Thursday, May 10, 2007

How secure is a hosted environment?

Network World

Unified Communications




Network World's Unified Communications Newsletter, 05/10/07

How secure is a hosted environment?

By Michael Osterman

We have been following the hosted messaging market for many years in all of its various flavors: complete hosted messaging, hosted messaging security, hosted archiving, etc. In the research that we have done, one of the perennial objections raised by many decision makers with regard to their potential use of hosted services has been the security of data that is managed by a hosted provider.

For example, in a recent survey of midsized and large organizations, we asked decision makers to rate their agreement with the statement: ‘Message stores will not be as secure if managed by a managed or hosted service provider.’ The response: 44% of decision makers told us that they agree or strongly agree with this statement.

Last week, I spent a few hours at the corporate headquarters of ZANTAZ in Pleasanton, Calif. ZANTAZ is a leading provider of hosted and on-premise messaging archiving solutions. The company has focused its hosted services on very large financial institutions, among others, and currently manages more than 14 billion e-mails for a large number of companies.

VoIP: Lessons from Early Adopters

Experts say VoIP isn't a magic wand that will solve all of an organization's communications challenges right out of the box. Learn why VoIP may not produce expected savings and productivity gains, and other lessons from early adopters.

Click Here to Watch

I was very impressed with just how secure the facilities really are. There are 50 cameras located inside and outside of the building that houses customer data. The minimum security areas of the building require employees to go through two access points, each of which require two-factor authentication – a scan of an employee identification card and a fingerprint scan.

Some areas require employees to pass through four access points. Customers can have their data housed on either shared or dedicated systems – the latter can be physically sealed off with cages that require secure access for additional protection. Even if an unauthorized visitor can make it into the building through a secure access door, the most they could do would be to visit a bathroom. The control center within the building cannot be inadvertently viewed by passersby – staff in the center are alerted when someone wants to peek in so that any customer information can be taken off of the many monitors throughout the facility before the shades are lifted. ZANTAZ operates multiple data centers in the western United States and in the United Kingdom and uses two different telecom providers to link each facility to transfer data for redundancy. Of course, like any hosted provider, the facilities are staffed 24x7, backup generators are in place, etc.

The point of this article is not to advertise for ZANTAZ – other hosted providers, including MessageOne, Apptix, Postini, MessageLabs, AppRiver, MX Logic, USi and many, many others also provide very robust security for their customer data. In many cases, these facilities are more robust than those of their customers.

The bottom line is this: if, as a decision maker, you object to the use of hosted services, potential data breaches might be one objection you should rethink.


  What do you think?
Post a comment on this newsletter

TODAY'S MOST-READ STORIES:

1. Analysts squash IBM layoff rumors
2. Five cool future IT positions
3. Top 15 controversial Microsoft quotes
4. Top things we love and hate about Apple
5. Thin clients in, PCs out at Verizon Wireless
6. 10 ways to boost your IT org now
7. Cringely should stop shooting his mouth off
8. Users headed to Vista, but concerns increase
9. Wireless LANs turned inside-out
10. Management heavies get poor grades in survey

MOST E-MAILED STORY:
Homeless man disrupts Internet2 service


Contact the author:

For webinars or research on messaging, or to join the Osterman Research market research survey panel, go here. Osterman Research helps organizations understand the markets for messaging and directory related offerings. To e-mail Michael, click here.



ARCHIVE

Archive of the Unified Communications Newsletter.


BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: networking.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment