SlideShare a Scribd company logo
1 of 2
Download to read offline
RKON Technologies 328 S Jefferson, Ste. 450 Chicago, IL 60661 t: 312-654-0300 www.rkon.com
Off Premise Corporate Data Storage
Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery
and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud
storage services—such as Dropbox, Box, OneDrive—which are also known as hosted, off premise solutions.
These services have become widely popular within the consumer market. The explosive growth of the mobile device
industry over the past three years has been the main driver for the cloud storage market. Consumers were in search of
a way to easily share and access files, pictures and video content across all their devices whether it be a laptop, desk-
top or smart device. They wanted their content readily accessible and east to access. Companies like Dropbox and
Box were the early pioneers of this cloud storage niche that has now become a battleground for the big players such
as Google and Microsoft. The competition of this market has benefited the consumer with cost-effective pricing and
almost limitless storage. Microsoft includes 1TB of OneDrive storage with the Office 365 subscription and Dropbox cost
$99/year for 1TB.
Consumers, now equipped with a DropBox or similar service for personal data, demand the ability to access corporate
data on their smart devices or mobile workspace in a similar manner. Initially, this leads to people using their personal
accounts to store and share work related documents. With this, a variety of issues surfaced when using this approach;
from security to compliance the list runs long. In order to remedy these issues, corporations began buying enterprise
accounts from cloud storage providers where a higher degree of security is offered, and access control to data and
improved logging addressed some compliance issues.
Service Level Agreement Omission
Though these services are scrambling to entice the enterprise market, there
are still many apprehensions I have that prohibit me from recommending
these services for corporate data. First and foremost, the omission of a Service
Level Agreement (SLA) guaranteeing the availability of data is a concern. Most
IT organizations build resilient networks with three, four or five 9’s of uptime.
This equates to a high degree of availability for your corporate data. As a
corporate user, you expect (or require) the same level of service for your cloud
Consequences of Combining off premise
cloud storage and corporate data
By Marc Malizia
Chief Technology Officer, RKON Technologies
February 5, 2015
(as published in CloudTweaks)
Solution Paper
RKON Technologies 328 S Jefferson, Ste. 450 Chicago, IL 60661 t: 312-654-0300 www.rkon.com
storage, yet most of these providers only commit to “provide the service as is“, “with all faults” and “as available” while
providing no warranty that the service will be uninterrupted, free of harmful components or that the content will be
secure or not lost or damaged. These terms and conditions significantly minimize the provider’s responsibility to ensure
data is accessible, safe, error-free and uninterrupted. On the flip side, it’s hard to believe a company would accept this
type of disclaimer from an internal IT department.
Maintenance Scheduling
Most IT departments schedule routine maintenance windows to patch and upgrade systems when usage is low. These
windows typically occur on the weekend or late at night to minimize disruption. Cloud storage providers reserve the
right, at their sole discretion, to make necessary unscheduled deployments of changes, updates or enhancements to
the Service at any time. In essence, upgrading their systems whenever they desire.
Also worth considering, is the fact that these services can terminate any account, locking users out of data at any given
time with or without cause based on their sole discretion and charge an additional fee to retrieve the data once this
occurs.
While the off-premise service providers’ capabilities may fit the needs of consumers, the risk potential when it comes to
data loss and security can significantly inhibit satisfaction and productivity for corporate users. To shield your organiza-
tion from these threats, I suggest leveraging the providers that allow on-premise implementations of their software. By
doing so, companies can take advantage of the ease of use and accessibility these applications offer, while enjoying
the peace of mind that comes with a higher degree of security, compliance, availability and accessibility of an incredibly
valuable asset: their data.

More Related Content

What's hot

The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)Hybrid Cloud
 
Enterprise File Fabric for Igneous
Enterprise File Fabric for IgneousEnterprise File Fabric for Igneous
Enterprise File Fabric for IgneousHybrid Cloud
 
Storage Made Easy Case Study | Arsenal F.C.
Storage Made Easy Case Study | Arsenal F.C.Storage Made Easy Case Study | Arsenal F.C.
Storage Made Easy Case Study | Arsenal F.C.Hybrid Cloud
 
The Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution BriefThe Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution BriefHybrid Cloud
 
SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the cloudsSharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the cloudsBIWUG
 
M-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefM-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefHybrid Cloud
 
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareThe Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareHybrid Cloud
 
The Enterprise File Fabric for Scality
The Enterprise File Fabric for ScalityThe Enterprise File Fabric for Scality
The Enterprise File Fabric for ScalityHybrid Cloud
 
Aberdeen group, the case for data deduplication in highly virtualized environ...
Aberdeen group, the case for data deduplication in highly virtualized environ...Aberdeen group, the case for data deduplication in highly virtualized environ...
Aberdeen group, the case for data deduplication in highly virtualized environ...mag4freemagazine
 
J Tobolski Cloud Computing
J Tobolski Cloud ComputingJ Tobolski Cloud Computing
J Tobolski Cloud ComputingArt Upton
 
A blueprint for data in a multicloud world
A blueprint for data in a multicloud worldA blueprint for data in a multicloud world
A blueprint for data in a multicloud worldMehdi Charafeddine
 
Driving collaboration and interoperability within healthcare for better patie...
Driving collaboration and interoperability within healthcare for better patie...Driving collaboration and interoperability within healthcare for better patie...
Driving collaboration and interoperability within healthcare for better patie...Axway
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends RoundtableCommunity IT Innovators
 
The Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIOThe Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIOHybrid Cloud
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicCitrix
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for SuccessCitrix
 
Webinar: How to Design a Compliant and GDPR Ready Collaboration System
Webinar: How to Design a Compliant and GDPR Ready Collaboration SystemWebinar: How to Design a Compliant and GDPR Ready Collaboration System
Webinar: How to Design a Compliant and GDPR Ready Collaboration SystemStorage Switzerland
 

What's hot (20)

The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
The Enterprise File Fabric for Leonovus User Collaboration Interface (LUCI)
 
Enterprise File Fabric for Igneous
Enterprise File Fabric for IgneousEnterprise File Fabric for Igneous
Enterprise File Fabric for Igneous
 
What is killing ecm
What is killing ecmWhat is killing ecm
What is killing ecm
 
Storage Made Easy Case Study | Arsenal F.C.
Storage Made Easy Case Study | Arsenal F.C.Storage Made Easy Case Study | Arsenal F.C.
Storage Made Easy Case Study | Arsenal F.C.
 
The Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution BriefThe Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution Brief
 
DMS
DMSDMS
DMS
 
SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the cloudsSharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
SharePoint Saturday Belgium 2014 - A practical guide for navigating the clouds
 
M-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefM-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution Brief
 
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and ShareThe Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
The Enterprise File Fabric for Cloudian | GDPR ready File Sync and Share
 
The Enterprise File Fabric for Scality
The Enterprise File Fabric for ScalityThe Enterprise File Fabric for Scality
The Enterprise File Fabric for Scality
 
Aberdeen group, the case for data deduplication in highly virtualized environ...
Aberdeen group, the case for data deduplication in highly virtualized environ...Aberdeen group, the case for data deduplication in highly virtualized environ...
Aberdeen group, the case for data deduplication in highly virtualized environ...
 
J Tobolski Cloud Computing
J Tobolski Cloud ComputingJ Tobolski Cloud Computing
J Tobolski Cloud Computing
 
A blueprint for data in a multicloud world
A blueprint for data in a multicloud worldA blueprint for data in a multicloud world
A blueprint for data in a multicloud world
 
Driving collaboration and interoperability within healthcare for better patie...
Driving collaboration and interoperability within healthcare for better patie...Driving collaboration and interoperability within healthcare for better patie...
Driving collaboration and interoperability within healthcare for better patie...
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable
 
The Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIOThe Enterprise File Fabric for OpenIO
The Enterprise File Fabric for OpenIO
 
Manage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data InfographicManage Risk By Protecting the Apps and Data Infographic
Manage Risk By Protecting the Apps and Data Infographic
 
TierPoint_ColocationWhitepaper-Six_Reasons
TierPoint_ColocationWhitepaper-Six_ReasonsTierPoint_ColocationWhitepaper-Six_Reasons
TierPoint_ColocationWhitepaper-Six_Reasons
 
Security Strategies for Success
Security Strategies for SuccessSecurity Strategies for Success
Security Strategies for Success
 
Webinar: How to Design a Compliant and GDPR Ready Collaboration System
Webinar: How to Design a Compliant and GDPR Ready Collaboration SystemWebinar: How to Design a Compliant and GDPR Ready Collaboration System
Webinar: How to Design a Compliant and GDPR Ready Collaboration System
 

Viewers also liked

Sesion de aprendizaje vivencial de religión: LOS TRES HEBREOS
Sesion de aprendizaje vivencial de religión: LOS TRES HEBREOSSesion de aprendizaje vivencial de religión: LOS TRES HEBREOS
Sesion de aprendizaje vivencial de religión: LOS TRES HEBREOSTobias Julio López Ponte
 
Luxurious Magazine Media Pack
Luxurious Magazine Media PackLuxurious Magazine Media Pack
Luxurious Magazine Media PackDaniel Ambrose
 
SplunkLive Miami Carnival Cruiselines - John Masseria
SplunkLive Miami   Carnival Cruiselines - John MasseriaSplunkLive Miami   Carnival Cruiselines - John Masseria
SplunkLive Miami Carnival Cruiselines - John MasseriaSplunk
 
SplunkLive! Zürich 2016 - Use Case Helvetia
SplunkLive! Zürich 2016 - Use Case HelvetiaSplunkLive! Zürich 2016 - Use Case Helvetia
SplunkLive! Zürich 2016 - Use Case HelvetiaSplunk
 
Splunk Implementation and Usage - Garmin
Splunk Implementation and Usage - GarminSplunk Implementation and Usage - Garmin
Splunk Implementation and Usage - GarminSplunk
 

Viewers also liked (10)

Resume
ResumeResume
Resume
 
Sesion de aprendizaje vivencial de religión: LOS TRES HEBREOS
Sesion de aprendizaje vivencial de religión: LOS TRES HEBREOSSesion de aprendizaje vivencial de religión: LOS TRES HEBREOS
Sesion de aprendizaje vivencial de religión: LOS TRES HEBREOS
 
Luxurious Magazine Media Pack
Luxurious Magazine Media PackLuxurious Magazine Media Pack
Luxurious Magazine Media Pack
 
SplunkLive Miami Carnival Cruiselines - John Masseria
SplunkLive Miami   Carnival Cruiselines - John MasseriaSplunkLive Miami   Carnival Cruiselines - John Masseria
SplunkLive Miami Carnival Cruiselines - John Masseria
 
Eevalauation SAMEER BAMOALLEM QUALITY MANAGER
Eevalauation SAMEER BAMOALLEM QUALITY MANAGEREevalauation SAMEER BAMOALLEM QUALITY MANAGER
Eevalauation SAMEER BAMOALLEM QUALITY MANAGER
 
Los gemelos
Los gemelosLos gemelos
Los gemelos
 
La escuela de frankfurt
La escuela de frankfurtLa escuela de frankfurt
La escuela de frankfurt
 
SplunkLive! Zürich 2016 - Use Case Helvetia
SplunkLive! Zürich 2016 - Use Case HelvetiaSplunkLive! Zürich 2016 - Use Case Helvetia
SplunkLive! Zürich 2016 - Use Case Helvetia
 
Splunk Implementation and Usage - Garmin
Splunk Implementation and Usage - GarminSplunk Implementation and Usage - Garmin
Splunk Implementation and Usage - Garmin
 
Los Cinco Sentidos
Los Cinco SentidosLos Cinco Sentidos
Los Cinco Sentidos
 

Similar to Factors to keep in mind when you’re considering cloud storage services.

On premise vs cloud software
On premise vs cloud softwareOn premise vs cloud software
On premise vs cloud softwareTCM infosys
 
What are the advantages of adopting public cloud
What are the advantages of adopting public cloudWhat are the advantages of adopting public cloud
What are the advantages of adopting public cloudNicole Khoo
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxMetaorange
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is CloudWilliam Lam
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
NEC Backup as a Service reduces administrative tasks, helping it departments...
 NEC Backup as a Service reduces administrative tasks, helping it departments... NEC Backup as a Service reduces administrative tasks, helping it departments...
NEC Backup as a Service reduces administrative tasks, helping it departments...InteractiveNEC
 
Read the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docxRead the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docxmakdul
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogativeWayne Poggenpoel
 
The Storage Side of Private Clouds
The Storage Side of Private CloudsThe Storage Side of Private Clouds
The Storage Side of Private CloudsDataCore Software
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computingHossam Zein
 
internal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideinternal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideSatchit Dokras
 
What is cloud computing report
What is cloud computing reportWhat is cloud computing report
What is cloud computing reportProduct Reviews
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management Padma Jella
 
The Benefits of Cloud Storage for Businesses in 2023.pptx
The Benefits of Cloud Storage for Businesses in 2023.pptxThe Benefits of Cloud Storage for Businesses in 2023.pptx
The Benefits of Cloud Storage for Businesses in 2023.pptxWP CONSULTANTS & SOLUTIONS LLC
 
Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyOneNeck
 

Similar to Factors to keep in mind when you’re considering cloud storage services. (20)

On premise vs cloud software
On premise vs cloud softwareOn premise vs cloud software
On premise vs cloud software
 
Data Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud ComputingData Security and Privacy in Cloud Computing
Data Security and Privacy in Cloud Computing
 
What are the advantages of adopting public cloud
What are the advantages of adopting public cloudWhat are the advantages of adopting public cloud
What are the advantages of adopting public cloud
 
Vps server 3
Vps server 3Vps server 3
Vps server 3
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 
How Secure Is Cloud
How Secure Is CloudHow Secure Is Cloud
How Secure Is Cloud
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
NEC Backup as a Service reduces administrative tasks, helping it departments...
 NEC Backup as a Service reduces administrative tasks, helping it departments... NEC Backup as a Service reduces administrative tasks, helping it departments...
NEC Backup as a Service reduces administrative tasks, helping it departments...
 
Read the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docxRead the Discussions below and give a good replyDiscussion 1..docx
Read the Discussions below and give a good replyDiscussion 1..docx
 
Cloud Computing - A future prerogative
Cloud Computing - A future prerogativeCloud Computing - A future prerogative
Cloud Computing - A future prerogative
 
The Storage Side of Private Clouds
The Storage Side of Private CloudsThe Storage Side of Private Clouds
The Storage Side of Private Clouds
 
10 security concerns cloud computing
10 security concerns cloud computing10 security concerns cloud computing
10 security concerns cloud computing
 
internal-cloud-audit-risk-guide
internal-cloud-audit-risk-guideinternal-cloud-audit-risk-guide
internal-cloud-audit-risk-guide
 
Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?Facing the Future - Is the cloud right for you?
Facing the Future - Is the cloud right for you?
 
The storage matrix netmagic
The storage matrix   netmagicThe storage matrix   netmagic
The storage matrix netmagic
 
Netmagic the-storage-matrix
Netmagic the-storage-matrixNetmagic the-storage-matrix
Netmagic the-storage-matrix
 
What is cloud computing report
What is cloud computing reportWhat is cloud computing report
What is cloud computing report
 
Cloud computing Risk management
Cloud computing Risk management  Cloud computing Risk management
Cloud computing Risk management
 
The Benefits of Cloud Storage for Businesses in 2023.pptx
The Benefits of Cloud Storage for Businesses in 2023.pptxThe Benefits of Cloud Storage for Businesses in 2023.pptx
The Benefits of Cloud Storage for Businesses in 2023.pptx
 
Hybrid IT – A Winning Strategy
Hybrid IT – A Winning StrategyHybrid IT – A Winning Strategy
Hybrid IT – A Winning Strategy
 

More from Rita Barry

The time for SIEM
The time for SIEM The time for SIEM
The time for SIEM Rita Barry
 
Why so many SIEM Implmentations Fail
Why so many SIEM Implmentations FailWhy so many SIEM Implmentations Fail
Why so many SIEM Implmentations FailRita Barry
 
Carve-outs and Mergers and Acquisitions place unique demands on IT. How can y...
Carve-outs and Mergers and Acquisitions place unique demands on IT. How can y...Carve-outs and Mergers and Acquisitions place unique demands on IT. How can y...
Carve-outs and Mergers and Acquisitions place unique demands on IT. How can y...Rita Barry
 
Tertiary Hospital Services 2015
Tertiary Hospital Services 2015 Tertiary Hospital Services 2015
Tertiary Hospital Services 2015 Rita Barry
 
Biopharma Production & Development Week 2015
Biopharma Production & Development Week 2015 Biopharma Production & Development Week 2015
Biopharma Production & Development Week 2015 Rita Barry
 
Cell Line Development and Engineering 2015
Cell Line Development and Engineering 2015 Cell Line Development and Engineering 2015
Cell Line Development and Engineering 2015 Rita Barry
 
Biosimilars Asia 2015
Biosimilars Asia 2015 Biosimilars Asia 2015
Biosimilars Asia 2015 Rita Barry
 
5th Annual BioManufacturing Asia 2015
5th Annual BioManufacturing Asia 2015 5th Annual BioManufacturing Asia 2015
5th Annual BioManufacturing Asia 2015 Rita Barry
 
Pharmaceutical Compliance 2015
Pharmaceutical Compliance 2015 Pharmaceutical Compliance 2015
Pharmaceutical Compliance 2015 Rita Barry
 
OTC Pharma Asia 2015
OTC Pharma Asia 2015 OTC Pharma Asia 2015
OTC Pharma Asia 2015 Rita Barry
 
Philippines healthcare 2015
Philippines healthcare 2015Philippines healthcare 2015
Philippines healthcare 2015Rita Barry
 
9th Clearing, Settlement Custody Asia
9th Clearing, Settlement Custody Asia9th Clearing, Settlement Custody Asia
9th Clearing, Settlement Custody AsiaRita Barry
 
Biopharma Production and Development China 2015
Biopharma Production and Development China 2015 Biopharma Production and Development China 2015
Biopharma Production and Development China 2015 Rita Barry
 
Offshore RMB 2014
Offshore RMB 2014 Offshore RMB 2014
Offshore RMB 2014 Rita Barry
 
Generics Asia 2014
Generics Asia 2014 Generics Asia 2014
Generics Asia 2014 Rita Barry
 
8th genericsasia2013
8th genericsasia20138th genericsasia2013
8th genericsasia2013Rita Barry
 
Indonesia Healthcare 2014
Indonesia Healthcare 2014 Indonesia Healthcare 2014
Indonesia Healthcare 2014 Rita Barry
 
Pharmaceutical R&D Asia 2014
Pharmaceutical R&D Asia 2014 Pharmaceutical R&D Asia 2014
Pharmaceutical R&D Asia 2014 Rita Barry
 

More from Rita Barry (20)

The time for SIEM
The time for SIEM The time for SIEM
The time for SIEM
 
Why so many SIEM Implmentations Fail
Why so many SIEM Implmentations FailWhy so many SIEM Implmentations Fail
Why so many SIEM Implmentations Fail
 
Carve-outs and Mergers and Acquisitions place unique demands on IT. How can y...
Carve-outs and Mergers and Acquisitions place unique demands on IT. How can y...Carve-outs and Mergers and Acquisitions place unique demands on IT. How can y...
Carve-outs and Mergers and Acquisitions place unique demands on IT. How can y...
 
Hf asia15
Hf asia15Hf asia15
Hf asia15
 
Tertiary Hospital Services 2015
Tertiary Hospital Services 2015 Tertiary Hospital Services 2015
Tertiary Hospital Services 2015
 
Biopharma Production & Development Week 2015
Biopharma Production & Development Week 2015 Biopharma Production & Development Week 2015
Biopharma Production & Development Week 2015
 
Cell Line Development and Engineering 2015
Cell Line Development and Engineering 2015 Cell Line Development and Engineering 2015
Cell Line Development and Engineering 2015
 
Biosimilars Asia 2015
Biosimilars Asia 2015 Biosimilars Asia 2015
Biosimilars Asia 2015
 
5th Annual BioManufacturing Asia 2015
5th Annual BioManufacturing Asia 2015 5th Annual BioManufacturing Asia 2015
5th Annual BioManufacturing Asia 2015
 
Pharmaceutical Compliance 2015
Pharmaceutical Compliance 2015 Pharmaceutical Compliance 2015
Pharmaceutical Compliance 2015
 
OTC Pharma Asia 2015
OTC Pharma Asia 2015 OTC Pharma Asia 2015
OTC Pharma Asia 2015
 
Philippines healthcare 2015
Philippines healthcare 2015Philippines healthcare 2015
Philippines healthcare 2015
 
9th Clearing, Settlement Custody Asia
9th Clearing, Settlement Custody Asia9th Clearing, Settlement Custody Asia
9th Clearing, Settlement Custody Asia
 
Biopharma Production and Development China 2015
Biopharma Production and Development China 2015 Biopharma Production and Development China 2015
Biopharma Production and Development China 2015
 
Oncology asia
Oncology asiaOncology asia
Oncology asia
 
Offshore RMB 2014
Offshore RMB 2014 Offshore RMB 2014
Offshore RMB 2014
 
Generics Asia 2014
Generics Asia 2014 Generics Asia 2014
Generics Asia 2014
 
8th genericsasia2013
8th genericsasia20138th genericsasia2013
8th genericsasia2013
 
Indonesia Healthcare 2014
Indonesia Healthcare 2014 Indonesia Healthcare 2014
Indonesia Healthcare 2014
 
Pharmaceutical R&D Asia 2014
Pharmaceutical R&D Asia 2014 Pharmaceutical R&D Asia 2014
Pharmaceutical R&D Asia 2014
 

Recently uploaded

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 

Recently uploaded (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 

Factors to keep in mind when you’re considering cloud storage services.

  • 1. RKON Technologies 328 S Jefferson, Ste. 450 Chicago, IL 60661 t: 312-654-0300 www.rkon.com Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted, off premise solutions. These services have become widely popular within the consumer market. The explosive growth of the mobile device industry over the past three years has been the main driver for the cloud storage market. Consumers were in search of a way to easily share and access files, pictures and video content across all their devices whether it be a laptop, desk- top or smart device. They wanted their content readily accessible and east to access. Companies like Dropbox and Box were the early pioneers of this cloud storage niche that has now become a battleground for the big players such as Google and Microsoft. The competition of this market has benefited the consumer with cost-effective pricing and almost limitless storage. Microsoft includes 1TB of OneDrive storage with the Office 365 subscription and Dropbox cost $99/year for 1TB. Consumers, now equipped with a DropBox or similar service for personal data, demand the ability to access corporate data on their smart devices or mobile workspace in a similar manner. Initially, this leads to people using their personal accounts to store and share work related documents. With this, a variety of issues surfaced when using this approach; from security to compliance the list runs long. In order to remedy these issues, corporations began buying enterprise accounts from cloud storage providers where a higher degree of security is offered, and access control to data and improved logging addressed some compliance issues. Service Level Agreement Omission Though these services are scrambling to entice the enterprise market, there are still many apprehensions I have that prohibit me from recommending these services for corporate data. First and foremost, the omission of a Service Level Agreement (SLA) guaranteeing the availability of data is a concern. Most IT organizations build resilient networks with three, four or five 9’s of uptime. This equates to a high degree of availability for your corporate data. As a corporate user, you expect (or require) the same level of service for your cloud Consequences of Combining off premise cloud storage and corporate data By Marc Malizia Chief Technology Officer, RKON Technologies February 5, 2015 (as published in CloudTweaks) Solution Paper
  • 2. RKON Technologies 328 S Jefferson, Ste. 450 Chicago, IL 60661 t: 312-654-0300 www.rkon.com storage, yet most of these providers only commit to “provide the service as is“, “with all faults” and “as available” while providing no warranty that the service will be uninterrupted, free of harmful components or that the content will be secure or not lost or damaged. These terms and conditions significantly minimize the provider’s responsibility to ensure data is accessible, safe, error-free and uninterrupted. On the flip side, it’s hard to believe a company would accept this type of disclaimer from an internal IT department. Maintenance Scheduling Most IT departments schedule routine maintenance windows to patch and upgrade systems when usage is low. These windows typically occur on the weekend or late at night to minimize disruption. Cloud storage providers reserve the right, at their sole discretion, to make necessary unscheduled deployments of changes, updates or enhancements to the Service at any time. In essence, upgrading their systems whenever they desire. Also worth considering, is the fact that these services can terminate any account, locking users out of data at any given time with or without cause based on their sole discretion and charge an additional fee to retrieve the data once this occurs. While the off-premise service providers’ capabilities may fit the needs of consumers, the risk potential when it comes to data loss and security can significantly inhibit satisfaction and productivity for corporate users. To shield your organiza- tion from these threats, I suggest leveraging the providers that allow on-premise implementations of their software. By doing so, companies can take advantage of the ease of use and accessibility these applications offer, while enjoying the peace of mind that comes with a higher degree of security, compliance, availability and accessibility of an incredibly valuable asset: their data.