What is the most common security threat?

The process to secure a cloud environment is different from more traditional data center practices, so cloud adoption requires a learning curve for IT teams. Unauthorized access to resources is the most common cloud security threat; many high-profile exposures of sensitive data resulted from misconfigurations.

Is the cloud secure?

The cloud is generally more secure than most private data centers since Amazon and Microsoft can hire talented engineers and automate many of their practices. Cloud infrastructure providers also offer tools and architectural options to isolate workloads, encrypt data and detect potential threats.

What level of administration capabilities do we get post deployment when we move to cloud? We want to keep the user and content management with us. What about upgrades, is it turn-key upgrade or do we have to involve in the upgrade process?

At ROK we take a different approach to Managed Services. Our clients have complete access to all of their Esri Software and data giving them (and you) complete control over content. When it comes time to upgrade, the ROK team can take that entirely off your plate. Simply call our team and request a move […]

How long is the outage and what will be down during that time?

Budget 4 hours of downtime for the Portal upgrade. During that time none of the elements of the ArcGIS Enterprise environment will be accessible. This includes the Portal, GIS Server(s), and Data Store(s). If you have a VDI solution and an SDE server you can still make a direct connection to your Enterprise Geodatabase if […]