Tag Archives: cloud security indonesia

Top 5 Reason Indonesian Businesses use the Cloud

indonesian cloud growth

Good news is that SMBs are moving business functions into the cloud as more tools and solutions are developed specifically for the SMB market.

When we talk about the cloud, it’s no longer a future issue or let’s wait and see. It’s a present and important, addressing their real business needs, adding simplicity and enhance security and helping to accelerate innovation and growth.

There are more businesses than ever in on cloud, how are they using it?

1. Hybrid: Hybrid cloud allows for fluid operations, makes it possible to bridge incompatible clouds and traditional on-premises environments as one. As a result, increase control and enhance security of their data and are able to bring portability to their back and front office applications.

2. Infrastructure: Taking advantage of scaling computing resources on demand and avoiding extra CAPEX expenditure for resources they may only need for a few days. Scaling up when they require additional bandwidth, storage or processing power.

3. Test & Development: Efficient, cloud-based environments are empowering business to quickly create, test and launch new applications and solutions, cutting deployment time. Developer teams are creating business applications with ease and speed, helping them to better serve their market better and compete on a global scale.

4. Big Data and Analytics: The cloud is empowering businesses to take advantage of big data and analytics technology by reducing cost or complexity. By identifying the data that are most meaningful to their business, analyze and act upon key insights. This means uncovering and predicting trends before they happen, fostering a deeper understanding of customers, operations and markets.

5. Mobility: The reach of cloud-based mobile solutions, native and wrapper application are helping business owners to arm their workforce with key applications and have company information on the go. Armed with valuable customer data or inventory information at the touch of a finger helps improve efficiency and enhances customer relationships as they grow their business.

4 Key Cloud Predictions for 2016 Indonesia

Indonesian Cloud

Looking back, the trend is clear: IT transformation is growing and will continue to rely on expansion into the cloud, while the focus on cybersecurity and the search for talent will continue to impact the industry.
The changes are shifting where value in cloud meant more than lowest cost; where companies and governments would begin creating the best mix of cloud infrastructure they need for their workloads. Today’s IT leaders are better understanding that certain things are worth paying for, like the expertise that’s often difficult to hire in-house, with the rapid adoption of hybrid cloud strategies underling the talent crunch.

IT talent shortage will continue
Where are the highly skilled IT professionals, with IT budgets expected to remain flat in 2016. IT departments will be to be lean and mean, and rely on trusted partners who do have the ability to attract and maintain the right talent, in delivering value.

My suggestion to engage service providers that are focus to provide you the service, that will be the best value bet.

Security as-a-Service
Who has a security department, it has not been a competency for most company, not forgetting ensuring the right expertise against an always-evolving threat will become increasingly more difficult dropdead and expensive.
For better economies of scale, engage a cloud companies offering security as a service and also offer economies of expertise.

Big Data and analytics will be even…Bigger
Data boom is another reason we’ll see continued migration to the cloud. Questions is how do we use or monetize all that data, Think of Uber versus the Taxi industry. Uber uses data to understand who their customers are, where and when they need rides, and to continually optimize their business model.

Continued explosion of Containers
Growing in popularity because they push a straightforward and commonsense approach to building new distributed applications in the cloud, as well as “containerizing” existing applications for distribution. Thanks to containers from Docker and CoreOS but still missing, networking and security services.

I’m not sure on 2 things IoT and VR, going mainstream this year, maybe next year, this will help drive the cloud adoption with storage, tools and connection. Reality check of 2016 flat IT budgets and talent wars, companies will also have to accept that, for the most part, they can no longer fight alone.

Cloud Disaster Recovery Indonesia

ljf

How does one explain disaster recovery to a SMB owner or an organisation’s president without confusing them more than clarifying? Or without boring the hell out of them? Here’s my attempt.

First, there are a few terms you’ll need to acquaint yourself with. Like RTO and RPO. Common slang for us IT experts, but nonsense to non IT professionals.

RTO: Recovery time objective. Simply put: how much time between the moment of the disaster and the time users can work again?

RPO: Recovery point objective. How far back in time are you willing to go in case of a disaster? How much work and/or transactions can be lost without hindering business continuity?

Both of these are counted in minutes, hours or days, and are directly related to the criticality of your IT processes and data. The lower the number is for RTO and RPO, the higher the cost will be for a disaster recovery solution.

Usually, it’s mostly core business applications and data that are included in the scope of a disaster recovery plan. If you think about it, what data is your business dealing with that is not business critical? Usually most of it is, but because disaster recovery can get pricey, some organizations choose to only include a certain percentage of their data in the plan. This, of course, means that you won’t access the data you didn’t include in the plan should a disaster occur.

Before I paint you a broader picture, here are other important terms you should know. Here are the 3 types of recovery sites. An important thought to keep in mind: there is not wrong or right here. The key is to find a disaster recovery plan that meets your organization’s specific needs.

Cold site: A cold site is a datacenter with sleeping servers (virtual or physical) where regular offsite backups can be restored to the sleeping servers. For example, backups for mission critical systems could be done every six hours. This is the most affordable and common type of disaster recovery for SMBs. Usually this scheme is chosen for longer RTO/RPO values.

Warm site: Warm sites require better infrastructure, but they can bring down RTO and RPO to minutes. It all depends on internet link speed, latency, etc. Because they require active licenses, warm sites have about the same total cost of ownership as the original datacenter they are duplicating. Sometimes, they can even cost a little more because of the costs for synchronizing tools for servers and data.

Geographically dispersed high availability: This type of site offers almost instant backups of the duplicated environment in real-time. It is achieved through applicative and network load balancing, and requires advanced Domain Name System (DNS) servers management process.

Cold and warm sites have been the most common disaster recovery options for larger corporations as their data processing defines their business continuity capabilities. Nowadays, the widespread adoption of cloud services allows eased implementation and cost reduction like never before.

Most companies now use virtual servers to handle their daily computing requirements. Virtual server infrastructures are inherently more resilient and easier to replicate across internet and WAN links. Cloud hosting providers can help companies setup a warm site with reduced capabilities through a synchronization procedure that respects the target RPO/TRO.

One the main features of a cloud infrastructure is elasticity. This means that in the advent of a disaster, one simply allocates the required resources to the synchronized servers and move the operations to the cloud hosted infrastructure.

Of course, these setups still require planning and the expertise of IT architects/business specialists to address the specificities of each company. These experts can assess with accuracy the companies’ mission critical needs and thus evaluate feasibility to properly set the requirements of a disaster recovery plan. Cloud technology has made disaster recovery solutions within reach of most SMBs that rely on IT to thrive.

Cloud Data Security Indonesia Learn from Ashley Madison Mistake

cloud security

A hack could endanger your company’s life… especially in Indonesia where there is huge group of self-taught, smart and restless youth, trying to cash in to survive the lack of opportunity in the region.

Example where sensitive customer information got bump from AshleyMadison.com, a cheating website married couples, they have appeared to have made good on their threat to post the data online.

10 Gb of data dump was posted to the dark web using an Onion address accessible only through the Tor browser. AshleyMadison.com business model includes charging a small fee to completely remove your personal data from their system. Unfortunately, it appears that even the people that paid to be removed still found their personal information in the leak and faces destroyed.

Produk Cloud believes it’s not the first company to have user data compromised and neither will it be the last leak. High-profile breach comes the opportunity to learn from the mistakes and consider best practices going forward…

1. Only collect data that you need

The smaller the data the easier it is to secure. Understand the important data to store and have a plan to get rid of data that’s no longer needed. If you must store sensitive data then consider hashing or encrypting it.?

Hashing is a programming function that converts a string of text into a smaller, undecipherable variation of the input, designed so it’s impossible to turn the output back to its original text.

2. Understand the user agreement of your cloud service storage

Read the user agreement of the service you are planning to sign up for. It is texty but no doubt you really need to face those text volumes as its contain essential information you are looking for.

3. Encryption

Encryption is, so far, the best way you can protect your data. Encryption allows for encoding of text so that it can only be accessed with a special key or password.

4. Use a Strong Password / Apply Two-Step Verification

As the first line of defence against malicious hackers out there, you had better be sure that your password can stand a hacking or cracking attempt. There are tons of tips on the Internet on what makes for a good password.

5. Back Up Data Locally

Always have a backup for your data. Generally speaking, it is good practice to create electronic copies for any of your data so that you will still be able to access them even when the original is lost or has been corrupted.

6. Test.. Test .. Test

Keep penetrating, don’t stop and offer a bounty for help.

Jamie , Produk Cloud Indonesia