Protecting the CRM System at Cincom Systems Term Paper by scribbler

Protecting the CRM System at Cincom Systems
A brief discussion on the need for security controls on Cincom's customer relationship management (CRM) systems.
# 152642 | 907 words | 3 sources | APA | 2013 | US
Published on Apr 08, 2013 in Business (Companies) , Computer and Technology (General)

$19.95 Buy and instantly download this paper now


The paper looks at the Cincom CRM system and its move to the SaaS-platform based suite, a cloud vendor. The paper discusses the significance of the risks to the data being compromised and outlines the steps Cincom has taken to alleviate these security threats. The paper emphasizes the need for exceptional levels of security controls on all data that is used in this new cloud-based CRM system.

The Cincom CRM System
Protecting the Cincom CRM System Databases

From the Paper:

"Cincom Systems is one of the pioneers in the development of databases, Customer Relationship Management (CRM), call center support, and outsourcing systems globally. Operating in 40 nations globally and having a CRM system that has decades of customer information and insight included within it, Cincom has had to take the lessons learned from managing the security of its own databases and create enhancements to their enterprise software based on the lessons learned. The concepts of database security as they relate to customer records management have become integral to how the company manages its on-premise CRM systems. Database security concepts have overwhelming been based on the concept of software being installed on-premise, not delivered over the Web via cloud computing and Software-as-a-Service (SaaS) platforms (Fulkerson, Gonsoulin, Walz, 2002). This has made the practice of placing customer data on SaaS-based platforms one that is considered risky het accomplishable with the right safeguards in place (Katzan, 2010). Cincom has over time moved to the hosted platform to scale their operations globally through geographies where placing substantial investments in hosted applications did not make economic sense. The use of the SaaS platform for CRM implementations however has been one that has exposed the 40+ years of customer data through the platform, a decision that the CIO of Cincom only made because a single-tenant structure could be created for the hosted applications over time."

Sample of Sources Used:

  • Box, R.. (2010). Firm Up Your Data Security. Journal of Accountancy, 209(6), 18.
  • Cheryl L Fulkerson, Mark A Gonsoulin, & Diane B Walz. (2002). Database security. Strategic Finance, 84(6), 48-53.
  • Katzan, H.. (2010). On The Privacy Of Cloud Computing. International Journal of Management and Information Systems, 14(2), 1-12.

Cite this Term Paper:

APA Format

Protecting the CRM System at Cincom Systems (2013, April 08) Retrieved March 06, 2021, from

MLA Format

"Protecting the CRM System at Cincom Systems" 08 April 2013. Web. 06 March. 2021. <>