How Can Cloud ERP Benefit Your Business
JAMIS Prime ERP provides users with the opportunity to access their data anywhere, on any mobile device thanks to its use of true cloud computing.
JAMIS’ Cloud ERP solution is designed to address the inflexibility of existing ERP software by allowing businesses to choose the deployment option that fits their specific needs. Cloud ERP is a flexible and cost-effective option for small and medium-sized businesses and offers extensive benefits for growth and expansion:
- Freedom to scale and grow: Lowers businesses’ total costs and flat-fee prices
- Freedom from IT constraints: Offers high-level security and privacy, easy accessibility and integration
- Freedom from lock-in: With your data in the cloud, you can move it at any time
- Freedom to innovate: Offers continuous new features and functions
JAMIS Cloud Hosting
JAMIS uses the premier global bandwidth infrastructure services provider Zayo to provide top of the line data center hosting services to our customers. To protect your mission-critical operations, Zayo maintains a tight and multi-layered security system. An extensive digital video surveillance network monitors and records all data center area and building entrance activity. Data center floor entrances are controlled by strictly managed access levels, mantrap entry and biometric scans to ensure that only your authorized personnel are allowed entry. In addition to the physical security features, the highly secure NOC features 100% uptime and the data center is manned 24x7x365 by our rapid response specialists. All detected issues are proactively tracked and acted upon for immediate resolution.
Cisco Powered Firewall
Our Cisco-powered firewall solves the combined problems of performance and breadth of security – without affecting network complexity or business agility. Web security is managed in the cloud and tightly integrated with the network, placing no additional load on existing systems. It provides users with highly secure access to data and network resources – anytime, anywhere, using any device. Cisco ASA devices represent more than 15 years of proven firewall and network security engineering and leadership, with more than 1 million security appliances deployed throughout the world.
TLS (Transport Layer Security) Protocol
Transport Layer Security (TLS) is a protocol that provides privacy and data integrity between two communicating applications. It’s the most widely deployed security protocol used today, and is used for web browsers and other applications that require data to be securely exchanged over a network. The TLS protocol is designed to provide three essential services to all applications running above it: encryption, authentication, and data integrity.
Backups will be performed daily between 1:00am and 5:00am (in the Eastern Time Zone) as protection from unforeseen facility, hardware or software problems that destroy or unintentionally modify Licensee data. Restorations from these backups can be requested at any time.
Emergency maintenance will be performed when there is an apparent risk to the hosted service. In such an event, we will make our best attempt to provide notification to the Licensee. Because of the emergency nature of the maintenance this notification may be incomplete or delayed. Once such maintenance tasks have been completed, JAMIS hosted services personnel will notify Licensee of the return to service.
Disaster Recovery Plan
As part of our regularly scheduled maintenance plan, daily backups are performed as protection from unforeseen facility, hardware or software problems that destroy or unintentionally modify Licensee data. These backups will occur between 1:00am and 5:00am Eastern Time. In the event of a catastrophic event which renders the JAMIS hosted services facility inoperable, JAMIS will restore application accessibility to Licensee within a 48-hour period of time. Once JAMIS has identified an alternate hosting site, we would be able to load the Licensee’s system backups onto alternate servers. Application accessibility would then be restored.
Monitoring and Security
During available hours, the JAMIS system will be monitored and there will be an on-call JAMIS engineer to resolve system issues. JAMIS stores transaction information on computers located in a physically secure data center. JAMIS protects information with a combination of access security and encryption.