Instead of buying licenses to run software on their own computers, a growing number of businesses are "renting" software hosted by application service providers (ASPs). That means the business is running on systems managed by a third party and accessed over a VPN or over the Internet. The upside: a generally accepted lower cost of ownership. Pay for what you need, when you need it, and let the ASP worry about pesky issues such as software upgrades. The downside? Potential security holes. Are the external servers and network links as secure as your own systems? If you are outsourcing an application that trucks in sensitive data, credit card numbers or consumer credit histories, say, that's a most critical question.
According to Mike Arnavutian, head of security strategy at BT Global Services (an arm of the company formerly known as British Telecom), any ASP his company would consider needs to meet some basic security standards: secure firewalls, authentication systems, antivirus software and a secure architecture. Physical aspects of security, such as a robust and well-practiced disaster plan, are also important, he adds. But it's the policies underpinning those security issues that are the most important and most overlooked potential security loopholes, Arnavutian says.
"Most ASPs are weakest on the development and maintenance of security policies," he says. But he doesn't blame the ASPs so much as the companies that use them. "A lot of the time, companies are being sold what they ask for, and if they don't ask about security policies, then they aren't going to be sold them," says Arnavutian. "If you don't have a security policy, you have no rules and procedures by which you can shape the behavior of people and control access to the network."
Typical of the details that probing an ASP about its security policies should reveal, he says, are such things as employee background checks. "It's not just asking, Are they carried out? but instead asking, What checks are carried out on the people who might have access to my data?" he says. BT, Arnavutian points out, must carry out positive security background investigations on all employees with access rights who work in data centers handling government projects. But the private sector doesn't automatically benefit from such checks: "We don't have the same level of vetting for all our data centers," he notes.
These days, throughout the world of business, managers in functions as diverse as accounting, human resources and marketing are seeing ways to boost their departments' productivity
Saunders reviewed the market and quickly identified a potential solution. Parent company The Hearst Corp. of New York City
Security, though, was a major concern. As a matter of policy, Saunders explains, Hearst generally tries to limit the extent of external access to its systems. For example, he says, the London subsidiary "has only one modem on the network
Recognizing that crucial point, Saunders called in the experts from Hearst and National Magazine's own IT departments. "I was asking basic questions about firewalls but wasn't technically qualified to understand the answers that I was getting," he recalls.
The success of the Concur implementation
And from the security perspective, it was this issue of Internet access that had been the major concern, he explains: Concur's facilities and own security practices came in for rather less scrutiny. "We didn't go in and do an assessment," says Tunley. "We were satisfied with their explanation of how secure their system was, which appeared to us to be as secure as you could make it."
For its part, Concur has become accustomed to helping its potential customers appraise its security. But the nature of that help isn't what might be imagined. "Often, customers don't actually know what questions to ask us," says Senior Director of Product Marketing Chris Juneau. "Their level of security awareness is enormously varied." There's a distinct difference between the larger and more sophisticated customers that opt to license Concur's product, and the smaller organizations that choose to go the ASP route. The smaller ones, Juneau observes, "tend to ask simplistic questions and are often fairly quickly satisfied with the answers they get."
Evidently proud of Concur's multilevel security systems and dedicated ISO 17799 infosec team, which helps protect the expense management data of more than a thousand corporate customers, Juneau wryly observes that in the past year, no U.S.-based customer of the company's hosted applications has asked to visit and audit the third-party facility in which Concur's servers sit in secure cages. And the London building owned and managed by Cable and Wireless in which the server hosting National Magazine's application resides, he adds, have been visited just once. Indeed, just 10 percent of Concur's British ASP customers even bother to visit the company's Old Amersham European headquarters, where servers that host their applications are housed in a secure room to which only three staff members have access.
A massive blind spot
But the trouble is, he adds, "many ASPs have a cookie-cutter approach to security." Ask about security, in other words, and you'll generally hear a standard recitation of firewalls, intrusion detection, antivirus and user-authentication capabilities.
"All these things are important, but they are only a part of the overall security picture," says Greg Gianforte, CEO of RightNow Technologies, an ASP that hosts customer service and support applications for more than a thousand companies worldwide. "It's the questions that don't come up that can often matter more," asserts Gianforte, who has actually created a list of precisely those questions (see "What to Ask an ASP," this page). Take, for example, the internal network inside a firewall. Especially with the new breed of ASPs offering a Net-native, multitenant architecture, it's important to explore the mechanisms through which different customers' data held on the same server is kept separate. "You can have literally hundreds of customers on the same box, and you need to be sure that your data isn't going to show up on someone else's website."
Another often overlooked area of potential weakness, Gianforte believes, is when companies use applications that in effect link several ASPs together over supposedly secure SSL connections
Send an e-mail or a Web inquiry to British Airways, says Gianforte, and there's a fairly good chance that the application the agent uses to respond is hosted by RightNow Technologies. But not all the data the agent needs is stored at RightNow: Some may have come directly from the airline's own servers, and some could have come from accounting applications running on another ASP. The bottom line: The more ASP-connected applications there are, the greater the potential for a weak link in the communications chain.
Finally, says Gianforte, blind spots over policy issues are common. "People typically don't ask questions about policy issues
Even employee background checks aren't as meaningful as might be imagined. They might provide potential customers with a "feel good" factor, certainly, but the fact remains that someone with a clean past isn't necessarily guaranteed to have a clean future. As at least one anonymous ASP provider concedes, he's not even certain exactly what a "social security check" comprises, even though his company proudly boasts to customers that every job applicant must pass it.
So while not protecting against every eventuality, one solution is to at least encrypt data so that malign individuals within an ASP
"Over time you wind up with an enormous number of one-off security solutions, each of which is evolving dynamically as the nature of the business relationship between the two parties itself evolves," he says. "How do you ensure that each of these relationships is operating securely
The solution, he believes, is to assess the security requirements of each ASP relationship at the outset and force it into one of a handful of standard approaches. An ASP handling event registration for an employee conference, for example, would be put under a less strict security regime than an ASP that handles sensitive customer information. "You're driving the cost down while increasing the security