Despite the advent of professional tools such as Google Apps, self-contained devices (BYOD) Policies and Dropbox, the more data, applications, and accesses are in the cloud, the reliable Virtual private network (VPN) strives to keep the WAN abreast. James Gordon is vice president of information technology at Needham Bank, who, like many IT managers, does not trust the latest cloud products, such as Microsoft and Google products. In his extremely stringent financial institutions, "not my server" does not mean "not my problem." ”
This attitude does not prevent Gordon from welcoming the large number of employees with iphones, ipads and Android devices into his office. Instead, he has been helping his users to enjoy the latest and most advanced entertainment games, while his network is delivering key business data while allowing employees to score high on games such as Angry Birds and child graffiti. He has become accustomed to the byod trend of the business because he deploys the tools it has been following: reliable VPNs, and new technologies to improve employee satisfaction and efficiency.
All in all, the prospects for VPN management are good, at least in terms of protecting and managing enterprise interests outside of the LAN.
VPN applications also need to use a new tablet computer technology
One of the new technologies used by the Needham Bank is the use of array receptacle Remote Desktop tools to help users access their corporate desktops through a variety of mobile devices. This allows it to maintain control and ensure that critical data is not stored locally on the device because the devices may be lost or stolen. One of the new technologies used by the Needham Bank is the use of array receptacle Remote Desktop tools to help users access their corporate desktops through a variety of mobile devices. This allows it to maintain control and ensure that critical data is not stored locally on the device because the devices may be lost or stolen.
In any case, each company faces a different choice, and it is almost impossible to have a simple solution that meets the needs of all companies.
Enterprise BYOD means that the network needs to meet any time, location and user's access requirements
"Now, users will use their devices to connect to the corporate network at any time, anywhere," said Kevin Beaver, an information security advisor. I certainly don't envy those administrators who are busy managing the network all day. "However, the risk of improper control is not negligible, for example, by directly banning cloud and consumer user tools, and continuing to use the 90 's VPN technology." "Users are now making higher demands on it," Gordon said. They will say that if it is not deployed, I will take the corporate credit card home and solve the problem by myself. ”
Scott Gode, vice president of product management and sales at Azaleos, has the opposite attitude to Gordon: his company provides remote IT support services to help manage Exchange, SharePoint, and other complex business software of all sizes. But there are still issues of security, accessibility, and agility. Azaleos uses software clients installed on client servers to back up the data that needs to be managed, in contrast to the traditional cloud model: hardware is deployed by customers and people are outsourced.
This also allows Gode to find out why business companies are securely and reliably accessing critical business resources for remote people. He points out that his views can be used to assess the choice of cloud services for others, or extend the network through VPN or other technologies. Oddly enough, Gode says security is not the cloud issue he is most concerned about. "Security is a subjective judgment," he said. "Often, depending on the size of the business and the experience and concerns of the cloud provider, cloud providers may even use stricter or more responsible security best practices."
But there are exceptions to any rule: in this case, demanding industries such as healthcare and finance may find that finding the right cloud service provider is like using a round wooden nail to fill a square hole. Sometimes the wiser way is to choose another tool. "If they value costs, cloud solutions will be more economical," Gode said. However, for security, they are concerned about public cloud solutions and are concerned that internal it specifications do not allow them to use cloud services. ”
Even in some loose environments, many cloud solutions lag behind it-controlled peers because they have long and deep integration of enterprise traditions, whether it's synchronizing CRM, helpdesk data to Outlook, or keeping ERP software synchronized to every corner of the multinational company.
Dropbox can solve many problems as long as it meets safety requirements
Another reason for opposing cloud services, Henry Ford points out, is that they are often proud of the service posture: "Completely black box, can solve all the problems." "The best example is a business-to-business SaaS company, known as simplicity and beauty, 37signals. The co-founder of 37signals, Jason Fried, points out in his blog that many customers are proactively asking them to make new product lines to address increasingly complex needs. "We would say no," he wrote in his blog. The reason: We would rather have customers go beyond the scope of our product services, and do not want to eventually be able to implement these products. ”
While it is wise to avoid the complexities of endless growth for businesses, in fact, many cloud services are often unable to match existing business processes, whether from the smallest SaaS start-up or the service giant Google, and are particularly adapted to change.
There are similar phenomena in integration. Gode said: "Many cloud solutions want a solution to all the problems, not just features, but also planned downtime and upgrades to fully implement these capabilities." "In the end, Gordon, who knows all about competing technologies, insists it does have certain privileges in terms of technology choices," he said. "It needs to face the reality that users do it themselves," he said. If a company's policy rules prohibit the use of social media, and their competitors do not prohibit it, then soon the company will have many users to violate the policy. ”
In this reality, it must decide what to put in the cloud, and how to ensure that its network is protected against the security threats posed by open Internet, so that it does not jeopardize critical data and business. "Realize that if you just move into the cloud, it doesn't help them out of responsibility," Gordon said. I always say that if there is a problem, then I leave a lot of reasons for the CEO to dismiss me: I don't use Office 365 or Dropbox. My role is no longer an IT expert, but it manager. Responsibility is always there, but the management is the technical supplier, and this job should not be neglected. ”
(Responsible editor: The good of the Legacy)