SlideShare a Scribd company logo
1 of 1
Download to read offline
FLEXIBILITY. ACCESSIBILITY.
SCALABILITY.
Without a doubt, cloud services area top
solution today – and this fact is changing the
world. As Steve Jobs used to say, “Everything
is important – that success is in the details”.
Same here. As interest in cloud services
increases, so do worries about its specifics,
mainly its security.
By the way… Did you know that, in 2019,
total enterprise spending on security
outsourcing services will be 80% of the ex-
penses on security software and hardware
products, up from 50% in 2015?
Nowadays, cloud-based solutions are
becoming more and more popular. Many of
the leading global companies are using them
to implement their key business initiatives.
The effect? Adequate data security has
become crucial.
It is a fact that companies are subject to
constant evolution. But at least one thing
remains the same: taking care of the good
image of the company and being reliable
for customers – those two aspects have the
highest priority. Given such a context, it is
important to ask whether cloud services
meet the challenge.
Let us be frank about it. Without secu-
rity services there are no cloud services.
Nowadays, security technology should be
built into every cloud solution, because it is
the foundation for best-in- class services.
So, what do you need to keep all the data safe
and sound?
• Vulnerability Tracking – to verify the
security of an IT environment by executing
periodic vulnerability scans.
• Patch Management – to get a collection
of vulnerability-related information from
various sources, like vendor sites, security
bulletins and vulnerability databases.
• Security Monitoring – to effectively
monitor the security of IT environments,
enabling you to quickly identify, analyse and
respond to potential security threats.
• Security Operations Center – to be in
control all the time – seven days a week,
24 hours a day.
• Compliance Management – to improve
compliance with our support, identify and
deploy best security practices and regulatory
requirements.
• Risk Management – to manage open
threats by introducing controls, corrective
actions, or other means aimed at mitigating
risk.
• Business Continuity Management – to
determine the maturity of controls in terms
of the Information Security  Business
Continuity domains.
It is not a thing of the future any longer.
Comarch’s portfolio already contains
an extensive set of security services.
Comarch cloud solutions are built on the
foundation of providing security services
that include the aspects mentioned above.
Additionally, we provide security services
which can add even more to a customer’s
cloud infrastructure. Both cases ensure that
our customer’s data is secure.
Clearly, doing cloud services right requires
the use of a wide array of tools. Let’s pick and
underline the three most important ones:
effective IT security monitoring, vulnerabil-
ity tracking, and consistent implementation
of ITIL best industrial practices and the
required safety certificates (ISO 27001, ISAE
3402 type I and II, PCI DSS, etc.). Such a trio
can mean only one thing – a good night’s
sleep for CEOs and companies’ management.
NONETHELESS, THE POWEROF
PERSONALIZATION CANNOT BE
IGNORED.
Only precise analyses of customers’ needs
enable the planning and implementation of
security solutions that fulfil their specific
requirements. All of that definitely needs to
be supported by expertise. Dedicated secure
solutions are designed by specialists experi-
enced in areas such as firewalls, data leakage,
content security, secure switching, routing,
and secure networks, to mention but a few.
And this is (mainly) what differentiates first-
class cloud services from others.
Not so long ago, the only way to access a new application was to install it from a floppy disk.
Prehistory, huh? Now we have the Internet. Anytime. Anywhere. Everywhere: in the office,
at home, in cafés, on the street,even on the beach. We live in a world where we are connected
all the time. This influences our lifestyle, our interests and attitude, it changes the way we work.
This means a whole new era for the software industry. And this era should be called “Cloud”.
SLEEPING WELL WITH CLOUD SERVICES
Author: Lukasz Lacniak, Business Solutions Architect Comarch ICT
www.ict.comarch.com | services@comarch.com

More Related Content

What's hot

The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapCitrix
 
Aerospace Company Customer Presentation
Aerospace Company Customer PresentationAerospace Company Customer Presentation
Aerospace Company Customer PresentationSplunk
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityElasticsearch
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security Cristian Garcia G.
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanNetIQ
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomyCisco Russia
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Kenneth de Brucq
 
Five Key Trends for Data-Centric Security
Five Key Trends for Data-Centric SecurityFive Key Trends for Data-Centric Security
Five Key Trends for Data-Centric SecuritySeclore
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Marc Vael
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTIoT613
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus visionMarc Vael
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked inJohn Masiliunas
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaborationcentralohioissa
 
The Role of Technology in the Legal Industry 2
The Role of Technology in the Legal Industry 2The Role of Technology in the Legal Industry 2
The Role of Technology in the Legal Industry 2E-MIT Solutions
 

What's hot (20)

AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
 
The Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity GapThe Growing U.S. IT Productivity Gap
The Growing U.S. IT Productivity Gap
 
Aerospace Company Customer Presentation
Aerospace Company Customer PresentationAerospace Company Customer Presentation
Aerospace Company Customer Presentation
 
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoTCyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit security
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
 
Five Key Trends for Data-Centric Security
Five Key Trends for Data-Centric SecurityFive Key Trends for Data-Centric Security
Five Key Trends for Data-Centric Security
 
Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018Cloud Services & the Development of ISO/IEC 27018
Cloud Services & the Development of ISO/IEC 27018
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_ReedThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
ThinAir Endpoint Visibility Security HIMSS2018 Brian_Reed
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus vision
 
Seeberger
Seeberger Seeberger
Seeberger
 
general_resume_12 1 linked in
general_resume_12 1 linked ingeneral_resume_12 1 linked in
general_resume_12 1 linked in
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
 
The Role of Technology in the Legal Industry 2
The Role of Technology in the Legal Industry 2The Role of Technology in the Legal Industry 2
The Role of Technology in the Legal Industry 2
 

Viewers also liked

15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...
15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...
15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...Futurum2
 
PRINCE2 FOUNDATION
PRINCE2 FOUNDATIONPRINCE2 FOUNDATION
PRINCE2 FOUNDATIONjerinbiju
 
Raychel Harvey Jones | Today's Breaking News
Raychel Harvey Jones | Today's Breaking NewsRaychel Harvey Jones | Today's Breaking News
Raychel Harvey Jones | Today's Breaking NewsRaychel Harvey Jones
 
Spark of life: maximising urban efficiency through location-based analytics
Spark of life: maximising urban efficiency through location-based analyticsSpark of life: maximising urban efficiency through location-based analytics
Spark of life: maximising urban efficiency through location-based analyticsThe Economist Media Businesses
 
Unlocking Data Trapped in Audio & Video Files
Unlocking Data Trapped in  Audio & Video FilesUnlocking Data Trapped in  Audio & Video Files
Unlocking Data Trapped in Audio & Video FilesPaul Murphy
 
Obligasi konversi - akuntansi bagian 2 a
Obligasi konversi - akuntansi bagian 2 aObligasi konversi - akuntansi bagian 2 a
Obligasi konversi - akuntansi bagian 2 aFuturum2
 

Viewers also liked (10)

15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...
15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...
15-minute lesson derivation of optimal risky portfolio (investment- bodie, ka...
 
La modernidad
La modernidadLa modernidad
La modernidad
 
S 3 persona
 S 3 persona S 3 persona
S 3 persona
 
PRINCE2 FOUNDATION
PRINCE2 FOUNDATIONPRINCE2 FOUNDATION
PRINCE2 FOUNDATION
 
Raychel Harvey Jones | Today's Breaking News
Raychel Harvey Jones | Today's Breaking NewsRaychel Harvey Jones | Today's Breaking News
Raychel Harvey Jones | Today's Breaking News
 
Spark of life: maximising urban efficiency through location-based analytics
Spark of life: maximising urban efficiency through location-based analyticsSpark of life: maximising urban efficiency through location-based analytics
Spark of life: maximising urban efficiency through location-based analytics
 
Unlocking Data Trapped in Audio & Video Files
Unlocking Data Trapped in  Audio & Video FilesUnlocking Data Trapped in  Audio & Video Files
Unlocking Data Trapped in Audio & Video Files
 
Obligasi konversi - akuntansi bagian 2 a
Obligasi konversi - akuntansi bagian 2 aObligasi konversi - akuntansi bagian 2 a
Obligasi konversi - akuntansi bagian 2 a
 
Get Big Geo Data
Get Big Geo DataGet Big Geo Data
Get Big Geo Data
 
Vector
Vector Vector
Vector
 

Similar to Sleeping well with cloud services

Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Cyber Security and Cloud Security
Cyber Security and Cloud SecurityCyber Security and Cloud Security
Cyber Security and Cloud SecurityIT Governance Ltd
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb finalChristophe Monnier
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Successaccenture
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?Lori McInnes
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingRichard Kennedy
 
Know the Cloud ERP and safety in your business.pdf
Know the Cloud ERP and safety in your business.pdfKnow the Cloud ERP and safety in your business.pdf
Know the Cloud ERP and safety in your business.pdfJose thomas
 
F_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfF_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfjosbjs
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityMighty Guides, Inc.
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technologyrosswilks1
 
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...Dana Gardner
 

Similar to Sleeping well with cloud services (20)

The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Cyber Security and Cloud Security
Cyber Security and Cloud SecurityCyber Security and Cloud Security
Cyber Security and Cloud Security
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Risk management for cloud computing hb final
Risk management for cloud computing hb finalRisk management for cloud computing hb final
Risk management for cloud computing hb final
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
Networking Expertise
Networking ExpertiseNetworking Expertise
Networking Expertise
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
OT Security Architecture & Resilience: Designing for Security Success
OT Security Architecture & Resilience:  Designing for Security SuccessOT Security Architecture & Resilience:  Designing for Security Success
OT Security Architecture & Resilience: Designing for Security Success
 
Building a security strategy?
Building a security strategy?Building a security strategy?
Building a security strategy?
 
Uptime Group
Uptime GroupUptime Group
Uptime Group
 
The Avoidable Risks of Remote Working
The Avoidable Risks of Remote WorkingThe Avoidable Risks of Remote Working
The Avoidable Risks of Remote Working
 
Azure Security.pdf
Azure Security.pdfAzure Security.pdf
Azure Security.pdf
 
Azure security
Azure securityAzure security
Azure security
 
Know the Cloud ERP and safety in your business.pdf
Know the Cloud ERP and safety in your business.pdfKnow the Cloud ERP and safety in your business.pdf
Know the Cloud ERP and safety in your business.pdf
 
F_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdfF_DR_Dark Reading Editorial Report_March 2022.pdf
F_DR_Dark Reading Editorial Report_March 2022.pdf
 
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT CybersecurityPAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technology
 
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
How to Gain Advanced Cyber Resilience and Recovery Across Digital Business Wo...
 

More from Comarch_Services

From Automation System to Hyperconvergence - The Top Data Center Trends in Re...
From Automation System to Hyperconvergence - The Top Data Center Trends in Re...From Automation System to Hyperconvergence - The Top Data Center Trends in Re...
From Automation System to Hyperconvergence - The Top Data Center Trends in Re...Comarch_Services
 
ЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDI
ЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDIЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDI
ЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDIComarch_Services
 
Kierunki i trendy rozwoju EDI [RU]
Kierunki i trendy rozwoju EDI [RU]Kierunki i trendy rozwoju EDI [RU]
Kierunki i trendy rozwoju EDI [RU]Comarch_Services
 
Korus conference 24.04.2015 - Olga Vislavnykh
Korus conference 24.04.2015 - Olga VislavnykhKorus conference 24.04.2015 - Olga Vislavnykh
Korus conference 24.04.2015 - Olga VislavnykhComarch_Services
 
Comarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographicComarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographicComarch_Services
 
How Internet of Things revolutionizes the retail marketing & customer experience
How Internet of Things revolutionizes the retail marketing & customer experienceHow Internet of Things revolutionizes the retail marketing & customer experience
How Internet of Things revolutionizes the retail marketing & customer experienceComarch_Services
 
Pierwszy krok w chmurach, czyli Warsztaty Contact Center
Pierwszy krok w chmurach, czyli Warsztaty Contact CenterPierwszy krok w chmurach, czyli Warsztaty Contact Center
Pierwszy krok w chmurach, czyli Warsztaty Contact CenterComarch_Services
 
Answers to deliver outstanding customer experience with the Omni-Channel Appr...
Answers to deliver outstanding customer experience with the Omni-Channel Appr...Answers to deliver outstanding customer experience with the Omni-Channel Appr...
Answers to deliver outstanding customer experience with the Omni-Channel Appr...Comarch_Services
 
Delivering an exceptional customer experience with a next-generation customer...
Delivering an exceptional customer experience with a next-generation customer...Delivering an exceptional customer experience with a next-generation customer...
Delivering an exceptional customer experience with a next-generation customer...Comarch_Services
 
Customer Relationship Revolution What’s Next?
Customer Relationship Revolution What’s Next?Customer Relationship Revolution What’s Next?
Customer Relationship Revolution What’s Next?Comarch_Services
 
Advanced Back Office Optimization
Advanced Back Office OptimizationAdvanced Back Office Optimization
Advanced Back Office OptimizationComarch_Services
 
Contact center - czyli co i kiedy nam się oplaca?
Contact center - czyli co i kiedy nam się oplaca?Contact center - czyli co i kiedy nam się oplaca?
Contact center - czyli co i kiedy nam się oplaca?Comarch_Services
 

More from Comarch_Services (19)

Comarch ICT - CLOUD EXPO
Comarch ICT - CLOUD EXPOComarch ICT - CLOUD EXPO
Comarch ICT - CLOUD EXPO
 
From Automation System to Hyperconvergence - The Top Data Center Trends in Re...
From Automation System to Hyperconvergence - The Top Data Center Trends in Re...From Automation System to Hyperconvergence - The Top Data Center Trends in Re...
From Automation System to Hyperconvergence - The Top Data Center Trends in Re...
 
Automated Data Center?
Automated Data Center?Automated Data Center?
Automated Data Center?
 
Case study carrefour
Case study carrefourCase study carrefour
Case study carrefour
 
Bp letter of references
Bp letter of referencesBp letter of references
Bp letter of references
 
ЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDI
ЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDIЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDI
ЕВРОПЕЙСКИЙ ОПЫТ ОПТИМИЗАЦИИ ЛОГИСТИЧЕСКИХ ПРОЦЕССОВ С ПОМОЩЬЮ ТЕХНОЛОГИИ EDI
 
Comarch at ECR Forum 2015
Comarch at ECR Forum 2015Comarch at ECR Forum 2015
Comarch at ECR Forum 2015
 
Kierunki i trendy rozwoju EDI [RU]
Kierunki i trendy rozwoju EDI [RU]Kierunki i trendy rozwoju EDI [RU]
Kierunki i trendy rozwoju EDI [RU]
 
Korus conference 24.04.2015 - Olga Vislavnykh
Korus conference 24.04.2015 - Olga VislavnykhKorus conference 24.04.2015 - Olga Vislavnykh
Korus conference 24.04.2015 - Olga Vislavnykh
 
Comarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographicComarch ICT Service Desk - infographic
Comarch ICT Service Desk - infographic
 
How Internet of Things revolutionizes the retail marketing & customer experience
How Internet of Things revolutionizes the retail marketing & customer experienceHow Internet of Things revolutionizes the retail marketing & customer experience
How Internet of Things revolutionizes the retail marketing & customer experience
 
Zipwire Cloud solution
Zipwire Cloud solutionZipwire Cloud solution
Zipwire Cloud solution
 
Pierwszy krok w chmurach, czyli Warsztaty Contact Center
Pierwszy krok w chmurach, czyli Warsztaty Contact CenterPierwszy krok w chmurach, czyli Warsztaty Contact Center
Pierwszy krok w chmurach, czyli Warsztaty Contact Center
 
Answers to deliver outstanding customer experience with the Omni-Channel Appr...
Answers to deliver outstanding customer experience with the Omni-Channel Appr...Answers to deliver outstanding customer experience with the Omni-Channel Appr...
Answers to deliver outstanding customer experience with the Omni-Channel Appr...
 
Comarch
ComarchComarch
Comarch
 
Delivering an exceptional customer experience with a next-generation customer...
Delivering an exceptional customer experience with a next-generation customer...Delivering an exceptional customer experience with a next-generation customer...
Delivering an exceptional customer experience with a next-generation customer...
 
Customer Relationship Revolution What’s Next?
Customer Relationship Revolution What’s Next?Customer Relationship Revolution What’s Next?
Customer Relationship Revolution What’s Next?
 
Advanced Back Office Optimization
Advanced Back Office OptimizationAdvanced Back Office Optimization
Advanced Back Office Optimization
 
Contact center - czyli co i kiedy nam się oplaca?
Contact center - czyli co i kiedy nam się oplaca?Contact center - czyli co i kiedy nam się oplaca?
Contact center - czyli co i kiedy nam się oplaca?
 

Recently uploaded

How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfDerekIwanaka1
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareWorkforce Group
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Omaninstagramfab782445
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Timegargpaaro
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdflaloo_007
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance managementVaishnaviGunji
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSpanmisemningshen123
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Adnet Communications
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 

Recently uploaded (20)

How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
BeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdfBeMetals Investor Presentation_May 3, 2024.pdf
BeMetals Investor Presentation_May 3, 2024.pdf
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in OmanMifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
Mifepristone Available in Muscat +918761049707^^ €€ Buy Abortion Pills in Oman
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Structuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdfStructuring and Writing DRL Mckinsey (1).pdf
Structuring and Writing DRL Mckinsey (1).pdf
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Power point presentation on enterprise performance management
Power point presentation on enterprise performance managementPower point presentation on enterprise performance management
Power point presentation on enterprise performance management
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 

Sleeping well with cloud services

  • 1. FLEXIBILITY. ACCESSIBILITY. SCALABILITY. Without a doubt, cloud services area top solution today – and this fact is changing the world. As Steve Jobs used to say, “Everything is important – that success is in the details”. Same here. As interest in cloud services increases, so do worries about its specifics, mainly its security. By the way… Did you know that, in 2019, total enterprise spending on security outsourcing services will be 80% of the ex- penses on security software and hardware products, up from 50% in 2015? Nowadays, cloud-based solutions are becoming more and more popular. Many of the leading global companies are using them to implement their key business initiatives. The effect? Adequate data security has become crucial. It is a fact that companies are subject to constant evolution. But at least one thing remains the same: taking care of the good image of the company and being reliable for customers – those two aspects have the highest priority. Given such a context, it is important to ask whether cloud services meet the challenge. Let us be frank about it. Without secu- rity services there are no cloud services. Nowadays, security technology should be built into every cloud solution, because it is the foundation for best-in- class services. So, what do you need to keep all the data safe and sound? • Vulnerability Tracking – to verify the security of an IT environment by executing periodic vulnerability scans. • Patch Management – to get a collection of vulnerability-related information from various sources, like vendor sites, security bulletins and vulnerability databases. • Security Monitoring – to effectively monitor the security of IT environments, enabling you to quickly identify, analyse and respond to potential security threats. • Security Operations Center – to be in control all the time – seven days a week, 24 hours a day. • Compliance Management – to improve compliance with our support, identify and deploy best security practices and regulatory requirements. • Risk Management – to manage open threats by introducing controls, corrective actions, or other means aimed at mitigating risk. • Business Continuity Management – to determine the maturity of controls in terms of the Information Security Business Continuity domains. It is not a thing of the future any longer. Comarch’s portfolio already contains an extensive set of security services. Comarch cloud solutions are built on the foundation of providing security services that include the aspects mentioned above. Additionally, we provide security services which can add even more to a customer’s cloud infrastructure. Both cases ensure that our customer’s data is secure. Clearly, doing cloud services right requires the use of a wide array of tools. Let’s pick and underline the three most important ones: effective IT security monitoring, vulnerabil- ity tracking, and consistent implementation of ITIL best industrial practices and the required safety certificates (ISO 27001, ISAE 3402 type I and II, PCI DSS, etc.). Such a trio can mean only one thing – a good night’s sleep for CEOs and companies’ management. NONETHELESS, THE POWEROF PERSONALIZATION CANNOT BE IGNORED. Only precise analyses of customers’ needs enable the planning and implementation of security solutions that fulfil their specific requirements. All of that definitely needs to be supported by expertise. Dedicated secure solutions are designed by specialists experi- enced in areas such as firewalls, data leakage, content security, secure switching, routing, and secure networks, to mention but a few. And this is (mainly) what differentiates first- class cloud services from others. Not so long ago, the only way to access a new application was to install it from a floppy disk. Prehistory, huh? Now we have the Internet. Anytime. Anywhere. Everywhere: in the office, at home, in cafés, on the street,even on the beach. We live in a world where we are connected all the time. This influences our lifestyle, our interests and attitude, it changes the way we work. This means a whole new era for the software industry. And this era should be called “Cloud”. SLEEPING WELL WITH CLOUD SERVICES Author: Lukasz Lacniak, Business Solutions Architect Comarch ICT www.ict.comarch.com | services@comarch.com