Cloud ERP Mistakes: Security Assumptions
One of the most universally appreciated values of cloud ERP is its ability to translate directly from an operational requirement to an active system in about half the time associated with a typical on-premise system. On the face of it, this characteristic alone appears to provide everything an ERP-dependent enterprise might need, ranging from speed of launch to back-end stability. While this savvy approach to resources management may appear to be a panacea, there are a number of concerns deep-rooted in cloud topology, and at the locus of this cluster of weaknesses lies cloud ERP security.
'While That May Be True, It Is Also Irrelevant'
Now, I know what you’re about to say; in terms of today’s cloud ERP, platform security elements are light years more sophisticated when compared with 5 years ago. However, to leverage North Vietnamese General Ho Binh Gap after his Army finally took Saigon in 1975 after 20 years worth of trying, ‘while that may be true, it is also irrelevant’; effective cloud-based security is not derived by the ERP platform alone. Cloud ERP security depends on the complete constellation of affiliate systems and people who ultimately create an effective and stable end-to-end system management chain.
there are a number of concerns deep-rooted in cloud topology, and at the locus of this cluster of weaknesses lies cloud ERP security
As banal as it may appear to be, humor me and ask yourself this question; what connects a cloud ERP platform to an enterprise workforce? That’s simple; connectivity you say. And where does connectivity come from? Multiple international and domestic CLEC’s, WAN nodes, servers, gateways, routers, and god-only-knows how many other active and passive communications widgets.
All these elements are managed by hosts of individuals simultaneously, thereby allowing a user to receive usually accurate and constant processing that drives raw materials in one side of a factory and produces finished goods that roll out the back end of the building. This of course is followed by the happy business coincidence of revenue appearing within an enterprise’s bank account.
Planning for Disaster Recovery
However, what if ‘any’, and I mean this literally, ‘any’ of those elements are seriously compromised; do you think that your ERP system will survive the potential cataclysmic upset? The sad truth of cloud ERP security dependency is that to make a single accurate data-packet go from ‘here to there’ securely, each virtual link in the end-to-end processing chain must be squeaky clean all the time, every day. In the middle of all of that unattended activity, people are constantly trimming, maintaining, upgrading, and patching an entire network fabric in real-time.
So, the next time you see your enterprise security compliance officer, ask him about his level of confidence when it comes to the invisible ‘squishy stuff’ in the middle of your ERP cookie. I expect you’ll have a bit of a fright since a completely accurate understanding of cloud ERP security will likely require much more effort than originally thought.
Featured white papers
Five common cloud ERP mistakes
Get your comprehensive guide to avoiding the five most common cloud ERP errorsDownload
ERP Software in the Cloud
Get your free guide to cloud ERP softwareDownload
ERP Software Pricing Guide
Get the latest pricing information on over 80 popular ERP systems, and learn how to budget for your ERP project in our free guideDownload
Why you shouldn't underestimate cloud ERP consultant costs
Make sure to take the cost of a consultant into account when planning your cloud ERP budget
Why a food specific ERP system is a must-have
Key features and requirements food companies should consider when searching for an ERP
Cloud ERP vs on-premise ERP: an objective comparison
Are you choosing between cloud ERP and on-premise ERP? This balanced guide will help