A blog by Oleg Shilovitsky
Information & Comments about Engineering and Manufacturing Software

Cloud PLM and “Good Enough” Security

Cloud PLM and “Good Enough” Security
Oleg
Oleg
9 July, 2012 | 2 min for reading

When it comes to “cloud PLM”, the discussion about “security” is almost inevitable. This is one of the top concerns of people and, at the same way, top argument of IT and other people arguing against use of public (and other variations of) cloud PLM systems. I’m reading about security topic and the cloud in many blogs these days. The topic comes in different variations and aspects. Few days ago, I came across the article in ReadWriteWeb Enterprise blog – Why “Good Enough” Security Really Is Good Enough for Most Companies. Spend some time and have a read. This article resonated with some of my comments I’ve made previously about cloud, PLM and security. At the end it comes to the risk. The following passage I especially liked:

It may sound cynical, but avoiding legal liability for security negligence is an excellent goal. Not only does it protect your business, but it generally requires your organization to take advantage of the best practices and policies that are widely agreed upon. Security quality standards and independent auditors are the best protection against being found negligent, and they put businesses at the same starting line as everyone else.

Another thing about security rules I see as a very important is related to how organization can make security rules reasonable. Here is the situation I’ve seen many times. A company made very strict rules on how to share documents outside of organization with a portal and set of very complicated rules. At the same time, you can see how people are sharing files using Gmail and Google Drive / Docs. Another passage from ReadWriteWeb speaks exactly about that:

Make realistic rules. If you’re not realistic, employees will tune you out. If you say “don’t ever do X,” but someone turns out to have a good reason to do X, they will take the rules less seriously. It’s far better to explain why an employee shouldn’t do X, list some alternatives, and give mitigating advice for the times when X is unavoidable. For example, when extremely complex password requirements result in passwords no one can memorize, they end up on post-its near the desk. Such a complex password policy should be accompanied by advice on how to manage an unmemorable password. (For example, “Keep it in your wallet, not on the wall.”)

So, what is my conclusion? To set up realistic rules and goal for “good enough” is a way to go. I can see companies that will keep their gates closed. However, low cost barrier and good compromise will drive many companies to adopt cloud PLM sooner than later. Just my thoughts.

Best, Oleg

Recent Posts

Also on BeyondPLM

4 6
21 September, 2009

As it looks like, the first public results about CAD applications running from cloud are coming from Autodesk. My attention...

12 June, 2009

 It’s impossible to speak about collaboration these days, in my opinion,  without touching Google Wave. I analyzed multiple presentations, demos,...

27 October, 2023

In the fast moving world of manufacturing, to have company to perform to achieve a certain level of efficiency, to...

4 November, 2015

Part numbers. This is probably one of the most discussed topic in manufacturing and related software domains. How to define...

11 April, 2013

For many years, enterprise software was known as a place where development of new features was one of the main...

11 May, 2017

Manufacturing innovation blog article – Challenge Forecasting for Very Small Manufacturers brings an interesting perspective on challenges for very small manufacturing...

1 June, 2016

I remember first time I was introduced to AutoLISP. It was many years ago, but I can still recall how...

9 May, 2026

A recent analysis about enterprise UX from Technology Evaluation Centers made a striking observation: AI agents are fundamentally reshaping enterprise...

30 January, 2021

Standards are super important. They provide us a basis for mutual understanding and used in products and technologies to support...

Blogroll

To the top