SlideShare a Scribd company logo
1 of 32
Download to read offline
Understanding the Cloud
           October 11, 2012
About Me


      I am the initial architect for our online “cloud” clinical data collection solutions which we have
      been delivering since the late 1990s.

      Personally, I am a proponent and user of online “cloud” applications.


Confidential – 2
Goals Today

        1.         Define “the cloud” in simple terms

        2.         Provide some “cloud” benefit and risk evaluation
                   checklists




Confidential – 3
Understanding the Cloud


Confidential – 4
A majority thought that cloud computing referred to a “fluffy white thing”

          51% believed storms could interfere with it


                                     August 2012 Survey by Citrix
                            http://www.citrix.com/lang/English/lp/lp_2328330.asp
Confidential – 5
http://www.citrix.com/lang/English/lp/lp_2328330.asp


Confidential – 6
So, what is the cloud?




Confidential – 7
We will cover a formal definition from the




                                         but first…


Confidential – 8
“The Cloud” in Simple Terms




Confidential – 9
“The Cloud” in Simple Terms


      1.       You access it through the Internet

      2.       You don't own it (generally)

      3.       You don't have to do much to scale up to a bigger
               footprint (except pay for what you are using)



  Adapted from:
  http://it.toolbox.com/blogs/original-thinking/what-is-cloud-computing-a-simple-definition-30648

Confidential – 10
Examples

               Photos



  Productivity



            Industry



Confidential – 11
Technical Nuts and Bolts
                        (for the record)




Confidential – 12
The National Institute of Standards and Technology
          defines Cloud Computing with three main categories




Confidential – 13
1




Confidential – 14
2




Confidential – 15
Service model options are
             the most commonly discussed Cloud Category




                     Let’s take a closer look at those options…


Confidential – 16
Software           Software (as a Service) indicates special-purpose software made
               (SaaS)            available through the Internet.




                                 Platform indicates a higher-level environment for which developers
              Platform           write custom applications. Generally the developer is accepting
               (PaaS)            some restrictions on the type of software they can write in
                                 exchange for built-in application scalability.



                                 Infrastructure includes provisioning of hardware or virtual
          Infrastructure
                                 computers on which one generally has control over the OS;
               (IaaS)
                                 therefore allowing the execution of arbitrary software.



  Adapted from
  http://rwandering.net/2008/07/03/cloud-services-continuum/
Confidential – 17
Common Users for Cloud Service Models




 http://www.saasblogs.com/saas/demystifying-the-cloud-where-do-saas-paas-and-other-acronyms-fit-in/
Confidential – 18
The lower you go down in the stack the more security you are
      tactically responsible for implementing and managing.


                    For Example:
                            Operating system
                            Network security
                            Data encryption
                            System installation

 http://www.saasblogs.com/saas/demystifying-the-cloud-where-do-saas-paas-and-other-acronyms-fit-in/
Confidential – 19
3




Confidential – 20
Open to the general public



                    Exclusively accessed by a single organization



                    Combination of two or more service models



                    Selectively accessible for users with a shared purpose



Confidential – 21
What is the benefit of all this?




Confidential – 22
http://www.citrix.com/lang/English/lp/lp_2328330.asp
Confidential – 23
►     Save money
              • Lower IT costs
              • Economies of scale
              • Pay as you go

      ►     Save time
              • Eliminate install tasks associated with licensed software

      ►     Focus on competitive advantage rather than
              • Purchasing and supporting the server infrastructure
              • Managing the security, reliability, and scalability
              • Maintaining a labor-intensive patch and upgrade process


Confidential – 24
Should I be concerned about the safety of my data?




Confidential – 25
Always.

      Data security is a concern whether you subscribe to SaaS
      or purchase software and implement it on in-house servers.




                       Here are some things to consider…


Confidential – 26
Is the solution Secure?

      Is it easily Accessible?

      Does it support a Global marketplace?

      Is it Sustainable?



Confidential – 27
Some questions to ask!
      ►     Secure
              •     Is the application 21 CFR Part 11 compliant?
              •     Do you have Safe Harbor certification?
              •     What encryption is used for data transfers?
              •     Is the data center SOC 2 Type II certified?

      ►     Accessible
              • Which browsers are supported?
              • Is it accessible on mobile and tablet browsers?
              • Does the application require routine maintenance downtime? How often? How
                    long?

      ►     Global
              • Does the application support the display and storage of multiple languages and
                    typesets (Chinese, Japanese, etc.)?
              •     Can you report on multiple studies with the same application?

      ►     Sustainable
              • What is the cost model?
              • What is the training time for standard end users?
              • How are upgrades supported?

Confidential – 28
Can you audit the vendor facilities?

      How are the data backed up?

      What is the recovery process?

      Is your production equipment housed in a state-of-the-art colocation facility?

      What are the security arrangements for the facility?
                                                                                         Extended
      Are they in place 24 hours a day, 365 days a year?

      On what type of infrastructure do you host data?
                                                                                         SaaS Data Checklist
      How often do you back up data and where are the backups stored?

      Where and how do you store the backups?

      What level of data encryption do you use to protect website transactions?

      Can I export my data in a format that I can easily re-use?




  Adapted from:
  http://www.trumba.com/connect/knowledgecenter/software_as_a_service.aspx#secure_data

Confidential – 29
In Summary




Confidential – 30
Simply Put                    You Have Options
                    “In The Cloud”                 Cloud Service Models
      • You access it through the Internet   • SaaS, PaaS, IaaS

      • You don't own it (generally)         • Most organizations leverage SaaS

      • You don't have to do much to         • Remember the lower you go, the
        scale                                  more you are responsible to
                                               manage



And finally…
When deploying a solution either in-house or as SaaS, make sure it is:




Confidential – 31
®
from Concept to Cure
                        ™
   with D ATATRAK ONE




                        DATAT R A K International
                        Cleveland, Ohio
                        Bryan, Texas
                        Cary, North Carolina


                        888.677.DATA (3282) Toll Free
                        www.datatrak.net

More Related Content

What's hot

Wind River For Medical
Wind River For MedicalWind River For Medical
Wind River For Medical
sheilamia
 
Lan Desk 9 Solutions Overview
Lan Desk 9 Solutions OverviewLan Desk 9 Solutions Overview
Lan Desk 9 Solutions Overview
comania
 
Guide project extranets 10 killer features
Guide   project extranets 10 killer featuresGuide   project extranets 10 killer features
Guide project extranets 10 killer features
Kahootz
 
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
EMC
 

What's hot (18)

NSX on VMware Data Center
NSX on VMware Data CenterNSX on VMware Data Center
NSX on VMware Data Center
 
CAST Architecture Checker
CAST Architecture CheckerCAST Architecture Checker
CAST Architecture Checker
 
Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7Optimized Desktop, Mdop And Windows 7
Optimized Desktop, Mdop And Windows 7
 
Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
Wind River For Medical
Wind River For MedicalWind River For Medical
Wind River For Medical
 
Lan Desk 9 Solutions Overview
Lan Desk 9 Solutions OverviewLan Desk 9 Solutions Overview
Lan Desk 9 Solutions Overview
 
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
VMworld 2013: Building the Management Stack for Your Software Defined Data Ce...
 
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
ASFWS 2012 - Theory vs Practice in implementing Software Security related act...
 
Guide project extranets 10 killer features
Guide   project extranets 10 killer featuresGuide   project extranets 10 killer features
Guide project extranets 10 killer features
 
Real Cost of Software Remediation
Real Cost of Software RemediationReal Cost of Software Remediation
Real Cost of Software Remediation
 
BC_DR
BC_DRBC_DR
BC_DR
 
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItWebinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
 
NF101: Nutanix 101
NF101: Nutanix 101NF101: Nutanix 101
NF101: Nutanix 101
 
Devops (start walking in the same direction) by ops
Devops (start walking in the same direction) by opsDevops (start walking in the same direction) by ops
Devops (start walking in the same direction) by ops
 
Healthcare
HealthcareHealthcare
Healthcare
 
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas[Case Study ~ 2011] Baptist Hospitals of Southest Texas
[Case Study ~ 2011] Baptist Hospitals of Southest Texas
 
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
VMworld 2013: Separating Cloud Hype from Reality in Healthcare – a Real-Life ...
 
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
 

Similar to Understanding the Cloud

Similar to Understanding the Cloud (20)

Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Whitepaper: Security of the Cloud
Whitepaper: Security of the CloudWhitepaper: Security of the Cloud
Whitepaper: Security of the Cloud
 
Security of the Cloud
Security of the CloudSecurity of the Cloud
Security of the Cloud
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
AWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the ComplianceAWS Cloud Security From the Point of View of the Compliance
AWS Cloud Security From the Point of View of the Compliance
 
Cloud 101: The Basics of Cloud Computing
Cloud 101: The Basics of Cloud ComputingCloud 101: The Basics of Cloud Computing
Cloud 101: The Basics of Cloud Computing
 
Cloud security
Cloud securityCloud security
Cloud security
 
Introduction Of Cloud Computing
Introduction Of Cloud Computing Introduction Of Cloud Computing
Introduction Of Cloud Computing
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Securing The Journey To The Cloud
Securing The Journey To The Cloud Securing The Journey To The Cloud
Securing The Journey To The Cloud
 
CLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACHCLOUD COMPUTING -DETAILED APPROACH
CLOUD COMPUTING -DETAILED APPROACH
 
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your CloudLinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
LinuxCon North America 2013: Why Lease When You Can Buy Your Cloud
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
cloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptxcloudcomputing-151228104644 (1).pptx
cloudcomputing-151228104644 (1).pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Tech equity - Cloud presentation
Tech equity - Cloud presentationTech equity - Cloud presentation
Tech equity - Cloud presentation
 
Sunil
SunilSunil
Sunil
 
Features of cloud
Features of cloudFeatures of cloud
Features of cloud
 

More from www.datatrak.com

CDM's Role in Supporting Risk-Based Monitoring
CDM's Role in Supporting Risk-Based MonitoringCDM's Role in Supporting Risk-Based Monitoring
CDM's Role in Supporting Risk-Based Monitoring
www.datatrak.com
 
Innovative Learning Opportunities: A Collaboration between Industry and Acade...
Innovative Learning Opportunities: A Collaboration between Industry and Acade...Innovative Learning Opportunities: A Collaboration between Industry and Acade...
Innovative Learning Opportunities: A Collaboration between Industry and Acade...
www.datatrak.com
 
EDC and Getting Ready for Migration
EDC and Getting Ready for MigrationEDC and Getting Ready for Migration
EDC and Getting Ready for Migration
www.datatrak.com
 

More from www.datatrak.com (20)

eSource: Data Capture Simplified - Uncover Time and Cost Saving Possibilities
eSource: Data Capture Simplified - Uncover Time and Cost Saving PossibilitieseSource: Data Capture Simplified - Uncover Time and Cost Saving Possibilities
eSource: Data Capture Simplified - Uncover Time and Cost Saving Possibilities
 
Leverage Your EDC Solution to Mitigate Risk in Clinical Research
Leverage Your EDC Solution to Mitigate Risk in Clinical ResearchLeverage Your EDC Solution to Mitigate Risk in Clinical Research
Leverage Your EDC Solution to Mitigate Risk in Clinical Research
 
Defining a Central Monitoring Capability: Sharing the Experience of TransCele...
Defining a Central Monitoring Capability: Sharing the Experience of TransCele...Defining a Central Monitoring Capability: Sharing the Experience of TransCele...
Defining a Central Monitoring Capability: Sharing the Experience of TransCele...
 
Technology Considerations to Enable the Risk-Based Monitoring Methodology
Technology Considerations to Enable the Risk-Based Monitoring MethodologyTechnology Considerations to Enable the Risk-Based Monitoring Methodology
Technology Considerations to Enable the Risk-Based Monitoring Methodology
 
How To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based MonitoringHow To Optimize Your EDC Solution For Risk Based Monitoring
How To Optimize Your EDC Solution For Risk Based Monitoring
 
eSource: What You Need To Know
eSource: What You Need To KnoweSource: What You Need To Know
eSource: What You Need To Know
 
eSource: A Clinical Data Manager's Tale of Three Studies
eSource: A Clinical Data Manager's Tale of Three StudieseSource: A Clinical Data Manager's Tale of Three Studies
eSource: A Clinical Data Manager's Tale of Three Studies
 
Monitoring Plan Template
Monitoring Plan TemplateMonitoring Plan Template
Monitoring Plan Template
 
Risk Based Monitoring in Practice
Risk Based Monitoring in PracticeRisk Based Monitoring in Practice
Risk Based Monitoring in Practice
 
Gamification to Incentivize Sites ACRP 2014
Gamification to Incentivize Sites ACRP 2014Gamification to Incentivize Sites ACRP 2014
Gamification to Incentivize Sites ACRP 2014
 
Using Gamification to Incentivize Sites
Using Gamification to Incentivize SitesUsing Gamification to Incentivize Sites
Using Gamification to Incentivize Sites
 
Utilizing a Unified Platform to Bridge Geographical and Departmental Gaps Whi...
Utilizing a Unified Platform to Bridge Geographical and Departmental Gaps Whi...Utilizing a Unified Platform to Bridge Geographical and Departmental Gaps Whi...
Utilizing a Unified Platform to Bridge Geographical and Departmental Gaps Whi...
 
Mitigating Risks in Clinical Studies
Mitigating Risks in Clinical Studies Mitigating Risks in Clinical Studies
Mitigating Risks in Clinical Studies
 
Using Technology to Integrate Clinical Data Management and Clinical Operations
Using Technology to Integrate Clinical Data Management and Clinical OperationsUsing Technology to Integrate Clinical Data Management and Clinical Operations
Using Technology to Integrate Clinical Data Management and Clinical Operations
 
The FDA Guidance of a Risk-Based Approach to Monitoring as Viewed By CDM
The FDA Guidance of a Risk-Based Approach to Monitoring as Viewed By CDMThe FDA Guidance of a Risk-Based Approach to Monitoring as Viewed By CDM
The FDA Guidance of a Risk-Based Approach to Monitoring as Viewed By CDM
 
CDM's Role in Supporting Risk-Based Monitoring
CDM's Role in Supporting Risk-Based MonitoringCDM's Role in Supporting Risk-Based Monitoring
CDM's Role in Supporting Risk-Based Monitoring
 
Innovative Learning Opportunities: A Collaboration between Industry and Acade...
Innovative Learning Opportunities: A Collaboration between Industry and Acade...Innovative Learning Opportunities: A Collaboration between Industry and Acade...
Innovative Learning Opportunities: A Collaboration between Industry and Acade...
 
Integrating Clinical Operations and Clinical Data Management Through EDC
Integrating Clinical Operations and Clinical Data Management Through EDCIntegrating Clinical Operations and Clinical Data Management Through EDC
Integrating Clinical Operations and Clinical Data Management Through EDC
 
OneMedPlace November Research Report
OneMedPlace November Research ReportOneMedPlace November Research Report
OneMedPlace November Research Report
 
EDC and Getting Ready for Migration
EDC and Getting Ready for MigrationEDC and Getting Ready for Migration
EDC and Getting Ready for Migration
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Understanding the Cloud

  • 1. Understanding the Cloud October 11, 2012
  • 2. About Me I am the initial architect for our online “cloud” clinical data collection solutions which we have been delivering since the late 1990s. Personally, I am a proponent and user of online “cloud” applications. Confidential – 2
  • 3. Goals Today 1. Define “the cloud” in simple terms 2. Provide some “cloud” benefit and risk evaluation checklists Confidential – 3
  • 5. A majority thought that cloud computing referred to a “fluffy white thing” 51% believed storms could interfere with it August 2012 Survey by Citrix http://www.citrix.com/lang/English/lp/lp_2328330.asp Confidential – 5
  • 7. So, what is the cloud? Confidential – 7
  • 8. We will cover a formal definition from the but first… Confidential – 8
  • 9. “The Cloud” in Simple Terms Confidential – 9
  • 10. “The Cloud” in Simple Terms 1. You access it through the Internet 2. You don't own it (generally) 3. You don't have to do much to scale up to a bigger footprint (except pay for what you are using) Adapted from: http://it.toolbox.com/blogs/original-thinking/what-is-cloud-computing-a-simple-definition-30648 Confidential – 10
  • 11. Examples Photos Productivity Industry Confidential – 11
  • 12. Technical Nuts and Bolts (for the record) Confidential – 12
  • 13. The National Institute of Standards and Technology defines Cloud Computing with three main categories Confidential – 13
  • 16. Service model options are the most commonly discussed Cloud Category Let’s take a closer look at those options… Confidential – 16
  • 17. Software Software (as a Service) indicates special-purpose software made (SaaS) available through the Internet. Platform indicates a higher-level environment for which developers Platform write custom applications. Generally the developer is accepting (PaaS) some restrictions on the type of software they can write in exchange for built-in application scalability. Infrastructure includes provisioning of hardware or virtual Infrastructure computers on which one generally has control over the OS; (IaaS) therefore allowing the execution of arbitrary software. Adapted from http://rwandering.net/2008/07/03/cloud-services-continuum/ Confidential – 17
  • 18. Common Users for Cloud Service Models http://www.saasblogs.com/saas/demystifying-the-cloud-where-do-saas-paas-and-other-acronyms-fit-in/ Confidential – 18
  • 19. The lower you go down in the stack the more security you are tactically responsible for implementing and managing. For Example: Operating system Network security Data encryption System installation http://www.saasblogs.com/saas/demystifying-the-cloud-where-do-saas-paas-and-other-acronyms-fit-in/ Confidential – 19
  • 21. Open to the general public Exclusively accessed by a single organization Combination of two or more service models Selectively accessible for users with a shared purpose Confidential – 21
  • 22. What is the benefit of all this? Confidential – 22
  • 24. Save money • Lower IT costs • Economies of scale • Pay as you go ► Save time • Eliminate install tasks associated with licensed software ► Focus on competitive advantage rather than • Purchasing and supporting the server infrastructure • Managing the security, reliability, and scalability • Maintaining a labor-intensive patch and upgrade process Confidential – 24
  • 25. Should I be concerned about the safety of my data? Confidential – 25
  • 26. Always. Data security is a concern whether you subscribe to SaaS or purchase software and implement it on in-house servers. Here are some things to consider… Confidential – 26
  • 27. Is the solution Secure? Is it easily Accessible? Does it support a Global marketplace? Is it Sustainable? Confidential – 27
  • 28. Some questions to ask! ► Secure • Is the application 21 CFR Part 11 compliant? • Do you have Safe Harbor certification? • What encryption is used for data transfers? • Is the data center SOC 2 Type II certified? ► Accessible • Which browsers are supported? • Is it accessible on mobile and tablet browsers? • Does the application require routine maintenance downtime? How often? How long? ► Global • Does the application support the display and storage of multiple languages and typesets (Chinese, Japanese, etc.)? • Can you report on multiple studies with the same application? ► Sustainable • What is the cost model? • What is the training time for standard end users? • How are upgrades supported? Confidential – 28
  • 29. Can you audit the vendor facilities? How are the data backed up? What is the recovery process? Is your production equipment housed in a state-of-the-art colocation facility? What are the security arrangements for the facility? Extended Are they in place 24 hours a day, 365 days a year? On what type of infrastructure do you host data? SaaS Data Checklist How often do you back up data and where are the backups stored? Where and how do you store the backups? What level of data encryption do you use to protect website transactions? Can I export my data in a format that I can easily re-use? Adapted from: http://www.trumba.com/connect/knowledgecenter/software_as_a_service.aspx#secure_data Confidential – 29
  • 31. Simply Put You Have Options “In The Cloud” Cloud Service Models • You access it through the Internet • SaaS, PaaS, IaaS • You don't own it (generally) • Most organizations leverage SaaS • You don't have to do much to • Remember the lower you go, the scale more you are responsible to manage And finally… When deploying a solution either in-house or as SaaS, make sure it is: Confidential – 31
  • 32. ® from Concept to Cure ™ with D ATATRAK ONE DATAT R A K International Cleveland, Ohio Bryan, Texas Cary, North Carolina 888.677.DATA (3282) Toll Free www.datatrak.net