SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
What to look for in a hosted supplier
                                  Mark Holland
                     Baker Tilly Revas Limited
The future is hosted….




“Most companies will access software
and service through hosted suppliers in
the future”
           Microsoft – “Next Generation Hosting”
Security
“You can’t know where your data is,
you can’t prove that it’s being protected
and can’t know who’s accessing it”

                              Robert Richardson,
        Director of the Computer Security Institute
Back up and disaster recovery
          • It’s your data.
          • Responsibility for the
            security of your data, your
            compliance obligations
            and even the health of
            your business will sit in
            the hands of strangers
The processing environment
“There are different
kinds of clouds.
Some are more
secure than others”

              Izak Mutlu,
     CISO Salesforce.com
Flexibility
“Without a contract that’s reasonably well
thought out, you really don’t know what
level of service to expect and what to do
when service doesn’t live up to
expectations”
                                   Eric Maiwald,
                            Burton Group analyst
Credibility
“Leased servers in a rented property;
financed by a bank loan. We’d certainly
throw the switch!”
                                            Matt Wild,
           Baker Tilly Restructuring and Recovery LLP
Choosing a supplier
The suitability of hosted processing for any
 business will always be dependent upon
 that organisations individual requirements.

Contenu connexe

Tendances

Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime Whitepaper
Martin Ruubel
 

Tendances (18)

Pki part 1
Pki part 1Pki part 1
Pki part 1
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
[HashiConf EU] Securing Cloud Native Communication, From End User to Service[HashiConf EU] Securing Cloud Native Communication, From End User to Service
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
 
Mydex Annual ICO Roundtable - Personal data & Data Protection Act by William ...
Mydex Annual ICO Roundtable - Personal data & Data Protection Act by William ...Mydex Annual ICO Roundtable - Personal data & Data Protection Act by William ...
Mydex Annual ICO Roundtable - Personal data & Data Protection Act by William ...
 
Life with digital services after GDPR
Life with digital services after GDPRLife with digital services after GDPR
Life with digital services after GDPR
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
 
FAMILY OFFICES SEE LEGITIMACY IN SECURITIZED BITCOIN INVESTMENTS
FAMILY OFFICES SEE LEGITIMACY IN SECURITIZED BITCOIN INVESTMENTSFAMILY OFFICES SEE LEGITIMACY IN SECURITIZED BITCOIN INVESTMENTS
FAMILY OFFICES SEE LEGITIMACY IN SECURITIZED BITCOIN INVESTMENTS
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime Whitepaper
 
Martine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resourcesMartine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resources
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in Healthcare
 
What are the different types of blockchain technology explained
What are the different types of blockchain technology explainedWhat are the different types of blockchain technology explained
What are the different types of blockchain technology explained
 
Enterprise Security and the Waves of Disruption: It’s Surf or Sink
Enterprise Security and the Waves of Disruption: It’s Surf or SinkEnterprise Security and the Waves of Disruption: It’s Surf or Sink
Enterprise Security and the Waves of Disruption: It’s Surf or Sink
 
ReCheck - secure digitalization
ReCheck - secure digitalizationReCheck - secure digitalization
ReCheck - secure digitalization
 
CWIN17 Singapore / Kalyan madala ibm
CWIN17 Singapore / Kalyan madala ibmCWIN17 Singapore / Kalyan madala ibm
CWIN17 Singapore / Kalyan madala ibm
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
Richard Mabey & Stefania Passera's presentation @ Legal Geek '18
Richard Mabey & Stefania Passera's presentation @ Legal Geek '18Richard Mabey & Stefania Passera's presentation @ Legal Geek '18
Richard Mabey & Stefania Passera's presentation @ Legal Geek '18
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 

En vedette

танцевальная студия
танцевальная студиятанцевальная студия
танцевальная студия
okorkus
 
So Update January 2007
So Update January 2007So Update January 2007
So Update January 2007
GryKB
 
Nginx The webserver you might actually like
Nginx   The webserver you might actually likeNginx   The webserver you might actually like
Nginx The webserver you might actually like
Edorian
 
Future Uses Of Computers Powerpoint
Future  Uses Of  Computers  PowerpointFuture  Uses Of  Computers  Powerpoint
Future Uses Of Computers Powerpoint
ryan022395
 
2118 F I N A L With Bg 2
2118  F I N A L With Bg 22118  F I N A L With Bg 2
2118 F I N A L With Bg 2
2118tibet
 

En vedette (20)

Field Studies Council anticipates savings of up to £100,000 per annum with do...
Field Studies Council anticipates savings of up to £100,000 per annum with do...Field Studies Council anticipates savings of up to £100,000 per annum with do...
Field Studies Council anticipates savings of up to £100,000 per annum with do...
 
танцевальная студия
танцевальная студиятанцевальная студия
танцевальная студия
 
Pikas
PikasPikas
Pikas
 
Online distance PG Diploma courses from MIT Pune
Online distance PG Diploma courses from MIT PuneOnline distance PG Diploma courses from MIT Pune
Online distance PG Diploma courses from MIT Pune
 
Add topic
Add topicAdd topic
Add topic
 
Moodle - add topic to course page
Moodle - add topic to course pageMoodle - add topic to course page
Moodle - add topic to course page
 
Ivy d
Ivy dIvy d
Ivy d
 
So Update January 2007
So Update January 2007So Update January 2007
So Update January 2007
 
Nginx The webserver you might actually like
Nginx   The webserver you might actually likeNginx   The webserver you might actually like
Nginx The webserver you might actually like
 
Blake t
Blake tBlake t
Blake t
 
Tristan.d
Tristan.dTristan.d
Tristan.d
 
Chloecollins
ChloecollinsChloecollins
Chloecollins
 
Passive
PassivePassive
Passive
 
Alex j
Alex jAlex j
Alex j
 
Implementing and using employee self-service software
Implementing and using employee self-service softwareImplementing and using employee self-service software
Implementing and using employee self-service software
 
Kelley
KelleyKelley
Kelley
 
Future Uses Of Computers Powerpoint
Future  Uses Of  Computers  PowerpointFuture  Uses Of  Computers  Powerpoint
Future Uses Of Computers Powerpoint
 
2118 F I N A L With Bg 2
2118  F I N A L With Bg 22118  F I N A L With Bg 2
2118 F I N A L With Bg 2
 
Chase A
Chase AChase A
Chase A
 
Comic
ComicComic
Comic
 

Similaire à What to look for in a hosted supplier

The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
NTEN
 
Dynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsDynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton Communications
Clear Technologies
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
Valencell, Inc.
 
Centuric Overview
Centuric OverviewCenturic Overview
Centuric Overview
Centuric
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
DATAVERSITY
 

Similaire à What to look for in a hosted supplier (20)

Merrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created EqualMerrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created Equal
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
 
Capitalising on the cloud- why law firms should embrace hosted IT
Capitalising on the cloud- why law firms should embrace hosted ITCapitalising on the cloud- why law firms should embrace hosted IT
Capitalising on the cloud- why law firms should embrace hosted IT
 
Dynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsDynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton Communications
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Centuric Overview
Centuric OverviewCenturic Overview
Centuric Overview
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
Self defending data webinar (feb13)
Self defending data webinar (feb13)Self defending data webinar (feb13)
Self defending data webinar (feb13)
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Cloud Computing - Security (BIG Data)
Cloud Computing - Security (BIG Data)Cloud Computing - Security (BIG Data)
Cloud Computing - Security (BIG Data)
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmitDistributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
 
Blockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial ServicesBlockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial Services
 

Plus de Softworld

Plus de Softworld (11)

Ensuring maximum return on HR technology investment
Ensuring maximum return on HR technology investmentEnsuring maximum return on HR technology investment
Ensuring maximum return on HR technology investment
 
Save time, reduce risk and improve quality: How online accounting adds value
Save time, reduce risk and improve quality: How online accounting adds valueSave time, reduce risk and improve quality: How online accounting adds value
Save time, reduce risk and improve quality: How online accounting adds value
 
Software selection and implementation in the real world
Software selection and implementation in the real worldSoftware selection and implementation in the real world
Software selection and implementation in the real world
 
Expenses management: Avoiding the scandal that has rocked parliament
Expenses management: Avoiding the scandal that has rocked parliamentExpenses management: Avoiding the scandal that has rocked parliament
Expenses management: Avoiding the scandal that has rocked parliament
 
Ousourcing vs in-house: Key considerations and challenges
Ousourcing vs in-house: Key considerations and challengesOusourcing vs in-house: Key considerations and challenges
Ousourcing vs in-house: Key considerations and challenges
 
HMRC Update
HMRC UpdateHMRC Update
HMRC Update
 
With over 1,000 business software applications available, how do you select t...
With over 1,000 business software applications available, how do you select t...With over 1,000 business software applications available, how do you select t...
With over 1,000 business software applications available, how do you select t...
 
Regulations, Acts, and everything else you need to know about payroll legisla...
Regulations, Acts, and everything else you need to know about payroll legisla...Regulations, Acts, and everything else you need to know about payroll legisla...
Regulations, Acts, and everything else you need to know about payroll legisla...
 
How should we prepare for integrated HR & payroll software?
How should we prepare for integrated HR & payroll software?How should we prepare for integrated HR & payroll software?
How should we prepare for integrated HR & payroll software?
 
Improving business performance through the recession: Are your HR systems fit...
Improving business performance through the recession: Are your HR systems fit...Improving business performance through the recession: Are your HR systems fit...
Improving business performance through the recession: Are your HR systems fit...
 
The benefits of in-house payroll over outsourced: A user's experience
The benefits of in-house payroll over outsourced: A user's experienceThe benefits of in-house payroll over outsourced: A user's experience
The benefits of in-house payroll over outsourced: A user's experience
 

Dernier

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

What to look for in a hosted supplier

  • 1. What to look for in a hosted supplier Mark Holland Baker Tilly Revas Limited
  • 2. The future is hosted…. “Most companies will access software and service through hosted suppliers in the future” Microsoft – “Next Generation Hosting”
  • 3. Security “You can’t know where your data is, you can’t prove that it’s being protected and can’t know who’s accessing it” Robert Richardson, Director of the Computer Security Institute
  • 4. Back up and disaster recovery • It’s your data. • Responsibility for the security of your data, your compliance obligations and even the health of your business will sit in the hands of strangers
  • 5. The processing environment “There are different kinds of clouds. Some are more secure than others” Izak Mutlu, CISO Salesforce.com
  • 6. Flexibility “Without a contract that’s reasonably well thought out, you really don’t know what level of service to expect and what to do when service doesn’t live up to expectations” Eric Maiwald, Burton Group analyst
  • 7. Credibility “Leased servers in a rented property; financed by a bank loan. We’d certainly throw the switch!” Matt Wild, Baker Tilly Restructuring and Recovery LLP
  • 8. Choosing a supplier The suitability of hosted processing for any business will always be dependent upon that organisations individual requirements.