Tag: secure cloud

80% of all IT budgets will be committed to cloud apps and solutions

More than 80% of the organizations surveyed in this recently published report (25 pp., PDF, opt-in) are now following a Cloud First strategy. They prefer to purchase applications as a service deployed in the Cloud over applications deployed on physical servers in their data center.

Those with a Cloud First strategy believe that their IT budgets will be 80% cloud services in less than 12 months, while those without such a strategy think it will be closer to 20 months with 15 months being the average. That’s remarkable [at least to me]. Clearly, trust and confidence in the Cloud has grown quickly.

IT80percent
Cloud First is the reality. Most organizations want to migrate quickly to the Cloud. Source: Building Trust in a Cloudy Sky (see link above).

At frevvo, that’s very much in line with what we see. Customers mostly prefer our public cloud – even very large organizations. They’re less concerned about security and availability and more interested in practical issues like cost. That’s likely because incidents have decreased.

We also offer both Public and Private cloud. We’ve noticed too that customers increasingly perceive the benefits of public cloud surpassing private cloud, especially when it comes to cost. The TCO for Public Cloud is almost universally perceived as being hugely lower – sometimes to the point that customers expect public cloud services to be incredibly inexpensive.

PublicCloudBenefits

To us, it’s still a surprising number. 80% of the IT budget going to Cloud computing in just over 1 year. Clearly Cloud Computing has matured and is being adopted broadly.

Learn more about frevvo’s solutions by visiting our website where you’ll find several customer success stories. Explore some of the examples and contact us for more information.

Download the full report at Building Trust in a Cloudy Sky: The State of Cloud Adoption and Security (25 pp., PDF, opt-in).

 

Cloud Security on your mind?

ds-explosionConcerned about Cloud Security? You’re not alone. A single breach can have a huge negative impact on your business. Even the Rebels destroyed the Death Star by exploiting a single security flaw.

cs-infoA staggering 90% of companies are very or moderately concerned about cloud security with the biggest worries being unauthorized access and malicious insiders.

Make frevvo your ally and you can rapidly take advantage of powerful, impactful cloud solutions today while minimizing security risks and decreasing your compliance costs. We know that data security is critical for your business. Check out this new infographic and see how our multi-layered approach can help you secure your information as we continuously monitor and improve your systems, processes and services.

Interested in learning more? Contact frevvo today to get a comprehensive overview of how you too can securely deploy everyday workflows on mobile devices using frevvo’s Cloud.

How SECURE is frevvo’s cloud?

We understand that your data is essentSecure Cloudial to your business operations and to our own success. We use a multi-layered approach to secure your information, constantly monitoring and improving our processes, services and systems.

Secure Data Centers

Our cloud services are deployed on Amazon Web Services (AWS) infrastructure. AWS provides us first class data centers that are designed and managed in alignment with security best practices and a variety of IT security standards, including SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70), SOC 2, SOC 3, FISMA, DIACAP, FedRAMP, DOD CSM Levels 1-5, PCI DSS Level 1, ISO 27001, ITAR, FIPS 140-2, and MTCS Level 3.

All of our servers reside in a number of availability zones in AWS’s Northern Virginia region (us-east-1). All customer data, including backups and redundant servers, are located only in the Northern Virginia region. We do not replicate our servers across to other regions either within the United States or internationally. At this point, we do not operate in AWS’s GovCloud region.

Secure Data Storage

All our data at rest, including our databases, backups, read replicas and snapshots, are encrypted before stored.Since we leverage Amazon’s Relational Database Service (RDS), our employees have no direct access to the actual database servers, which is fully managed by AWS.

Secure Data Transfers

Connection to our environment is done via TLS cryptographic protocols, ensuring that our users have a secure connection from their browsers to our services.

Individual user sessions are properly identified and verified on each transaction using a unique token created at login.

Secure Network

Our servers are deployed in a secure Virtual Private Cloud (VPC) network divided in a public and a private subnet. All server processing and data storage takes place in private subnets with no direct access to the Internet. We also have strict firewall policies between the public and private subnets, making sure that traffic can flow only in specific directions, to and from specific ports, including strict firewall policies between the application application and database tiers.

All traffic flowing out from our VPC goes through NAT instances which protects internal IP addresses from external hosts.

We also make sure only a single bastion host can access our internal servers for management purposes. This bastion host has a completely different IP address than our public IP addresses.

Our servers receive daily security patches to make sure they remain secure from new exploits. Password access to our servers and remote root logins are both disabled.

All AWS API access is audited to a secure write-only storage.

Backups

Backups are encrypted and performed daily remaining available for up to 35 days.

Security Policies

We centralize all our EC2 security across accounts using standard IAM policies. We implement fine-grained security controls and follow the principle of least privilege. Multi-factor authentication enabled on our master AWS accounts and master credentials are locked away and are not used for routine operational tasks.