SlideShare a Scribd company logo
1 of 8
Download to read offline
What to look for in a hosted supplier
                                  Mark Holland
                     Baker Tilly Revas Limited
The future is hosted….




“Most companies will access software
and service through hosted suppliers in
the future”
           Microsoft – “Next Generation Hosting”
Security
“You can’t know where your data is,
you can’t prove that it’s being protected
and can’t know who’s accessing it”

                              Robert Richardson,
        Director of the Computer Security Institute
Back up and disaster recovery
          • It’s your data.
          • Responsibility for the
            security of your data, your
            compliance obligations
            and even the health of
            your business will sit in
            the hands of strangers
The processing environment
“There are different
kinds of clouds.
Some are more
secure than others”

              Izak Mutlu,
     CISO Salesforce.com
Flexibility
“Without a contract that’s reasonably well
thought out, you really don’t know what
level of service to expect and what to do
when service doesn’t live up to
expectations”
                                   Eric Maiwald,
                            Burton Group analyst
Credibility
“Leased servers in a rented property;
financed by a bank loan. We’d certainly
throw the switch!”
                                            Matt Wild,
           Baker Tilly Restructuring and Recovery LLP
Choosing a supplier
The suitability of hosted processing for any
 business will always be dependent upon
 that organisations individual requirements.

More Related Content

What's hot

Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceEryk Budi Pratama
 
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
[HashiConf EU] Securing Cloud Native Communication, From End User to Service[HashiConf EU] Securing Cloud Native Communication, From End User to Service
[HashiConf EU] Securing Cloud Native Communication, From End User to ServiceDaniel Bryant
 
Mydex Annual ICO Roundtable - Personal data & Data Protection Act by William ...
Mydex Annual ICO Roundtable - Personal data & Data Protection Act by William ...Mydex Annual ICO Roundtable - Personal data & Data Protection Act by William ...
Mydex Annual ICO Roundtable - Personal data & Data Protection Act by William ...Mydex CIC
 
Life with digital services after GDPR
Life with digital services after GDPRLife with digital services after GDPR
Life with digital services after GDPRExove
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your CloudthinkASG
 
FAMILY OFFICES SEE LEGITIMACY IN SECURITIZED BITCOIN INVESTMENTS
FAMILY OFFICES SEE LEGITIMACY IN SECURITIZED BITCOIN INVESTMENTSFAMILY OFFICES SEE LEGITIMACY IN SECURITIZED BITCOIN INVESTMENTS
FAMILY OFFICES SEE LEGITIMACY IN SECURITIZED BITCOIN INVESTMENTSSteven Rhyner
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperMartin Ruubel
 
Martine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resourcesMartine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resourcesServiceWave 2010
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareIonixx Technologies Inc.
 
What are the different types of blockchain technology explained
What are the different types of blockchain technology explainedWhat are the different types of blockchain technology explained
What are the different types of blockchain technology explainedOliviaJune1
 
Enterprise Security and the Waves of Disruption: It’s Surf or Sink
Enterprise Security and the Waves of Disruption: It’s Surf or SinkEnterprise Security and the Waves of Disruption: It’s Surf or Sink
Enterprise Security and the Waves of Disruption: It’s Surf or Sinkbstiekes
 
ReCheck - secure digitalization
ReCheck - secure digitalizationReCheck - secure digitalization
ReCheck - secure digitalizationrecheck
 
CWIN17 Singapore / Kalyan madala ibm
CWIN17 Singapore / Kalyan madala ibmCWIN17 Singapore / Kalyan madala ibm
CWIN17 Singapore / Kalyan madala ibmCapgemini
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issuesAdv Prashant Mali
 
Richard Mabey & Stefania Passera's presentation @ Legal Geek '18
Richard Mabey & Stefania Passera's presentation @ Legal Geek '18Richard Mabey & Stefania Passera's presentation @ Legal Geek '18
Richard Mabey & Stefania Passera's presentation @ Legal Geek '18Richard Mabey
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud ComputingMartin Bioh
 

What's hot (18)

Pki part 1
Pki part 1Pki part 1
Pki part 1
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
[HashiConf EU] Securing Cloud Native Communication, From End User to Service[HashiConf EU] Securing Cloud Native Communication, From End User to Service
[HashiConf EU] Securing Cloud Native Communication, From End User to Service
 
Mydex Annual ICO Roundtable - Personal data & Data Protection Act by William ...
Mydex Annual ICO Roundtable - Personal data & Data Protection Act by William ...Mydex Annual ICO Roundtable - Personal data & Data Protection Act by William ...
Mydex Annual ICO Roundtable - Personal data & Data Protection Act by William ...
 
Life with digital services after GDPR
Life with digital services after GDPRLife with digital services after GDPR
Life with digital services after GDPR
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
 
FAMILY OFFICES SEE LEGITIMACY IN SECURITIZED BITCOIN INVESTMENTS
FAMILY OFFICES SEE LEGITIMACY IN SECURITIZED BITCOIN INVESTMENTSFAMILY OFFICES SEE LEGITIMACY IN SECURITIZED BITCOIN INVESTMENTS
FAMILY OFFICES SEE LEGITIMACY IN SECURITIZED BITCOIN INVESTMENTS
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime Whitepaper
 
Martine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resourcesMartine Lapierre - Security in Cloud computing: sharing more than resources
Martine Lapierre - Security in Cloud computing: sharing more than resources
 
Exploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in HealthcareExploring the Possibilities of Blockchain in Healthcare
Exploring the Possibilities of Blockchain in Healthcare
 
What are the different types of blockchain technology explained
What are the different types of blockchain technology explainedWhat are the different types of blockchain technology explained
What are the different types of blockchain technology explained
 
Enterprise Security and the Waves of Disruption: It’s Surf or Sink
Enterprise Security and the Waves of Disruption: It’s Surf or SinkEnterprise Security and the Waves of Disruption: It’s Surf or Sink
Enterprise Security and the Waves of Disruption: It’s Surf or Sink
 
ReCheck - secure digitalization
ReCheck - secure digitalizationReCheck - secure digitalization
ReCheck - secure digitalization
 
CWIN17 Singapore / Kalyan madala ibm
CWIN17 Singapore / Kalyan madala ibmCWIN17 Singapore / Kalyan madala ibm
CWIN17 Singapore / Kalyan madala ibm
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
Richard Mabey & Stefania Passera's presentation @ Legal Geek '18
Richard Mabey & Stefania Passera's presentation @ Legal Geek '18Richard Mabey & Stefania Passera's presentation @ Legal Geek '18
Richard Mabey & Stefania Passera's presentation @ Legal Geek '18
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 

Viewers also liked (20)

Field Studies Council anticipates savings of up to £100,000 per annum with do...
Field Studies Council anticipates savings of up to £100,000 per annum with do...Field Studies Council anticipates savings of up to £100,000 per annum with do...
Field Studies Council anticipates savings of up to £100,000 per annum with do...
 
танцевальная студия
танцевальная студиятанцевальная студия
танцевальная студия
 
Pikas
PikasPikas
Pikas
 
Online distance PG Diploma courses from MIT Pune
Online distance PG Diploma courses from MIT PuneOnline distance PG Diploma courses from MIT Pune
Online distance PG Diploma courses from MIT Pune
 
Add topic
Add topicAdd topic
Add topic
 
Moodle - add topic to course page
Moodle - add topic to course pageMoodle - add topic to course page
Moodle - add topic to course page
 
Ivy d
Ivy dIvy d
Ivy d
 
So Update January 2007
So Update January 2007So Update January 2007
So Update January 2007
 
Nginx The webserver you might actually like
Nginx   The webserver you might actually likeNginx   The webserver you might actually like
Nginx The webserver you might actually like
 
Blake t
Blake tBlake t
Blake t
 
Tristan.d
Tristan.dTristan.d
Tristan.d
 
Chloecollins
ChloecollinsChloecollins
Chloecollins
 
Passive
PassivePassive
Passive
 
Alex j
Alex jAlex j
Alex j
 
Implementing and using employee self-service software
Implementing and using employee self-service softwareImplementing and using employee self-service software
Implementing and using employee self-service software
 
Kelley
KelleyKelley
Kelley
 
Future Uses Of Computers Powerpoint
Future  Uses Of  Computers  PowerpointFuture  Uses Of  Computers  Powerpoint
Future Uses Of Computers Powerpoint
 
2118 F I N A L With Bg 2
2118  F I N A L With Bg 22118  F I N A L With Bg 2
2118 F I N A L With Bg 2
 
Chase A
Chase AChase A
Chase A
 
Comic
ComicComic
Comic
 

Similar to What to look for in a hosted supplier

Merrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created EqualMerrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created EqualChris_Robilliard
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?NTEN
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - IdealwareIdealware
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderArmor
 
Capitalising on the cloud- why law firms should embrace hosted IT
Capitalising on the cloud- why law firms should embrace hosted ITCapitalising on the cloud- why law firms should embrace hosted IT
Capitalising on the cloud- why law firms should embrace hosted ITDPS Software
 
Dynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsDynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsClear Technologies
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
Centuric Overview
Centuric OverviewCenturic Overview
Centuric OverviewCenturic
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskCloudMask inc.
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Bianca Mueller, LL.M.
 
Self defending data webinar (feb13)
Self defending data webinar (feb13)Self defending data webinar (feb13)
Self defending data webinar (feb13)Vic Winkler
 
Cloud Computing - Security (BIG Data)
Cloud Computing - Security (BIG Data)Cloud Computing - Security (BIG Data)
Cloud Computing - Security (BIG Data)Vasanth Ganesan
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013Mydex CIC
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCDATAVERSITY
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmitDistributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmitPablo Junco
 
Blockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial ServicesBlockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial ServicesVeridium
 

Similar to What to look for in a hosted supplier (20)

Merrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created EqualMerrill DataSite Not All VDRs Are Created Equal
Merrill DataSite Not All VDRs Are Created Equal
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Cloud Security - Idealware
Cloud Security - IdealwareCloud Security - Idealware
Cloud Security - Idealware
 
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment ProviderCase Study - Currency from the Cloud: Security & Compliance for Payment Provider
Case Study - Currency from the Cloud: Security & Compliance for Payment Provider
 
Capitalising on the cloud- why law firms should embrace hosted IT
Capitalising on the cloud- why law firms should embrace hosted ITCapitalising on the cloud- why law firms should embrace hosted IT
Capitalising on the cloud- why law firms should embrace hosted IT
 
Dynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton CommunicationsDynamic Log Analysis™ Case Story Hutton Communications
Dynamic Log Analysis™ Case Story Hutton Communications
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
Centuric Overview
Centuric OverviewCenturic Overview
Centuric Overview
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
Self defending data webinar (feb13)
Self defending data webinar (feb13)Self defending data webinar (feb13)
Self defending data webinar (feb13)
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Cloud Computing - Security (BIG Data)
Cloud Computing - Security (BIG Data)Cloud Computing - Security (BIG Data)
Cloud Computing - Security (BIG Data)
 
The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?The Cloud Beckons, But is it Safe?
The Cloud Beckons, But is it Safe?
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmitDistributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
Distributed Ledger Technology (DLT) beyond blockchain #BlockchainSubmit
 
Blockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial ServicesBlockchain, Biometrics, and the Future of Financial Services
Blockchain, Biometrics, and the Future of Financial Services
 

More from Softworld

Ensuring maximum return on HR technology investment
Ensuring maximum return on HR technology investmentEnsuring maximum return on HR technology investment
Ensuring maximum return on HR technology investmentSoftworld
 
Save time, reduce risk and improve quality: How online accounting adds value
Save time, reduce risk and improve quality: How online accounting adds valueSave time, reduce risk and improve quality: How online accounting adds value
Save time, reduce risk and improve quality: How online accounting adds valueSoftworld
 
Software selection and implementation in the real world
Software selection and implementation in the real worldSoftware selection and implementation in the real world
Software selection and implementation in the real worldSoftworld
 
Expenses management: Avoiding the scandal that has rocked parliament
Expenses management: Avoiding the scandal that has rocked parliamentExpenses management: Avoiding the scandal that has rocked parliament
Expenses management: Avoiding the scandal that has rocked parliamentSoftworld
 
Ousourcing vs in-house: Key considerations and challenges
Ousourcing vs in-house: Key considerations and challengesOusourcing vs in-house: Key considerations and challenges
Ousourcing vs in-house: Key considerations and challengesSoftworld
 
With over 1,000 business software applications available, how do you select t...
With over 1,000 business software applications available, how do you select t...With over 1,000 business software applications available, how do you select t...
With over 1,000 business software applications available, how do you select t...Softworld
 
Regulations, Acts, and everything else you need to know about payroll legisla...
Regulations, Acts, and everything else you need to know about payroll legisla...Regulations, Acts, and everything else you need to know about payroll legisla...
Regulations, Acts, and everything else you need to know about payroll legisla...Softworld
 
How should we prepare for integrated HR & payroll software?
How should we prepare for integrated HR & payroll software?How should we prepare for integrated HR & payroll software?
How should we prepare for integrated HR & payroll software?Softworld
 
Improving business performance through the recession: Are your HR systems fit...
Improving business performance through the recession: Are your HR systems fit...Improving business performance through the recession: Are your HR systems fit...
Improving business performance through the recession: Are your HR systems fit...Softworld
 
The benefits of in-house payroll over outsourced: A user's experience
The benefits of in-house payroll over outsourced: A user's experienceThe benefits of in-house payroll over outsourced: A user's experience
The benefits of in-house payroll over outsourced: A user's experienceSoftworld
 

More from Softworld (11)

Ensuring maximum return on HR technology investment
Ensuring maximum return on HR technology investmentEnsuring maximum return on HR technology investment
Ensuring maximum return on HR technology investment
 
Save time, reduce risk and improve quality: How online accounting adds value
Save time, reduce risk and improve quality: How online accounting adds valueSave time, reduce risk and improve quality: How online accounting adds value
Save time, reduce risk and improve quality: How online accounting adds value
 
Software selection and implementation in the real world
Software selection and implementation in the real worldSoftware selection and implementation in the real world
Software selection and implementation in the real world
 
Expenses management: Avoiding the scandal that has rocked parliament
Expenses management: Avoiding the scandal that has rocked parliamentExpenses management: Avoiding the scandal that has rocked parliament
Expenses management: Avoiding the scandal that has rocked parliament
 
Ousourcing vs in-house: Key considerations and challenges
Ousourcing vs in-house: Key considerations and challengesOusourcing vs in-house: Key considerations and challenges
Ousourcing vs in-house: Key considerations and challenges
 
HMRC Update
HMRC UpdateHMRC Update
HMRC Update
 
With over 1,000 business software applications available, how do you select t...
With over 1,000 business software applications available, how do you select t...With over 1,000 business software applications available, how do you select t...
With over 1,000 business software applications available, how do you select t...
 
Regulations, Acts, and everything else you need to know about payroll legisla...
Regulations, Acts, and everything else you need to know about payroll legisla...Regulations, Acts, and everything else you need to know about payroll legisla...
Regulations, Acts, and everything else you need to know about payroll legisla...
 
How should we prepare for integrated HR & payroll software?
How should we prepare for integrated HR & payroll software?How should we prepare for integrated HR & payroll software?
How should we prepare for integrated HR & payroll software?
 
Improving business performance through the recession: Are your HR systems fit...
Improving business performance through the recession: Are your HR systems fit...Improving business performance through the recession: Are your HR systems fit...
Improving business performance through the recession: Are your HR systems fit...
 
The benefits of in-house payroll over outsourced: A user's experience
The benefits of in-house payroll over outsourced: A user's experienceThe benefits of in-house payroll over outsourced: A user's experience
The benefits of in-house payroll over outsourced: A user's experience
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

What to look for in a hosted supplier

  • 1. What to look for in a hosted supplier Mark Holland Baker Tilly Revas Limited
  • 2. The future is hosted…. “Most companies will access software and service through hosted suppliers in the future” Microsoft – “Next Generation Hosting”
  • 3. Security “You can’t know where your data is, you can’t prove that it’s being protected and can’t know who’s accessing it” Robert Richardson, Director of the Computer Security Institute
  • 4. Back up and disaster recovery • It’s your data. • Responsibility for the security of your data, your compliance obligations and even the health of your business will sit in the hands of strangers
  • 5. The processing environment “There are different kinds of clouds. Some are more secure than others” Izak Mutlu, CISO Salesforce.com
  • 6. Flexibility “Without a contract that’s reasonably well thought out, you really don’t know what level of service to expect and what to do when service doesn’t live up to expectations” Eric Maiwald, Burton Group analyst
  • 7. Credibility “Leased servers in a rented property; financed by a bank loan. We’d certainly throw the switch!” Matt Wild, Baker Tilly Restructuring and Recovery LLP
  • 8. Choosing a supplier The suitability of hosted processing for any business will always be dependent upon that organisations individual requirements.