Better QuickBooks Hosting: Noobeh Cloud Solutions on Azure Help Businesses Avoid Data Loss, Improve Application Performance and Implement QuickBooks Integrations

They said back in 1999 that the desktop was dead, but desktop software is far from gone. In fact, application hosting services for products like QuickBooks desktop editions just keeps growing in popularity because it delivers the access, mobility and managed services businesses need.

Service providers have been hosting QuickBooks for years, and I’ve been right there all the way, ever since the model was originally developed. In fact, the company I worked with is still selling that original service model today while many other providers have come along to follow it and take advantage of the opportunity.

Using the cloud to support accounting and other business processes makes a lot of sense, and the best part is that it doesn’t require businesses adopt the online versions of the software that just doesn’t work as well. I have a background in accounting so I understand the issues of working remotely with clients, when the business is done in one place but the accounting is done in another. And I love the technology and finding ways to make it easier and more efficient to get small business accounting done.

The benefits of using hosted QuickBooks services are many.

Anytime/anywhere access and fully-managed service are among the most obvious benefits for QuickBooks desktop users, but the advantages of centralized information and applications, secure support for mobile and remote workers, and real-time integrations and analytics capabilities can be transformational for the entire business.  Having the means to affordably extend applications to the entire workforce and keep everyone working with the same data in real time can become the foundation for improved processes, greater efficiency and better business performance.

Among the key benefits of the application hosting model is the fact that businesses are not forced to adopt software subscription services or invest their data in web applications that do not provide the functionality or features required. Even more, the business can elect to move their hosted system back to in-house computers, because the hosting is simply an alternative platform for running the software the business owns. You can take your ball and go home if you don’t want to stay.

With all the benefits of hosting QuickBooks, there are also risks involved, especially when working with shared hosting platforms.

Shared hosting platforms are architectures where the service provider spreads the cost of their infrastructure across many customers to help keep the costs down. Using conventional technologies to create divisions between customers on servers, networks and so on, services providers can deliver at a lower cost when they are able to generate revenue from lots of customers for the same pieces of equipment. As more customers are added, more servers are joined into the network. After a while, there are many servers handling the customer load.

Unfortunately, the greater the number of servers, the more complicated and costly it becomes to update the platform. This is among the reasons why many service providers have aged platforms, with server operating systems that are going out of support and offering only legacy desktop views. In addition to compatibility and modernization, a big problem with allowing the platform to age is that it becomes less secure and more difficult to keep protected.

Protecting against disaster is not the same as doing backups.

Many hosted QuickBooks customers have been faced with the ugly reality that their service provider backups are not enough to recover from disaster. This is largely the fault of the providers and is somewhat by design.  Businesses hosting their financial and other business applications and data want to know that their information is safe and secure. Performing data backups is part of the promise of protecting customer data, so most customers believe that their service provider is backing up in a way that ensures the data can be recovered.

What most hosting customers don’t understand is that the provider backups are there to help the provider recover from disaster and not necessarily to get the customer back where they were.

Hosting companies know that they need to do backups so they can support customers when files get deleted or become corrupted. Hosting companies typically do regular backups of customer data, but they do not necessarily retain individual backup data sets and they often backup all customer data together. This means that the backup data is constantly being updated, and that fully restoring the data of just one customer may be problematic. Service provider backups are there to support the continued operations of the service provider and may not provide the level of archive or retention needed by the customer. Just to make sure their data is safe and recoverable, I strongly recommend that clients keep any hosted data archived in at least one other location off the host’s platform.

In just the past year, outages caused by malware have been experienced by service providers Cetrom, Skyline, Cloud9 and Insynq, demonstrating just how devastating an outage can be when the service provider doesn’t have adequate protections in place.

In many cases customers lost data because the service provider wasn’t able to recover it from compromised or nonexistent backups. Suggesting that customers should have their data backed up locally is never part of the marketing or onboarding with the QuickBooks host, but it is often the fallback position in times of trouble.

Perhaps the most troubling aspects of these provider failures are that many of the problems stem from the shared nature of the platform.

When we first started building QuickBooks hosting services the hardware and software to make it work was terribly expensive. To approach some level of affordability, a shared platform approach was developed. This allowed the service to scale while offering a lower cost of service to customers. When the services were initially developed, there was concern about protecting from viruses and Trojans, but the nature of malware in the wild was not nearly as troublesome as it has become. Things were manageable.

But technology has evolved and so have the threats and bad actors.

The smarter bad guys should be forcing platform providers to reconsider their shared management and delivery models.

Affordable computing resources are available from platforms like Microsoft Azure and Amazon AWS, offering small businesses the opportunity to have not only powerful and scalable platforms for their business IT, but also offering a means of operating privately. Not being forced to operate in the same network or on the same VMs as other companies means not having to worry about the behavior of other people or applications in your business network. It also means that the focus is on recovering your system if disaster strikes, not on recovering the systems of hundreds or thousands of other businesses at the same time.

Considering the move to a more private cloud hosting solution is an important way to reduce risk and improve IT performance for the business.

When they were in-house, the networks were private and no other businesses were sharing the servers. Moving to the cloud should not radically change that profile, and should offer customers the same privacy from outsiders and the same flexibility to implement whatever applications the business needs.

The Microsoft Azure platform provides this capability and businesses can benefit without compromising the budget. With private accounts on the Microsoft Azure platform, our customers are able to take advantage of the current and emerging technologies while safely and affordably supporting their business requirements, which is something the shared platforms fail to offer.

Make Sense?

J

Security and Users: Change is the Only Constant

Security and Users: Change is the Only Constant

Managing user accounts and access to business IT assets is challenging, particularly as cloud and social computing models introduce new wrinkles in security and identity management. Information has become “mobile” along with the users accessing it, yet management of user behavior is even more complicated that trying to manage a digital resource.

If you look at the history of security breaches, you’ll find that many of them started with a user making a mistake – like losing a laptop or clicking on a phishing email, downloading bad software, or forgetting to report an employee termination to the IT dept – something which inadvertently created a vulnerability that could be exploited.  It’s tough to stop breaches because there are so many possible ways for them to happen.

If most security breaches start with a user mistake, then IT departments have their hands full because users aren’t static, unchanging objects to monitor and manage.  Users change, sometimes a lot.  It is this constant change which undermines the ability for some IT departments to meet the demand to adequately secure company information systems and data. Now is the time to take control of user security and identity management, creating automation and controls to protect business assets in a constantly evolving environment.

It is not simply employee turnover that challenges security management.  Certainly, IT departments have been dealing with user account creation and termination for a long time.  And sure, users have sometimes been promoted and demoted, resulting in the requirement for IT to increase or perhaps decrease access to information and applications.  These are normal and expected activities for a business IT department.  Unfortunately, IT often doesn’t hear about the user’s change in status.  An account isn’t disabled, access isn’t restricted, and the system is left vulnerable.

Just to pile on, think about what happens when a user is more than just a single system user.  It may be manageable when where a single identity and set of credentials governs their access to applications and information.  But the proliferation of web-based services and SaaS solutions has made it commonplace for users to have multiple applications and services available to them, each with their own approaches to identity management.

For even a small business IT department, the security of all of these access points and applications must be managed and monitored – no small task when the department may not even be aware that the solution is in use.  It is not unusual for file sharing, data sync, or other applications to be implemented in businesses without the knowledge or participation of the IT department.  Actually, many services attract users due to their simplicity and ease of use, leveraging the fact that they can be deployed without the “assistance” of IT.

Users are becoming increasingly mobile, accessing information and applications from public and private locations while using any number of possible mobile devices.  Vulnerabilities which may exist in public networks and the increased potential for device loss or theft are high on the list of concerns of IT departments managing remote and mobile user access.  Mobility is driving many changes in how information technology and access to systems is provided to users, and it is changing user demands for what they should be able to easily accomplish while being mobile.

Businesses need to recognize that their continued existence may rely on keeping their information systems and assets safe and secure.  Disaster recovery and business continuity applies not only to loss of physical systems, but also to losses of various forms due to data breach. The disaster recovery and continuity plan (you have one, right?) should not only address situations after they happen; planning by definition is proactive.  It is not enough to have a plan to recover from loss or failure; the business must actively engage in activities which will prevent loss and reduce vulnerability. 

Part of this plan necessarily centers on managing users and user identities, ensuring that the company knows about all access or user accounts involved and employs strict processes and guidelines for making sure they are constantly up to date and have the authority to do what they’re trying to do.  In short, the plan must also be a plan for change, providing change management processes to guide the business as the evolution of information technology and the dynamics of user interaction continue to change.

jmbunnyfeetMake Sense?

J

read more about IT Security and Engaging users to reduce vulnerability

read more about Mobility and the Cloud, Managing BYOD and securing company resources

Is it Cloud or is it Desktop?

Is it Cloud or is it Desktop?

There are a few realities that users of purely SaaS-based solutions are finding, and among them is that most web-based applications don’t readily integrate with the desktop – and the desktop is still where a lot of the real work gets done.  Yes, users are increasingly mobile and are using smartphones and tablets to create and access information via mobile applications and services, yet the PC desktop – whether it’s an actual desktop computer, laptop or full-featured tablet – remains as the workhorse for business.  Even the most popular SaaS applications continue to rely upon the desktop and locally installed applications to get some of the work done (note that many Salesforce.com users still find Excel to be their most effective reporting tool).  In an effort to deliver mobility for those applications traditionally tied to the desktop, software developers have adopted two main approaches: redevelop the application for the web (which usually means bringing functionality down to a lowest-common-denominator approach), or applying a traditional terminal server or virtualized application approach and calling it “cloud”.

desktop-apps

Neither option is awesome for the software maker – the time and cost of development certainly isn’t low, and the realities of hosting conventional desktop or LAN-based applications in shared infrastructure are pretty ugly at best.  What these software makers need is a way to allow businesses to continue to use their software for the desktop and LAN, enabling the user with software license use rights to access that software product and associated data on any of their “desktops”, regardless of where that desktop might be (or what device it is running on).  The model is cloud, but then it’s a desktop model too.

Independent software vendors are more frequently turning to platform providers (PaaS) to help deliver whatever “cloud” approach the company elects, and these ISVs are also feeling the bite of outsourced service fees and growing costs of delivery.  It is not just the direct customer questioning the cost of deploying resources in the cloud – software providers are questioning these costs, too, especially as they attempt to deliver resource-intensive solutions from hosted infrastructure that bills them based on resource utilization.  MyQuickCloud is proving that ISVs and their customers no longer have to bear large infrastructure costs in order to deliver complete user mobility. MyQuickCloud supports IaaS providers and their partner networks, allowing infrastructure-as-a-service offerings to include a simple and fast way to immediately make that infrastructure useful for desktop and application delivery.

The information technology industry has seen a lot of disruption in recent years, with complexity and risk in systems rising as users demand more functional mobile capability and software developers struggle to protect and preserve their assets (users included).  MyQuickCloud jumps right into the middle of it, delivering solutions for business customers, software developers and cloud providers alike, and answering the question of whether it’s cloud or desktop.  The answer is “yes”.

jmbunnyfeetMake Sense?

J

New York or Las Vegas? It doesn’t matter if you can work online.

New York or Las Vegas?  It doesn’t matter if you can work online.

Skyline
Skyline

The 10th annual Accounting Solutions Conference, held by The Sleeter Group, is being held in Las Vegas on November 3-6.  By all accounts, it’s looking like the conference will again bring together some of the best and brightest in accounting and business technologies.

The annual “Sleeter Conference” event is among the best opportunities accounting and bookkeeping professionals have to explore and learn about the technologies, service models, client management tools and other elements involved in delivering accounting, bookkeeping and consulting services to small business clients.  With the introduction of so many new ideas and solutions designed for small businesses and their accountants, it is no wonder that professionals look to this conference to help make sense of it all.

With the right strategy and through the innovative and efficient use of technology, people and processes, even the smallest of organizations can compete with the big boys.  Accounting professionals, pro bookkeepers, and small business consultants and advisors are not simply participants in the financial processes of these small organizations – they are the influencers and implementors of the solutions and methodologies which will generate the positive impact in the client business.  Information technology -mobile access solutions and innovative tools for working together – makes it possible to deliver these benefits to clients, whether they’re in Vegas or the Big Apple.  Come to the conference and hear all about it.

While you’re there, stop by the Uni-Data Skyline Cloud Services booth and check out some of the new stuff that’s going on in the QuickBooks and general application hosting world.  It’s pretty cool!  I give it 5 bunnies.

J