Re: Data security consideration?
That's a great question. K2 (www.k2.com) has been working with many fortune 500 companies, including banks and insurance organizations. Information protection and lifecycle management is top of mind for us.
The K2 platform includes a patented technology called SmartObjects, which is essentially the mechanism we use to provide read/write access to information in your on premises line of business systems such as SAP, SharePoint or cloud based solutions such as salesforce.com. New information that doesn't exist can be created in SQL server or Oracle databases with no code or technical database skills required.
When you build disposable apps, K2 SmartObjects takes care of retrieving and saving the information without ever copying or removing it from its source. K2 SmartObjects has been proven to scale to meet the demand of some of the biggest companies in the world.
This is very very important for us. We believe that those source systems, which K2 SmartObjects retrieve the information from, know how to protect their data, who can access it and who can update it. We honor that, and using technologies such as oAuth or claims, we ensure that those rules are enforced and the data is protected by those systems.
When you later decide not to use an application, you can destroy the forms, workflows and K2 SmartObject definitions, but your information in those LOB systems continue to live on untouched.
If you did decide to create new data sources in K2, you have the option to remove them when you remove the application.
Lastly, I want to point out that we have a powerful workflow platform in K2 that can assist with request and approval processes before you deploy or destroy applications.
Lifecycle management, data security, versioning and exception handling are all concepts that are native to K2, and are used by large organizations for mission critical solutions daily.
I hope this short explanation helps to answer your questions.