Untitled Document
You are from : ( )  
Untitled Document
Untitled Document

International Journal of Information Technology & Computer Science ( IJITCS )

Abstract :

Key challenges in Business Process Outsourcing IT are the minimization of the risks of customer data loss and to provide a technical basis for a global, highly reliable, continuous and flexible BPO service delivery. In order to cope with those challenges, the IT innovation CoE of Capgemini BPO has developed the novel “Model Delivery Center” (MDC) thin client concept and already successfully rolled it out as a new IT standard to a significant part of its employees in BPO service delivery globally (China, India, Europe and Latin America). The MDC thin client concept is a “hybrid” thin client approach (meaning application functionality from various sources can be consolidated on a single use desktop) which allows that data of the various stakeholders (Capgemini BPO as a service provider, customers etc) stay completely separated. Data especially from Capgemini BPO’s customers in never persistently stored on Capgemini BPO end user IT equipment, minimizing the risk for data loss. The concept meets the ISO 27001 Information Security Management System requirements. From the technology perspective, combines cost efficient “commercial off the shelf” (COTS ) hardware, open source software for the lightweight software load, SaaS for the Capgemini internal application functionality and state of the art remote application access technologies for the applications of Capgemini BPO’s customers. The concept also helps to reduce the complexity of Capgemini IT architecture by globally centralizing security monitoring and alerting; reducing effort on IT audits by standardizing set up in all delivery locations; Improved  IT recovery time objective in a disaster recovery situation by no local data; and able to continue service delivery from alternative locations for BCP purpose. This article focuses on the aspect security of the MDC thin client concept.

Keywords :

: Security; Hybrid; Thin Client Concept; Google Apps; Cloud

References :

  1. Karen Scarfone, Murugiah Souppaya, Paul Hoffma, "Guide to Security for Full Virtualization Technologies", 2011
  2. Michael Armbrust: “A view of cloud computing” Magazine, Communications of the ACM CACM Homepage archive Volume 53 Issue 4, April 2010 Pages 50-58
  3. M. Kaufman,"Data Security in the World of Cloud Computing"Journal, IEEE Security and Privacy archive, Volume 7 Issue 4, July 2009
  4. Jack Halprin, “Google Apps Vault Brings Information Governance to Google Apps”  MARCH 28, 2012 http://googleenterprise.blogspot.com/2012/03/google-apps-vault-brings-information.html
  5. https://support.google.com
  6. Linux, the Ultimate Unix, JuergenHaas, http://linux.about.com/cs/linux101/a/linux.htm
  7. http://en.wikipedia.org/wiki/Cloud_computing_security

Untitled Document
Untitled Document
  Copyright © 2013 IJITCS.  All rights reserved. IISRC® is a registered trademark of IJITCS Properties.