SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
Cloud security with
Sage Construction Anywhere
Table of Contents

Cloud computing’s advantage for construction companies................................... 3

Security concerns................................................................................................. 3

The Sage commitment to security........................................................................ 4

Sage application architecture security provisions.................................................. 5

Conclusion........................................................................................................... 5




                                                                                                                          2




Cloud security with Sage Construction Anywhere
Cloud computing’s advantage
for construction companies
In construction, access to back-office financial and operations systems from a remote site is
often needed to make decisions and stay productive. For many industries like construction, cloud
technology is being considered and adopted as the new answer for remote work. Some businesses
are outsourcing to the cloud just to save on the cost from having in-house technical experts. But
when considering how to improve remote operations, a well-matched cloud application, especially
in construction, can do better than just give an answer to internal resource constraints. Cloud
applications can increase agility and competitiveness, enhance team collaboration, strengthen
decision making using current data, and improve productivity—particularly when the back-office
systems are integrated into the cloud.

A report by “Information and Communication Technologies”1 affirms that cloud computing is
particularly suited to the construction industry because of its many key players working across various
locations. When considering which type of cloud solution may be a suitable business fit, research firm
Gartner advises businesses to focus “near-term efforts on application and data integration, linking fixed
internal and external applications with a hybrid solution.”2 Gartner’s research conclusions reinforce
that leveraging on-premises systems with cloud technology has strong merit. In construction, the heart
of on-premises systems is the back office. It’s commonplace for a remote worker to need access to
billing, invoices, financials, projects, payroll, or other data. However, when a cloud application offers an
improvement to remote business operations, addressing strong security measures is always advised.



Security concerns
Although the cloud’s potential is touted far and wide, many companies have concerns about cloud
security, whether in regards to cloud technology itself or in response to workers’ using mobile
devices. A survey from Microsoft found that 44 percent of small and midsized businesses (SMBs)
still believe cloud computing is unproven and risky. Another 51 percent of responding SMBs said
data privacy was one reason to give pause before migrating to the cloud.3 Other research sources
cite management concerns about potential increased data leakage or breaches, decreased visibility
into operations, less awareness into general risks, and risks associated with workers bringing their
own devices to work.4




                                                                                                                            3

 1. http://ieeexplore.ieee.org/xpl/login.jsp?tp=arnumber=6141425url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.
     jsp%3Farnumber%3D6141425
 2. http://www.gartner.com/it/page.jsp?id=1971515
 3. http://www.microsoft.com/en-us/news/presskits/telecom/docs/SMBCloud.pdf
 4. http://www.cio.in/article/top-five-key-cloud-security-issues?page=1



Cloud security with Sage Construction Anywhere
When workers use their personal devices like a tablet or smartphone for business purposes, the
reality is, it’s hard for companies to do anything but respond. Mobile device use at work continues to
increase. The risks are significant if companies don’t lead by setting up and communicating mobile
best practices and policies, enforcing safeguards, and identifying suitable applications.

International Data Corporation forecasts that mobile workers will number 1.3 billion worldwide by
2015,5 and 37.2 percent of the total workforce will be operating outside of a traditional office setting
by that time. The Cloud Security Alliance reports that with the increasing use of mobile devices on the
job there is “tremendous concern for enterprises worldwide”.6 Experts within the industry recommend
setting up precautionary measures before any worker’s device with confidential data is lost, such as
setting up passwords, malware protection, and remote wipe capabilities.7 Companies are also advised
to implement access controls, encrypt data, and identify and limit the number of people who can view
certain files.



The Sage commitment to security
Despite concerns, many experts are recognizing that with the right planning, the cloud can actually
improve general security.8 A fall 2012 survey reports that “on-premises systems and applications
aren’t necessarily more secure than those in the cloud”.9 Choosing a provider that focuses on the
continual changes in security and technology trends can also free up a company to concentrate on
its core business.


Sage third-party audits
Sage is committed to security excellence. This excellence is demonstrated by its ongoing contract
with a third-party expert to assess the security of Sage Construction Anywhere. Before any new
release, strong measures and testing are taken to examine the security of the solution. In the
most recent third-party audit, Comsec, a global information security consulting firm, found no
vulnerabilities across the entire Sage Construction Anywhere site. As Sage solutions continue
to improve and use the best new technologies, customers can be assured that Sage will continue
its over 40 year commitment to being proactive about the security needs of its customers.


Microsoft® AzureTM security
Sage Construction Anywhere is built upon Microsoft’s industry-leading cloud services platform,
Azure.10 Through leveraging Microsoft’s application hosting platform, regarded by many as the
industry standard, Sage Construction Anywhere customers are assured of the highest levels of
data integrity, availability, and confidentiality.




                                                                                                                         4

 5. http://www.idc.com/getdoc.jsp?containerId=prUS23251912
 6. https://cloudsecurityalliance.org/csa-news/data-loss-mobile-ranks-top-threat-enterprises/
 7. http://www.govinfosecurity.com/articles.php?art_id=4650
 8. http://searchcio.techtarget.com/news/2240163146/Cloud-based-storage-replete-with-pros-and-cons-gaining-traction
 9. http://www.forbes.com/sites/joemckendrick/2012/09/19/cloud-apps-somewhat-more-secure-than-on-premises-apps-survey/
10. http://www.microsoft.com/online/legal/?langid=en-usdocid=11

Cloud security with Sage Construction Anywhere
Sage application architecture security provisions
Sage Construction Anywhere has been architected with key provisions that produce the protection
your business needs for keeping information confidential and safe and at the same time create new
collaboration opportunities with project teams. These provisions include:

   •	  age Construction Anywhere Connector—Sage has built its secure web services
      S
      platform from the ground up. The Sage Construction Anywhere Connector initiates all cloud
      communications and provides protection from the cloud by managing the handling of all
      exchanges with on-premises company information. This configuration is a key component
      for providing users freedom to access company data anywhere there is Internet connectivity
      while safeguarding the company systems from firewall or server breaches.
   •	 Encryption—All communication between your back-office financial and operations solution
       (Sage 300 Construction and Real Estate, for example) and Sage Construction Anywhere is
       encrypted with 256-bit SSL security.
   •	  ecuring customers’ information—Sage Construction Anywhere uses secure web
      S
      services for connections between servers and mobile devices to mitigate unauthorized
      access, network eavesdropping, and other threats. Customers are also assigned their
      own dedicated secure site so data is safeguarded from others.
   •	  ser management by project—Project files are stored and secured by project and
      U
      by folder. In a single step, you can categorize and secure files so they can be seen by all
      participants, seen by only those participants from a single vendor, or seen by a specific person.
   •	  dvanced folder security—Advanced Sage Construction Anywhere folder security settings
      A
      give you the trust to extend specific information access to an entire project team. These access
      options provide the ability to identify and ensure that only the right people see confidential
      documents such as contracts or invoices.
   •	  otifications and audit trails—Audit trails and online reports are available to track who
      N
      requests, accesses, and views information stored on Sage Construction Anywhere. This is
      particularly beneficial for legal protection and contract compliance.



Conclusion
Sage has been a market leader in construction-specific business management for over 40 years.
Providing strong security for its customers has always been an integral part of its software planning
and development, and Sage is fully committed to security excellence as technology issues and
opportunities continue to change. With the right security measures in place, cloud technologies can
help you operate more efficiently and extend your business opportunities. The momentum for
adopting cloud applications is building as more contractors and owners realize the cloud’s potential.
Imagine what your construction firm can accomplish with constant access to project data and the
ability to work from virtually anywhere.




                                                                                                          5




Cloud security with Sage Construction Anywhere
Sage
15195 NW Greenbrier Pkwy
Beaverton, OR 97006-5701
800-628-6583
www.SageCRE.com




©2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service
names mentioned herein are registered trademarks or trademarks of Sage Software, Inc., or its affiliated
entities. All other trademarks are the property of their respective owners. SPK 12-02733 1/13

Contenu connexe

Tendances

Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...ijccsa
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud SecuritySusanne Tedrick
 
Is the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudIs the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudTechSoup
 
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...Mighty Guides, Inc.
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365Symantec
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
Crisis Management & Remote Work w/ Microsoft 365
Crisis Management & Remote Work w/ Microsoft 365Crisis Management & Remote Work w/ Microsoft 365
Crisis Management & Remote Work w/ Microsoft 365Perficient, Inc.
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationCitrix
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Forcepoint LLC
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital WorkspaceCitrix
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technologyrosswilks1
 
Defense In-Depth
Defense In-DepthDefense In-Depth
Defense In-DepthWill Kelly
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 

Tendances (20)

Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Global Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud ComputingGlobal Mandate to Secure Cloud Computing
Global Mandate to Secure Cloud Computing
 
A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...A proficient 5 c approach to boost the security in the saas model's technical...
A proficient 5 c approach to boost the security in the saas model's technical...
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Is the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the CloudIs the Cloud Safe? Ensuring Security in the Cloud
Is the Cloud Safe? Ensuring Security in the Cloud
 
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...
CDM From the Frontlines - CISOs, PMs and Others Share Success Perspectives an...
 
Securing Office 365
Securing Office 365Securing Office 365
Securing Office 365
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417Fy17 sec shadow_it-e_book_final_032417
Fy17 sec shadow_it-e_book_final_032417
 
Crisis Management & Remote Work w/ Microsoft 365
Crisis Management & Remote Work w/ Microsoft 365Crisis Management & Remote Work w/ Microsoft 365
Crisis Management & Remote Work w/ Microsoft 365
 
Top 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application VirtualizationTop 3 Reasons to Deliver Web Apps with Application Virtualization
Top 3 Reasons to Deliver Web Apps with Application Virtualization
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365Driving the successful adoption of Microsoft Office 365
Driving the successful adoption of Microsoft Office 365
 
Life in the Digital Workspace
Life in the Digital WorkspaceLife in the Digital Workspace
Life in the Digital Workspace
 
Happiest Minds
Happiest MindsHappiest Minds
Happiest Minds
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Cloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary TechnologyCloud Security: A Brief Journey through the Revolutionary Technology
Cloud Security: A Brief Journey through the Revolutionary Technology
 
Defense In-Depth
Defense In-DepthDefense In-Depth
Defense In-Depth
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 

Similaire à Cloud security with Sage Construction Anywhere

IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital ForensicIRJET Journal
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGijitcs
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the CloudCloudSmartz
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfDataSpace Academy
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudIRJET Journal
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxMetaorange
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Khiro Mishra
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGIRJET Journal
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018Alejandro Daricz
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital ForensicIRJET Journal
 

Similaire à Cloud security with Sage Construction Anywhere (20)

IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET-  	  SAAS Attacks Defense Mechanisms and Digital ForensicIRJET-  	  SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTINGINFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdfCloud Security - Types, Common Threats & Tips To Mitigate.pdf
Cloud Security - Types, Common Threats & Tips To Mitigate.pdf
 
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid CloudDetailed Analysis of Security Challenges in the Domain of Hybrid Cloud
Detailed Analysis of Security Challenges in the Domain of Hybrid Cloud
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
I017225966
I017225966I017225966
I017225966
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 
Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)Cloud Security POV_Final (by KM)
Cloud Security POV_Final (by KM)
 
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTINGSECURE DATA TRANSFER BASED ON CLOUD COMPUTING
SECURE DATA TRANSFER BASED ON CLOUD COMPUTING
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018Esg lab-validation-check-point-cloud guard-mar-2018
Esg lab-validation-check-point-cloud guard-mar-2018
 
IRJET- A Survey on SaaS-Attacks and Digital Forensic
IRJET-  	  A Survey on SaaS-Attacks and Digital ForensicIRJET-  	  A Survey on SaaS-Attacks and Digital Forensic
IRJET- A Survey on SaaS-Attacks and Digital Forensic
 

Plus de Sage Construction and Real Estate

Plus de Sage Construction and Real Estate (10)

Sage survey: 2015 NAHB International Builders' Show
Sage survey: 2015 NAHB International Builders' ShowSage survey: 2015 NAHB International Builders' Show
Sage survey: 2015 NAHB International Builders' Show
 
Business without blind spots
Business without blind spotsBusiness without blind spots
Business without blind spots
 
Sage Construction and Real Estate Whitepaper - Performing a Needs Analysis
Sage Construction and Real Estate Whitepaper - Performing a Needs AnalysisSage Construction and Real Estate Whitepaper - Performing a Needs Analysis
Sage Construction and Real Estate Whitepaper - Performing a Needs Analysis
 
Collaborative Construction: Making BIM Work for Builders
Collaborative Construction: Making BIM Work for BuildersCollaborative Construction: Making BIM Work for Builders
Collaborative Construction: Making BIM Work for Builders
 
Is It Time to Deploy Construction-Specific Accounting Software?
Is It Time to Deploy Construction-Specific Accounting Software?Is It Time to Deploy Construction-Specific Accounting Software?
Is It Time to Deploy Construction-Specific Accounting Software?
 
The Benefits of Document Management
The Benefits of Document ManagementThe Benefits of Document Management
The Benefits of Document Management
 
Developing New Business in the Construction Industry
Developing New Business in the Construction IndustryDeveloping New Business in the Construction Industry
Developing New Business in the Construction Industry
 
Helping Your Construction Clients Grow and Thrive
Helping Your Construction Clients Grow and ThriveHelping Your Construction Clients Grow and Thrive
Helping Your Construction Clients Grow and Thrive
 
Sage 100 Contractor
Sage 100 ContractorSage 100 Contractor
Sage 100 Contractor
 
2012 Construction Industry IT & Financial Outlook
2012 Construction Industry IT & Financial Outlook 2012 Construction Industry IT & Financial Outlook
2012 Construction Industry IT & Financial Outlook
 

Cloud security with Sage Construction Anywhere

  • 1. Cloud security with Sage Construction Anywhere
  • 2. Table of Contents Cloud computing’s advantage for construction companies................................... 3 Security concerns................................................................................................. 3 The Sage commitment to security........................................................................ 4 Sage application architecture security provisions.................................................. 5 Conclusion........................................................................................................... 5 2 Cloud security with Sage Construction Anywhere
  • 3. Cloud computing’s advantage for construction companies In construction, access to back-office financial and operations systems from a remote site is often needed to make decisions and stay productive. For many industries like construction, cloud technology is being considered and adopted as the new answer for remote work. Some businesses are outsourcing to the cloud just to save on the cost from having in-house technical experts. But when considering how to improve remote operations, a well-matched cloud application, especially in construction, can do better than just give an answer to internal resource constraints. Cloud applications can increase agility and competitiveness, enhance team collaboration, strengthen decision making using current data, and improve productivity—particularly when the back-office systems are integrated into the cloud. A report by “Information and Communication Technologies”1 affirms that cloud computing is particularly suited to the construction industry because of its many key players working across various locations. When considering which type of cloud solution may be a suitable business fit, research firm Gartner advises businesses to focus “near-term efforts on application and data integration, linking fixed internal and external applications with a hybrid solution.”2 Gartner’s research conclusions reinforce that leveraging on-premises systems with cloud technology has strong merit. In construction, the heart of on-premises systems is the back office. It’s commonplace for a remote worker to need access to billing, invoices, financials, projects, payroll, or other data. However, when a cloud application offers an improvement to remote business operations, addressing strong security measures is always advised. Security concerns Although the cloud’s potential is touted far and wide, many companies have concerns about cloud security, whether in regards to cloud technology itself or in response to workers’ using mobile devices. A survey from Microsoft found that 44 percent of small and midsized businesses (SMBs) still believe cloud computing is unproven and risky. Another 51 percent of responding SMBs said data privacy was one reason to give pause before migrating to the cloud.3 Other research sources cite management concerns about potential increased data leakage or breaches, decreased visibility into operations, less awareness into general risks, and risks associated with workers bringing their own devices to work.4 3 1. http://ieeexplore.ieee.org/xpl/login.jsp?tp=arnumber=6141425url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all. jsp%3Farnumber%3D6141425 2. http://www.gartner.com/it/page.jsp?id=1971515 3. http://www.microsoft.com/en-us/news/presskits/telecom/docs/SMBCloud.pdf 4. http://www.cio.in/article/top-five-key-cloud-security-issues?page=1 Cloud security with Sage Construction Anywhere
  • 4. When workers use their personal devices like a tablet or smartphone for business purposes, the reality is, it’s hard for companies to do anything but respond. Mobile device use at work continues to increase. The risks are significant if companies don’t lead by setting up and communicating mobile best practices and policies, enforcing safeguards, and identifying suitable applications. International Data Corporation forecasts that mobile workers will number 1.3 billion worldwide by 2015,5 and 37.2 percent of the total workforce will be operating outside of a traditional office setting by that time. The Cloud Security Alliance reports that with the increasing use of mobile devices on the job there is “tremendous concern for enterprises worldwide”.6 Experts within the industry recommend setting up precautionary measures before any worker’s device with confidential data is lost, such as setting up passwords, malware protection, and remote wipe capabilities.7 Companies are also advised to implement access controls, encrypt data, and identify and limit the number of people who can view certain files. The Sage commitment to security Despite concerns, many experts are recognizing that with the right planning, the cloud can actually improve general security.8 A fall 2012 survey reports that “on-premises systems and applications aren’t necessarily more secure than those in the cloud”.9 Choosing a provider that focuses on the continual changes in security and technology trends can also free up a company to concentrate on its core business. Sage third-party audits Sage is committed to security excellence. This excellence is demonstrated by its ongoing contract with a third-party expert to assess the security of Sage Construction Anywhere. Before any new release, strong measures and testing are taken to examine the security of the solution. In the most recent third-party audit, Comsec, a global information security consulting firm, found no vulnerabilities across the entire Sage Construction Anywhere site. As Sage solutions continue to improve and use the best new technologies, customers can be assured that Sage will continue its over 40 year commitment to being proactive about the security needs of its customers. Microsoft® AzureTM security Sage Construction Anywhere is built upon Microsoft’s industry-leading cloud services platform, Azure.10 Through leveraging Microsoft’s application hosting platform, regarded by many as the industry standard, Sage Construction Anywhere customers are assured of the highest levels of data integrity, availability, and confidentiality. 4 5. http://www.idc.com/getdoc.jsp?containerId=prUS23251912 6. https://cloudsecurityalliance.org/csa-news/data-loss-mobile-ranks-top-threat-enterprises/ 7. http://www.govinfosecurity.com/articles.php?art_id=4650 8. http://searchcio.techtarget.com/news/2240163146/Cloud-based-storage-replete-with-pros-and-cons-gaining-traction 9. http://www.forbes.com/sites/joemckendrick/2012/09/19/cloud-apps-somewhat-more-secure-than-on-premises-apps-survey/ 10. http://www.microsoft.com/online/legal/?langid=en-usdocid=11 Cloud security with Sage Construction Anywhere
  • 5. Sage application architecture security provisions Sage Construction Anywhere has been architected with key provisions that produce the protection your business needs for keeping information confidential and safe and at the same time create new collaboration opportunities with project teams. These provisions include: • age Construction Anywhere Connector—Sage has built its secure web services S platform from the ground up. The Sage Construction Anywhere Connector initiates all cloud communications and provides protection from the cloud by managing the handling of all exchanges with on-premises company information. This configuration is a key component for providing users freedom to access company data anywhere there is Internet connectivity while safeguarding the company systems from firewall or server breaches. • Encryption—All communication between your back-office financial and operations solution (Sage 300 Construction and Real Estate, for example) and Sage Construction Anywhere is encrypted with 256-bit SSL security. • ecuring customers’ information—Sage Construction Anywhere uses secure web S services for connections between servers and mobile devices to mitigate unauthorized access, network eavesdropping, and other threats. Customers are also assigned their own dedicated secure site so data is safeguarded from others. • ser management by project—Project files are stored and secured by project and U by folder. In a single step, you can categorize and secure files so they can be seen by all participants, seen by only those participants from a single vendor, or seen by a specific person. • dvanced folder security—Advanced Sage Construction Anywhere folder security settings A give you the trust to extend specific information access to an entire project team. These access options provide the ability to identify and ensure that only the right people see confidential documents such as contracts or invoices. • otifications and audit trails—Audit trails and online reports are available to track who N requests, accesses, and views information stored on Sage Construction Anywhere. This is particularly beneficial for legal protection and contract compliance. Conclusion Sage has been a market leader in construction-specific business management for over 40 years. Providing strong security for its customers has always been an integral part of its software planning and development, and Sage is fully committed to security excellence as technology issues and opportunities continue to change. With the right security measures in place, cloud technologies can help you operate more efficiently and extend your business opportunities. The momentum for adopting cloud applications is building as more contractors and owners realize the cloud’s potential. Imagine what your construction firm can accomplish with constant access to project data and the ability to work from virtually anywhere. 5 Cloud security with Sage Construction Anywhere
  • 6. Sage 15195 NW Greenbrier Pkwy Beaverton, OR 97006-5701 800-628-6583 www.SageCRE.com ©2013 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product and service names mentioned herein are registered trademarks or trademarks of Sage Software, Inc., or its affiliated entities. All other trademarks are the property of their respective owners. SPK 12-02733 1/13