Reduce costs and increase security with the ZenShare Cloud
Data migration to the Cloud: what is Cloud Computing, advantages and solutions.
There is more and more talk about Cloud Computing, but what does it mean to manage company data in the Cloud and what are the advantages of this solution?
The term Cloud Computing refers to the distribution of services such as software, databases, servers and networks via an internet connection. An innovative system that allows companies and public bodies to access software and applications wherever they are and wherever an Internet connection is available.
Cloud Computing represents a fundamental evolution in corporate data management, offering a series of advantages. In particular, data migration to the Cloud offers companies the flexibility to access their data and applications from anywhere, promoting collaboration, operational efficiency and smart working.
Data migration to the Cloud represents a real turning point for all organizations regardless of their size.
Contact us for more information
If we had to summarize the main advantages linked to data migration to the Cloud in just three terms, these would undoubtedly be:
1. COST SAVINGS
Cloud Computing allows companies to avoid expensive investments in physical infrastructure. Cloud services, managed by suppliers such as ZenShare, offer the possibility of paying only for the resources actually used, guaranteeing significant savings on operating costs. Organizations that use the Cloud can access all their information and documents without managing physical devices, with significant cost savings.
2. IMPROVED PERFORMANCE
With the growing amount of data generated and shared by companies, it is becoming increasingly complex to manage all activities on proprietary servers while ensuring high performance. Data migration to the Cloud allows organizations to dynamically adapt to data storage and processing needs, ensuring optimal performance at all times.
3. INCREASED SECURITY
Data security is a priority for any business. ZenShare offers advanced security features, including backup and disaster recovery, ensuring the protection and security of company data even in the event of hardware failures or external attacks.
Added to these advantages are other related ones that can help increase productivity, make remote working more efficient and increase operations.
The secure Cloud for companies and public bodies
Rely on an ISO 9001 and 27001 certified partner like Interzen: we accompany private companies and public administrations in the successful migration of data to a secure Cloud environment protected from cyber attacks.
The security of the Microsoft Azure Cloud Service Provider to ensure optimal performance:
- Back Up every 4 hours on different regions
- Disaster Recovery
- System redundancy
Contact us for a free consultation and find out how we can help you achieve your business goals with Cloud solutions tailored for you.
Find out more about the ZenShare Cloud
The ZenShare Cloud Suite relieves the customer entirely of all the duties of those who manage a server-farm for hosting web-based software platforms. All activities – both ordinary and extraordinary – related to the management of both the software platform and the technological infrastructure on which it works are entirely entrusted to Interzen and the reference Cloud Service Provider, for their respective areas of expertise.
Interzen, as the vendor house that owns the ZenShare Cloud Suite, operates in a coordinated manner in several areas:
- Developing and make periodic updates of the application functions of the ZenShare Cloud Suite available to its customers aimed at eliminating any malfunctions, increasing the level of application security, improving overall usability and introducing new functions and application modules;
- Periodically monitoring ZenShare Suite Cloud security to guarantee the highest possible levels;
- Constantly monitoring the operating conditions of the technological infrastructure of the reference Cloud Service Provider on which the ZenShare Cloud Suite is installed to ensure that the level of service offered to its customers constantly meets the standard set by the contract;
- Coordinating with the Cloud Service Provider to request ordinary/extraordinary support activities in managing the security and service level of the ZenShare Cloud Suite.
The ZenShare Cloud Suite is able to meet the needs of a wide range of business types, from SME to large companies.
In the start-up phase, activation times are very short because the software platform does not require any installation, but simple standardized activities:
- Analysis of customer needs, collected through interviews and exchanges of information with company representatives, subsequently elaborated by Interzen consultants and structured in a document shared with the customer in order to thoroughly dissect the customer’s need;
- Configuration of the ZenShare Cloud Suite so that it can, consistently with the analysis document shared and approved by the customer, fully respond to the management of data, documents and business processes;
- Training for end users of the ZenShare Cloud Suite, through remote/live sessions in which to train individuals in the use of the software platform for the execution of business processes shared with the customer in the preliminary analysis document.
- After its adoption in the company, the ZenShare Cloud Suite offers the customer extreme flexibility where a change in business needs arises:
- As for the number of users operating on the software platform, the activation and configuration times for new users are very low; equally agile is the online training method through remote sessions (web-conference) to allow new users to be operational in a reasonably short time;
- As for the adaptation of the IT resources dedicated to the ZenShare Cloud Suite (modification of the disk space available in the case of Cloud Standard customers, modification of the system resources available in the case of Cloud Premium customers), also in this case the intervention times of Interzen and of entry into operation of the changes requested by the customer are on average short.
The ZenShare Cloud Suite is able to meet the needs of a wide range of business types, from SME to large companies.
In the start-up phase, activation times are very short because the software platform does not require any installation, but simple standardized activities:
- Analysis of customer needs, collected through interviews and exchanges of information with company representatives, subsequently elaborated by Interzen consultants and structured in a document shared with the customer in order to thoroughly dissect the customer’s need;
- Configuration of the ZenShare Cloud Suite so that it can, consistently with the analysis document shared and approved by the customer, fully respond to the management of data, documents and business processes;
- Training for end users of the ZenShare Cloud Suite, through remote/live sessions in which to train individuals in the use of the software platform for the execution of business processes shared with the customer in the preliminary analysis document.
- After its adoption in the company, the ZenShare Cloud Suite offers the customer extreme flexibility where a change in business needs arises:
- As for the number of users operating on the software platform, the activation and configuration times for new users are very low; equally agile is the online training method through remote sessions (web-conference) to allow new users to be operational in a reasonably short time;
- As for the adaptation of the IT resources dedicated to the ZenShare Cloud Suite (modification of the disk space available in the case of Cloud Standard customers, modification of the system resources available in the case of Cloud Premium customers), also in this case the intervention times of Interzen and of entry into operation of the changes requested by the customer are on average short.
Certifications, Information Security and Backup
LEVEL 1 – EXTERNAL PREVENTION SYSTEMS
|
|
---|---|
Vulnerability scan
|
LEVEL 2 – I.T. INFRASTRUCTURE OF THE CLOUD SERVICE PROVIDER
|
|||
---|---|---|---|
Service provider
|
|||
Cloud service type
|
Public Cloud
|
||
Cloud Service Provider Certifications
|
|||
Location of data centers used
|
|||
Security levels adopted by the service provider
|
|||
Service provider data redundancy
|
3° LEVEL – DATA SECURITY I.T. INFRASTRUCTURE OF INTERZEN
|
|||
---|---|---|---|
Firewall
|
|||
ISO 27017:2015 – Cloud Services. Defines advanced controls for cloud service providers and customers, clarifies roles and responsibilities of stakeholders with the aim of ensuring information security in the cloud environment.
|
|||
ISO 27018:2019 – Protection of information that allows personal identification in public clouds. It provides a set of specific controls with a "privacy by design" approach to manage the main issues, both legal and contractual, related to the management of personal data in public cloud environments.
|
|||
Firewall
|
Interzen has adopted pfSense®, a firewall recognized as one of the most powerful, secure and reliable.
|
||
Back-up
|
Virtual Machine backup procedure:
1. Frequency: every 4 hours. 2. Storage mode: GRS geographic redundancy (GEO-REDUNDANT-STORAGE). Synchronously copy data three times within a single physical location in the primary region using locally redundant storage. It asynchronously copies the data to a single physical location in the secondary region. Within the secondary region, data is copied synchronously three times using locally redundant storage. 3. Primary Area: West Europe (Netherlands). 4. Secondary Area : North Europe (Ireland). 5. Retention Backup: 15 days |
||
Disaster Recovery
|
Virtual Machine Disaster Recovery procedure:
1. Mode: Cross Region Restore. 2. Redundancy: geographic (Geo-Redundancy Storage, GRS). Synchronous replication of data stored in Azure to a different physical location (sub-region). 3. Location of the data center used for Disaster recovery: North Europe (Ireland) . |
||
RTO (Recovery Time Objective, the time required for system recovery): 2 business days (minimum time)
|
|||
RPO (Recovery Point Objective, maximum amount of data - expressed in hours - that the company loses following the occurrence of a disastrous event, since it is not part of the normal cyclical back-up procedure): 4 hours (maximum time)
|
LEVEL 4 – VIRTUAL SERVER SECURITY SOFTWARE COMPONENTS
|
|||
---|---|---|---|
Operating system
|
Microsoft Forefront antivirus
|
||
Virtual server
|
Access to virtual servers takes place via a VPN and using a user profile strictly sized according to monitoring and maintenance needs.
|
5° LEVEL – ZENSHARE SUITE APPLICATION
|
|||
---|---|---|---|
Interzen cyber security
|
As part of the ACN Cloud Marketplace qualification process, Interzen has validated its data security and privacy management levels of the ZenShare Cloud Suite at the Cloud Security Alliance's STAR Registry (Security, Trust, Assurance, and Risk).
|
||
Authentication system
|
|||
Interfacing with external systems. Ability to manage user access to the ZenShare Suite via SSO (Single Sign On) procedure and - if available - MFA (Multi Factor Authentication) with third-party systems:
|
|||
IP Filtering
|
1. Ability to set rules to allow/block access to ZenShare Suite based on IP address and subnet mask.
2. Logged in users. Possibility to view all users authenticated on the ZenShare Suite with the following data: surname, first name, role, IP address, last access made. |
||
Audit Logs
|
The ZenShare Suite allows you to track for each user:
• what features you used in a solution; • which documents you have accessed. Users with an administrator role have a search filter available with these parameters: • user name or user groups; • date range (from-to). The search results provide: • page name/document name; • URL of the page/document; • timestamp (date and time of access). Furthermore, it is possible to export the Audit Logs search results to a CSV format file. |
LEVEL 6 – DATA AND DOCUMENTS OF THE ZENSHARE SUITE
|
|||
---|---|---|---|
Database and document encryption (optional)
|
1.Database. Data encryption key in turn encrypted by an algorithm for an additional level of security. The data remains encrypted in the database and its decryption takes place only when it is displayed.
2. Documents. Encryption and decryption by private key. |
||
HTTPS Protocol
|
The HyperText Transfer Protocol Secure (over Secure Socket Layer) is an Internet communication protocol that protects the integrity and confidentiality of the data exchanged between the ZenShare Suite and the hardware (PC, tablet, smartphone) of the user accessing it. SSL certificate provided by Network Solutions LLC.
|