Most internal comms platforms are built for the cloud, and it’s perfectly reasonable for the majority of organisations to make this assumption as a default position. For a significant and growing number of organisations, however, it is simply not an option.

Banking and financial services organisations with data handling regulations to adhere to. Insurance companies with information governance strategies in place that preclude cloud-based third-party hosting solutions. Healthcare organisations with internal comms and associated employee data to manage, as well as patient-adjacent data to consider. Government and public sector organisations with data residency requirements for their citizens. Multinationals with business interests in countries where data transfer is prohibited under current legislation.

For these organisations, it’s not a case of “which cloud-based internal comms platform should we choose?” It’s more a case of “which internal communications platforms can we actually deploy?” And the answer to that is far shorter. It’s the answer this guide will help you with.

Why Cloud-Only Internal Comms Tools Fail Regulated Organisations

The shift to cloud-hosted software has been one of the defining technology trends of the past decade. For most enterprise applications, the arguments in favour are compelling: lower infrastructure overhead, faster updates, predictable subscription pricing, and vendor-managed security patching.

But "most enterprise applications" does not mean all of them. And the internal communications function sits in an interesting position: it handles employee data, names, roles, departments, locations, response data from surveys and acknowledgements, that in many jurisdictions and industries is subject to the same data handling obligations as any other personal or sensitive data the organisation holds.

For a regulated financial institution, the question of where that data resides, who can access it, and whether it can cross a national or regulatory boundary is not a preference, it is a compliance requirement. Cloud-only vendors cannot meet that requirement, regardless of their security certifications or contractual assurances, because the architecture itself places data in a shared environment outside the customer's direct control.

The specific failure modes vary:

Regulatory non-compliance. In financial services, regulators including the FCA in the UK, BaFin in Germany, and MAS in Singapore have published guidance on operational resilience and third-party risk that places obligations on firms using cloud-hosted technology. Some interpretations of these frameworks, combined with firms' own risk appetites, make cloud-hosted employee communications platforms a difficult approval to get through a risk committee.

Data sovereignty. An increasing number of countries are legislating to require that data generated within their borders be stored and processed domestically. A cloud-hosted platform hosted in US-East or EU-West does not satisfy a data residency requirement in, for example, Saudi Arabia, Indonesia, or the UAE, regardless of what the vendor's data processing agreement says.

Internal security architecture. For organisations with air-gapped networks, highly segmented environments, or strict controls on which external services can be contacted from managed devices, a cloud-hosted platform may simply be technically incompatible with the network architecture. A tool that requires outbound internet connectivity to function cannot be deployed in an environment designed to prevent it.

Third-party risk appetite. Beyond regulatory requirements, many large enterprises, particularly in financial services and insurance, have risk frameworks that limit their exposure to third-party data processors. Even where cloud hosting is technically permissible, getting a cloud-based internal comms platform through a thorough third-party risk assessment can take months and may ultimately fail.

What True On-Premises Deployment Actually Means

The term "on-premises" is used loosely in the software industry, sometimes to describe any dedicated or isolated deployment, including private cloud hosted by the vendor. It is worth being precise about what it means in the context of internal communications software, because the distinction matters for compliance and security purposes.

True on-premises deployment means the software is installed and runs entirely within the customer's own IT environment, on servers the customer owns or leases, within their own data centre or managed hosting facility, connected only to their own internal network infrastructure. No data leaves the customer's environment at any point in normal operation. The vendor does not have standing access to the system; any vendor involvement in support or updates is managed explicitly and audited.

This is meaningfully different from:

  • Vendor-managed private cloud: The software runs on infrastructure the vendor controls, dedicated to a single customer. The customer's data is isolated, but it still sits on someone else's infrastructure.
  • Dedicated regional cloud: The vendor hosts the software in a specific geographic region, satisfying data residency requirements but not necessarily sovereignty requirements — the vendor still manages the environment.
  • Single-tenant SaaS: The customer has their own instance of the application, but it is still hosted and managed by the vendor on shared infrastructure.

All of these arrangements may be appropriate depending on the organisation's specific requirements. But they are not on-premises, and treating them as equivalent in a compliance conversation is a mistake, one that some vendors exploit by describing cloud deployments in language designed to imply on-premises characteristics.

When evaluating any vendor's claims about on-premises deployment, the key questions are: Who owns the hardware? Who has administrative access to the operating environment? Where does data reside at rest and in transit? What happens to data during a vendor support engagement? The answers should be unambiguous.

True On-Premises Private / Regional Cloud Multi-Tenant SaaS
Data location Customer's own infrastructure — data never leaves their environment Vendor-managed, single-tenant instance in a specified region Vendor-managed shared infrastructure — region may vary
Infrastructure ownership Customer owns or leases all hardware ~ Vendor owns infrastructure, dedicated to customer Vendor owns and shares infrastructure
Vendor access to data None by default — any access is explicit and audited Vendor has administrative access to infrastructure Vendor has full administrative access
Update management Customer controls timing — updates applied on their schedule Typically vendor-managed, sometimes with notice period Vendor-managed — updates applied automatically
Network requirements No outbound internet needed for core functionality Internet connectivity required to reach hosted instance Internet connectivity required at all times
Air-gap compatibility Yes — fully self-contained No No
Data residency Customer's own data centre or country Region-specific hosting available ~ Depends on vendor's infrastructure locations
Typical compliance fit Regulated FS  Government  Healthcare  Defence Data residency  Some regulated sectors General enterprise  Not for strict compliance

Data Residency: A Related but Distinct Requirement

Data residency is the requirement that data generated within a particular jurisdiction be stored and processed within that same jurisdiction. It is related to, but not the same as, the on-premises requirement.

An organisation may be comfortable with cloud hosting but require that the cloud infrastructure is physically located in their country. Conversely, an organisation may have an on-premises deployment that technically satisfies data residency requirements by keeping data in their own local data centre, but the primary motivation may be security architecture rather than residency per se.

The regulatory landscape driving data residency requirements has expanded significantly in recent years:

GDPR and its national interpretations. The EU's General Data Protection Regulation introduced significant restrictions on transferring personal data outside the European Economic Area. While cloud providers have legal mechanisms, Standard Contractual Clauses, adequacy decisions, to manage these transfers, some organisations and their legal teams take the view that keeping data within the EEA entirely is simpler and more defensible.

National data localisation laws. Beyond GDPR, a number of countries have enacted or are enacting laws that specifically require data to be stored domestically. Russia, China, Indonesia, Saudi Arabia, and the UAE all have forms of data localisation legislation that affect how multinational organisations can handle employee data for staff in those countries.

Sector-specific requirements. In addition to general data protection law, many regulated sectors have their own data handling requirements. The UK's FCA and PRA, the US's FDIC and Federal Reserve, and various national healthcare regulators all have expectations around where and how data is held that may go beyond general privacy law.

For organisations navigating data residency requirements, the evaluation question is whether a vendor can host the application in their specific geography, not just in "Europe" or "Asia Pacific" in general. Providers who build on major cloud infrastructure platforms with broad regional presence are better positioned to meet specific country requirements than those with a smaller, fixed data centre footprint.

Industries and Use Cases Where On-Premises is Non-Negotiable

Banking and Financial Services

Financial institutions face a combination of regulatory pressure and internal risk management frameworks that makes cloud-hosted tooling difficult or impossible to justify for certain categories of data. Internal communications, particularly where the platform handles read receipts, survey responses, acknowledgement data, or any targeting based on employee role and location, falls squarely into the category of employee personal data that is subject to the same handling standards as other sensitive data the firm holds.

Beyond the regulatory angle, banks and insurers operate some of the most sophisticated IT security environments of any industry. Their networks are extensively segmented, outbound connectivity from managed devices is tightly controlled, and third-party software must pass rigorous security assessments before deployment. An on-premises deployment that integrates cleanly with existing Active Directory infrastructure, sits behind the corporate firewall, and requires no outbound internet connectivity for core functionality is categorically easier to get approved than a cloud-hosted alternative. The same applies to the individual communication channels, desktop alerts, corporate lock screens, and desktop tickers, all of which operate within the on-premises environment with no external dependency.

Insurance

Insurance groups face similar regulatory frameworks to banking and often carry additional complexity from the distributed nature of their operations. A large insurer may operate across multiple jurisdictions, each with its own data protection requirements, and may have significant populations of employees in both office and field-based roles who need reliable access to internal communications regardless of their network location.

On-premises deployment, combined with strong Active Directory integration for authentication and group management, fits naturally into the technical architecture most large insurers already maintain.

Healthcare

Healthcare organisations handle patient data under some of the strictest regulatory frameworks in any sector, HIPAA in the United States, Caldicott principles and the Data Security and Protection Toolkit in the UK, and equivalent frameworks in other jurisdictions. While employee communications data is distinct from patient data, healthcare IT teams typically apply the same conservative standards to all software procurement, and cloud-hosted platforms face significant scrutiny.

The operational reality of healthcare communications also creates specific requirements: communications need to reach staff across clinical, administrative, and operational environments, including areas with limited or no internet connectivity. Channels such as desktop alerts and lock screen messaging operate within the internal network and are well suited to these environments. An internally-hosted solution that operates within the organisation's existing network infrastructure is more reliable in these environments than one that depends on external connectivity.

Government and Public Sector

Government departments and agencies in many countries operate under explicit data localisation requirements, data generated in government operations must be held on government-approved or domestically-hosted infrastructure. In some cases this extends to a requirement for deployment on government-managed hardware, making true on-premises deployment the only viable option.

Beyond formal requirements, government IT teams are typically conservative in their approach to cloud adoption, particularly for tools that handle employee data. The procurement process for government technology usually includes a formal security assessment, often against a framework like the UK's Cyber Essentials or equivalent — and a clean on-premises deployment is generally easier to clear than a cloud-hosted one.

Multinational Organisations with Cross-Border Data Complexity

A growing category of buyers is multinational organisations that are not regulated in any single particularly restrictive sector, but that operate across enough jurisdictions to make data residency a genuine operational concern. A company with significant employee populations in the EU, the Middle East, Southeast Asia, and the United States faces a patchwork of data handling requirements that a single-region cloud deployment cannot cleanly satisfy.

For these organisations, the combination of on-premises deployment (for the most sensitive or restrictive markets) and region-specific cloud hosting (for markets where that is sufficient) is the most practical architecture, requiring a vendor capable of supporting both models.

Security and IT Infrastructure Requirements

For IT teams evaluating on-premises internal communications software, the deployment model itself is only part of the story. How the software integrates with existing security infrastructure is equally important and often where otherwise-capable platforms fall short.

Active Directory Integration

Active Directory is the directory service at the heart of most enterprise IT environments. It holds the authoritative record of every user account, their attributes, their group memberships, and their access rights. Any on-premises software that needs to know who your employees are, what department they work in, and what their role is should be consuming that information from Active Directory, not maintaining a parallel, manually-managed user database.

For an internal communications platform, this matters in several specific ways:

User provisioning and deprovisioning. When an employee joins, their AD account is created and they should automatically become available in the communications platform, without manual intervention from an administrator. When they leave, their AD account is disabled and they should be immediately removed from all platform access. Any gap in this cycle is a security and compliance risk.

Audience targeting. The power of a well-deployed internal communications platform is the ability to target messages to specific groups, by department, location, role level, or any other attribute. Whether delivering a desktop alert to a single site or a desktop ticker to a specific department, in an AD-integrated deployment those groups already exist. IT should not have to rebuild organisational structure inside a communications tool; the platform should read it from AD directly.

Attribute synchronisation. Beyond basic group membership, richer AD attributes, cost centre, manager hierarchy, site location, employment type, can drive more sophisticated targeting. A platform that can sync and filter on arbitrary AD attributes gives communicators significantly more precision without adding IT overhead.

Single Sign-On and SAML Authentication

Single sign-on is a non-negotiable requirement in most enterprise environments. Employees should authenticate to the communications platform using their existing corporate credentials, not a separate username and password. This has security implications (one credential to manage, one credential to revoke) and practical ones (employees will not engage with a tool that requires a separate login they inevitably forget).

SAML 2.0 is the standard protocol for enterprise SSO federation, and integration with identity providers including Microsoft Entra ID (formerly Azure AD), Active Directory Federation Services (ADFS), Okta, Ping Identity, and others should be a baseline expectation for any on-premises deployment.

For highly regulated environments, this integration is not optional. A communications platform that maintains its own authentication layer is an additional credential system to manage, audit, and secure, and most IT security teams will not accept that overhead.

Group Sync and Audience Management

Group synchronisation, keeping the communications platform's audience groups in step with AD group membership in real time, is where many platforms that claim AD integration fall short. There is a meaningful difference between:

  • Reading user data from AD at initial setup (basic integration)
  • Synchronising user data from AD on a scheduled basis (adequate, but creates lag)
  • Maintaining a live, event-driven sync that reflects AD changes immediately (genuine integration)

For communications purposes, the lag matters. If an employee changes department and it takes 24 hours to be reflected in the communications platform, they may receive a day's worth of messages from their old team and miss a day's worth from their new one. In compliance-sensitive environments, where acknowledgement of a specific communication may need to be attributable to a specific role, this lag is unacceptable.

The practical question to ask any vendor: if an employee is added to an AD group at 9:00am, at what point can a communicator in the platform target that employee as part of that group?

Network and Perimeter Security

An on-premises deployment should be architecturally compatible with the organisation's existing network security model. This means:

No mandatory outbound internet connectivity for core functionality. The platform should operate fully within the internal network for all core communication delivery, sending messages, tracking acknowledgements, managing audiences. Any external connectivity requirements (for updates, for vendor support) should be optional, explicit, and audited.

Compatibility with network segmentation. Many enterprise networks are significantly segmented, different VLANs for different departments, separate networks for regulated vs non-regulated functions. The communications platform should be deployable in a way that allows it to reach across segments where required, using existing network controls rather than requiring new firewall exceptions.

Proxy and certificate support. In environments where outbound traffic is inspected via a proxy or SSL inspection is in place, the platform should support these configurations without requiring exceptions that would undermine the organisation's security controls.

Agent deployment via existing tooling. The client-side component of the platform, typically a lightweight agent installed on managed devices that powers channels including desktop alerts, screensavers, and wallpaper management, should be deployable via the organisation's existing software distribution tooling: Group Policy, SCCM, Intune, or similar. Requiring a separate deployment mechanism is an unnecessary overhead and creates a shadow IT footprint that IT security teams are rightly reluctant to accept.

ISO 27001 and What It Actually Tells You About a Vendor

ISO 27001 is the international standard for information security management systems. A vendor holding ISO 27001 certification has had their information security controls independently audited against a defined framework, covering how they manage access to systems, how they handle data, how they respond to incidents, and how they manage third-party risk.

For procurement teams evaluating internal communications vendors, ISO 27001 certification is a meaningful baseline signal, but it is worth understanding what it does and does not tell you.

What ISO 27001 certification means:

  • The vendor has documented and implemented an information security management system
  • That system has been audited by an accredited certification body and found to meet the standard
  • The certification is maintained through regular surveillance audits (typically annual) and full re-certification every three years
  • The vendor has processes for managing security incidents, access controls, supplier relationships, and risk

What ISO 27001 certification does not tell you:

  • The specific scope of the certification, some vendors certify only a subset of their systems or operations. Ask for the Statement of Applicability and the certificate scope.
  • Whether the certification is current, certificates lapse if surveillance audits are not completed. Always verify currency with the issuing body.
  • The details of their sub-processor and supply chain risk management, relevant if you care about who else touches your data.

For on-premises deployments specifically, the vendor's ISO 27001 certification matters primarily for the software development and update processes, since your own IT team controls the infrastructure. The more relevant question is whether the software itself has been developed under a security-by-design framework, and what the process is for receiving and verifying security updates.

What ISO 27001 Actually Covers

🔐
Access Control
Who can access systems and data, how access is granted and revoked, and how privileged access is managed and audited.
🛡️
Information Security Policies
Documented policies covering how information is classified, handled, and protected across the organisation.
⚠️
Risk Assessment & Treatment
Formal processes for identifying, evaluating, and managing information security risks on an ongoing basis.
🔔
Incident Management
Defined processes for detecting, reporting, and responding to security incidents — including breach notification obligations.
🏢
Supplier & Third-Party Risk
How the vendor manages security risks introduced by their own suppliers and sub-processors who may touch customer data.
🔄
Business Continuity
Plans and controls to ensure information security is maintained during and after a disruptive incident or disaster.
💻
Operations Security
Controls covering day-to-day operational security: change management, malware protection, logging, and monitoring.
📦
Asset Management
Inventory and ownership of information assets, and how those assets are handled throughout their lifecycle.
🔍
Compliance & Audit
Internal audits, management reviews, and processes for maintaining compliance with legal, regulatory, and contractual obligations.

What to Ask Any Internal Comms Vendor During Evaluation

The following questions are designed to surface the real capabilities and limitations, of any vendor claiming to support on-premises or compliance-grade deployment. Vendors who cannot answer these clearly should be treated with caution.

On deployment architecture:

  • Does your platform support true on-premises deployment, where the software runs entirely within our own infrastructure with no data leaving our environment during normal operation?
  • What are the server requirements for on-premises deployment? (Operating system, database, compute, storage)
  • What outbound internet connectivity, if any, does the platform require? What happens if that connectivity is unavailable?
  • How are software updates delivered in an on-premises deployment? Can updates be received, reviewed, and applied on our schedule rather than yours?

On data handling:

  • Where is data stored at rest in an on-premises deployment, specifically including message content, delivery logs, acknowledgement records, and audience data?
  • What data, if any, is transmitted to your infrastructure during normal operation of an on-premises deployment?
  • What data do you access during a support engagement, and what audit trail is created?

On Active Directory and authentication:

  • What Active Directory integration does the platform support? Does it use LDAP, LDAPS, or native AD connectors?
  • Does the platform support SAML 2.0 SSO? Which identity providers have you tested and certified?
  • How frequently does the platform sync with AD? Is sync event-driven or scheduled?
  • Can the platform target communications based on arbitrary AD attributes, or only pre-defined groups?

On security certifications:

  • What is the scope of your ISO 27001 certification? Can you provide the certificate and Statement of Applicability?
  • Have you completed a penetration test on the platform in the last 12 months? Can you share the executive summary under NDA?
  • How do you manage and communicate security vulnerabilities in the software?

On compliance and audit:

  • Can the platform produce audit logs of all administrative actions, who sent what, to whom, when?
  • Are acknowledgement records stored in a format that can be exported for compliance reporting?
  • Have you previously been through a formal third-party risk assessment with a regulated financial institution or government body? What was the outcome?

Common Mistakes When Evaluating On-Premises Solutions

Accepting "private cloud" as equivalent to on-premises. As covered above, these are meaningfully different. If your compliance requirement is that data stays within your own infrastructure, private cloud hosted by the vendor does not satisfy it.

Not defining the compliance requirement precisely before evaluation. "We need on-premises" is often a shorthand for a more specific requirement, data sovereignty, AD integration, no third-party data processors, air-gap compatibility. Getting precise about the actual requirement makes evaluation much more productive and prevents spending time on vendors who can meet the shorthand but not the underlying need.

Evaluating only the product, not the vendor's ability to support it. On-premises deployments require a vendor capable of supporting software in environments they do not control. Ask how many on-premises customers they currently have, what their on-premises support process looks like, and how they handle situations where they need remote access to diagnose an issue.

Ignoring the update lifecycle. Software that is not updated is software that accumulates security vulnerabilities. On-premises deployments put the customer in control of the update process, which is the point, but this requires the vendor to produce timely updates and the customer to have a process for applying them. Understand the vendor's release cadence and the effort required to apply updates before committing.

Treating security certifications as a substitute for due diligence. ISO 27001 is a meaningful signal but not a complete answer. A thorough evaluation for a regulated organisation should include a review of the vendor's penetration testing programme, their incident response history, and ideally a formal third-party risk assessment.

Underestimating the IT change management involved. On-premises deployment is an IT project, not just a software purchase. It requires server provisioning, network configuration, AD integration work, agent deployment across the device estate, and ongoing maintenance. Building an accurate picture of the internal IT resource required, and getting that resource committed, before signing a contract is essential.

Icon

FAQ

Common Questions

We hope this section will help you better understand Heed's internal communication platform

Contact Us

What are the server requirements for an on-premises internal communications deployment?
Faq Icon
Can an on-premises internal communications platform reach employees who work remotely?
Faq Icon
How do software updates work in an on-premises deployment?
Faq Icon
Does on-premises deployment affect what features are available?
Faq Icon
How do you handle data residency requirements for organisations operating across multiple countries?
Faq Icon
Trusted by leading enterprise organisations
Brand LogoBrand LogoBrand LogoBrand LogoBrand Logo

Let's have a chat

Talk to use about keeping your employees informed, engaged and inspired - book a call today!

Book a Call

Cta Image