{"id":61136,"date":"2016-02-03T12:20:29","date_gmt":"2016-02-03T11:20:29","guid":{"rendered":"http:\/\/e3mag.com\/?p=61136"},"modified":"2019-07-15T12:27:04","modified_gmt":"2019-07-15T10:27:04","slug":"high-data-protection-standards-lower-cloud-risk","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/hohe-datenschutzstandards-senken-cloud-risiken\/","title":{"rendered":"High data protection standards reduce cloud risks"},"content":{"rendered":"<p>Cloud computing is an attractive alternative to conventional on-premise operation, especially for medium-sized companies, given their generally limited financial and human resources.<\/p>\n<p>The service models available here include Software as a Service (SaaS) and Infrastructure as a Service (IaaS). Software as a Service refers to a native, multi-tenant cloud solution that a provider operates in its data center and is used by many companies simultaneously.<\/p><div id=\"great-1812620234\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6Ja0zaCg0ss\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_bdc_2026_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_bdc_2026_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>In the Infrastructure-as-a-Service (IaaS) model, the customer runs its own applications, such as ERP powered by Hana or the S\/4 suite, including all extensions and customizing settings in the data center of a cloud provider, on a virtual server running on a physical machine. The required computing power is provided dynamically and according to demand.<\/p>\n<h3>No fear of the cloud<\/h3>\n<p>Regardless of whether a medium-sized company uses cloud software or an IaaS model, it wants to be able to rely absolutely on the protection, security and integrity of its data. Experience shows that the issue of data loss is the least of the concerns of IT managers in SMEs.<\/p>\n<p>The risk of losing critical data by using a cloud solution or operating one's own IT landscape in an IaaS model is considered to be rather low. The reason is that the providers of cloud software and cloud IaaS solutions invest in state-of-the-art technologies in their data centers, which would usually be too expensive for a single medium-sized industry company.<\/p>\n<p>All critical components in the data centers, from application and database servers to storage systems, network, power supply and the productive database, are designed with redundancy.<\/p>\n<p>There is no longer a \"single point of failure\". In addition, there are usually dual data center concepts which, in conjunction with disaster recovery solutions, offer real protection against catastrophes (K-case) such as fire, earthquake or flood.<\/p>\n<h3>100 percent protection does not exist<\/h3>\n<p>When it comes to data protection, on the other hand, things look worse. In the wake of the NSA affair, midsize companies - and not only them - are asking themselves whether business-critical information, company secrets and business processes in a SaaS or IaaS environment are really safe from unauthorized access or espionage.<\/p>\n<p>In today's dynamic and sensitive business world, no company can afford for personal data, research results, important key figures or even offers and contracts to fall into the hands of the competition.<\/p>\n<p>Here, the geographical location of the cloud SaaS or cloud IaaS provider and its data centers is highly important. When deciding on a cloud partner, it is therefore essential to ensure that it operates one, ideally several, data centers in Germany and processes and stores its customers' business data and information exclusively in this country.<\/p>\n<p>Only then is it subject to the German Federal Data Protection Act (BDSG), whose regulations are particularly strict with regard to data processing and storage. The hurdles for government authorities to access this data are also extremely high in Germany.<\/p>\n<p>If the cloud partner can then demonstrate strict security standards based on certifications or quality seals such as ISO\/IEC 27001, which are regularly audited by independent experts, that's an added bonus.<\/p>\n<p>By contrast, a provider based in the U.S., for example, can be relatively easily required by the U.S. government to hand over its customers' business data and documents, citing the Patriot Act.<\/p>\n<p>For this reason, more than a third of German SMEs do not use cloud computing at all, as a recent Destatis survey shows. However, this raises the question of whether the IT department of a medium-sized company, with its limited resources, is actually better able to protect critical data in its own data center than a highly specialized SaaS or IaaS provider.<\/p>\n<p>Whatever you ultimately decide, one thing is certain: unfortunately, there is no such thing as one hundred percent protection for critical data.<\/p>","protected":false},"excerpt":{"rendered":"<p>The most important thing about cloud computing is the protection of critical corporate data. Choosing a service provider for cloud, hosting and\/or IaaS with data centers and associated infrastructure in Germany significantly reduces these security risks. <\/p>","protected":false},"author":1821,"featured_media":60767,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[4,1596],"tags":[39,321,7157],"coauthors":[33437],"class_list":["post-61136","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-management","category-1596","tag-cloud","tag-iaas","tag-software-as-a-service","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",400,155,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-768x297.jpg",768,297,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-100x39.jpg",100,39,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-480x186.jpg",480,186,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-640x248.jpg",640,248,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-720x279.jpg",720,279,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-960x372.jpg",960,372,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",18,7,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",600,232,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",600,232,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Das Wichtigste beim Cloud Computing ist der Schutz kritischer Unternehmensdaten. Die Auswahl eines Serviceanbieters f\u00fcr Cloud, Hosting und\/oder IaaS mit Rechenzentren und zugeh\u00f6riger Infrastruktur in Deutschland reduziert diese Sicherheitsrisiken deutlich. <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/management\/\" rel=\"category tag\">Business-Management<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/1602\/\" rel=\"category tag\">MAG 16-02<\/a>","author_info_v2":{"name":"Lars Janitz, Itelligence","url":"https:\/\/e3mag.com\/en\/author\/lars-janitz\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/61136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/1821"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=61136"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/61136\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/60767"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=61136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=61136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=61136"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=61136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}