Mr. Ellis

Revenue Management

Cloud Best Practices

11 Strategic Questions for Hoteliers Considering Moving to the Cloud

By Bernard Ellis, Vice President of Industry Strategy, Infor Hospitality

The benefits for hoteliers of moving business applications to the cloud are numerous. Initial costs are lower because there is no need to purchase additional hardware or expand IT headcount. Systems can be deployed faster, changes can be easily made as business needs expand over time, and the long-term return on investment is higher because the technology vendor will handle potentially costly system upgrades and enhancements. Disaster recovery of data is also easier, as information is backed up in the cloud rather than on physical servers.

Additionally, selecting a solution that delivers the same robust, hospitality-specific functionality as an on premise system supports globalization for hotels, resorts and casinos. With access via the cloud, users, partners and suppliers at locations across multiple continents can share real-time data on everything from guests to revenue. Information flows more freely and managing daily operations becomes easier as teams are able to connect from different properties and departments. This also enables better-informed decision making, as hotel managers have visibility into comprehensive data and an enterprise-wide view of how their organization is performing and operating.

Many information-critical industries, including pharmaceuticals and manufacturing, must weigh the potential pros and cons associated with moving to the cloud. But hoteliers are in a unique position because guest satisfaction, not the delivery of a physical product to market, is the top priority. Compromised guest data including contact and credit card information would mean a serious blow to revenue for a hotel chain or casino, as guests would no longer feel that their identities were safe while staying at the property. With more ways than ever for customers to voice feedback, including social media and online rating sites, news of a security breach would travel faster than ever before.

Because of the guest’s distinctive control over hoteliers’ success, it is even more important for companies to vet a vendor’s approach to cloud security before selecting a provider for their cloud technology. Hotels own and manage the data, but it is the technology vendor’s job to protect that data. Technology providers should instill confidence in customers that best-practice protocols and a thorough, continuous improvement approach will be utilized for any cloud-related projects.

However, many hoteliers are hesitant about moving to the cloud because with 24/7 guest interaction, a back-end system glitch could have negative implications on customer satisfaction. Compromising guest profiles or credit card information could be disastrous, making many hospitality companies uncertain about cloud deployment. In order to ensure security when utilizing SaaS-based business applications, hoteliers should focus on vendor selection and best practices for network safety. Selecting the right technology provider who employs these practices and is transparent on how and where data will be stored is critical in minimizing any risks associated with utilizing cloud technology.

Ensuring security in the cloud is a two part endeavor. Hoteliers must take steps internally to safely store and transfer data, but software vendors must also take measures to assess potential threats and implement effective security controls. A detailed look at the vendor’s security approach is essential to confirm that a company will be thorough and follow necessary protocols. Effective security also begins with development and the proper training of staff. It should include a multiple layer strategy, as well as physical and operational processes that support protection. Knowing what type of monitoring processes and infrastructure-related measures will be taken to minimize safety risks is essential to when running business applications in the cloud. Vendors are the direct source for each of these security measures. Hoteliers should view technology providers as a partner in facilitating data safety in the cloud, and as such should carefully examine answers to the questions above when moving to a SaaS-based system.

With security top of mind for cloud deployment, decision-makers should ask these questions before choosing a technology provider for their project.

1. How in-depth is your security strategy?

Make sure that the vendor employs an in-depth defense strategy and does not rely on a single security technique or device. Data assurance should be confirmed through a multiple layer approach with overlapping security controls.

To proactively defend against an attack, the cloud architecture should include different levels to protect against specific strikes like a Distributed Denial-of-Service (DDoS) attack, as well as more general information attacks such as vulnerability scanning. Real-time monitoring of potential internet threats and firewalls is also crucial in order to isolate critical components and prevent access from an external network.

2. How are your products developed to enable security in the cloud?

Security parameters for each product should be established from the beginning to guarantee that they are architected into the software design. Vendors should also conduct routine testing to identify potential vulnerabilities and problem areas, as well as code reviews that allow developers to collaborate on safe coding practices. In order to verify that developers are kept up-to-date on these practices, confirm that the software provider also conducts regular security training sessions to make sure that all security policies are followed.

3. Will the cloud network be separated from the general corporate network?

Independent networks that exist autonomously from the general corporate network provide additional security against data corruption. Solutions can also be customized to better meet specific security and performance needs when they are deployed separately from existing networks.

4. Will the network remain protected, even if users do not employ security best practices?

Hoteliers cannot confirm that each user at every location is running up-to-date anti-virus protection software and does not have a compromised system. Therefore, the network should be designed on rigid protocols that enforce security, even when employees do not.

5. What physical measures will be taken to protect the infrastructure?

If working with the same vendor to establish the data center, hospitality companies should inquire how the data center will be physically protected. Will there be registered guest restrictions, locked cage spaces or biometric safeguards? How will they monitor, detect and alert necessary IT staff and decision-makers if there is a physical intrusion?

Additionally, traffic within the network should never be broadcast using an antenna or wireless transmitter. A virtual private network should be required to protect data from interception by third parties.

6. What mandatory IT infrastructure requirements will be used to support security?

Before selecting a vendor, make sure that their strategic IT services include mandatory security requirements. These could include automated logging of security events, continuous management of backups, and administration of limited user-account permissions. Services must be built and administered in compliance with the security standards required for global data centers in order to enable the highest level of safety. Data should also be encrypted to ensure that the information of hotel guests is protected from potential threats.

7. What operational practices will be utilized to support security?

The system should provide options for tiers of user access within the network, allowing hotel staff to see only the information that is required to complete their daily activities. Access should be structured to reflect specific team’s roles and responsibilities under the principle of least privilege. Additionally, the vendor should not allow hotel users to tap into supporting operating systems or lower functions, but rather requests should be managed in different network segments, and then sent to protected back-end databases.

8. Does the vendor have staff dedicated exclusively to its cloud technology?

Check that the vendor has a specific group or business unit tasked with the implementation and deployment of cloud technology. This confirms that those working to build and launch the system have extensive experience with SaaS-based implementations and are more likely to have received extensive training on cloud security. Having a group dedicated to cloud technology also indicates that it is a priority for the vendor, and that they will actively work behind the scenes to enable the security of your data, as well as continue to develop system protection enhancements.

9. What monitoring processes will be implemented to track potential security threats?

At the most basic level, the system should maintain centrally managed passwords to protect administrative access points to the cloud network. The technology should also alert network management staff to unsuccessful password attempts and patterns that could potentially indicate a security breach. The system should always have the ability to authenticate the server, which ensures that all user sessions are authenticated.

Additionally, vendors should log and monitor security incidents to certify that the system has not been compromised. By collaborating with hoteliers to investigate intrusion attempts, vendors can become a critical ally in mitigating safety risks.

10. Is the system ISO-27001 compliant?

Vendors should demonstrate compliance with this internationally recognized credential for a securely designed information management system. This is often the first, and most concrete, box to check when selecting a technology provider for your project. ISO-27001 is designed to enable the security of financial assets, intellectual property, employee details, and third-party information, which for hoteliers includes guest-related data.

11. Does the vendor conduct business everywhere that you do?

While cloud technologies have taken a lot of responsibility off of the plates of hospitality IT executives, achieving the ‘last mile’ of property-level broadband connectivity in a global enterprise has grown as a challenge that rivals those of local sourcing of food and labor. Local ISP offerings should be vetted for reliability, speed and security, and local data privacy and storage laws need to be researched and accommodated. Your cloud provider should make this easier by offering a network with multiple points of presence around the world, not only for shorter hops, but to allow multiple options for the storage location of your data.

In spite of all these concerns, the hospitality industry’s adoption of cloud technologies has accelerated at a rapid clip in the past few years. The SaaS model is a great fit for the industry’s fragmented ownership structure, and generally allows a larger IT investment than would have otherwise been the case. Today’s growing array of options allows hotel companies to tread carefully, without having to tread lightly.

Bernard Ellis, Vice President of Industry Strategy is responsible for defining the go-to-market strategy of the entire Infor product suite for the hospitality industry vertical, including product positioning, messaging and partner relationships. Mr. Ellis also directly oversees product management of hospitality-specific solutions, and ensures the alignment of all hospitality sales, marketing and product management objectives. Prior to Infor, Mr. Ellis held executive positions with IDeaS, a SAS Company, SynXis, now part of Sabre Hospitality, and Micros-Fidelio. Mr. Ellis can be contacted at 646-336-1700 or innovate@infor.com Extended Bio...

HotelExecutive.com retains the copyright to the articles published in the Hotel Business Review. Articles cannot be republished without prior written consent by HotelExecutive.com.

Receive our daily newsletter with the latest breaking news and hotel management best practices.
Hotel Business Review on Facebook
RESOURCE CENTER - SEARCH ARCHIVES
General Search:

DECEMBER: Hotel Law: The Biggest Challenges

Marjorie Obod

What steps do Hotel HR Managers need to take to determine if the Affordable Care Act (the “ACA”) requires that changes be made to the healthcare benefits offered to employees by January 1, 2015? Although the seasonal exception may apply to employees in the hotel industry, the fact that the definition for “full time” employees under the ACA lowers the threshold number of hours an employee needs to work to be considered a “full time” employee from 40 hours a week to 30 hours a week, requires that HR Managers recalculate whether the fifty (50) full-time of full-time equivalent employees cutoff has been met. In addition to factors that must be considered in determining if the ACA applies to your hotel, this article outlines what HR Managers need to do to prepare for the January 1, 2015 effective date of the ACA. Risks for non-compliance are outlined so that HR Managers are aware of how to act prudently in protecting businesses from unnecessary costs that can be avoided through understanding the law and taking responsive action. READ MORE

Banks Brown

As this article is being written, two armed police officers guard the front of the building that houses our law offices, and have been a fixture since the UN was in session over three weeks ago. The officers first appeared at the same time that government agents encased in flack jackets, bearing machine guns, and accompanied by canine units appeared on the streets outside of Grand Central Terminal and the New York Public Library. Last week also brought news that NYC’s Office of Emergency Management ran a training exercise that simulated an emergency response to a 10-kiloton nuclear device exploding in Times Square, which according to the simulation, killed 100,000 people instantly, took down skyscrapers for a half-mile radius and inflicted damage up to two miles away, all as a radiation cloud swept over the entire metropolitan region. No doubt, the nation’s safety and security are still critical issues. READ MORE

Andria Ryan

The problem of employee theft in hotels is an age-old problem. Businesses lose billions of dollars each year in employee theft. And hotels, by nature, present numerous opportunities for employee theft from guests and the house. Theft in a hotel can take many forms – from identity theft to credit card fraud to theft of merchandise and guest property. No employer hires an employee thinking that the employee is someday going to steal. Hotels need to take steps to prevent theft and be cautious in taking action against an employee after a suspected theft. Both have practice and legal implications. READ MORE

J.Thomas Cairns

New rules allowing the sale of condo hotel rooms as investment securities will affect not only the way that condo hotels are marketed, but the way they are structured. Mandatory participation by owners in a rental pool may allow hotel operators greater flexibility and control and ensure a critical mass of available room inventory and permit operation of a condo hotel as a true “common enterprise”. READ MORE

Coming Up In The January Online Hotel Business Review


Feature Focus
Mobile Technology: The Necessity for a Well-Defined Strategy
Mobile technology has altered the way the world does just about everything. With mobile devices in our hands (smart phones and tablets) and media and information up in The Cloud, the possibilities for immediate, worldwide, personal access are limitless. Smart mobile devices are dictating how we live our lives and as a result, these developments are game-changers for all businesses, but especially for service industries, including the hotel sector. These advancements are literally redefining how guests interact with a hotel in virtually every aspect of its operation, and savvy hoteliers who are implementing the latest mobile technologies and best practices in each critical channel will steal market share from their competitors, decrease dependency on their Online Travel Agents, and generate incremental revenues which will substantially increase their bottom line. A well-defined mobile strategy is no longer a "nice-to-have" but an essential weapon in an industry that is evolving at a blistering pace, and those operations that are slow to respond do so at their peril. The January Hotel Business Review will examine which mobile strategies some operators have adopted in order to meet these challenges, and will report on the solutions that are proving to be most advantageous for both companies and their guests.