Time to Value: Successful Cloud Software Implementation



Similar documents
Secure, Scalable and Reliable Cloud Analytics from FusionOps

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Client Security Risk Assessment Questionnaire

Cloud Computing; What is it, How long has it been here, and Where is it going?

Pharma CloudAdoption. and Qualification Trends

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

Managing Cloud Computing Risk

See Appendix A for the complete definition which includes the five essential characteristics, three service models, and four deployment models.

PCI Compliance for Cloud Applications

CompTIA Cloud+ 9318; 5 Days, Instructor-led

Infrastructure as a Service (IaaS) Dancik International and Peak 10

SECURITY DOCUMENT. BetterTranslationTechnology

custom hosting for how you do business

Blue Jeans Network Security Features

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Enterprise level security, the Huddle way.

Tableau Online Security in the Cloud

Security Policy JUNE 1, SalesNOW. Security Policy v v

Enterprise Architecture Review Checklist

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Security Threat Risk Assessment: the final key piece of the PIA puzzle

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

SaaS Security for the Confirmit CustomerSat Software

ProjectManager.com Security White Paper

Cloud Computing for SCADA

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Cloud Computing demystified! ISACA-IIA Joint Meeting Dec 9, 2014 By: Juman Doleh-Alomary Office of Internal Audit

CA Cloud Overview Benefits of the Hyper-V Cloud

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

Famly ApS: Overview of Security Processes

Cloud Services Overview

Cloud Computing Trends, Examples & What s Ahead

Cloud Courses Description

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

BMC s Security Strategy for ITSM in the SaaS Environment

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

SELLING CLOUD. RapidScale 101. Author. RapidScale s CloudIntelligence Team

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan

FormFire Application and IT Security. White Paper

PRODUCT SHEET: CA Arcot Cloud Services Data Centers CA Arcot cloud services data centers. True multi-tenancy and scalability

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Course Overview. What You Will Learn

How To Use Arcgis For Free On A Gdb (For A Gis Server) For A Small Business

Hosted SharePoint: Questions every provider should answer

Third Party Cloud Services Its Adoption in the New Age

White Paper How Noah Mobile uses Microsoft Azure Core Services

Security Information & Policies

Data Center Consolidation: Lessons From The Field. John Tsiofas, Kraft Kennedy David Carlson, Kraft Kennedy

Transitioning Your Clients to the Cloud from Initial Discussion to Implementation to Client Usage

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Cloud Hosting Option For New OnSite Customers

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

CLOUD SERVICES FOR EMS

Security & Infra-Structure Overview

Secure and control how your business shares files using Hightail

Live Guide System Architecture and Security TECHNICAL ARTICLE

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS

How To Understand Cloud Computing

Cloud Contact Center. Security White Paper

The Elephant in the Room: What s the Buzz Around Cloud Computing?

How To Understand Cloud Computing

Security from a customer s perspective. Halogen s approach to security

Cloud models and compliance requirements which is right for you?

Cloud Management. Overview. Cloud Managed Networks

Itron Cloud Services Offering

Autodesk PLM 360 Security Whitepaper

Module 1: Facilitated e-learning

Best Practices of Hosting Applications in the Cloud. Douglas Sleeter, Founder The Sleeter Group

security in the cloud White Paper Series

How to Turn the Promise of the Cloud into an Operational Reality

All your apps & data in the cloud, all in one place.

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

White Paper: Librestream Security Overview

CLOUD ARCHITECTURE DIAGRAMS AND DEFINITIONS

Cloud Computing. What is Cloud Computing?

Two Approaches to PCI-DSS Compliance

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Running Oracle Applications on AWS

A.Prof. Dr. Markus Hagenbuchner CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1

Transcription:

Time to Value: Successful Cloud Software Implementation Cloud & Data Security 2015 Client Conference

About the Presenter Scott Schimberg, CPA, CMA Partner, Consulting, Armanino Scott became a Certified Management Accountant in 1995 and obtained his CPA certificate in 2002. He has a mixture of industry experience and has held positions as Assistant Controller, Controller and VP of Finance. He also has more than 13 years of consulting experience, where he has focused on implementing ERP systems.

Agenda Learning Objectives On Premise vs Cloud Implementations Cloud Based Software Solution What s Included Cloud Implementation Tools and Trends Cloud Specific Implementation Cloud Security Considerations

Learning Objectives Examine the similarities and differences of on-premise vs. cloud implementations Learn how an implementation can be done 100% remotely Identify essential Cloud software solution components

On Premise vs. Cloud Implementations 2015 Client Conference

Similarities Project Management is required Need an Implementation Methodology and Plan Typical high level steps o Requirements gathering o Design and configure o Testing o Training o Deploy or go live o Support

Major Differences Cloud deployments are typically done remote Nothing installed at client s office or systems. Most frequent on site requests o Kickoff meeting o Complex requirements gathering o Training Flexibility with database o Onsite has access, cloud ask to do

Major Differences Quick implementations o No setup and configuration of servers and workstations.

Cloud Based Software Solution What s Included 2015 Client Conference

Cloud Computing Stack - Types SaaS - Applications for end-users delivered over the cloud PaaS Tools used to deliver Applications for end-users (hosted environments) IaaS underlying infrastructure that runs the SaaS and PaaS solutions, servers, storage, networks and operating systems

Types of Deployment and What s Included SaaS Hosted (PaaS) On Premise or PaaS Software Multi-tenant Managed servers And software installation Customer managed Disaster recover Included Usually included Customer deploys Support Included Portions included Typically extra cost Sandbox Usually extra Usually extra Customer deploys Integration API API/direct to database Guaranteed Up Time API/direct to database Included with SLA Included with SLA Customer manages Security Included Managed service Customer manages Upgrades Included Depends on provider Customer Manages

Cloud Implementation Tools and Trends 2015 Client Conference

Meetings and Trainings Video conferencing Screen sharing tools Recording meetings Survey of meetings and trainings Shared Drives work papers and documents Online project management tool

Cloud Specific Implementation 2015 Client Conference

System Activation Software provider sends introduction communication Customer completes initial setup information o Company ID o Initial user o Other basic information Software provider activates software SOC 16 Report Initial user add e-mail

Browser Access Access is typically through a supported browser Make sure supported browser is used by all members Non-supported browsers may: o Work for a significant portion of the functionality o Have issues with only certain forms, buttons, etc. o Create error messages and stop or slow work o Cause data corruption

Sandbox Sandbox is highly recommended o Better for training new employees o Integration support Common Sandboxes offered o Copy of live system that can be refreshed o An extra environment (needs to be configured and populated with data) Password security is important o Copy of your data

Integration and Customization Sandbox is highly recommended Hosting of development code and solutions Upgrade considerations Connectivity requirements

Implementation Time Implementation Timeline o Generally 60 to 90 days for most SMB clients (non-distribution and manufacturing) o Integrations could take more time Meetings o Short and focused o Meetings a couple times per week for 1 to 2 hours End users typically have implementation work after meetings o Gathering requirements information o Compiling data

Implementation Steps Requirements gathering Configuration Testing Training Data migration Deployment Transition to support

Cloud Security Considerations 2015 Client Conference

System Security SSAE 16 SOC1 Type II audited and PCI DSS certified Tightly restricted access to production data including biometric access controls Hardened networks and firewalls Real-time activity log tracking Automated security scanning and third party white hat penetration testing Virus resistance reinforced through software architecture Encryption for all data transmission Multiple fiber trunks and mirrored RAID storage Standby servers and redundant network components Redundant uninterruptable power supplies and parallel redundant generators

Data-Level Security Full daily backups to multiple locations Continuous backups of transaction data Secure streaming of transaction data to remote disaster recovery center

Application Security Highly granular level of control over user access o Permissions, role-based access Option of requiring 2-step user verification every time a user signs on through an unrecognized device Enforced password changes and automatic session timeouts Option to set acceptable IP ranges from which users may log in

Conclusion Examine the similarities and differences of on-premise vs. cloud implementations Learn how an implementation can be done 100% remotely Identify essential Cloud software solution components

What Questions Do You Have?

Scott Schimberg, CPA phone: 925.790.2622 email: scott.schimberg@armaninollp.com 2015 Client Conference

COMING UP NEXT: Building an Enterprise Application Strategy Around Cloud Technologies 2015 Client Conference