Skip to Content

Keeping your SAP data out of the cloud is not as easy as you might think, as cloud services extend to every element of the day-to-day activities of your employees.

/wp-content/uploads/2014/02/rsz_1rsz_secure_data_379876.jpg

Chances are, some of your SAP data may already be in the cloud and beyond your control. Do your employees use cloud storage, like Dropbox or SkyDrive? Do you allow employees to access company resources on their mobile devices and tablets? Do you work with partners and share information?

 

With sensitive data like HR personnel files, finances, and intellectual property being so pertinent to a company’s operations and future, the safety of the data is the biggest concern. Leaving data security up to the cloud vendor is risky business, and may not be the right choice for you.


In this SAPinsider article, you can learn about new ways of protecting your most sensitive data both on-premise and in the cloud.

Click here to read the full article

To report this post you need to login first.

4 Comments

You must be Logged on to comment or reply to a post.

  1. Asad Walayat

    Thanks for sharing this article Mariana. Since I am working with SAP ByD it was very useful for me reading something on Cloud and data Protection.

    (0) 
  2. Oluf Timo Dybdal Jensen

    Hi Mariana

    Thank you for sharing. Working with security in a defense organisation, Could is an eternal source to concerns. Especially in the sgadows of Edward Snowdens revelations, its clear to me, that you have to be VERY careful before you allow ANY data outside your own premises. And thats a big shame.

    (0) 
    1. Marina Adams Post author

      Thanks Oluf!

      I totally agree. In light of recent events, security of information is becoming of outmost importance for any company. It’s getting harder and harder to keep track of sensitive data as it travels to the cloud, employee mobile devices, email servers, etc. – with NO protection. Fortunately, there are new technologies that enforce protection on data itself. I believe that companies looking to protect their information beyond traditional boundaries can really find answers in them.

      (0) 

Leave a Reply