Software-as-a-Service: Changing How You Share Information in Today s Changing Business World. Part II



Similar documents
A White Paper for Business Decision Makers

SAS 70 Type II Audits

Virtual Data Room. From Deal Making to Due Diligence

EARTHLINK BUSINESS. Simplify the Complex

SaaS Adoption Lifecycle in Life-Sciences Companies

How to Turn the Promise of the Cloud into an Operational Reality

Take Your Vision to the Cloud

Minimizing ITSM cost of entry: HP Service Anywhere

A White Paper for Business Decision Makers

SOFTWARE AS A SERVICE (SaaS)

Creating Business Networks and Communities in the Cloud

ADVANCE YOUR MISSION WITH THE CLOUD DO MORE WITH LESS CLOUD SOLUTIONS CDW NONPROFIT

Sage ERP I White Paper. ERP and the Cloud: What You Need to Know

Right-Sizing Electronic Discovery: The Case For Managed Services. A White Paper

About RecoveryPlanner.com Business Continuity Management

Securing the Service Desk in the Cloud

Confidence in the Cloud Five Ways to Capitalize with Symantec

Injazat s Managed Services Portfolio

Symphony Plus Cyber security for the power and water industries

How To Use Egnyte

EMC DOCUMENTUM Capital Projects Express. KEEP YOUR PROJECTS ON TRACK Flexible Document Control for Agile Teams

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Xerox Workflow Automation Services Solutions Brochure. Xerox DocuShare 7.0. Enterprise content management for every organization.

Does Company Size Matter? Sizing up SaaS for your IT Help Desk SOLUTION WHITE PAPER

Sage ERP The top five reasons to deploy your ERP Solution in the cloud

HITS HR & PAYROLL CLOUD MODEL WHITEPAPER

The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution

At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS

Managing Business Documents in the Cloud

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Payment Card Industry Data Security Standard

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

PRODUCT SHEET: CA Arcot Cloud Services Data Centers CA Arcot cloud services data centers. True multi-tenancy and scalability

Built with the leading Investment Banks, Law Firms, and Corporations. Our service is used by tens of thousands of professionals all over the world.

CLOUD ERP AND ACCOUNTING: SELECTION AND PLANNING GUIDE

The biggest challenges of Life Sciences companies today. Comply or Perish: Maintaining 21 CFR Part 11 Compliance

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

SAAS VS. ON-PREMISE SECURITY. Why Software-as-a-Service Is a Better Choice for and Web Threat Management

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Virtual Data Room Security 2. Service 3. Simplicity 4. Speed 5. Cost Certainty

Your guide to hosted data centres: How to evaluate potential providers

Deltek First - The Business Case

Document ID. Cyber security for substation automation products and systems

The Challenges of Managing Multiple Cloud Identities and Enterprise Identity by BlackBerry

SEVEN REASONS TO CONSIDER ERP IN THE CLOUD SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND

Information Technology Solutions. Managed IT Services

BMC s Security Strategy for ITSM in the SaaS Environment

Buyer s Guide to Enterprise Collaboration

Securing Cloud Computing for Enterprise Collaboration

Cloud Vendor Evaluation

Walk Then Run: 10 Essential Steps to Securing the Cloud

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Cloud-Based Project Information Management from Aconex: A Guide for IT Professionals

Clearing the ERP Clouds

The Real SaaS Manifesto: Defining Real SaaS and how it can benefit your business

Cloud Computing in the Hedge Fund Industry

Leveraging security from the cloud

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations

Microsoft Dynamics. The Business Benefits of Hosted ERP Solutions for Small & Midsize Organizations

Contact Center Security: Moving to the True Cloud

How To Achieve Pca Compliance With Redhat Enterprise Linux

How On-Premise ERP Deployment Compares to a Cloud (SaaS) Deployment of Microsoft Dynamics NAV

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

Managing g SAP Document and Data. Cloud. Jochen Hager Solution Exchange Wellesley Information Services. All rights reserved.

Data Storage That Looks at Business the Way You Do. Up. cloud

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

Brit HOSTED EXCHANGE BRITE SECURITY FEATURES:

White paper: Information Rights Management for IBM FileNet. Page 1

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

Anypoint Platform Cloud Security and Compliance. Whitepaper

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Provide access control with innovative solutions from IBM.

Enterprise level security, the Huddle way.

What is the Cloud and Saas? Introducing the Cloud and its Benefits

BEST PRACTICES IN AP AUTOMATION

TOP SECRETS OF CLOUD SECURITY

Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security

Vodafone Total Managed Mobility

SINGTEL BUSINESS - PRODUCT FACTSHEET MANAGED CLOUD SERVICE (SINGTEL IAAS)

Delivering the Benefits of Enterprise Content Management in a Hosted Environment

IBX Business Network Platform Information Security Controls Document Classification [Public]

DICTATION & TRANSCRIPTION. INFO@DOLBEY.com

Client Security Risk Assessment Questionnaire

Applying ITIL v3 Best Practices

Software As A Service

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Advanced Service Desk Security

MOVING TO THE NEXT-GENERATION MEDICAL INFORMATION CALL CENTER

Hosted Exchange. Security Overview. Learn More: Call us at

Troux Hosting Options

SECURITY IN A HOSTED EXCHANGE ENVIRONMENT

Is Cloud Backup good insurance for your brokerage?

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Clinical Trials in the Cloud: A New Paradigm?

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

ProjectManager.com Security White Paper

Transcription:

Software-as-a-Service: Changing How You Share Information in Today s Changing Business World Part II

Contents Introduction...1 Guidelines for Choosing an Online Workspace Provider...2 Evaluating SaaS Solutions: What to Ask?...3 Assessing an Online Workspace Provider...7 Summary...9 About IntraLinks...10

Introduction This is Part II of an ebook series that examines the business demands driving the growth of a new type of enterprise content management solution delivered in a Software-as-a-Service (SaaS) model called an online workspace for critical information exchange. Part I of this series explores the limitations of traditional approaches to business-critical information sharing and provides an overview of online workspaces as an alternative to the current document management methods. It also defines the SaaS delivery model for enterprise content management (ECM), describes the business benefits of online workspaces, and provides examples of how these workspaces support critical information exchange for. document-intensive processes. This ebook provides guidelines for IT and business decision-makers seeking a document management and exchange solution to support business-critical processes. 1

Guidelines for Choosing an Online Workspace Provider for Critical Information Exchange Solution providers should be evaluated on two main dimensions. SaaS delivery. Since SaaS is an out-tasking model, it is important to verify a provider can deliver the level of service and capabilities your company requires. Functionality. Be sure the service will meet the document management and exchange demands of its users and will support the security, compliance and cost considerations of the business. Six Questions for Evaluating SaaS Solutions: 1. Is the service reliable? 2. Is the service secure? 3. Is the solution scalable? 4. Can data get backed up easily if I terminate my contract? 5. Can a fast ROI be achieved? 6. Does the solution meet must-have functionality requirements? 2

Evaluating SaaS Solutions: What to Ask? 1. Is the service reliable? The first order of business is to determine if the solution meets your organization s requirements for system uptime and availability. Carefully examining performance records. to ensure the provider delivers reliable and universal access to valuable documents. is a good place to start. Many providers offer or will negotiate service level agreements (SLAs) that clearly state their availability and performance, identify how these service levels will be monitored and verified, and specify how the provider will be penalized if they fail to meet their obligations. 99.9% system uptime over a 12-month period is optimal for a SaaS solution. Disaster recovery and system back-up are also key considerations. The provider s servers should be housed in geographically remote, highly secure data centers that should use realtime replication, multiple connections, alternate power sources and state-of-the-art emergency response systems to ensure data protection. It is important to note that SLAs should not only state the availability and performance standards to be met but also should relay the back-up and recovery plans. In addition, they should relay the problem notification and escalation steps that will be taken if an issue arises. 3

2. Is the service secure? To ensure the security of the service infrastructure and business processes, four key security criteria need to be reviewed with potential providers. Application Security When users access SaaS services, the need for security kicks in as soon as that activity begins. The best SaaS providers protect their offerings with strong authentication and equally potent authorization systems. Authentication ensures that only those with valid user credentials obtain access, while authorization controls what services and data items individual valid users may access. Infrastructure Security Disaster recovery, discussed on the previous page, is one key aspect of infrastructure security. In addition, the data centers firewall mechanisms, virus scanning and intrusion detection software should be continuously monitored to assure they are not compromised. Be sure to verify that potential providers perform annual tests and audits of their security infrastructure. Process Security Process security adds another layer of protection, and is particularly important when SaaS solutions will support highly sensitive company information. Of critical importance is to ensure that potential providers have thorough security procedures and controls in place to govern every aspect of how client information is managed. Security policies and procedures should be verified using recognized industry standards, such as SAS 70 Type II certification for the financial industry or the FDA s 21 CFR 11 regulations for the life sciences industry. Personnel Security Finally, the solution provider s process to ensuring that employees are screened and equipped to handle client s information with the highest integrity and according to strict processes should also be verified. Employees should have comprehensive background checks and be expected to adhere to stringent confidentiality agreements. They should undergo intensive training and be required to pass rigorous certification exams, in addition to undergoing continuing certification training to ensure their skills are up-to-date. PERSONNEL APPLICATION INFRASTRUCTURE PROCESS 4

3. Is the solution scalable? For many companies, one reason to consider a SaaS solution is the ability to pay as you go. Therefore, it makes sense to verify that it s possible to cost-effectively start with a departmental solution and easily add users with the same high levels of security and reliability, as the business demands. The best vendors will be able to add users seamlessly. 4. Can I get my data back easily if I terminate my contract? Because SaaS business models almost always necessitate housing data with the provider, understanding the process to bring the information back in-house and ensuring it will not be overly complex and burdensome is essential. 5. Can I achieve a fast ROI? Two main drivers for any business case are the financial investments and staff resources required to undertake a program. SaaS solutions naturally support a faster ROI than software purchase and implementation because they do not require a large capital outlay or an investment in staff to maintain the solution. However, SaaS solutions will require support for implementation. Scoping the effort necessary to implement a solution and train users is part of the smart manager s ROI calculation for executing a new SaaS program. Evaluate vendors on their support for a turnkey implementation approach, including their ability to upload a company s information and integrate with current systems and training. Equally important is to look at the tools and capabilities vendors provide to support and control the implementation at your own pace. Vendors that provide robust service options and strong self-service implementation tools allow maximum control over the implementation process and cost. 5

6. Does the solution meet my must-have functionality requirements? One of the trade-offs of a SaaS solution is that users may not be able to fully customize the application. This trade-off must be weighed against the significant up-front and ongoing costs of a build your own, customized solution. One way to make the calculation is to apply the 80/20 rule to the SaaS solution options: Will the SaaS solution provide 80% of the functionality critical to meeting your business needs, at a substantially lower cost than an on-premise software solution? Can the SaaS solution be configured to meet your needs today, and is the vendor willing and able to work with you to add additional functionality over time? Online Workspaces Manage the lifecycle of content with integrated workflow, permissioning and DMR INFORMATION PEOPLE Share & collaborate with business counterparties on and off-line. PROCESS Enterprise content management REPOSITORY Crossorganizational collaboration Organize, present, search and filter content within a familiar folder structure. Track content and usage with sophisticated audit compliance and reporting. 6

Assessing an Online Workspace Provider Once a potential provider has been vetted against the SaaS selection criteria, assessing the provider against online workspaces specific criteria is the next step. How vendors support critical information exchange should be a primary focus in your evaluation. 1. Will cross-company document exchange and management be made flexible and easy? Evaluate several aspects of the service to gauge the relative flexibility and ease of one vendor s solution versus another s. Seek the solution that is easy for the business users and administrators, as well as the IT team. Assess solutions on the following dimensions: Ease of getting documents uploaded and organized Ease of adoption and use of the service Ease of adding new users and administering the system 24/7 global dedicated customer service 2. Can I trust that my critical information will be protected? The first step to ensuring data is protected is verifying that the provider meets the reliability and security guidelines outlined earlier. Online workspace providers for critical information exchange should support additional application security capabilities that add significant protection to sensitive information. Look for the following features: Ability to assign access levels and roles Document permission Watermarks Digital Rights Management Strict ID and password protocol.. 7

3. Can the provider demonstrate experience and instill trust? Another important consideration is finding out the full scope of experience your solution provider has with critical information exchange. How long has the company been in business? Which companies trust this provider with their critical information today? Does the provider have a solid track record of handling highly sensitive information from a wide range of business processes and industries? Is the company SAS 70 Type II certified? Online workspaces have demonstrated a 30% reduction in business critical information exchange costs and a 20% improvement in work group productivity. Is the company 21CFR Part II capable? 1 Answers to these questions will provide a comprehensive profile with which to gauge the experience of the solution provider and help determine if you can absolutely trust that your critical information will be protected. 4. Will the solution add value and efficiency to my business process? Improving the efficiency and effectiveness of cross-company collaboration and document exchange are critical to business success today. Online workspace solutions can help break through the productivity barrier and add an extra level of information protection to document exchange. Features and functionality to look for when evaluating online workspace vendors include: Mobile access Comprehensive question and answer capability Records and tracking for compliance 1 SAS 70 Type II certification in the financial services industry s auditing standard for client data protection. 21CFR Part II is the set of FDA rules for electronic record keeping for clinical drug trials. Providers that meet these criteria by definition have set the bar very high for data protection 8

Summary A growing number of companies are adopting SaaS online workspaces for critical information exchange to meet their document management needs. This solution can be acquired on a pay-as-you-go basis and deployed quickly. However, IT and business decision-makers must carefully evaluate providers to ensure they have the proper availability, performance, scalability and security measures in place to fully support their corporate requirements. In addition, a careful review of how online workspace functionality meets their requirements for critical information exchange including information protection, compliance, ease of use and administration, and efficiency is recommended. Business leaders and IT managers in need of secure, compliant, cost-effective document exchange solutions will be well-served to assess online workspaces for their critical information exchange. 9

About IntraLinks For more than a decade, IntraLinks enterprise-wide solutions have been facilitating the secure, compliant and auditable exchange of critical information, collaboration and workflow management inside and outside the enterprise. For simplifying business processes such as board of director communications, post-merger integration, acquisition management, corporate finance and legal matter management, the IntraLinks platform can help improve operational efficiency and reduce time and costs while adding increased security and control to your processes. More than 750,000 users across 90,000 organizations around the world rely on IntraLinks, including 50 of the 50 top global banks, 10 of the top 10 life sciences companies, 25 of the top 25 law firms, and 14 of the 15 largest private equity firms. To learn how IntraLinks can transform your business,. visit www.intralinks.com or contact us at: 1 866 INTRALINKS New York + 1 212 342 7684 London + 44 (0) 20 7060 0660 Hong Kong + 852 3101 7022 10

1 866 INTRALINKS New York + 1 212 342 7684 London + 44 (0) 20 7060 0660 Hong Kong + 852 3101 7022 www.intralinks.com 2009 IntraLinks, Inc. All rights reserved. IntraLinks and the IntraLinks logo are registered trademarks of IntraLinks, Inc. in the United States and/or other countries. 11