That seems possible too. Kind of a good idea too. A customer gets to keep
their costs low as well as have the systems hosted on premise. Kind of a
perfect example of keep the cake and eat it too.

 

Maybe BMC should try to market that strategy a little more to make their
pricings more attractive to the customers.

 

Joe

 

  _____  

From: Action Request System discussion list(ARSList)
[mailto:[email protected]] On Behalf Of Rick Cook
Sent: Thursday, June 16, 2016 2:19 PM
To: [email protected]
Subject: Re: Question - Service Now

 

** 

Nope.  The customer owns and maintains the hardware. BMC may have a VPN or
something to access it, I don't know.  

Rick

On Jun 16, 2016 11:06 AM, "Joe D'Souza" <[email protected]> wrote:

** 

I would think that too. I'm guessing what might have been done is while the
physical systems may have been hosted at BMC's network, they may have used
their own domain to web enable it? And probably have a private network to
access the systems directly? Just a guess.

 

Joe

 

  _____  

From: Action Request System discussion list(ARSList)
[mailto:[email protected]] On Behalf Of Jason Miller
Sent: Thursday, June 16, 2016 2:55 AM
To: [email protected]
Subject: Re: Question - Service Now

 

** Does hosting your own instance make it no longer RoD?

On Wed, Jun 15, 2016, 4:42 PM Rick Cook <[email protected]> wrote:

** 

Amazon has already been hacked at least once.   I know of one DoD RoD
customer that hosts their own instance for security reasons. 

Rick

On Jun 15, 2016 16:10, "Joe D'Souza" <[email protected]> wrote:

** 

I think it mostly comes down to the answer to this question - would you be
ok to let a valet drive and park an expensive car or motorcycle you own or
would you want to do it yourself. Would you trust that valet to tell you
after he has parked it if he accidentally dinked it or hit a huge pot hole
if that dink or damage is not easily visible? If so maybe you are the kind
of person for who services like the cloud would work quite well with if
functionally it offers you everything else you have been looking for.

 

Personally I do not think that services that host cloud based services
publicly acknowledge their service was compromised in the odd event it was
unless it was quite obvious it has been to the end customer which can sort
of be a disturbing thought. There may or may not be a threat or a breach
every month.. Maybe every week. Maybe even every day. I honestly do not
think they would upfront about such incidents when and if it occurs unless
it was quite fatal. It could mean a risk to their business and they would
not want that.

 

Joe

 


  _____  


From: Action Request System discussion list(ARSList)
[mailto:[email protected]] On Behalf Of Pierson, Shawn
Sent: Wednesday, June 15, 2016 8:49 AM
To: [email protected]
Subject: Re: Question - Service Now

 

Just to play devil's advocate, theoretically someone whose business depends
on their internet-facing servers being trusted is going to likely spend more
money on security than a company that sells widgets as their primarily line
of business and views I.T. security as just an expense.  I don't know who
hosts Service Now or BMC's cloud servers, but I'd expect that they probably
take it very seriously.  Things can definitely slip through but if we're all
deploying MyIT and such to give people access to Remedy via their
smartphones and tablets off the network, it's really a question of whose
cybersecurity you trust more.

 

Thanks,

 

Shawn Pierson 

Remedy Developer | Energy Transfer

 

From: Action Request System discussion list(ARSList)
[mailto:[email protected]] On Behalf Of Joe D'Souza
Sent: Tuesday, June 14, 2016 8:28 PM
To: [email protected]
Subject: Re: Question - Service Now

 

** 

Exactly - but I would like to add its as safe as someone else's computer who
gives access to some of his trusted associates facing the internet.

 

So once out there, it is as safe as any other "shared" resource with
"limited public access" on the internet is.

 

Whether you like it or not, that exposes the system to a few more
vulnerabilities than a system that is internal and intranet facing.

 

So whether it is ServiceNOW's cloud or any other, it is the one risk you
need to assume before investing in it.

 

Joe

 


  _____  


From: Action Request System discussion list(ARSList)
[mailto:[email protected]] On Behalf Of Rod Harris
Sent: Tuesday, June 14, 2016 8:44 PM
To: [email protected]
Subject: Re: Question - Service Now

 

** 

If only I had a like button. Yes, cloud does seem to be a bit of a buzzword
that you have distilled nicely with that T-shirt slogan.

Thanks JDHood.

 

On 15 June 2016 at 10:35, JD Hood <[email protected]> wrote:

** 

It may be a T-Shirt slogan, but it's relevant nonetheless: "...There is no
"Cloud" - It's just someone else's computer..."

 

-JDHood

 

On Tue, Jun 14, 2016 at 8:19 PM, Joe D'Souza <[email protected]> wrote:

** 

I do recall hearing rumors it was - not sure how long time ago. But take
that information with a grain of salt as I do not know much details of what
I had heard.

 

ServiceNOW is primarily a system hosted on the cloud so is as vulnerable or
strong as any other system on the cloud.

 

So IMHO if security of your data is one of your top concerns, the cloud may
not be the best place for you to be at. However strong the security, there
is always a loophole to be found for someone who has the intent to find one.
While this is true for systems hosted internally too, at least the
vulnerability of the system isn't exposed to the world if your system isn't
internet facing.

 

Joe

 


  _____  


From: Action Request System discussion list(ARSList)
[mailto:[email protected]] On Behalf Of Sanford, Claire
Sent: Tuesday, June 14, 2016 3:17 PM
To: [email protected]
Subject: Question - Service Now

 

Does anyone know if Service Now has ever had their servers (with customer's
data) ever been hacked?

 

 

_ARSlist: "Where the Answers Are" and have been for 20 years_ _ARSlist:
"Where the Answers Are" and have been for 20 years_

 

_ARSlist: "Where the Answers Are" and have been for 20 years_ 

 

_ARSlist: "Where the Answers Are" and have been for 20 years_ 

_ARSlist: "Where the Answers Are" and have been for 20 years_ 

Private and confidential as detailed here
<http://www.energytransfer.com/mail_disclaimer.aspx> . If you cannot access
hyperlink, please e-mail sender. 

_ARSlist: "Where the Answers Are" and have been for 20 years_ _ARSlist:
"Where the Answers Are" and have been for 20 years_

_ARSlist: "Where the Answers Are" and have been for 20 years_ 

_ARSlist: "Where the Answers Are" and have been for 20 years_ 

_ARSlist: "Where the Answers Are" and have been for 20 years_ 

_ARSlist: "Where the Answers Are" and have been for 20 years_ 


_______________________________________________________________________________
UNSUBSCRIBE or access ARSlist Archives at www.arslist.org
"Where the Answers Are, and have been for 20 years"

Reply via email to