Hosting comparison
Cloud Hosting
![](https://static.wixstatic.com/media/8fb65c_22adff67059a4de7b0766bf2bbee2f3d~mv2.png/v1/fill/w_350,h_90,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/8fb65c_22adff67059a4de7b0766bf2bbee2f3d~mv2.png)
Constant monitoring of Cloud environment to ensure infrastructure and software are always working properly and up to date.
System maintenance
Self-Hosting
![](https://static.wixstatic.com/media/8fb65c_4a49a6237a0742f4a5a3eadbce09b703~mv2.png/v1/fill/w_348,h_93,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/8fb65c_4a49a6237a0742f4a5a3eadbce09b703~mv2.png)
Clients need to maintain and protect facilities and hardware as well as manage software installations/updates.
![](https://static.wixstatic.com/media/8fb65c_4a49a6237a0742f4a5a3eadbce09b703~mv2.png/v1/fill/w_345,h_80,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/8fb65c_4a49a6237a0742f4a5a3eadbce09b703~mv2.png)
Users can access their data securely from anywhere with an Internet connection.
Remote access
![](https://static.wixstatic.com/media/8fb65c_53ca8061a2cf4c6faa5aa64a93000fe9~mv2.png/v1/fill/w_353,h_80,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/8fb65c_53ca8061a2cf4c6faa5aa64a93000fe9~mv2.png)
Users must login via employer's network before they can access the system.
Data security & privacy
![](https://static.wixstatic.com/media/8fb65c_22adff67059a4de7b0766bf2bbee2f3d~mv2.png/v1/fill/w_348,h_106,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/8fb65c_22adff67059a4de7b0766bf2bbee2f3d~mv2.png)
Clients need to maintain a robust IT environment that can meet security and privacy objectives around visbility, auditability, controllability and agility.
![](https://static.wixstatic.com/media/8fb65c_22adff67059a4de7b0766bf2bbee2f3d~mv2.png/v1/fill/w_344,h_109,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/8fb65c_22adff67059a4de7b0766bf2bbee2f3d~mv2.png)
Local security-sensitive data centre and network architecture with data encryption, monitoring tools and stringent security training, policies and procedures.
![](https://static.wixstatic.com/media/8fb65c_4a49a6237a0742f4a5a3eadbce09b703~mv2.png/v1/fill/w_344,h_90,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/8fb65c_4a49a6237a0742f4a5a3eadbce09b703~mv2.png)
Comprehensive storage, backup, archiving and retrieval process with data replication across 3 sites in same region.
Backup and disaster recovery
![](https://static.wixstatic.com/media/8fb65c_4a49a6237a0742f4a5a3eadbce09b703~mv2.png/v1/fill/w_349,h_93,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/8fb65c_4a49a6237a0742f4a5a3eadbce09b703~mv2.png)
Clients need to perform backups, build data/system redundancy and regulary test DRP and BCP to a satisfactory standard.
![](https://static.wixstatic.com/media/8fb65c_53ca8061a2cf4c6faa5aa64a93000fe9~mv2.png/v1/fill/w_350,h_80,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/8fb65c_53ca8061a2cf4c6faa5aa64a93000fe9~mv2.png)
Energy consumption and carbon emissions are reduced by more than 30%.
Environmental cost
![](https://static.wixstatic.com/media/8fb65c_53ca8061a2cf4c6faa5aa64a93000fe9~mv2.png/v1/fill/w_348,h_80,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/8fb65c_53ca8061a2cf4c6faa5aa64a93000fe9~mv2.png)
Power, light and cooling for infrastructure increases energy usage.