GDPR Compliance

System Vulnerabilities Are an Issue for Everyone in the Cloud Environment

System Vulnerabilities Are an Issue for Everyone Over the past decade, we have seen a drastic increase in the number of companies relying on cloud services. Given the nature of the cloud as a shared-resource environment, threats that infiltrate the system of a single provider
Not Digital Transformation; It’s “Intelligence Transformation” We Seek

Not Digital Transformation; It’s “Intelligence Transformation” We Seek

Forrester published a report titled “The Sorry State of Digital Transformation in 2018” (love the brashness of the title) that found that 21% of 1,559 business and IT decision makers consider their digital transformations complete.  Complete? Say what?! The concept of “Digital Transformation” is confusing because many
katie-cullen-montgomerie

Is There Still A Place For On-premise Migration Tools In The Cloud?

On-premise Migration Tools

With the popularity of cheap and convenient online migration tools, it’s hard to imagine why there would still be a need for typically outdated and expensive on-premise migration software. But with concerns over cloud security and reliability, is there a better way?

When Amazon Web Services went down on the 28th of February 2017, it brought concerns about cloud reliability bubbling to the surface. As the largest cloud hosting provider, many companies were affected. I use several cloud-based tools, and I watched in horror as everything ground to a halt.

Similarly, cloud security became an even hotter topic with the Cloudflare breach earlier this year. The breach was caused by a major security flaw in the Cloudflare software that exposed user login details, private messages and other sensitive information from popular apps like Uber, Fitbit and OKCupid over a period of months.

These two examples are the products of internal errors, not of nefarious designs. But it does pose the question: if these sorts of mistakes can happen without the assistance of a hacker, how safe is your data if someone really wants access to it?

Public clouds are hugely attractive targets to hackers because of the sheer quantity of sensitive data contained within them. Additionally, the rate of technological development is outstripping the pace of regulatory authorities. Therefore it may be some time before the cloud is truly a safe and reliable place to store data. The GDPR in Europe is the first major step to regulate the industry, with offenders potentially being fined up to 5% of their worldwide turnover.

But here’s the rub: the cloud is such a convenient, cost effective and easy place to store data that we all want to use it. In fact, I would hazard a guess that everyone reading this article has at least some data stored in the cloud.

Storing data is one thing. Assuming you do due diligence ,you can mitigate many privacy and security risks associated with cloud storage.

But what if you’re migrating your data to the cloud? For something you hope to only do once, is it necessary to go through all the same steps to ensure your data is secure?

If you’re using a cloud migration provider, the answer is yes.

It is imperative you perform the same due diligence to ensure your data is safe when moving from an on-premise server, to one in the cloud.

Your other option is an on-premise migration tool. These tools can move your data from your company sever to the cloud, without having to go through any middle-men servers on the way.

Let’s weigh up the pros and cons of these options:

Cloud Migration Tool

Migration tools

Pros

  • Cost effective: low-entrance subscription models mean you only pay for exactly what you use
  • Convenient: no software installation necessary
  • Up-to-date: you get the latest updates whenever they are released
  • Complete overview: you can see how your entire migration is progressing quickly and easily from a single portal

Cons

  • Decreased security: your data is in the hands of the vendor and you don’t necessarily know where your data is being stored, and which locations it is passing through
  • Reduced reliability: if there is a major outage, your data could be lost irrevocably
  • Slower migration: if any data conversion is necessary (as in the case of email migration), it adds another step to the process when using a cloud migration solution. This is because the data must be uploaded to the vendor’s server, converted, and only then transferred to the new cloud storage platform.

On-Premise Tool

Pros

  • Secure: your data is passing from your servers, directly to your cloud provider with no stops along the way
  • Reliability: assuming you have chosen a reliable tool, you don’t face the risk of losing data through an outage
  • Faster Migration: On-premise tools convert data first before migrating it, which eliminates the need of uploading it to a vendor server for the conversion before transferring to the chosen cloud storage platform.

Cons

  • Higher cost: on-premise tools are typically more expensive than cloud tools. Perpetual licenses require an up-front payment and mean a larger initial investment
  • Not as convenient: on-premise software requires you to install it wherever you will be performing the migration. This can mean additional IT resources are required.
  • Slower updates: On-premise tools are harder to update and typically less agile. Updates must be installed, and oftentimes additional maintenance must be paid to benefit from updates.
  • No overview: you can’t see how your entire migration is progressing when software is installed in multiple locations

Neither solution is perfect, and it can be difficult to choose between options that both suffer from significant drawbacks.

Because of this, what is really needed is a hybrid model. An on-premise solution that offers similar features and licensing models to cloud solutions, while continuing to offer the increased security, speed and reliability of an on-premise tool.

While there haven’t been many companies to adopt this approach yet, with our latest release of Aid4Mail, this is what we have tried to achieve.

On-Premise with a Hybrid Approach

Pros

  • Cost effective: low-entrance subscription model means you only pay for exactly what you use, and the duration for which you want to use it
  • Up-to-date: you get the latest updates whenever they are released, without additional maintenance payments. However, these updates do need to be installed.
  • Secure: your data is passing from your servers, directly to your cloud provider with no stops along the way
  • Reliable: you need have no fears about losing data through an outage
  • Speed: converts data faster than cloud tools as the conversion takes place on premise before the data is uploaded to the cloud
  • Complete overview: you can see how your entire migration is progressing quickly and easily from a single portal, no matter where the software is installed

Cons

  • Not as convenient: you need to install it wherever you will be performing the migration. This can mean additional IT resources are required.

More on-premise migration vendors need to adopt a hybrid approach that allows their customers to benefit from the security of an on-premise tool, with the convenience of a cloud solution. Until the industry has matured we will continue to see data breaches and outages. Because of this, unnecessary risks and costs should be avoided wherever possible with a one-time migration. Even when the industry matures and data breaches and outages become less common, some highly regulated industries (like finance, healthcare and aviation) will be required to take extra precautions when migrating their data.

For the foreseeable future, there is still a place for on-premise migration tools. But this doesn’t mean they need to be inconvenient, costly and slow to improve. On-premise vendors can’t allow themselves to stagnate, and should start taking steps to move their offerings into the 21st century.

contributorBy Katie Cullen Montgomerie

Katie is the marketing and communications manager for Fookes Software, the developers of email migration software Aid4Mail. A new version of Aid4Mail Migrator has recently been released that takes the hybrid approach to on-premise email migrations.

Cloud Syndicate

The 'Cloud Syndicate' is a mix of short term guest contributors, curated resources and syndication partners covering a variety of interesting technology related topics.

Contact us for syndication details on how to connect your technology article or news feed to our syndication network.

TOP ARCHIVES

Make Your Smart Device Even Smarter By Answering These 4 Questions

Make Your Smart Device Even Smarter By Answering These 4 Questions

Make Your Smart Device Even Smarter The Internet of Things (IoT) has reached the peak of its hype cycle for emerging technologies, ...
10 Online Savings and Wealth Management Services

10 Online Savings and Wealth Management Services

Wealth Management Services There are a lot of cloud based options for those of you wanting to save for a ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...
A Closer Look at the Hidden Costs of Collaboration Solutions

A Closer Look at the Hidden Costs of Collaboration Solutions

The Hidden Costs of Collaboration Solutions Collaboration technology is key to efficient communication and productivity for a dispersed and global ...
The Cloud Has Your Data (Whether You Like It Or Not)

The Cloud Has Your Data (Whether You Like It Or Not)

Cloud Cleanup Anyone? Following on where we left off from my last two articles now we shift focus to what ...

PARNTER LEARNING

$1,499.00Enroll Now

Cyber Security Expert Master's Program

Cyber Security Expert Master’s Program

The course will teach you: Advanced hacking concepts that can help you manage information security better. Architectures of frame cloud data storage and security strategies. You will learn how to use them to find and analyze risks. How to install, ...

$2,899.00Enroll Now

CEH (v10) – Certified Ethical Hacker Training Course

CEH (v10) – Certified Ethical Hacker Training Course

The course will help you: To understand the tactics and methodologies that hackers use to attack and penetrate any network. Understand honeypots, wireless hacking, firewall, and IDS. Become an expert in the hacking concepts, including smartphone hacking, writing virus codes, ...