In a third video tutorial from our new set of training content on hybrid SharePoint computing, Fabian Williams juxtaposes a set of rationales for hybrid SharePoint computing alongside the roles users will play in on-premises, and cloud SharePoint computing scenarios.
The title of the video is Preparing for SharePoint Hybrid – Part 1. The very close connection between objectives and user roles, which Fabian presents in detail across the approximate 25 minute length of the tutorial, is illustrative of the emphasis on security, which permeates the first 3 tutorials in the set.
It, therefore, makes sense to expand on the security theme. Organizations with a substantial commitment to SharePoint have a lot to lose should a plan to implement a hybrid computing architecture for SharePoint neglect to incorporate an adequate level of security over company confidential data.
Fabian goes to some length to emphasize the importance of this point. He talks about reverse proxies well in advance of actually presenting the technical specifics about them. He also talks about the choices facing SharePoint administrators as they consider just how to correctly direct the flow of data communications–inbound, outbound, bi-directional–in order to balance two pressing objectives: to satisfy user requirements for SharePoint Online, while, at the same time, taking the steps required to safeguard on-premises data repositories and servers.
I would argue it isn’t possible to overstate the importance of soberly considering the possible negative effect of unauthorized intrusion before proceeding on an actual implementation of a hybrid solution for SharePoint computing. Certainly it is better to identify very high levels of risk in advance, than it is to face them after the fact, which may prove to be too late.
Keeping this mindset, it then makes complete sense for Fabian to take the time in this video tutorial to define user roles based on different reasons for proceeding on a plan to implement hybrid. Seen from a different perspective, his presentation can be taken as a great presentation of a very practical method of building governance into a technical plan.
©2014, Ira Michael Blonder & Rehmani Consulting, Inc. All Rights Reserved