1
CentriLogic is a leading provider of outsourced Data Center and Hosting solutions for organizations doing brand and mission‐critical business on the Internet. State of the art Data Center facilities in both the United States and Canada, industry best practices, experienced technical resources and proactive customer support enable our customers to outsource IT seamlessly and gain peace of mind. CentriLogic.com CONTACT Jim Latimer VP Client Solutions E: [email protected] T: 1.866.366.3678 Twitter: @CentriLogic Free downloads from our online Resource Center : Overview of CentriLogic Solution This datasheet outlines our philosophy, approach, and solution offerings. Overview of Centrilogic Facilities Learn about CentriLogic standards for security, fire detection and much more. Rogue Hosting: Have Your Users Gone Rogue? Cloud computing provides a great opportunity to get servers and compute power on an as needed basis, but it’s also created an easy way for departments or individuals to more easily circumvent IT processes and policies to acquire business services without IT’s knowledge. Although end‐users may have the best of intentions, going rogue with their hosting creates security and data management issues for IT and the business as a whole. Unfortunately, in IT’s attempts to keep corporate assets secure, it may be driving end‐users to bypass IT entirely in order to more quickly cut through bureaucratic red tape. A rethink about how IT manages departmental and end‐user requests may be in order. But first, IT departments need to understand why rogue hosting is a problem. An old problem in a new guise Rogue IT is a problem that dates back to the early days of computing. A few years ago, the biggest problem was the installation of unapproved wireless access points on corporate networks, but now the biggest issue is rogue hosting. For IT departments, it’s frustrating to have end‐users deploy cloud services on their own because of IT’s responsibilities around security, budgeting, information protection and international privacy laws, as well as the general protection of corporate data and applications, but the problem isn’t new. It’s an age‐old computing problem that has taken on a new form. What are the pitfalls of rogue hosting? Circumventing the IT decision‐making process can create security and cost efficiency problems for an organization, including: Security of services untested by IT may not be up to spec. Proprietary data could be compromised if the service is hacked. Not knowing where company data is and being able to control that data may be in violation of compliance regulations. Although the fines are large for breaches, the loss of customer trust is larger. Rogue hosting may cost more in the end because IT departments can leverage economies of scale individuals cannot. Why your end‐users have gone rogue You know what they say about the best intentions. Unfortunately, those best intentions are not only coming from end‐users, but the IT department, as well. Here are a few things that drive end‐users and departments to using unapproved cloud services: Traditional IT infrastructure procurement can take six to nine months. When cloud services can be up and running in minutes, it’s not surprising employees go rogue. It’s easy. Cloud services accept credit cards that are written off in expense reports. Accessibility of cloud services means flexibility and productivity benefits. How to deal with rogue hosting Solving the problem is simpler than you might expect. Find and subscribe to IT‐ approved cloud hosting services that can be turned up and down as projects require. Eliminate red tape. Make it easier for end‐users to request resources from IT. Don’t believe that a company policy against rogue hosting will actually solve the problem. It won’t. If end‐users were so worried about breaking rules, they wouldn’t be going rogue in the first place. React quickly to end‐user needs. It’s a “need it now” society, and they’re not willing to wait months for IT services. United States Head Office 28 Mansfield Street, Rochester, New York USA 14606 T: 1.585.277.1300 Canadian Head Office 2 Robert Speck Parkway, Suite 500, Mississauga, ON Canada L4Z 1H8 T: 1.905.686.9682

Rogue Hosting: have your users gone rogue?

Tags:

Embed Size (px)

DESCRIPTION

Cloud hosting services are the great equalizer. They give small businesses easy access to technology that up to now has only been available to larger enterprises. However, the ease of access to cloud services has created a major security problem for IT departments. Critical company data is slipping into the public cloud without IT’s knowledge, putting the data, the company and the customers at risk. Do you know why your end-users are going rogue? Better yet, do you know how to stop such behaviour?

Citation preview

Page 1: Rogue Hosting: have your users gone rogue?

  

   

 

CentriLogic is a leading 

provider of outsourced Data Center and Hosting solutions for organizations doing brand and mission‐critical business on the Internet. State of the art Data Center facilities in both the United States and 

Canada, industry best practices, experienced technical resources and 

proactive customer support enable our customers to outsource IT seamlessly  and gain peace of mind. 

 

CentriLogic.com  

CONTACT 

Jim Latimer VP Client Solutions 

E: [email protected] T: 1.866.366.3678 

Twitter: @CentriLogic 

Free downloads from our online Resource Center:  Overview of CentriLogic Solution This datasheet outlines our philosophy, approach, and solution offerings.  Overview of Centrilogic Facilities Learn about CentriLogic standards for security, fire detection and much more. 

Rogue Hosting:  Have Your Users Gone Rogue?  Cloud computing provides a great opportunity to 

get servers and compute power on an as needed basis, but it’s also created an easy way for departments or individuals to more easily circumvent IT processes and policies to acquire business services without IT’s knowledge.   Although end‐users may have the best of intentions, going rogue with their hosting creates security and data management issues for IT and the business as a whole.  Unfortunately, in IT’s attempts to keep corporate assets secure, it may be driving end‐users to bypass IT entirely in order to more quickly cut through bureaucratic red tape. A rethink about how IT manages departmental and end‐user requests may be in order. But first, IT departments need to understand why rogue hosting is a problem.  An old problem in a new guise Rogue IT is a problem that dates back to the early days of computing. A few years ago, the biggest problem was the installation of unapproved wireless access points on corporate networks, but now the biggest issue is rogue hosting. For IT departments, it’s frustrating to have end‐users deploy cloud services on their own because of IT’s responsibilities around security, budgeting, information protection and international privacy laws, as well as the general protection of corporate data and applications, but the problem isn’t new. It’s an age‐old computing problem that has taken on a new form.   

What are the pitfalls of rogue hosting? Circumventing the IT decision‐making process can create security and cost efficiency problems for an organization, including: 

• Security of services untested by IT may not be up to spec. Proprietary data could be 

compromised if the service is hacked. • Not knowing where company data is and 

being able to control that data may be in violation of compliance regulations. 

Although the fines are large for breaches, the loss of customer trust is larger. 

• Rogue hosting may cost more in the end because IT departments can leverage 

economies of scale individuals cannot.  Why your end‐users have gone rogue You know what they say about the best intentions. Unfortunately, those best intentions are not only coming from end‐users, but the IT department, as well. Here are a few things that drive end‐users and departments to using unapproved cloud services: 

• Traditional IT infrastructure procurement 

can take six to nine months. When cloud services can be up and running in minutes, 

it’s not surprising employees go rogue. • It’s easy. Cloud services accept credit cards 

that are written off in expense reports. • Accessibility of cloud services means 

flexibility and productivity benefits. 

How to deal with rogue hosting Solving the problem is simpler than you might expect. • Find and subscribe to IT‐

approved cloud hosting services that can be turned 

up and down as projects require. 

• Eliminate red tape. Make it easier for end‐users to 

request resources from IT. • Don’t believe that a 

company policy against rogue hosting will actually 

solve the problem. It won’t. If end‐users were so worried about breaking rules, they 

wouldn’t be going rogue in the first place. 

• React quickly to end‐user needs. It’s a “need it now” 

society, and they’re not willing to wait months for IT 

services.  

United States Head Office 28 Mansfield Street, Rochester, New York USA 14606 T: 1.585.277.1300 Canadian Head Office 2 Robert Speck Parkway, Suite 500, Mississauga, ON Canada  L4Z 1H8 T: 1.905.686.9682