From small businesses to mid-size corporations to leading multinational companies, automating everyday business processes is a proven path to digital transformation. frevvo’s customers trust our software both in the cloud and on-premise to digitize routine tasks like purchase order processes, vacation requests, consent and emergency contact forms for education, emergency contact forms, travel authorization etc.Continue reading “Why do hundreds of customers choose frevvo?”
More than 80% of the organizations surveyed in this recently published report (25 pp., PDF, opt-in) are now following a Cloud First strategy. They prefer to purchase applications as a service deployed in the Cloud over applications deployed on physical servers in their data center.
Those with a Cloud First strategy believe that their IT budgets will be 80% cloud services in less than 12 months, while those without such a strategy think it will be closer to 20 months with 15 months being the average. That’s remarkable [at least to me]. Clearly, trust and confidence in the Cloud has grown quickly.
At frevvo, that’s very much in line with what we see. Customers mostly prefer our public cloud – even very large organizations. They’re less concerned about security and availability and more interested in practical issues like cost. That’s likely because incidents have decreased.
We also offer both Public and Private cloud. We’ve noticed too that customers increasingly perceive the benefits of public cloud surpassing private cloud, especially when it comes to cost. The TCO for Public Cloud is almost universally perceived as being hugely lower – sometimes to the point that customers expect public cloud services to be incredibly inexpensive.
To us, it’s still a surprising number. 80% of the IT budget going to Cloud computing in just over 1 year. Clearly Cloud Computing has matured and is being adopted broadly.
Learn more about frevvo’s solutions by visiting our website where you’ll find several customer success stories. Explore some of the examples and contact us for more information.
Download the full report at Building Trust in a Cloudy Sky: The State of Cloud Adoption and Security (25 pp., PDF, opt-in).
McKinsey recent global IT-as-a-Service (ITaaS) Cloud and Enterprise Cloud Infrastructure surveys found that the shift to the cloud is accelerating, with large enterprises becoming a major driver of growth for cloud environments. In the next three years, enterprises will make a fundamental shift from building IT to consuming IT.
A summary of both surveys is at IT as a service: From build to consume (free, no registration required). The key takeaways are
Enterprises are reducing on-premise deployment
In 2015, 77% of enterprises used traditional IT infrastructure for at least one workload; by 2018, this will drop to 43%. Conversely all varieties of Cloud deployments will increase
Large enterprises are moving to Cloud far faster than before
A deeper look into cloud adoption shows a significant shift coming in large enterprises. Large enterprises are finally catching up to small/midsize enterprises when it comes to cloud deployments. This portends significant headwinds for traditional IT and a boon for cloud providers since large/midsize enterprises form the majority of revenue/profits for IT vendors.
Cost is neither the primary driver nor barrier to cloud acceptance
Enterprises consider time to market and quality as the premier drivers for Cloud solutions outweighing any cost benefits. Security and compliance are the primary barriers to broad adoption. Cost comes in third but interoperability with on-premise private cloud solutions is also an important criterion.
Came across this Google-sponsored study, Trust in cloud technology and business performance: Reaping benefits from the cloud (PDF, no registration required) from The Economist Intelligence Unit (via Forbes/Louis Columbus). It’s based on a ten-country, multi-industry EIU survey of 452 senior executives and interviews with experts and is full of interesting insights:
An astounding 38% of I.T. at respondents’ organizations is cloud-based rising to 45% by 2019. Almost half of I.T. will be cloud-based by the end of the decade. And, the Cloud has already helped transform key areas such as time to market, greater agility and collaboration.
Yet, while everyone is using Cloud, just 16% of respondents say their organization has a very high level of trust in the cloud and this level of trust is not growing quickly.
The lack of trust is surprising when you consider the correlation between Cloud Trust and a wide range of key business outcomes from economic metrics such as Revenue, Profit & Share Price to non-financial ones like Agility, Collaboration & Innovation.
The conclusion is that Trust plays a key role. Cloud’s greatest benefits come from companies refashioning how they work and expand their capabilities by taking full advantage of the benefits and not from the low-hanging fruit of cost savings. Organizations with low trust are far from this transformation. Those with high trust are improving functional operations and profitability.
IMHO, this is the most important insight from Rightscale’s 2016 State of the Cloud Survey. Lack of resources/expertise has supplanted security as the top challenge in cloud.
We see this in so many ways. It’s probably one of the most important reasons customers buy our product.
They’re simply don’t have enough talented I.T. resources. People are too busy maintaining legacy systems or worrying about the SQL database to spend time on automating the routine stuff, making it look beautiful and usable on all devices. Frustrated business people turn to solutions like frevvo – we obsess about the user interface and make it easier and easier to meet key business requirements like electronic signatures and PDF generation (Government W-4) using fewer scarce resources.
Interestingly, another key area is the intersection of talent & security. Customers simply don’t have sufficient expertise in their organizations to understand Cloud Security. Automated workflows in frevvo’s Cloud are far more useful if they can integrate with internal systems (authentication, database etc.). We offer several well-tested mechanisms for this integration. But, it’s common to hit a roadblock inside the organization. And, it’s understandable – security breaches can have a devastating impact and everyone knows who will get blamed. Luckily, as companies gain more experience with the Cloud, they’re understanding security better and it’s less of an issue.
Talent is increasingly scarce across the board – from coding (especially UX) to security to analytics. Whether you’re large or small. In all industries. You have to get rid of daily inefficiencies and focus your talent where they can make a difference.
Learn more by visiting our website and see how customers are using frevvo today to become more efficient.
Are you concerned about Cloud Security? You’re clearly not alone. Over 90% of organizations are very or moderately concerned about cloud security with the biggest worries being unauthorized access and malicious insiders. It’s hardly surprising considering that a single breach can have such a large negative impact on your business.
At frevvo, we invest a lot of effort in Cloud Security. Our infographics and blog articles discuss how we’ve helped customers securely automate their key processes in the cloud. We’ve also created a short (2 min) video below to show you how partnering with frevvo.
Interested in learning more? Visit our website to and see how customers are already using frevvo’s public and private cloud solutions to transform everyday business processes.
Concerned about Cloud Security? You’re not alone. A single breach can have a huge negative impact on your business. Even the Rebels destroyed the Death Star by exploiting a single security flaw.
Make frevvo your ally and you can rapidly take advantage of powerful, impactful cloud solutions today while minimizing security risks and decreasing your compliance costs. We know that data security is critical for your business. Check out this new infographic and see how our multi-layered approach can help you secure your information as we continuously monitor and improve your systems, processes and services.
Interested in learning more? Contact frevvo today to get a comprehensive overview of how you too can securely deploy everyday workflows on mobile devices using frevvo’s Cloud.
Came across this article in Ars Technica UK (Warning: it’s a bit of an Infomercial with content sponsored by HP Enterprise), the basic premise is valid. We see similar trends in our customers.
Every CIO is interested in the cloud. It simply makes sense. You cannot compete with the cost structure of the large Cloud providers when it comes to basic infrastructure (servers, network etc.). When it comes to software, employees are also consumers and are accustomed to awesome user experiences on their mobile devices and apps that are regularly refreshed. Corporate I.T. departments simply cannot keep up. So whether it’s SaaS applications like GMail and Salesforce (who are finally rolling out a refreshed UI) or a product like ours which you can use to create your own customized SaaS-like application, corporate I.T. cannot expend the time, money and effort to refresh UIs, support the vast array of mobile devices, ensure 24×7 uptime and so on.
The Achilles heel is, of course, security. It’s hard to entrust some data to Cloud providers and all the high-profile hacks don’t help (even though, in reality, almost none of them affect cloud-based systems). And legacy business systems aren’t going anywhere [certainly not to the cloud] for many many years. So, there’s plenty of interest in private and hybrid cloud setups and we think it’s likely to continue for years.
That’s why, much as we prefer our customers to choose public cloud, we continue to offer both and will do so for the foreseeable future. Luckily for us, it’s the exact same software and we’ve learned that it doesn’t pay to offer too many variants (i.e. optional add-on features). The resulting increase in complexity isn’t worth it.
Read the original article here. Warning: you’ll have to wade through the infomercial fluff to get to the gist. Or, it’s summarized above for you 🙂
There’s a lot of hype about moving to the cloud and it is delivering on its promise of flexibility (51%), availability (50%) and cost reductions (48%). This, as a result of comprehensive research (signup required) in cooperation with the 250,000+ member Information Security Community on LinkedIn conducted by Crowd Research.
But the Cloud is still falling short when it comes to Security, which is still the biggest perceived barrier to cloud adoption. Nine out of ten organizations are very or moderately concerned about cloud security.
The dominant cloud security concerns include unauthorized access (63%), hijacking of accounts (61%), and malicious insiders (43%). Malware, denial of service attacks, and other direct attacks against the cloud provider rank lower on the list of concerns.
Cloud Confidence Builders
The most popular method to close the cloud security gap is the ability to set and enforce consistent cloud security policies (50%). Encryption for data at rest (65%) and in motion (57%) top the list of most effective security controls for data protection in the cloud.
At frevvo, as with any public cloud vendor, we take security very seriously. Most of our customers have relatively limited security expertise and have difficulty performing regular security audits and assessments. In contrast, security is critical for us and all public cloud vendors and we implement multi-layered approaches to security taking into account data centers, storage, networks, backups, audits and policies.
Specifically, when it comes to data privacy at rest and in motion, we take many steps including:
- All data at rest is encrypted including databases, backups, replicas, and snapshots.
- Employees have no direct access to database servers.
- Users’ data and accounts are isolated from undesirable traffic and access.
- All access is via TLS cryptographic protocols ensuring that users have a secure connection from their browsers to our services.
- Individual user sessions are identified and verified using a unique token created at login and never re-used.
- and more …
All this works in concert with the other security layers that we have in place to ensure that you can use frevvo’s Cloud with confidence. And, if you’re still not convinced, we also offer Private and Hybrid Cloud versions. So, security is no longer an excuse for paper/PDF based forms and approvals.
So, stop printing, signing, scanning and emailing for approvals today. Sign up for a free 30-day trial and see for yourself.
We understand that your data is essential to your business operations and to our own success. We use a multi-layered approach to secure your information, constantly monitoring and improving our processes, services and systems.
Secure Data Centers
Our cloud services are deployed on Amazon Web Services (AWS) infrastructure. AWS provides us first class data centers that are designed and managed in alignment with security best practices and a variety of IT security standards, including SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70), SOC 2, SOC 3, FISMA, DIACAP, FedRAMP, DOD CSM Levels 1-5, PCI DSS Level 1, ISO 27001, ITAR, FIPS 140-2, and MTCS Level 3.
All of our servers reside in a number of availability zones in AWS’s Northern Virginia region (us-east-1). All customer data, including backups and redundant servers, are located only in the Northern Virginia region. We do not replicate our servers across to other regions either within the United States or internationally. At this point, we do not operate in AWS’s GovCloud region.
Secure Data Storage
All our data at rest, including our databases, backups, read replicas and snapshots, are encrypted before stored.Since we leverage Amazon’s Relational Database Service (RDS), our employees have no direct access to the actual database servers, which is fully managed by AWS.
Secure Data Transfers
Connection to our environment is done via TLS cryptographic protocols, ensuring that our users have a secure connection from their browsers to our services.
Individual user sessions are properly identified and verified on each transaction using a unique token created at login.
Our servers are deployed in a secure Virtual Private Cloud (VPC) network divided in a public and a private subnet. All server processing and data storage takes place in private subnets with no direct access to the Internet. We also have strict firewall policies between the public and private subnets, making sure that traffic can flow only in specific directions, to and from specific ports, including strict firewall policies between the application application and database tiers.
All traffic flowing out from our VPC goes through NAT instances which protects internal IP addresses from external hosts.
We also make sure only a single bastion host can access our internal servers for management purposes. This bastion host has a completely different IP address than our public IP addresses.
Our servers receive daily security patches to make sure they remain secure from new exploits. Password access to our servers and remote root logins are both disabled.
All AWS API access is audited to a secure write-only storage.
Backups are encrypted and performed daily remaining available for up to 35 days.
We centralize all our EC2 security across accounts using standard IAM policies. We implement fine-grained security controls and follow the principle of least privilege. Multi-factor authentication enabled on our master AWS accounts and master credentials are locked away and are not used for routine operational tasks.