Lost in a Cloud?

Supply chain managers may also be asking whether building private clouds creates a single point of vulnerability by aggregating many different types of sensitive data onto a single platform

Subscriber: Log Out

While the use of highly scaled, shared, and automated IT platforms—known as cloud computing—is growing rapidly, the advance is technology is not without its skeptics.

Indeed, a recent report issued by McKinsey & Company maintains that many shippers are asking whether external providers can protect sensitive data and also ensure compliance with regulations about where certain data can be stored and who can access the data.

Supply chain managers may also be asking whether building private clouds creates a single point of vulnerability by aggregating many different types of sensitive data onto a single platform, stated the report.

Titled, “With All Its Benefits, Cloud Computing Does Not Come Without Risks,” McKinsey researchers note that blanket refusals to make use of private- or public-cloud capabilities leave too much value on the table from savings and improved flexibility:

Adopters are driven by the prospects of increasing agility and gaining access to more computing resources for less money. Large institutions are building and managing private-cloud environments internally (and, in some cases, procuring access to external public clouds) for basic infrastructure services, development platforms, and whole applications. Smaller businesses are primarily buying public-cloud offerings, as they generally lack the scale to set up their own clouds.

But as attractive as cloud environments can be, they also come with new types of risks.

McKinsey says executives should be asking whether external providers can protect sensitive data and also ensure compliance with regulations about where certain data can be stored and who can access the data.

Supply chain managers seem to agree that large institutions – which have many types of sensitive information to protect and many cloud solutions to choose from – must balance potential benefits against risks of breaches of data confidentiality, identity and access integrity, and system availability.

SC
MR

Latest Resources
The Ultimate WMS Checklist: Find the Perfect Fit
Avoid costly mistakes by choosing the perfect WMS for your company with our comprehensive buyer's guide. Get your checklist now!
Download

About the Author

Patrick Burnson, Executive Editor
Patrick Burnson

Patrick is a widely-published writer and editor specializing in international trade, global logistics, and supply chain management. He is based in San Francisco, where he provides a Pacific Rim perspective on industry trends and forecasts. He may be reached at his downtown office: [email protected].

View Patrick 's author profile.

Subscribe

Supply Chain Management Review delivers the best industry content.
Subscribe today and get full access to all of Supply Chain Management Review’s exclusive content, email newsletters, premium resources and in-depth, comprehensive feature articles written by the industry's top experts on the subjects that matter most to supply chain professionals.
×

Search

Search

Sourcing & Procurement

Inventory Management Risk Management Global Trade Ports & Shipping

Business Management

Supply Chain TMS WMS 3PL Government & Regulation Sustainability Finance

Software & Technology

Artificial Intelligence Automation Cloud IoT Robotics Software

The Academy

Executive Education Associations Institutions Universities & Colleges

Resources

Podcasts Webcasts Companies Visionaries White Papers Special Reports Premiums Magazine Archive

Subscribe

SCMR Magazine Newsletters Magazine Archives Customer Service