<img src="https://d5nxst8fruw4z.cloudfront.net/atrk.gif?account=53pUm1a4KM+2vg" style="display:none" height="1" width="1" alt="" />
TRG in the Board Room Blog

How financial data is protected on Sunsystems Cloud

Posted by Quoc Nguyen on

Financial Data must be protected from unauthorised access to safeguard the privacy and cyber security of an individual or organisation. Therefore, this is one of the biggest concern of companies wanting to protect their financial information. For businesses who are using SunSystems Cloud, TRG has already provided the optimal solutions in order to keep financial data safe from theft or data leakage. So what are those solutions that TRG has deployed?

Firstly, TRG applies AWS (Amazon Web Services) Cloud Security for the highest priority. AWS is a secure cloud services platform, database storage, content delivery and other functionality to help businesses scale and grow. Basically, AWS uses many layered controls, continuous validation and testing to ensure that the fundamental infrastructure is monitored and protected 24/7. Besides, AWS also makes sure that these controls are updated to every new data centre and service. Additionally, AWS operates under a shared security responsibility model, where AWS is responsible for the security of the based cloud infrastructure and users are responsible for securing workloads deploying in AWS (see Figure 1). This model gives users the flexibility they need to implement the most applicable security controls for business functions, especially SunSystems Cloud. Consequently, it allows users to create private networks and prevent unexpected network access.

 Security-chart.png

Figure 1: AWS Shared Security Responsibility Model

Another security layer that SunSystems Cloud uses is the Qualys Vulnerability Management (VM). Qualys VM is a cloud-based service that provides the protection to IT systems which might be vulnerable to latest Internet threats and unpredicted changes in the network. For example, Qualys VM has the ability to create an interactive network map that shows perimeter and internal devices. As a result, an administrator can generate a map that displays domains, hosts, connected endpoints, routers and other networking devices. Furthermore, clicking a host in the map indicates details about that host, such as operating systems, date of last scan and ports in use. Consequently, the administrator of SunSystems Cloud will rely on the continually updated database of vulnerability signatures in order to minimise the security risks.

In conclusion, all information of SunSystems Cloud is protected by two excellent security programs which are Amazon Web Services and Qualys Vulnerability Management. Besides, SunSystems Cloud is always improved and developed in order to provide the best solutions to businesses.

Download  Infor SunSystems VAS Edition Brochure

Topics: Financial Accounting Management Software, Infor SunSystems, Financial management solutions

Subscribe to TRG Blog

Follow Us

Subscribe to TRG Blog

Our Editorial Mission

rick yvanovich resized 174

 Rick Yvanovich
 /Founder & CEO/

With TRG International Blogs, it is our mission to be your preferred partner providing solutions that work and we will make sure to guide your business to greatness every day.

Upcoming Events

Posts by Topic

see all