Where Is Your Data Stored and Is It Physically Safe?

Reputable cloud-based CMMS companies will store your data in an advanced and dedicated data center. The only business model of these data centers is to provide secure data storage and move this data safely to and from customers. These data centers are run by some of the biggest companies on the Internet, such as Google and Amazon. The expertise of these companies in storing their own data safely and securely led to the formation of new businesses that provide these services to other customers, including CMMS customers.

Data centers are typically nondescript buildings within major city centers. Inside, they have banks of computers. These computer banks are secured like a bank of money. All people, including data center staff, need to pass through multiple levels of security authentication to gain access to the computers and the supporting infrastructure.

Compare this physical security at the data center with a solution hosted on your own computer. A local installation is probably stored in an insecure room that is accessed by many people, including a cleaning crew. Alone at night.

Data centers are incredibly secure in comparison. 

Data Loss

Data loss can occur due to several reasons. Data can be physically stolen, deleted, or overwritten. None of these losses are realistic for a reputable, cloud-based CMMS run from a reputable data center.

First of all, the physical security measures in data centers essentially guarantee that theft of data storage devices from a good data center is impossible.

Second, data centers run multiple redundant backups of all data in several geographically distinct buildings. In effect, a backup hard drive containing the same information (but in a different building) would be ready to go almost instantly if data were to be lost for reasons including breakdown, theft, or environmental hazard.

In addition to the multiple redundant backups, a cloud CMMS solution will never permit the CMMS to be accidently uninstalled, nor will it need to be reinstalled when you upgrade your desktop computer.

With all these measures, you can be virtually assured that the data cannot be stolen, lost, or accidently overwritten with a reputable, cloud-based CMMS company.

Data Availability

Your data availability is the percentage of time your data is available, ready for access. This is a critical parameter because there is nothing worse than having a CMMS unavailable when it is needed.

For a cloud-based CMMS, part of the data availability calculation is the data center’s availability. Most data centers guarantee a minimum uptime percentage of 99.95 percent. Most perform much better than this.

Another component of cloud-based CMMS availability is the application availability. This is the amount of time the CMMS is available, excluding the small amounts of time when planned system upgrades are performed overnight. Reputable CMMS companies will record these outages and be happy to tell you their performance over the previous year. For example, in 2013, a leading provider of cloud-based CMMS solutions had a 99.991 percent availability over the entire year. Does your locally hosted CMMS achieve availability this high? Do you even measure it? When you do measure it, make sure it is a fair comparison by including all of the unplanned unavailability of the local system.

Furthermore, because a cloud-based CMMS is viewed over the Internet, it can be accessed at anytime from anywhere with an Internet connection. If you really want to, you can check your CMMS on your mobile phone while at the beach!

Web Security Against Hackers

Security against hackers is a critical element of any cloud hosted program. Data centers have systems in place to record and stop all classes of hacker attacks, including attacks based on denial of service (DoS), man-in-themiddle, IP spoofing, port scanning and packet sniffing. Furthermore, exceptional CMMS companies will use irreversible hashing algorithms to protect sensitive data, like passwords, from being viewed in plain text by anyone. These measures combine to protect your data from thieves.

Data Sent Via the Web to the Data Center

Cloud-based CMMS providers also need to protect your data while it is being sent to and from the data center. Banks and other important Internet services, like e-mail, face a similar problem and they use a secure sockets layer (SSL) encryption technique to guard against it. Good CMMS companies use exactly the same technology with the same level of encryption. You will notice a padlock symbol in your browser when SSL is being used by your CMMS to stop hackers from observing the data being sent.

Access Control

The last security vulnerability that exists in both cloud and locally hosted CMMS systems is access control. On some locally hosted CMMS versions, anyone can use the computer on which the CMMS is installed and make changes to the CMMS. This is not permitted in a cloud-based CMMS. Users have to log in before they have any access to the CMMS. Then, because they are logged in, their actions are recorded. As a consequence, in the future, you will be able to determine who did what and when.


Cloud-based CMMS systems are incredibly secure. The data is stored in physically secured locations, with highly secured access controls. There is always a live backup of your data at another data center ready to take over in the case of a system failure in the primary data center. Furthermore, there are frequent historical backups of all data for protection in the unlikely event of a catastrophe. Hackers are thwarted using the latest techniques and your data is encrypted while being transmitted to the data center using the same methods adopted by the world’s largest financial institutions. In addition, because your users have to log in to their system, you will have a record of every change made in the system and by whom.

If you are still worried about using a cloud-based CMMS, you need to compare these security measures with a locally hosted system. Is your computer physically secured from other people? Do you have a live backup and regular historical backups? Do you have protection from hackers? And what about availability, can you guarantee a 99.95 percent uptime and access from anyplace with an Internet connection?

When you do a fair comparison, it is likely your own security measures will need improvements to match those provided by a reputable, cloudbased CMMS provider.

Dr. Jeffrey Dutschke is an Industry Research Specialist and blogger at Maintenance Assistant, an innovative provider of cloud-based CMMS software for managing facilities and infrastructure equipment. www.maintenanceassistant.com

Jason Kong is a Software Engineer and API Specialist at Maintenance Assistant Inc. Mr. Kong has experience architecting and integrating APIs in a wealth of industries, including healthcare, social media, industrial & manufacturing and pharma regulatory. www.maintenanceassistant.com

Upcoming Events

August 9 - August 11 2022

MaximoWorld 2022

View all Events
80% of Reliabilityweb.com newsletter subscribers report finding something used to improve their jobs on a regular basis.
Subscribers get exclusive content. Just released...MRO Best Practices Special Report - a $399 value!
Optimizing Value From Physical Assets

There are ever-increasing opportunities to create new and sustainable value in asset-intensive organizations through enhanced use of technology.

Conducting Asset Criticality Assessment for Better Maintenance Strategy and Techniques

Conducting an asset criticality assessment (ACA) is the first step in maintaining the assets properly. This article addresses the best maintenance strategy for assets by using ACA techniques.

Harmonizing PMs

Maintenance reliability is, of course, an essential part of any successful business that wants to remain successful. It includes the three PMs: predictive, preventive and proactive maintenance.

How an Edge IoT Platform Increases Efficiency, Availability and Productivity

Within four years, more than 30 per cent of businesses and organizations will include edge computing in their cloud deployments to address bandwidth bottlenecks, reduce latency, and process data for decision support in real-time.

MaximoWorld 2022

The world's largest conference for IBM Maximo users, IBM Executives, IBM Maximo Partners and Services with Uptime Elements Reliability Framework and Asset Management System is being held Aug 8-11, 2022

6 Signs Your Maintenance Team Needs to Improve Its Safety Culture

When it comes to people and safety in industrial plants, maintenance teams are the ones who are most often in the line of fire and at risk for injury or death.

Making Asset Management Decisions: Caught Between the Push and the Pull

Most senior executives spend years climbing through the operational ranks. In the operational ranks, many transactional decisions are required each day.

Assume the Decision Maker Is Not Stupid to Make Your Communication More Powerful

Many make allowances for decision makers, saying some are “faking it until they make it.” However, this is the wrong default position to take when communicating with decision makers.

Ultrasound for Condition Monitoring and Acoustic Lubrication for Condition-Based Maintenance

With all the hype about acoustic lubrication instruments, you would think these instruments, once turned on, would do the job for you. Far from it!

Maintenance Costs as a Percent of Asset Replacement Value: A Useful Measure?

Someone recently asked for a benchmark for maintenance costs (MC) as a percent of asset replacement value (ARV) for chemical plants, or MC/ARV%.