discussion forum to research Salesforce\'s policies on the following: shared res
ID: 395698 • Letter: D
Question
discussion forum to research Salesforce's policies on the following:
shared resource risk management;
virtualization software;
service disruption;
disaster recovery;
data ownership;
record retention; and
customization.
Share how easy it was to identify these specific policies. Are they posted, easily accessed, and transparent?
Identify other, possibly smaller, SaaS providers and provide a link to their website.
This collaborative research activity should provide you the foundation you'll need to conduct your analysis of the case.
Then, answer the following (case questions):
Give your analysis of both the accessibility and transparency of Salesforce's policies.
What questions would you have to ask a Salesforce vendor to find this information?
Provide a summary of another SaaS provider's policy information (accessibility and transparency) and outline any previous security breaches the alternate company has experienced.
Compare the risks of cloud sourcing to large, well-known vendors versus smaller, less well-known vendors.
WEB-BASED CASE Salesforce.com Outsourcing Policies When SaaS, laaS, and PaaS services first became available, companies, nonprofit organizations and governments were wary of jumping into the cloud because of the unknown risks. Yet, once the first wave of adopters of cloud technologies experienced significant returns-on-investment (ROI many others dived in. Today, some anlysts argue that business executives are now ignoring the risks associated with cloud computing. These analysts warn that if an organization chooses to use a public cloud service, its data may be insecure for several reasons. First, as noted in this chapter, joint access to shared computing resources such as CPU, storage, or a physical building means that a tenant who shares these resources could potentially access and retrieve another tenant's data. Second, virtualization products that are used to create and manage the cloud resources have the same vulnerabilities as other IT systems. Customers frequently do not know what virtualization software their cloud provider is running, or what version, and whether it is patched regularly to protect it from the most recently discovered vulnerabilities. In addition, cloud vendors sometimes include a clause in the contract giving their company ownership of their clients' data, which means they can mine this data to create additional revenue opportunities for themselves. Other experts point out that relying on cloud services can entail additional significant disad antages. The loss of Internet connectivity can disrupt workflow across an organization if all com puting services must be accessed via the Internet. Worse yet, clients have to rely on their cloud vendors for disaster recovery. Other potential issues include failure of a service provider to meet a client's record-retention requirements and limitations on a client's ability to customize the software, platform, or service to meet its needs, which might force a company to reorganize its workflow systems to accommodate off the-shelf cloud products. Of the cloud products out there, Salesforce is one of the most reputable. Yet, in 2007, a Salesforce employee fell for a phishing scam, which gave attackers access to customers' contact information. Some customers began receiving bogus emails that looked like Salesforce invoices. Salesforce clamped down on the attack immediately and worked with law enforcement and its customers to resolve the problem. Still, analysts raise an important question: If an innovative SaaS company such as Salesforce can fall victim to such an attack, how will smaller SaaS providers fare?Explanation / Answer
The information is easily available on the portal. Salesforce ha recorded only one security breach till date. Services can also be used from Sales.com - CRM on Demand Release 16; Netsuite
Top vendors are involved in all three layers of the cloud - SaaS, PaaS, IaaS; these have an unmatched commitment to ML, AI, and, BlockChain. Organizations such as Amazon provide end-to-end solutions. The solutions are not necessarily costly than from a small vendor; as greater fault tolerance is expected. IBM takes legacy systems to cloud-enabled environments. These firms are certainly better than firms that do not provide security, and, quality service. Elite cloud vendors are involved in all three of PaaS, IaaS, and, SaaS.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.