Hosted CRM software allows companies with even small IT budgets to run modern, sophisticated customer-analysis applications on a pay-as-you-go basis with only a minimal up-front investment. But despite hosted CRM's benefits, one important question remains: Is vital business data safe in the hands of an external service provider?
Business confidence in hosted CRM technology wasn't exactly enhanced in December 2005, when Salesforce.com suffered a several-hour long service outage. The company has reportedly suffered several minor outages since then, as have some other providers, but there's never been a report of any hosted CRM vendor ever losing client data either through an accident or a hacker attack. In fact, hosted CRM vendors do a far better job of safeguarding information than most enterprises, said Rebecca Wettemann, vice president of research for Wellesley, Mass.-based Nucleus Research Inc. "It's in their interest ensure that client information is secure," she said.
Hosted CRM providers take advantage of an array of data-security technologies and policies — often more extensive and powerful than the tools a typical business would use to safeguard its on-site information. The security technologies typically used by hosted CRM providers include data encryption, user authentication, perimeter defense, operating system safeguards, and storm- and attack-hardened datacenters.
Still, a business shouldn't simply assume that its hosted CRM provider is using adequate data-security measures. When sizing up a potential service provider, be sure to get answers to the following questions:
While useful, analyzing service providers' security practices is only half of the job. It's also important to remember that most data security breaches originate from inside a business. This is why, before or after questioning providers on their security practices, you'll also want to take a long, hard look at your own enterprise's security arrangements. These are the questions that need to be answered:
It's a good idea to investigate the security practices of any hosted CRM applications provider your organization uses or plans to use. But it's an even better idea to look into your own business's CRM data security environment to spot any potential weak points on your end.
Any operational business model relies heavily on IT support and the help desk to achieve maximum uptime for all IT systems. This white paper addresses ways for help desk analysts and IT support staff to easily and efficiently handle their workload by simplifying and automating processes to increase time and operational cost savings, enhance productivity, and boost customer satisfaction. more