What is the most common security threat?
The process to secure a cloud environment is different from more traditional data center practices, so cloud adoption requires a learning curve for IT teams. Unauthorized access to resources is the most common cloud security threat; many high-profile exposures of sensitive data resulted from misconfigurations.
Is the cloud secure?
The cloud is generally more secure than most private data centers since Amazon and Microsoft can hire talented engineers and automate many of their practices. Cloud infrastructure providers also offer tools and architectural options to isolate workloads, encrypt data and detect potential threats.
I have a data source I’d prefer to keep on-premise. Is this okay not to move to the cloud?
It is your data to do with as you need, but be able to answer the question “why?” Why would you want to maintain a workload on-premise when you can move it into the cloud? There, keeping the lights on is managed for you instead of having to maintain it yourself separately.
How do you routinely resolve conflicts where multiple sources exist for a data element, ie town GIS public system vs. our engineers?
This is an interesting problem, essentially the approach to take in this situation is to choose which data is the authority and leverage that data source over the other – in this situation if I knew good data was getting replaced with bad data by users, the first approach I would take is user access […]
We have a requirement to maintain a specific security certification, is ROK able to accommodate? (FedRAMP, PCI, HIPPA, etc.)
ROK approaches this problem in a way that respects our client’s budget. Oftentimes these security certifications require costly annual audits, documentation, etc. To help our clients avoid paying for this process twice (once for their environment that exists already, and one for the ROK environment), ROK provides services where we are able to be on-boarded […]
Are your systems running as software-as-a-service such as AGOL or are they cloud deployments of regular software (e.g. ArcGIS Enterprise on cloud VMs)?
Our clients are made up of organizations that use ArcGIS Enterprise and those that use both ArcGIS Online and Enterprise as well as a variety of third-party applications.
What level of administration capabilities do we get post deployment when we move to cloud? We want to keep the user and content management with us. What about upgrades, is it turn-key upgrade or do we have to involve in the upgrade process?
At ROK we take a different approach to Managed Services. Our clients have complete access to all of their Esri Software and data giving them (and you) complete control over content. When it comes time to upgrade, the ROK team can take that entirely off your plate. Simply call our team and request a move […]
What does the performance of cloud-based computing and data storage solutions look like compared to local LAN-based solutions?
It is comparable, and in many cases can surpass traditional solutions in terms of performance. One of the finer points of using cloud based solutions is the ease of scalability. The performance can scale dynamically with your workload, unlike traditional on premise solutions
How long is the outage and what will be down during that time?
Budget 4 hours of downtime for the Portal upgrade. During that time none of the elements of the ArcGIS Enterprise environment will be accessible. This includes the Portal, GIS Server(s), and Data Store(s). If you have a VDI solution and an SDE server you can still make a direct connection to your Enterprise Geodatabase if […]
Will links to applications or services change as a result of the upgrade?
No. The only change may be the path to the Python installation directory on the GIS Server. This may cause an issue if you have Python scripts that reference that path.