SlideShare a Scribd company logo
1 of 1
Download to read offline
FLEXIBILITY. ACCESSIBILITY.
SCALABILITY.
Without a doubt, cloud services area top
solution today – and this fact is changing the
world. As Steve Jobs used to say, “Everything
is important – that success is in the details”.
Same here. As interest in cloud services
increases, so do worries about its specifics,
mainly its security.
By the way… Did you know that, in 2019,
total enterprise spending on security
outsourcing services will be 80% of the ex-
penses on security software and hardware
products, up from 50% in 2015?
Nowadays, cloud-based solutions are
becoming more and more popular. Many of
the leading global companies are using them
to implement their key business initiatives.
The effect? Adequate data security has
become crucial.
It is a fact that companies are subject to
constant evolution. But at least one thing
remains the same: taking care of the good
image of the company and being reliable
for customers – those two aspects have the
highest priority. Given such a context, it is
important to ask whether cloud services
meet the challenge.
Let us be frank about it. Without secu-
rity services there are no cloud services.
Nowadays, security technology should be
built into every cloud solution, because it is
the foundation for best-in- class services.
So, what do you need to keep all the data safe
and sound?
• Vulnerability Tracking – to verify the
security of an IT environment by executing
periodic vulnerability scans.
• Patch Management – to get a collection
of vulnerability-related information from
various sources, like vendor sites, security
bulletins and vulnerability databases.
• Security Monitoring – to effectively
monitor the security of IT environments,
enabling you to quickly identify, analyse and
respond to potential security threats.
• Security Operations Center – to be in
control all the time – seven days a week,
24 hours a day.
• Compliance Management – to improve
compliance with our support, identify and
deploy best security practices and regulatory
requirements.
• Risk Management – to manage open
threats by introducing controls, corrective
actions, or other means aimed at mitigating
risk.
• Business Continuity Management – to
determine the maturity of controls in terms
of the Information Security  Business
Continuity domains.
It is not a thing of the future any longer.
Comarch’s portfolio already contains
an extensive set of security services.
Comarch cloud solutions are built on the
foundation of providing security services
that include the aspects mentioned above.
Additionally, we provide security services
which can add even more to a customer’s
cloud infrastructure. Both cases ensure that
our customer’s data is secure.
Clearly, doing cloud services right requires
the use of a wide array of tools. Let’s pick and
underline the three most important ones:
effective IT security monitoring, vulnerabil-
ity tracking, and consistent implementation
of ITIL best industrial practices and the
required safety certificates (ISO 27001, ISAE
3402 type I and II, PCI DSS, etc.). Such a trio
can mean only one thing – a good night’s
sleep for CEOs and companies’ management.
NONETHELESS, THE POWEROF
PERSONALIZATION CANNOT BE
IGNORED.
Only precise analyses of customers’ needs
enable the planning and implementation of
security solutions that fulfil their specific
requirements. All of that definitely needs to
be supported by expertise. Dedicated secure
solutions are designed by specialists experi-
enced in areas such as firewalls, data leakage,
content security, secure switching, routing,
and secure networks, to mention but a few.
And this is (mainly) what differentiates first-
class cloud services from others.
Not so long ago, the only way to access a new application was to install it from a floppy disk.
Prehistory, huh? Now we have the Internet. Anytime. Anywhere. Everywhere: in the office,
at home, in cafés, on the street,even on the beach. We live in a world where we are connected
all the time. This influences our lifestyle, our interests and attitude, it changes the way we work.
This means a whole new era for the software industry. And this era should be called “Cloud”.
SLEEPING WELL WITH CLOUD SERVICES
Author: Lukasz Lacniak, Business Solutions Architect Comarch ICT
www.ict.comarch.com | services@comarch.com

More Related Content

What's hot

The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapCitrix
 
Aerospace Company Customer Presentation
Aerospace Company Customer PresentationAerospace Company Customer Presentation
Aerospace Company Customer PresentationSplunk
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityElasticsearch
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security Cristian Garcia G.
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanNetIQ
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomyCisco Russia
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Kenneth de Brucq
 
Five Key Trends for Data-Centric Security
Five Key Trends for Data-Centric SecurityFive Key Trends for Data-Centric Security
Five Key Trends for Data-Centric SecuritySeclore
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Marc Vael
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTIoT613
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus visionMarc Vael
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked inJohn Masiliunas
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaborationcentralohioissa
 
The Role of Technology in the Legal Industry 2
The Role of Technology in the Legal Industry 2The Role of Technology in the Legal Industry 2
The Role of Technology in the Legal Industry 2E-MIT Solutions
 

What's hot (20)

AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Aerospace Company Customer Presentation
Aerospace Company Customer PresentationAerospace Company Customer Presentation
Aerospace Company Customer Presentation
 
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoTCyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit security
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
 
Five Key Trends for Data-Centric Security
Five Key Trends for Data-Centric SecurityFive Key Trends for Data-Centric Security
Five Key Trends for Data-Centric Security
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus vision
 
Seeberger
Seeberger Seeberger
Seeberger
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked in
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
 
The Role of Technology in the Legal Industry 2
The Role of Technology in the Legal Industry 2The Role of Technology in the Legal Industry 2
The Role of Technology in the Legal Industry 2
 

Viewers also liked

15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...
15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...
15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...Futurum2
 
PRINCE2 FOUNDATION
PRINCE2 FOUNDATIONPRINCE2 FOUNDATION
PRINCE2 FOUNDATIONjerinbiju
 
Raychel Harvey Jones | Today's Breaking News
Raychel Harvey Jones | Today's Breaking NewsRaychel Harvey Jones | Today's Breaking News
Raychel Harvey Jones | Today's Breaking NewsRaychel Harvey Jones
 
Spark of life: maximising urban efficiency through location-based analytics
Spark of life: maximising urban efficiency through location-based analyticsSpark of life: maximising urban efficiency through location-based analytics
Spark of life: maximising urban efficiency through location-based analyticsThe Economist Media Businesses
 
Unlocking Data Trapped in Audio & Video Files
Unlocking Data Trapped in  Audio & Video FilesUnlocking Data Trapped in  Audio & Video Files
Unlocking Data Trapped in Audio & Video FilesPaul Murphy
 
Obligasi konversi - akuntansi bagian 2 a
Obligasi konversi - akuntansi bagian 2 aObligasi konversi - akuntansi bagian 2 a
Obligasi konversi - akuntansi bagian 2 aFuturum2
 

Viewers also liked (10)

15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...
15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...
15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...
 
La modernidad
La modernidadLa modernidad
La modernidad
 
S 3 persona
 S 3 persona S 3 persona
S 3 persona
 
PRINCE2 FOUNDATION
PRINCE2 FOUNDATIONPRINCE2 FOUNDATION
PRINCE2 FOUNDATION
 
Raychel Harvey Jones | Today's Breaking News
Raychel Harvey Jones | Today's Breaking NewsRaychel Harvey Jones | Today's Breaking News
Raychel Harvey Jones | Today's Breaking News
 
Spark of life: maximising urban efficiency through location-based analytics
Spark of life: maximising urban efficiency through location-based analyticsSpark of life: maximising urban efficiency through location-based analytics
Spark of life: maximising urban efficiency through location-based analytics
 
Unlocking Data Trapped in Audio & Video Files
Unlocking Data Trapped in  Audio & Video FilesUnlocking Data Trapped in  Audio & Video Files
Unlocking Data Trapped in Audio & Video Files
 
Obligasi konversi - akuntansi bagian 2 a
Obligasi konversi - akuntansi bagian 2 aObligasi konversi - akuntansi bagian 2 a
Obligasi konversi - akuntansi bagian 2 a
 
Get Big Geo Data
Get Big Geo DataGet Big Geo Data
Get Big Geo Data
 
Vector
Vector Vector
Vector
 

Similar to Sleeping well with cloud services

Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Cyber Security and Cloud Security
Cyber Security and Cloud SecurityCyber Security and Cloud Security
Cyber Security and Cloud SecurityIT Governance Ltd
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb finalChristophe Monnier
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?Lori McInnes
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingRichard Kennedy
 
Know the Cloud ERP and safety in your business.pdf
Know the Cloud ERP and safety in your business.pdfKnow the Cloud ERP and safety in your business.pdf
Know the Cloud ERP and safety in your business.pdfJose thomas
 
F_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfF_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfjosbjs
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technologyrosswilks1
 
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...Dana Gardner
 

Similar to Sleeping well with cloud services (20)

The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Cyber Security and Cloud Security
Cyber Security and Cloud SecurityCyber Security and Cloud Security
Cyber Security and Cloud Security
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
Networking Expertise
Networking ExpertiseNetworking Expertise
Networking Expertise
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?
 
Uptime Group
Uptime GroupUptime Group
Uptime Group
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote Working
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
 
Azure security
Azure securityAzure security
Azure security
 
Know the Cloud ERP and safety in your business.pdf
Know the Cloud ERP and safety in your business.pdfKnow the Cloud ERP and safety in your business.pdf
Know the Cloud ERP and safety in your business.pdf
 
F_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfF_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdf
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technology
 
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
 

More from Comarch_Services

From Automation System to Hyperconvergence - The Top Data Center Trends in Re...
From Automation System to Hyperconvergence - The Top Data Center Trends in Re...From Automation System to Hyperconvergence - The Top Data Center Trends in Re...
From Automation System to Hyperconvergence - The Top Data Center Trends in Re...Comarch_Services
 
ЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDI
ЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDIЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDI
ЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDIComarch_Services
 
Kierunki i trendy rozwoju EDI [RU]
Kierunki i trendy rozwoju EDI [RU]Kierunki i trendy rozwoju EDI [RU]
Kierunki i trendy rozwoju EDI [RU]Comarch_Services
 
Korus conference 24.04.2015 - Olga Vislavnykh
Korus conference 24.04.2015 - Olga VislavnykhKorus conference 24.04.2015 - Olga Vislavnykh
Korus conference 24.04.2015 - Olga VislavnykhComarch_Services
 
Comarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographicComarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographicComarch_Services
 
How Internet of Things revolutionizes the retail marketing & customer experience
How Internet of Things revolutionizes the retail marketing & customer experienceHow Internet of Things revolutionizes the retail marketing & customer experience
How Internet of Things revolutionizes the retail marketing & customer experienceComarch_Services
 
Pierwszy krok w chmurach, czyli Warsztaty Contact Center
Pierwszy krok w chmurach, czyli Warsztaty Contact CenterPierwszy krok w chmurach, czyli Warsztaty Contact Center
Pierwszy krok w chmurach, czyli Warsztaty Contact CenterComarch_Services
 
Answers to deliver outstanding customer experience with the Omni-Channel Appr...
Answers to deliver outstanding customer experience with the Omni-Channel Appr...Answers to deliver outstanding customer experience with the Omni-Channel Appr...
Answers to deliver outstanding customer experience with the Omni-Channel Appr...Comarch_Services
 
Delivering an exceptional customer experience with a next-generation customer...
Delivering an exceptional customer experience with a next-generation customer...Delivering an exceptional customer experience with a next-generation customer...
Delivering an exceptional customer experience with a next-generation customer...Comarch_Services
 
Customer Relationship Revolution What’s Next?
Customer Relationship Revolution What’s Next?Customer Relationship Revolution What’s Next?
Customer Relationship Revolution What’s Next?Comarch_Services
 
Advanced Back Office Optimization
Advanced Back Office OptimizationAdvanced Back Office Optimization
Advanced Back Office OptimizationComarch_Services
 
Contact center - czyli co i kiedy nam się oplaca?
Contact center - czyli co i kiedy nam się oplaca?Contact center - czyli co i kiedy nam się oplaca?
Contact center - czyli co i kiedy nam się oplaca?Comarch_Services
 

More from Comarch_Services (19)

Comarch ICT - CLOUD EXPO
Comarch ICT - CLOUD EXPOComarch ICT - CLOUD EXPO
Comarch ICT - CLOUD EXPO
 
From Automation System to Hyperconvergence - The Top Data Center Trends in Re...
From Automation System to Hyperconvergence - The Top Data Center Trends in Re...From Automation System to Hyperconvergence - The Top Data Center Trends in Re...
From Automation System to Hyperconvergence - The Top Data Center Trends in Re...
 
Automated Data Center?
Automated Data Center?Automated Data Center?
Automated Data Center?
 
Case study carrefour
Case study carrefourCase study carrefour
Case study carrefour
 
Bp letter of references
Bp letter of referencesBp letter of references
Bp letter of references
 
ЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDI
ЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDIЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDI
ЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDI
 
Comarch at ECR Forum 2015
Comarch at ECR Forum 2015Comarch at ECR Forum 2015
Comarch at ECR Forum 2015
 
Kierunki i trendy rozwoju EDI [RU]
Kierunki i trendy rozwoju EDI [RU]Kierunki i trendy rozwoju EDI [RU]
Kierunki i trendy rozwoju EDI [RU]
 
Korus conference 24.04.2015 - Olga Vislavnykh
Korus conference 24.04.2015 - Olga VislavnykhKorus conference 24.04.2015 - Olga Vislavnykh
Korus conference 24.04.2015 - Olga Vislavnykh
 
Comarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographicComarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographic
 
How Internet of Things revolutionizes the retail marketing & customer experience
How Internet of Things revolutionizes the retail marketing & customer experienceHow Internet of Things revolutionizes the retail marketing & customer experience
How Internet of Things revolutionizes the retail marketing & customer experience
 
Zipwire Cloud solution
Zipwire Cloud solutionZipwire Cloud solution
Zipwire Cloud solution
 
Pierwszy krok w chmurach, czyli Warsztaty Contact Center
Pierwszy krok w chmurach, czyli Warsztaty Contact CenterPierwszy krok w chmurach, czyli Warsztaty Contact Center
Pierwszy krok w chmurach, czyli Warsztaty Contact Center
 
Answers to deliver outstanding customer experience with the Omni-Channel Appr...
Answers to deliver outstanding customer experience with the Omni-Channel Appr...Answers to deliver outstanding customer experience with the Omni-Channel Appr...
Answers to deliver outstanding customer experience with the Omni-Channel Appr...
 
Comarch
ComarchComarch
Comarch
 
Delivering an exceptional customer experience with a next-generation customer...
Delivering an exceptional customer experience with a next-generation customer...Delivering an exceptional customer experience with a next-generation customer...
Delivering an exceptional customer experience with a next-generation customer...
 
Customer Relationship Revolution What’s Next?
Customer Relationship Revolution What’s Next?Customer Relationship Revolution What’s Next?
Customer Relationship Revolution What’s Next?
 
Advanced Back Office Optimization
Advanced Back Office OptimizationAdvanced Back Office Optimization
Advanced Back Office Optimization
 
Contact center - czyli co i kiedy nam się oplaca?
Contact center - czyli co i kiedy nam się oplaca?Contact center - czyli co i kiedy nam się oplaca?
Contact center - czyli co i kiedy nam się oplaca?
 

Recently uploaded

Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncrdollysharma2066
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 

Recently uploaded (20)

Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / NcrCall Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
Call Girls in DELHI Cantt, ( Call Me )-8377877756-Female Escort- In Delhi / Ncr
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 

Sleeping well with cloud services

  • 1. FLEXIBILITY. ACCESSIBILITY. SCALABILITY. Without a doubt, cloud services area top solution today – and this fact is changing the world. As Steve Jobs used to say, “Everything is important – that success is in the details”. Same here. As interest in cloud services increases, so do worries about its specifics, mainly its security. By the way… Did you know that, in 2019, total enterprise spending on security outsourcing services will be 80% of the ex- penses on security software and hardware products, up from 50% in 2015? Nowadays, cloud-based solutions are becoming more and more popular. Many of the leading global companies are using them to implement their key business initiatives. The effect? Adequate data security has become crucial. It is a fact that companies are subject to constant evolution. But at least one thing remains the same: taking care of the good image of the company and being reliable for customers – those two aspects have the highest priority. Given such a context, it is important to ask whether cloud services meet the challenge. Let us be frank about it. Without secu- rity services there are no cloud services. Nowadays, security technology should be built into every cloud solution, because it is the foundation for best-in- class services. So, what do you need to keep all the data safe and sound? • Vulnerability Tracking – to verify the security of an IT environment by executing periodic vulnerability scans. • Patch Management – to get a collection of vulnerability-related information from various sources, like vendor sites, security bulletins and vulnerability databases. • Security Monitoring – to effectively monitor the security of IT environments, enabling you to quickly identify, analyse and respond to potential security threats. • Security Operations Center – to be in control all the time – seven days a week, 24 hours a day. • Compliance Management – to improve compliance with our support, identify and deploy best security practices and regulatory requirements. • Risk Management – to manage open threats by introducing controls, corrective actions, or other means aimed at mitigating risk. • Business Continuity Management – to determine the maturity of controls in terms of the Information Security Business Continuity domains. It is not a thing of the future any longer. Comarch’s portfolio already contains an extensive set of security services. Comarch cloud solutions are built on the foundation of providing security services that include the aspects mentioned above. Additionally, we provide security services which can add even more to a customer’s cloud infrastructure. Both cases ensure that our customer’s data is secure. Clearly, doing cloud services right requires the use of a wide array of tools. Let’s pick and underline the three most important ones: effective IT security monitoring, vulnerabil- ity tracking, and consistent implementation of ITIL best industrial practices and the required safety certificates (ISO 27001, ISAE 3402 type I and II, PCI DSS, etc.). Such a trio can mean only one thing – a good night’s sleep for CEOs and companies’ management. NONETHELESS, THE POWEROF PERSONALIZATION CANNOT BE IGNORED. Only precise analyses of customers’ needs enable the planning and implementation of security solutions that fulfil their specific requirements. All of that definitely needs to be supported by expertise. Dedicated secure solutions are designed by specialists experi- enced in areas such as firewalls, data leakage, content security, secure switching, routing, and secure networks, to mention but a few. And this is (mainly) what differentiates first- class cloud services from others. Not so long ago, the only way to access a new application was to install it from a floppy disk. Prehistory, huh? Now we have the Internet. Anytime. Anywhere. Everywhere: in the office, at home, in cafés, on the street,even on the beach. We live in a world where we are connected all the time. This influences our lifestyle, our interests and attitude, it changes the way we work. This means a whole new era for the software industry. And this era should be called “Cloud”. SLEEPING WELL WITH CLOUD SERVICES Author: Lukasz Lacniak, Business Solutions Architect Comarch ICT www.ict.comarch.com | services@comarch.com