SugarCRM unveils fast private cloud
Posted on 11 April 2013.
Bookmark and Share
SugarCRM announced Sugar Private Cloud, a flexible deployment option that gives companies a dedicated, managed private instance of SugarCRM’s Customer Relationship Management (CRM) applications in the cloud.


“Sugar Private Cloud gives our customers an opportunity to get the best of both worlds –a fully managed CRM service with the location, access, and service levels they choose,” said Lila Tretikov, SugarCRM chief product officer. “By leveraging on-demand cloud services without giving up control of their mission-critical data, performance, and security requirements, organizations can work at the speed of business across the world, and deliver a superior end-user experience globally.”

Sugar Private Cloud is ideal for companies that demand the highest, fastest levels of CRM performance and service, and require enterprise-level data isolation, business continuity, and SLAs to ensure the best experience for their users, yet do not want to manage a CRM IT infrastructure in-house.

Unlike other CRM solutions that keep customer data in a shared, multi-tenant database, Sugar’s architecture provides a dedicated database for each customer’s data, ensuring absolute data segregation, higher performance and service, and better control for every customer.

This Sugar premium cloud service works with global cloud providers and delivers the solution via worldwide data centers. Sugar Private Cloud is available in the United States, Ireland, Singapore, Japan, Australia and Brazil.

With Sugar Private Cloud, SugarCRM customers are not locked into one delivery model as they can easily move their Sugar installation based on their specific business requirements. For example, a customer can start on-premise, and move to the cloud as requirements change, or vice-versa.





Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //