Taking Formulator software to the Cloud
Formulator Cloud - Customer Benefits
Cloud based software solution to free you up to focus on what you do best, run your laboratory and meet regulatory requirements.
Access from anywhere.
No Software to install or upgrade.
Cross platform compatibility.
Dedicated Company Database.
No IT resources required, we are your IT resource.
Minimal Capital expenditures.
Automatic updates and upgrades.
We install only what you need.
No additional support contracts, all inclusive monthly charges.
Pay only for usage, one to multiple users.
Scale resources quickly.
Switch from on-premise to SaaS.
HOW Cloud Based Software benefits you
Taking your Formulator software to the cloud allows you to access the software according to your specific needs.
Cloud based software gives you the ability to grow your lab and regulatory compliance by offering:
Scale and grow: Lowers software total costs and flat-fee prices
Security and availability: IT constraints: Offers high-level security and privacy, easy accessibility and integration
Freedom to innovate: Offers continuous new features and functions immediately as released.
What is Cloud Software?
The term “Cloud” includes a broad set of applications and software deployment models, a generally accepted definition of cloud computing is; Use of the Internet to access hardware, software, and other resources that are provided on-demand to perform work.
Software deployed into cloud environments are built using virtualization and load balancing technology that allows applications to be deployed across multiple servers and database resources.
Why Cloud Computing Matters
Cloud based Software benefits customers by providing application scalability and reduced hardware costs. Cloud computing technology makes it easier to acquire cloud software and not have to manage hardware, software, and upgrades while reducing up-front expenses. Formulator runs the same as on a computer or network. Training is done on-line just as we would in a standard installation.
You gain the advantages of:
Your access to your Data Everywhere
When software is hosted in a centralized location, all information is in one place, and is hosted in the cloud, and accessed from anywhere with an internet connection.
Software and information is available through web browser on any computer.
Security is Easily Implemented by User. Individual User permissions can still be set in Formulator.
Sensitive data is never stored on the users end-point drive, applications are locked down and user accounts are managed to protect data.
If a user is compromised, passwords are changed from the central server and the security hole is closed.
Easy Software Upgrades both of the full Formulator improvements and by adding Company Formulator modules.
When new software features are developed, the updates are done to one image in the cloud.
There is no need to manually update every computers software. This make updates and new versions simple to deploy and use.
Because software runs on a browser, mission-critical software can be run on in-expensive user workstations. Resources can be directed toward the cloud instead of refreshing employee hardware every year.
Formulator Client Benefits
The Cloud Control Portal Manager enables Formulator Software to provision software service through a single, comprehensive cloud services platform which unifies and simplifies the application, user management, service provisioning and operational aspects of running software in the cloud. This on-demand management and delivery tool gives users a simple, self-service automated process.
Software run in the Cloud on Citrix provides a secure-by-design solution that enables simple security, protects intellectual property, ensures data privacy and meet compliance mandates while promoting laboratory and regulatory productivity and growth. Data and applications are managed and secured centrally in the data center; the cloud service is delivered securely anywhere, over any kind of connection, in high definition, to any device.
Citrix enables Software-as-a-Service to centralize and manage a single instance of Formulator in the datacenter and delivers it to users for online use, while providing a high-definition experience. It revolutionizes Windows application management by virtualizing applications and delivering them as a centralized on-demand service to any user anywhere on any device. With market-leading solutions for mobility, desktop virtualization, cloud networking, cloud platforms, collaboration and data sharing, Citrix helps organizations of all sizes achieve the speed and agility necessary to succeed in a mobile and dynamic world. Citrix products are in use at more than 260,000 organizations and by over 100 million users globally. Annual revenue in 2012 was $2.59 billion.
At Formulator Software we are here to make your transition to the cloud simple. We give you all the tools to easily deploy your data in Formulator software in the cloud, provide you with the control to manage and deliver your cloud securely and backed up by industry leading Citrix technology.
What is the security level and how does our cloud installation enforce security of the data?
Application virtualization acts as an abstraction layer between user system and user access, isolating the actual virtualized application from the user client OS, or allowing the use of a zero client with no OS at all. It remotely displays the representative content of the virtual application in an encapsulated, isolated instance, independent of whether the applications are locally executed (streamed apps) or hosted on datacenter server infrastructure. In this sense, application access security starts with a secure-by-design approach. In most cases, only screen updates, mouse clicks and keystrokes traverse the network, while content remains securely stored in the datacenter. Since no true content is sent to the end user’s device, no data is stored on the device, dramatically reducing the risk of theft, tampering or loss as well as non-compliance with data retention policies. In addition, as the application is executed in the datacenter, consistent access, encryption and logging are available for all applications and centralized patch management ensures that users are all working off of the identical patched and updated version of the applications, with all security controls and policies updated to reflect the most recent threats.
There are inherent security features built into XenApp with on-demand apps that enable the enterprise to further restrict the worker’s environment to prevent illegal or non-compliant data movement or storage.
• One-way copy/paste – The enterprise can establish policies around how data is transferred (or not transferred) between the virtual application running in the datacenter and the endpoint device. The worker can work in a rich, high-definition virtual environment but is not allowed to transfer data by copying/pasting content from a virtual application to their physical endpoint applications running in the background. Conversely, the enterprise can control copy/ paste of content from the physical environment into the virtual environment. These policy-based controls are centrally managed By the IT administrator and cannot be tampered with by the end user.
• Peripheral/USB access control – The enterprise can allow USB mass storage devices or other peripherals including non-USB hard drives, audio and microphones to be used in some scenarios, while restricting or disabling their use in other environments as dictated by the organization’s security practices and policies. For example, when connected to a remote enterprise work session, the use of USB devices may be prohibited to ensure content is not exposed to loss or theft. Policies such as read-only access, write access, or no access at all can be set to determine the level of access the user has to a particular application, server or environment. Specific USB device classes and other peripherals can also be allowed or prohibited. With a higher level of control, the enterprise can shut out all USB devices from being used to remove content from the protected environment.
• Print control – Application delivery provides the enterprise with a greater level of control over user printing, including:
— Printing turned on or off per application
— Network/local printing control
— Print screen key (or applicable key combinations) control
• Profile management controls – By implementing application delivery architecture, an added security benefit is the ability to control and manage all profile attributes. One such advantage is the ability to allow the user profile information loading to be postponed until the logon process is completed. Once the golden images for applications have been loaded and security checks have been run, user profile information is loaded and security checked. The user profile can be set to:
— Load settings on-demand
— Pre-cache files of specific sizes (download in background)
— Cache entire profile after logon (download in background)
— Update modified settings to the profile intermittently without requiring logoff
24/7 x 365 days on call support
Dedicated Environment, Not Shared Servers
Cloud same as On-Premise Configuration
Windows 2008 R2 and Windows 2012 Server – “DataCenter Edition only”
Customer owns their data
Backup offsite nightly. We offer a backup to the customer as a 2nd option, also the customer has access to their data 24/7 and can do their own backups if they choose.
SAS 70 Type II compliant
We partner with PHD Virtual and C7 for full failover, more info here.
What are the Business Benefits of SaaS?
By Mark Morley, Industry Marketing Director, GXS
The SaaS model can offer numerous benefits over traditional licensed software approaches:
Pay Only for What You Use- Often, IT organisations will over estimate the actual software utilisation by the end-user community. For example, an IT organisation may forecast an active end-user community for a particular application to grow to 10,000 employees within a year. However, customisation and implementation delays may result in only 500 employees actually using the software a year later. With SaaS, corporate buyers only pay for the active users of the system–not the forecasted user community.
Lower Total Cost of Ownership- One of the historical complaints about licensed software models has been the unknown cost to deploy and operate. With SaaS the total cost to operate the application is fixed. SaaS vendors typically will bundle all of the necessary hardware, software and support services such as implementation, training, help desk, troubleshooting, upgrades, security, and business continuity into a single fee. As a result, the overall total cost of ownership is known in advance.
Time-to-Market- The SaaS vendor takes responsibility for the provisioning of hardware, software and network infrastructure at the data centre. Additionally, SaaS applications typically have limited customisation of features and the user interface. As a result, there are no delays resulting from the need for internal IT organisations to perform development, enhancement or deployment of the application.
Easier Upgrades-SaaS vendors manage the upgrade process. New releases and feature enhancements are deployed centrally to the hosted applications. There are no client applications on end-user desktops to be upgraded. SaaS vendors typically deliver two to four major upgrades per year and several minor updates that the user gets automatically. Users of SaaS-based applications can always be certain that they are using the latest version of the software provided by the vendor.