Upload
centrilogic
View
1.161
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Cloud hosting services are the great equalizer. They give small businesses easy access to technology that up to now has only been available to larger enterprises. However, the ease of access to cloud services has created a major security problem for IT departments. Critical company data is slipping into the public cloud without IT’s knowledge, putting the data, the company and the customers at risk. Do you know why your end-users are going rogue? Better yet, do you know how to stop such behaviour?
Citation preview
CentriLogic is a leading
provider of outsourced Data Center and Hosting solutions for organizations doing brand and mission‐critical business on the Internet. State of the art Data Center facilities in both the United States and
Canada, industry best practices, experienced technical resources and
proactive customer support enable our customers to outsource IT seamlessly and gain peace of mind.
CentriLogic.com
CONTACT
Jim Latimer VP Client Solutions
E: [email protected] T: 1.866.366.3678
Twitter: @CentriLogic
Free downloads from our online Resource Center: Overview of CentriLogic Solution This datasheet outlines our philosophy, approach, and solution offerings. Overview of Centrilogic Facilities Learn about CentriLogic standards for security, fire detection and much more.
Rogue Hosting: Have Your Users Gone Rogue? Cloud computing provides a great opportunity to
get servers and compute power on an as needed basis, but it’s also created an easy way for departments or individuals to more easily circumvent IT processes and policies to acquire business services without IT’s knowledge. Although end‐users may have the best of intentions, going rogue with their hosting creates security and data management issues for IT and the business as a whole. Unfortunately, in IT’s attempts to keep corporate assets secure, it may be driving end‐users to bypass IT entirely in order to more quickly cut through bureaucratic red tape. A rethink about how IT manages departmental and end‐user requests may be in order. But first, IT departments need to understand why rogue hosting is a problem. An old problem in a new guise Rogue IT is a problem that dates back to the early days of computing. A few years ago, the biggest problem was the installation of unapproved wireless access points on corporate networks, but now the biggest issue is rogue hosting. For IT departments, it’s frustrating to have end‐users deploy cloud services on their own because of IT’s responsibilities around security, budgeting, information protection and international privacy laws, as well as the general protection of corporate data and applications, but the problem isn’t new. It’s an age‐old computing problem that has taken on a new form.
What are the pitfalls of rogue hosting? Circumventing the IT decision‐making process can create security and cost efficiency problems for an organization, including:
• Security of services untested by IT may not be up to spec. Proprietary data could be
compromised if the service is hacked. • Not knowing where company data is and
being able to control that data may be in violation of compliance regulations.
Although the fines are large for breaches, the loss of customer trust is larger.
• Rogue hosting may cost more in the end because IT departments can leverage
economies of scale individuals cannot. Why your end‐users have gone rogue You know what they say about the best intentions. Unfortunately, those best intentions are not only coming from end‐users, but the IT department, as well. Here are a few things that drive end‐users and departments to using unapproved cloud services:
• Traditional IT infrastructure procurement
can take six to nine months. When cloud services can be up and running in minutes,
it’s not surprising employees go rogue. • It’s easy. Cloud services accept credit cards
that are written off in expense reports. • Accessibility of cloud services means
flexibility and productivity benefits.
How to deal with rogue hosting Solving the problem is simpler than you might expect. • Find and subscribe to IT‐
approved cloud hosting services that can be turned
up and down as projects require.
• Eliminate red tape. Make it easier for end‐users to
request resources from IT. • Don’t believe that a
company policy against rogue hosting will actually
solve the problem. It won’t. If end‐users were so worried about breaking rules, they
wouldn’t be going rogue in the first place.
• React quickly to end‐user needs. It’s a “need it now”
society, and they’re not willing to wait months for IT
services.
United States Head Office 28 Mansfield Street, Rochester, New York USA 14606 T: 1.585.277.1300 Canadian Head Office 2 Robert Speck Parkway, Suite 500, Mississauga, ON Canada L4Z 1H8 T: 1.905.686.9682