In the age of “the cloud,” having a thoroughly secure framework for client data is a necessity. In fact, we here at ClickUp believe having a cloud-based application which our clients can trust and rely on is an essential part of running a successful technology company. We here at ClickUp have dotted our I’s and crossed our T’s to be sure that our client’s data is secure in the cloud.
You can also learn the cloud framework through Azure for testing and running the software solutions with completing the Azure training.
What is a cloud-based computing?
Cloud-based computing is any computer program or service that is run through the cloud, meaning the process of data storage is not hosted on site but rather outsourced to a third party storage provider. All applications and platforms hosted in the cloud can be accessed via a web browser and only requires an internet connection.
Examples of Cloud-based Computing
Software as a Service (SaaS)
Software as a service is simply any software application which is provided through the cloud with a subscription-based pricing model. ClickUp is the perfect example of a SaaS product since our software is licensed as a subscription monthly and annually while being hosted remotely via the cloud!
Platform as a Service (PaaS)
Platform as a service refers to frameworks and tools used by developers to create applications. Examples include programming language execution environments and the frameworks for developers to create applications. An example of a PaaS product is Window’s Azure, which provides a framework for running, testing and storing software applications.
Infrastructure as a Service (IaaS)
Infrastructure as a service generally refers to the preconfigured and virtualized hardware but can also refer to on-premise data and storage centers with actual hardware. A fantastic example of this is Amazon Web Services which provides on-demand cloud computing platforms to other software companies.
Advantages of Cloud-based Computing
The advantage of having a cloud-based app is the ability it gives a company to offload the resource-intensive process of maintaining an on-premise data center. So instead of sacrificing the valuable resources required to host data locally, resources are focused on making a cloud-based app the best it can be!
Additionally, whenever there are security or software updates, it can be done instantly by the company that maintains the software, making life so much easier for the end user since they don’t have to manage every little intricate part of their application. With cloud-based computing, you can scale up or down instantaneously with no limits.
Another fantastic advantage of cloud computing is that it allows your company to work from anywhere, as long as there is an internet connection. Since all cloud Computing is done online, there are no logistical restrictions on where and when someone can work. This allows companies to source the best talent available regardless of geography while also giving employees flexibility, leading to more productively overall!
Lastly, it allows for much easier collaboration within a company. Since documents can be updated in real time, there is no worry about an overload of drafts with conflicting content and titles. Now it is simple to just collaborate on a document together and have automatic updates whenever a change is made. Also, since files can be stored in the cloud, they can also be accessed from everywhere by anyone in your team, allowing for a much simpler process of collaboration.
How ClickUp ensures complete cloud computing security
Due to the fact that cloud computing necessitates having data stored online, it can face unique security risks which would not typically be a concern for locally stored software. As a result, cloud-based computing requires a thorough process for ensuring privacy and security. A process that should include a repudiable host, backups, multiple backup options as well as thorough testing of all security provisions.
ClickUp is completely hosted on Amazon Web Services. They feature the best end to end security and privacy features. In addition, the ClickUp team takes extra proactive measures to ensure that we are operating within a secure infrastructure environment. Since ClickUp is hosted entirely on AWS, we always have access to the many secure servers across the world.
Additionally AWS allows us a great deal of infrastructure security since it’s hosted in a fully redundant, secure environment with access limited to operations staff only. As a result, we can offer of complete firewall protection, private IP addresses, and other security features.
Another benefit of using AWS is that they feature a full data center security with a long repudiable list of certifications, third-party assessments to ensure state of the art data center security. They have many years of experience in designing, constructing, and operating large-scale data centers. Only those within Amazon who have a legitimate business need to have such information know the actual location of these data centers, and the data centers themselves are secured with a variety of physical controls to prevent unauthorized access.
In the event of a catastrophic failure in an AWS region, ClickUp is still able to recover pretty much immediately. With multiple available zones and instantly synced data across several regions, if one goes down for whatever reason, we’ll be right back online.
In the almost impossible event that all AWS regions fail, we have additional backups located outside of this infrastructure with additional providers. While it would take us some time to restore the backups, there would be no data lost.
Testing Security performance
We are constantly monitoring our ongoing security performance. This includes automated security testing as well as contracted third-party penetration testing. We won’t disclose all testing and security measures we currently make use of, but we can say this is our number one priority on an ongoing basis.
Web App Security
Even though we use AWS, we employ encryptions over 256 bit SSL for all web app communication. This ensures that any communication on our platform cannot be viewed by a third party and is identical to the encryption used by financial institutions.
We are also members of the Privacy Shield framework, a program which requires strict privacy requirements for companies who transfer client data from the US to Europe.
Additionally, all teams have the option to enable Encryption at Rest for their entire ClickUp team’s data. The only downside to doing this, it that search performance will be degraded due to the nature of encryption – partial matches will not be returned in results.
There are many regulatory compliances that must be abided by to ensure the safety and privacy of clients’ data. So we have gone above and beyond to make sure that all compliances have been met. From GDPR Compliance to the Privacy Shield Network (as mentioned above) even HIPAA which ensures privacy for client health information. We have checked all the possible boxes.
- GDPR– An EU wide set of regulations created to ensure the protection of user data. For more on understanding GDPR, check out this great beginner’s guide.
- HIPPA– The Health Insurance Portability and Accountability act of 1996, which ensures data privacy and security provisions for medical information.
- BAA Agreements– Agreements signed between HIPPA covered entities and HIPPA business associates.
Note that if you need a BAA agreement, you will have to upgrade to our enterprise plan. As a result of the regulatory and legal costs, the BAA agreements are only available to those users which are on our enterprise plan.
As technology becomes a bigger and bigger part of our lives and cloud computing becomes more and more comprehensive, protecting the personal information of clients will increase in importance. The cloud offers such opportunity for human productivity and achievement at the same time there must be a corresponding increase in the integrity of the companies who occupy the space. As the forward-thinking and conscientious company that we are, ClickUp will continue to be at the forefront of defending the rights of our clients to have privacy and security online.