{"id":240,"date":"2013-07-12T13:06:06","date_gmt":"2013-07-12T11:06:06","guid":{"rendered":"http:\/\/e3mag.com\/?p=240"},"modified":"2019-04-01T10:57:36","modified_gmt":"2019-04-01T08:57:36","slug":"cloud-computing-is-business-espionage","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/cloud-computing-is-business-espionage\/","title":{"rendered":"Cloud computing is industrial espionage"},"content":{"rendered":"<p>It must be a chaotic time with my dear colleagues who have their <span id=\"urn:enhancement-d47032ba-e5fc-67fb-9cd2-c20e910c54ec\" class=\"textannotation disambiguated wl-thing\">CRM<\/span>-Applications, <span id=\"urn:enhancement-a788e48f-5b56-a363-d4bf-a48d727d6bfd\" class=\"textannotation disambiguated wl-thing\">E-mail<\/span>-systems and whole <span id=\"urn:enhancement-b80e47ee-b5f2-21fe-e395-24404dcf8b2b\" class=\"textannotation disambiguated wl-thing\">ERP<\/span>-applications have moved to the cloud.<\/p>\n<p>\"You're in a good mood again today,\" even the best of wives observes, sitting down with me to read my monthly E-3 column first.<\/p><div id=\"great-647955394\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-1-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>I am happy to explain to her what happened: Exact details are not yet known, but the fact is that American intelligence services are not only massively interested in the <span id=\"urn:enhancement-b168c0aa-91df-8975-b4a4-21fcb706763f\" class=\"textannotation disambiguated wl-thing\">Data streams<\/span> at <span id=\"urn:enhancement-433345cc-ba1b-b5c1-16b1-cd99882fbbb6\" class=\"textannotation disambiguated wl-thing\">Internet<\/span> but have also found ways to make these <span id=\"urn:enhancement-be6c7c4f-bed7-fd31-8f8b-54cf64ba6df0\" class=\"textannotation disambiguated wl-thing\">Data<\/span> without much fuss.<\/p>\n<p>\"Yeah, yeah,\" my wife says knowingly, \"I've heard that too. I'm just curious what they want to find in my Facebook account?\"<\/p>\n<p>I'm not sure it's just about countering terrorist actions. In the <span id=\"urn:enhancement-c282c888-8c8f-eb26-858b-08012e5804f2\" class=\"textannotation disambiguated wl-thing\">Internet<\/span> can also find other interesting things and since <span id=\"urn:enhancement-a99bb6cb-779e-92a7-971b-683bf8c17ac2\" class=\"textannotation disambiguated wl-thing\">Cloud computing<\/span> there is sometimes the entire <span id=\"urn:enhancement-796b7bd2-eb81-aa64-3cbe-8b64bca540e1\" class=\"textannotation disambiguated wl-thing\">E-mail<\/span>-traffic of a company.<\/p>\n<p>Industrial espionage has probably been around since <span id=\"urn:enhancement-9f6c4842-707b-cbe3-8730-c433eab985b7\" class=\"textannotation disambiguated wl-thing\">Cloud computing<\/span> has become much easier. In the press at the moment you only read about <span id=\"urn:enhancement-0025b60a-34f6-860e-c5a8-5358c6b3aa7d\" class=\"textannotation disambiguated wl-thing\">Social media<\/span> and mentions companies like Facebook, Google and <span id=\"urn:enhancement-9bd38993-cef7-1b6d-736c-1cf0adc8864b\" class=\"textannotation disambiguated wl-organization\">Microsoft<\/span>.<\/p>\n<p>But Google, <span id=\"urn:enhancement-fdfd20ce-f20b-a3bc-29df-541e3f12b207\" class=\"textannotation disambiguated wl-organization\">Microsoft<\/span>, <span id=\"urn:enhancement-d9143afd-30b2-5b2b-8c5a-1792f0585248\" class=\"textannotation disambiguated wl-organization\">Apple<\/span>, salesforce and also <span id=\"urn:enhancement-dd213a9a-a88f-b9bd-0062-c1004a920bb4\" class=\"textannotation disambiguated wl-person\">SAP<\/span> offer Internet services that work with <span id=\"urn:enhancement-1ac76c1f-a66e-ae41-3f51-daed3c530445\" class=\"textannotation disambiguated wl-organization\">NSA<\/span>-technology can be tapped.<\/p>\n<p>It is not yet known whether the Prism spying program will also affect business applications or only <span id=\"urn:enhancement-672f3024-ce9c-5ce1-bd78-5883c2a460fb\" class=\"textannotation disambiguated wl-thing\">Social Media<\/span>-Applications.<\/p>\n<p>Ultimately, it would technically make no difference whether a Facebook account is tapped or a company's project plan in the Microsoft Cloud.<\/p>\n<h3>Critical factor - Cloud<\/h3>\n<p>I had never thought of the dimensions that are currently becoming public through Prism. But my shyness towards <span id=\"urn:enhancement-f4e7c226-1a40-2d3d-f0ec-a554d863b9dd\" class=\"textannotation disambiguated wl-thing\">Cloud computing<\/span> I will not deny.<\/p>\n<p>Unfortunately, I haven't had a chance to talk to my colleague from Hilti on the phone yet. He has lifted many business-critical applications into the cloud with SAP Business ByDesign.<\/p>\n<p>Now I don't believe that the U.S. <span id=\"urn:enhancement-60b78984-0186-d7b0-f510-7882008ab0f8\" class=\"textannotation disambiguated wl-organization\">NSA<\/span> direct access to <span id=\"urn:enhancement-8a2c63ca-ef25-9011-efcd-3ca4b3d026dd\" class=\"textannotation disambiguated wl-person\">SAP<\/span>-data centers, but what is not officially permitted may at least be technically conceivable.<\/p>\n<p>Accordingly, it is a vision of horror for me to <span id=\"urn:enhancement-075aed44-f0dd-4341-7d0e-c36aca3a02ce\" class=\"textannotation disambiguated wl-thing\">CRM<\/span>- and mail<span id=\"urn:enhancement-5787d7bb-c941-d54f-c363-b7f8f8af68b9\" class=\"textannotation disambiguated wl-thing\">Server<\/span> a <span id=\"urn:enhancement-da897ccd-182e-8374-87f2-02df233951b7\" class=\"textannotation disambiguated wl-thing\">Cloud Computing<\/span>-providers such as Google or Microsoft.<\/p>\n<p>Already in my column from last June I wrote about the madness of a <span id=\"urn:enhancement-07075d1b-ed5c-3387-91bf-1f654bd9450a\" class=\"textannotation disambiguated wl-thing\">Hana<\/span> Enterprise Cloud and many colleagues have agreed with me in both senses:<\/p>\n<ol>\n<li>Never move the corporate books and business critical applications to the cloud<\/li>\n<li>No confidence regarding <span id=\"urn:enhancement-43312e18-b41a-ab87-7da5-e8b33e144f84\" class=\"textannotation disambiguated wl-thing\">Cloud computing<\/span> for <span id=\"urn:enhancement-e02192db-8732-288a-f7ec-c525427186a0\" class=\"textannotation disambiguated wl-person\">SAP<\/span>.<\/li>\n<\/ol>\n<p>Our esteemed <span id=\"urn:enhancement-6e6e3722-2890-7938-f779-23404612f846\" class=\"textannotation disambiguated wl-place\">Walldorf<\/span> have consistently made every effort over the past few years to <span id=\"urn:enhancement-79d77b7d-d2fd-2c70-05ca-4e85e3442556\" class=\"textannotation disambiguated wl-thing\">Data Center<\/span>-<span id=\"urn:enhancement-9536332c-8b13-1c7b-0432-de890313e2fb\" class=\"textannotation disambiguated wl-thing\">Knowledge<\/span> dismantled and sold, among others to <span id=\"urn:enhancement-35ab71a4-6721-a7a2-12a0-9352631e923a\" class=\"textannotation disambiguated wl-organization\">T-Systems<\/span>.<\/p>\n<p>Now, of all things <span id=\"urn:enhancement-8ead8372-6ae2-0500-f7b5-d71fbec5a912\" class=\"textannotation disambiguated wl-person\">Hasso Plattner<\/span> and Vishal Sikka make believe that corporate data in a <span id=\"urn:enhancement-43b371d3-9a7b-8550-86f8-f9411e4281b4\" class=\"textannotation disambiguated wl-person\">SAP<\/span>-cloud are safe.<\/p>\n<p>There are <span id=\"urn:enhancement-905df6e8-2aae-947f-0a87-501862e75c58\" class=\"textannotation disambiguated wl-person\">SAP<\/span>-partners such as itelligence, Freudenberg IT, <span id=\"urn:enhancement-82f9522f-3051-e009-8997-d6061f84da7d\" class=\"textannotation disambiguated wl-organization\">T-Systems<\/span> or all-for-one, which in recent years have consistently invested in IT<span id=\"urn:enhancement-208c50d2-8079-0a11-aa8a-fec1f4ece1c6\" class=\"textannotation disambiguated wl-thing\">Outsourcing<\/span> and <span id=\"urn:enhancement-4f6d91b2-39a2-3ef5-b57b-a4da28da9b44\" class=\"textannotation disambiguated wl-thing\">Hosting<\/span> have invested.<\/p>\n<p>There may be a certain cloud competence here. However, as long as Vishal Sikka with Andreas von Bechtolsheim is the <span id=\"urn:enhancement-3b87a9a9-da45-3b73-4fdb-250033834a5b\" class=\"textannotation disambiguated wl-thing\">Hana<\/span> Enterprise Cloud presents, I am very concerned about data security.<\/p>\n<p>Not everywhere where <span id=\"urn:enhancement-ffaf836d-e6e7-15db-c7d0-abf18723af7e\" class=\"textannotation disambiguated wl-thing\">Cloud computing<\/span> on it, must also be a <span id=\"urn:enhancement-0559ab2e-619c-12a8-b3f0-8b02fe8173b1\" class=\"textannotation disambiguated wl-organization\">NSA<\/span>-hacked cloud cuckoo home be present.<\/p>\n<p>My schadenfreude is only for my naive colleagues who, without any doubt, have been able to understand the entire <span id=\"urn:enhancement-be99c9cf-5712-fa0e-31b2-05df99c82203\" class=\"textannotation disambiguated wl-thing\">E-mail<\/span>-traffic have moved to the cloud.<\/p>\n<p>What happens now with the <span id=\"urn:enhancement-4985b39c-4e0f-05b9-b07f-8fe4155d105e\" class=\"textannotation disambiguated wl-thing\">CRM<\/span>-<span id=\"urn:enhancement-aa581632-6a0b-f4d8-4282-13b330f9e476\" class=\"textannotation disambiguated wl-thing\">Data<\/span> in the salesforce cloud?<\/p>\n<p>Is this <span id=\"urn:enhancement-2afda610-8bbe-2d18-ca72-18b7b5ef949a\" class=\"textannotation disambiguated wl-thing\">CRM<\/span>-<span id=\"urn:enhancement-c951abfe-b14c-c20d-d60d-9bc049d011fe\" class=\"textannotation disambiguated wl-thing\">Cloud Computing<\/span> also already from the <span id=\"urn:enhancement-9d9db871-6a96-f17e-9a98-b24c6ff43d7e\" class=\"textannotation disambiguated wl-organization\">NSA<\/span> been corrupted?<\/p>\n<p>How much ridicule did I have to endure? I was called a backward and dithering CIO just because I didn't blindly strive for cloud cuckoo land.<\/p>\n<p>But I am the <span id=\"urn:enhancement-90c6beac-ab24-6c7a-2e96-37aef09cd4f0\" class=\"textannotation disambiguated wl-thing\">Cloud Computing<\/span>-<span id=\"urn:enhancement-4948428c-c029-0f4c-4d03-17ef0cc7cf41\" class=\"textannotation disambiguated wl-thing\">Technology<\/span> in no way averse: Private <span id=\"urn:enhancement-9806ccb7-8276-0d9a-b726-7ef951a354bd\" class=\"textannotation disambiguated wl-thing\">Cloud computing<\/span> is an important and correct option for virtualization.<\/p>\n<p>And we are seriously discussing building a private Hana Enterprise Cloud for our Business Suite. I have already received corresponding signals in the direction of <span id=\"urn:enhancement-2a17ef99-d615-033b-9a9c-62ba707d1e82\" class=\"textannotation disambiguated wl-person\">Gerd Oswald<\/span> and Bernd Leukert dropped off because the concept and the technology are convincing.<\/p>\n<p>What there certainly won't be, however, is an Internet connection to my private cloud cuckoo's home for the <span id=\"urn:enhancement-d0dd523e-4e9e-5600-a244-d436dde1209a\" class=\"textannotation disambiguated wl-organization\">NSA<\/span>not even for Google.<\/p>","protected":false},"excerpt":{"rendered":"<p>Schadenfreude is not an honorable virtue. When I read the reports on Spiegel Online about the Prism spying program of the U.S. NSA (National Security Agency), I had to think of all my critics: Why doesn't this CIO dare to go into the cloud? He who laughs last laughs best.<\/p>","protected":false},"author":9,"featured_media":2461,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[12,7,1476],"tags":[39,621,124,73,222,647,59,117,119,122],"coauthors":[21816],"class_list":["post-240","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noname","category-meinung","category-mag1307","tag-cloud","tag-cloud-computing","tag-crm","tag-erp","tag-facebook","tag-google","tag-microsoft","tag-sicherheit","tag-social-media","tag-spionage","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName.jpg",1000,431,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName.jpg",400,172,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName-768x331.jpg",768,331,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName.jpg",1000,431,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName-100x43.jpg",100,43,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName-480x207.jpg",480,207,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName-640x276.jpg",640,276,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName-720x310.jpg",720,310,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName-960x414.jpg",960,414,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName.jpg",1000,431,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName.jpg",1000,431,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName.jpg",1000,431,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName.jpg",1000,431,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName.jpg",1000,431,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName.jpg",18,8,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName.jpg",1000,431,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName.jpg",1000,431,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName.jpg",1000,431,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName.jpg",600,259,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName.jpg",600,259,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2016\/11\/NoName-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Schadenfreude ist keine ehrenwerte Tugend. Als ich auf Spiegel Online die Berichte \u00fcber das Sp\u00e4hprogramm Prism der US-amerikanischen NSA (National Security Agency) las, musste ich an all meine Kritiker denken: Warum traut sich dieser CIO nicht in die Wolke? Wer zuletzt lacht, lacht am besten.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/opinion\/noname\/\" rel=\"category tag\">No\/Name-Kolumne<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/opinion\/\" rel=\"category tag\">Die Meinung der SAP-Community<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag1307\/\" rel=\"category tag\">MAG 13-07<\/a>","author_info_v2":{"name":"no-name","url":"https:\/\/e3mag.com\/en\/author\/no-name\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/240","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=240"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/240\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/2461"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=240"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=240"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=240"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=240"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}