Contact Us
Request Demo
PolyVista
  • Home
  • Solutions
  • Services
  • Technology
  • Demo
  • Blog
  • Company

Blog

blog main page
Cloud Security Best Practices: If You’re Unsure about Cloud Security, Read This Before Switching

 

Cloud Security

 

In the past couple years, software has increasingly gone the way of the cloud. Also known as Software as a Service (SaaS), cloud computing is quickly becoming the predominant technology infrastructure. In 2012, cloud software revenue reached a whopping $14.5 billion (Gartner, 2012). That number only continues to grow, as a new 451 Research report predicts an excess of $20 billion in revenue by 2016, and it’s not hard to see why. Software in the cloud offers a lower cost, a month-to-month pay structure, accessibility from an internet browser, and no installation requirements.

 

However, the number one hesitation of those that switch to the cloud is data security, and it’s a valid concern. Not all cloud-based companies maintain the same level of security, so in order to ensure your data will be safe and protected, make sure your provider partakes in the following security practices before making the switch.

 

1. Data is transferred via a secure FTP

 

Make sure your provider uses a security certificate purchased through a vendor to secure their connection. The FTP connection should also use SSL encryption.

 

2. The data should be housed on segregated machines

 

To ensure clients are not able to see one another’s data, it is imperative that your cloud provider houses data on segregated machines. Each client’s data should be kept on a separate drive.

 

3. Electronic protection

 

Cloud providers should have adequate hardware and software firewalls in place, as well as standard anti-virus software that continually monitors everything on their server.

 

4. Multifactor user authentication

 
Electronic access to the servers should use multiple layers of standard authentication for added security, including VPN access, firewall ACL’s, and vendor authentication.

 

5. Physical security

 
Make sure access to the software provider’s physical servers are only limited to authorized clientele, and are strictly monitored at all times. Cameras and thumbprint authentication are common physical security measures to ask for.

 

6. Co-location handling

 
If your provider users a third party co-location data center, they should have passed the SSIE16 audit process. More information here.

 

7. Data protection policy

 
Lastly, make sure the company provides a formal document that details each practice listed above.
PolyVista’s advanced analytical engine is now available as a hosted solution. Users are able to access powerful data analytics in a browser safely and securely. For more information on our cloud services, click the button below.

blog main page
Categories
  • Actionable Insights
  • Alerts+
  • Algorithms
  • API
  • Best Practices
  • Big Data
  • Business Intelligence
  • Business Process Improvement
  • Cloud Computing
  • Comparison Analysis
  • Competitive Advantage
  • Competitive Analysis
  • Consumer Generated Content
  • Consumer Safety
  • Cost of Ignoring
  • CPSC Compliance
  • Customer Experience (CX)
  • Customer Loyalty
  • Customer Reviews
  • Customer Satisfaction
  • Customer Survey
  • Dashboard
  • Data Analysts
  • Data Analytics
  • Data Cleansing
  • Data Insights
  • Data Quality
  • Data Science
  • Discovery
  • Google Analytics
  • Human Talent
  • Interactive PDF (iPDF)
  • Internet of Things
  • iPDF
  • iPhone
  • KPIs
  • Market Research
  • Natural Language Processing
  • Net Promoter Score
  • Predictive Analytics
  • Presentation Layer
  • Product Improvement
  • Product Safety
  • Project Success
  • Quality
  • Recalls
  • ROI
  • Sales Improvement
  • Salesforce
  • Self Service Text Analytics
  • Sentiment Analysis
  • Small/Midsized Business
  • Social Media
  • Software as a Service
  • Solution as a Service
  • Statistical Process Control
  • Survey
  • Text Analytics
  • Uncategorized
  • User Generated Content
  • User Interface
  • Vendor Selection
  • Visualization
  • Voice of Customer (VOC)
Tags
actionable insightsAlgorithmanalysisAnalytics experienceAnalytics projectAnalytics softwareAnalytics talentandroid phonesandroid vs iosappleApple Iphonebest buy cell phonesbest smartphonesbetter or worse S6 vs iPhone6BIBig databig data visualizationBig Data Visualization Data Miningbrand managmentBusiness intelligencecharting and graphing technologycloud analyticscloud computingcloud securitycompare iphone6Compare s6 vs iphone6Compare Samsung Galaxy S6 vs Apple iPhone6comparison s6 vs iphone6Competitive AnalysisCompetitive IntelligenceComplianceconsumer alertsConsumer Federation of AmericaConsumer Product Safetyconsumer reviewsconsumer sentimentConsumer trustCPSCCrisis IntelligenceCustomer experienceCXDataData analysisData analyticsdata interfacedata miningData ScienceData scientistData visualizationdiehard fans s6 vs iphone6Expert analysisexploding iphoneFreeform text analysisgalaxy s4Galaxy S6galaxy samsung s6Google Analyticshow OEM's use text analyticshttp://www.polyvista.com/blog/3-benefits-of-interactive-pdf-ipdf-for-customer-analysisindustry reviewsIphoneiphone 3iphone 5iphone fireKids in Dangerlatest phonesMining softwareNational Research Center for Women & FamiliesNatural language processingnew phoneNLPOEM data analysisonline reviewsoutliers in data trendsoverlay scrollbarPolyVista SPCProduct mindset reportproduct reviewsPublic Citizenqualitative survey responsesQuality controlRatingrecall preparednessrecallsretailreview ratingReviewsS6s6 iphone 6 differencess6 iphone6 side by sideS6 iphone6 Verdictsaassamsungsamsung comparisonsamsung galaxy 6 phoneSamsung Galaxy S6samsung galaxy s6 phonesamsung iphone comparisonsamsung vs appleScorescrollbar dissapearingscrollbarssentiment analysissmartphonesmartphone reviewsSocial mediaSocial media analysisSocial media analyticssocial media channelssoftware as a serviceSolaaSSolution as a Servicesuperiority s6 vs iphone6Survey analysisSurvey analyticsTalent is scarcetext analysistext analysis examplesText analysis ROItext analysis technologyText analyticstext analytics service providerstext clustersText miningThe Consumers UnionUnion of Concerned ScientistsVoCVoice of customerVoice of the CustomerVoluntary Recallsworkmaps




Related

Social Media Analytics: A Business Differentiator

Data Visualization: A Top Choice for Business Managers

Take Your Company’s Consumer Safety Strategy to the Next Level

Can Your Business Transform Customer Data into Meaningful Insights?
Related
  • Case studies
  • White papers
  • Sample reports
  • Dashboards
  • Webinars
  • Data LookseeTM
  • ChartExpoTM
  • BI add-ins
  • InMemory+
  • Self Service Text Analytics
  • Home
  • Solutions
  • Services
  • Technology
  • Demos
  • Blogs
  • Company