Does hosting your own instance make it no longer RoD?

On Wed, Jun 15, 2016, 4:42 PM Rick Cook <[email protected]> wrote:

> **
>
> Amazon has already been hacked at least once.   I know of one DoD RoD
> customer that hosts their own instance for security reasons.
>
> Rick
> On Jun 15, 2016 16:10, "Joe D'Souza" <[email protected]> wrote:
>
>> **
>>
>> I think it mostly comes down to the answer to this question – would you
>> be ok to let a valet drive and park an expensive car or motorcycle you own
>> or would you want to do it yourself. Would you trust that valet to tell you
>> after he has parked it if he accidentally dinked it or hit a huge pot hole
>> if that dink or damage is not easily visible? If so maybe you are the kind
>> of person for who services like the cloud would work quite well with if
>> functionally it offers you everything else you have been looking for.
>>
>>
>>
>> Personally I do not think that services that host cloud based services
>> publicly acknowledge their service was compromised in the odd event it was
>> unless it was quite obvious it has been to the end customer which can sort
>> of be a disturbing thought. There may or may not be a threat or a breach
>> every month.. Maybe every week. Maybe even every day. I honestly do not
>> think they would upfront about such incidents when and if it occurs unless
>> it was quite fatal. It could mean a risk to their business and they would
>> not want that.
>>
>>
>>
>> Joe
>>
>>
>> ------------------------------
>>
>> *From:* Action Request System discussion list(ARSList) [mailto:
>> [email protected]] *On Behalf Of *Pierson, Shawn
>> *Sent:* Wednesday, June 15, 2016 8:49 AM
>> *To:* [email protected]
>> *Subject:* Re: Question - Service Now
>>
>>
>>
>> Just to play devil’s advocate, theoretically someone whose business
>> depends on their internet-facing servers being trusted is going to likely
>> spend more money on security than a company that sells widgets as their
>> primarily line of business and views I.T. security as just an expense.  I
>> don’t know who hosts Service Now or BMC’s cloud servers, but I’d expect
>> that they probably take it very seriously.  Things can definitely slip
>> through but if we’re all deploying MyIT and such to give people access to
>> Remedy via their smartphones and tablets off the network, it’s really a
>> question of whose cybersecurity you trust more.
>>
>>
>>
>> Thanks,
>>
>>
>>
>> *Shawn Pierson *
>>
>> Remedy Developer | Energy Transfer
>>
>>
>>
>> *From:* Action Request System discussion list(ARSList) [mailto:
>> [email protected]] *On Behalf Of *Joe D'Souza
>> *Sent:* Tuesday, June 14, 2016 8:28 PM
>> *To:* [email protected]
>> *Subject:* Re: Question - Service Now
>>
>>
>>
>> **
>>
>> Exactly – but I would like to add its as safe as someone else’s computer
>> who gives access to some of his trusted associates facing the internet.
>>
>>
>>
>> So once out there, it is as safe as any other “shared” resource with
>> “limited public access” on the internet is.
>>
>>
>>
>> Whether you like it or not, that exposes the system to a few more
>> vulnerabilities than a system that is internal and intranet facing.
>>
>>
>>
>> So whether it is ServiceNOW’s cloud or any other, it is the one risk you
>> need to assume before investing in it.
>>
>>
>>
>> Joe
>>
>>
>> ------------------------------
>>
>> *From:* Action Request System discussion list(ARSList) [
>> mailto:[email protected] <[email protected]>] *On Behalf Of *Rod
>> Harris
>> *Sent:* Tuesday, June 14, 2016 8:44 PM
>> *To:* [email protected]
>> *Subject:* Re: Question - Service Now
>>
>>
>>
>> **
>>
>> If only I had a like button. Yes, cloud does seem to be a bit of a
>> buzzword that you have distilled nicely with that T-shirt slogan.
>>
>> Thanks JDHood.
>>
>>
>>
>> On 15 June 2016 at 10:35, JD Hood <[email protected]> wrote:
>>
>> **
>>
>> It may be a T-Shirt slogan, but it's relevant nonetheless: "...There is
>> no "Cloud" - It's just someone else's computer..."
>>
>>
>>
>> -JDHood
>>
>>
>>
>> On Tue, Jun 14, 2016 at 8:19 PM, Joe D'Souza <[email protected]> wrote:
>>
>> **
>>
>> I do recall hearing rumors it was – not sure how long time ago. But take
>> that information with a grain of salt as I do not know much details of what
>> I had heard.
>>
>>
>>
>> ServiceNOW is primarily a system hosted on the cloud so is as vulnerable
>> or strong as any other system on the cloud.
>>
>>
>>
>> So IMHO if security of your data is one of your top concerns, the cloud
>> may not be the best place for you to be at. However strong the security,
>> there is always a loophole to be found for someone who has the intent to
>> find one. While this is true for systems hosted internally too, at least
>> the vulnerability of the system isn’t exposed to the world if your system
>> isn’t internet facing.
>>
>>
>>
>> Joe
>>
>>
>> ------------------------------
>>
>> *From:* Action Request System discussion list(ARSList) [mailto:
>> [email protected]] *On Behalf Of *Sanford, Claire
>> *Sent:* Tuesday, June 14, 2016 3:17 PM
>> *To:* [email protected]
>> *Subject:* Question - Service Now
>>
>>
>>
>> Does anyone know if Service Now has ever had their servers (with
>> customer’s data) ever been hacked?
>>
>>
>>
>>
>>
>> _ARSlist: "Where the Answers Are" and have been for 20 years_ _ARSlist:
>> "Where the Answers Are" and have been for 20 years_
>>
>>
>>
>> _ARSlist: "Where the Answers Are" and have been for 20 years_
>>
>>
>>
>> _ARSlist: "Where the Answers Are" and have been for 20 years_
>>
>> _ARSlist: "Where the Answers Are" and have been for 20 years_
>>
>> Private and confidential as detailed here
>> <http://www.energytransfer.com/mail_disclaimer.aspx>. If you cannot
>> access hyperlink, please e-mail sender.
>> _ARSlist: "Where the Answers Are" and have been for 20 years_ _ARSlist:
>> "Where the Answers Are" and have been for 20 years_
>
> _ARSlist: "Where the Answers Are" and have been for 20 years_

_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
"Where the Answers Are, and have been for 20 years"

Reply via email to