170 Cloud Computing
for information (RFI) or request for proposal (RFP). A structured process
and a knowledge base of frequently requested information will result in con-
siderable efficiency and the avoidance of ad-hoc, inefficient, or inconsistent
support of the customer RFI/RFP process. Members of the security team
should be not only internal security evangelists but also security evangelists
to customers in support of the sales and marketing teams. As discussed ear-
lier, security is top-of-mind and a primary concern for cloud computing
customers, and lack of information security representatives who can provide
support to the sales team in addressing customer questions and concerns
could result in the potential loss of a sales opportunity.
6.3.13 Business Continuity Plan
The purpose of business continuity (BC)/disaster recovery (DR) planning is
to minimize the impact of an adverse event on business processes. Business
continuity and resiliency services help ensure uninterrupted operations
across all layers of the business, as well as helping businesses avoid, prepare
for, and recover from a disruption. SaaS services that enable uninterrupted
communications not only can help the business recover from an outage,
they can reduce the overall complexity, costs, and risks of day-to-day man-
agement of your most critical applications. The cloud also offers some dra-
matic opportunities for cost-effective BC/DR solutions.
Some of the advantages that SaaS can provide over traditional BC/DR
are eliminating email downtime, ensuring that email messages are never
lost, and making system outages virtually invisible to end users no matter
what happens to your staff or infrastructure; maintaining continuous tele-
phone communication during a telecommunication outage so your organi-
zation can stay open and in contact with employees, customers, and
partners at virtually any location, over any network, over any talking device;
and providing wireless continuity for WiFi-enabled “smart” phones that
ensures users will always be able to send and receive corporate email from
their WiFi-enabled devices, even if your corporate mail system, data center,
network, and staff are unavailable.
9
6.3.14 Forensics
Computer forensics is used to retrieve and analyze data. The practice of
computer forensics means responding to an event by gathering and preserv-
ing data, analyzing data to reconstruct events, and assessing the state of an
9. http://www.eseminarslive.com/c/a/Cloud-Computing/Dell030509, retrieved 15 Feb 2009.
Chap6.fm Page 170 Friday, May 22, 2009 11:27 AM