2 WHAT IS WALKME FOR SALESFORCE? WalkMe enables Salesforce to build and overlay interactive Walk-Thrus that intuitively guide users to self-task successfully with even the most complex processes. Walk-Thrus are a sequence of tip balloons that are displayed onscreen based on what the user needs to do, his actions and the context he is in. WalkMe s technology focuses the users' attention on the screen and takes them step-by-step as they progress through the task in real time. SALESFORCE WILL SEE A MASSIVE IMPACT WITHIN DAYS Using WalkMe requires no integration or changes to the underlying software. WalkMe is a proven solution with 100 s of customers and by utilizing it Salesforce will increase conversions, speed up orientation of new prospects and users, increase the efficiency of current customers and slash the training costs they require. WalkMe is perfect for: Onboarding & orientation of new users Be there with your customers when they start testing and using Salesforce, to make sure they are driven, know and act in the way you know is best. Helping with migration of enterprise customers Remove the barriers of entry for enterprise customers using other CRM systems by slashing the need for training, ease employee agony over changes in their daily routine and cut the learning curve. Improving efficiency of existing customers Help the Salesforce users reach their maximum potential of using Salesforce software by ensuring proper usage, letting the users focus on the job at hand instead of how to operate the software and reduce help desk costs. Upselling to current customers base Use rule based usage analytics to automatically introduce new features and premium features to users who need them. Supporting non-native English speakers
3 Walk-Thrus can be displayed in any language based on user selection or as defined by rules. WALKME S BACKGROUND WalkMe s idea from the get-go was to make the web experience as easy as possible for every person clarifying the ease of any task for any website and thus reinventing the learning curve for any website, online service or software. WalkMe is a user-friendly and easy-to-use tool that requires no modification to underlying software where "Walk-Thrus" can be created in seconds without any previous technical skills. Walk- Thrus have reinvented the learning curve! Users are now able to intuitively use any system and be an expert within days. TECHNOLOGY WalkMe offers a secure, reliable, and scalable platform. The company culture believes in going out of the way to make clients comfortable and secure in the product especially when incorporating WalkMe in their services. As a pure software-as-a-service (SaaS) company, all of WalkMe's servers, data bases, and storage are located in a top tier and secure cloud network. WalkMe values providing dependability and availability to customers with its service and partnerships. In order to provide customers with the greatest flexibility, WalkMe utilizes Amazon Web Services (AWS). Because of WalkMe's advanced and scalable architecture, clients can be confident knowing that their end users will have zero effect on their website performance and user experience. WALKME IS COMPRISED OF THREE MODULES WalkMe Editor The WalkMe Editor is a simple and easy-to-use tool for creating and editing Walk-Thrus.
4 WalkMe Player The WalkMe Player is a discreet on-screen widget that allows end-users to control the visual experience and look of Walk-Thrus. The Player is made available to end-users as part of the website itself and does not require any configuration or installation. WalkMe Analytics WalkMe Analytics is a sophisticated analytical tool used to review the efficiency of Walk-Thru playback data. A DEEPER LOOK INTO THE THREE WALKME MODULES WalkMe Editor The WalkMe Editor is a Firefox extension that enables website and application owners to create Walk-Thrus for their websites. The WalkMe Editor requires no technical knowledge and allows users to point and click on the website elements to create a unified guidance flow Walk-Thrus. The Walk-Thrus are then saved onto database servers and stored there as personal drafts. During the creation process of the Walk-Thrus, they are not visibly seen or available to any of the end-users until publication and activation. The process to publish and activate Walk-Thrus involves two simple actions. Step 1: A One Time Implementation of the WalkMe Snippet In order to display the Player on your website or application, the WalkMe snippet must be added to the header of all of the HTML pages on which you wish to enable the Walk-Thrus. It's only required once for the entire life cycle of your partnership with WalkMe. This process is similar to the process of adding Google Analytics to a website. This snippet code is actually the connection between the original website content and WalkMe. Once the website HTML loads onto the end users browser, the browser activates the snippet code, which begins the downloading of WalkMe's data. Step 2: Publishing Walk-Thrus When the Walk-Thrus are ready to be launched and seen by end users on the website or application, the owner clicks on the "publish" button in the WalkMe Editor. This action changes the status of the selected Walk-Thrus from draft to published status, converting the Walk-Thrus to public and visible to all end-users. Changing or editing a Walk-Thru is made simple with the availability of more extensive editing options in the Editor. When the user publishes a new Walk-Thru, a flat file is generated with the Walk-Thru data and is deployed on Amazon's Cloudfront CDN.
5 SECURITY ASPECTS OF THE EDITOR Login Policy User Authentication and Authorization All users and administrators of WalkMe's platform are assigned a unique user account and authorization level. Password Policy All users authenticate to WalkMe with an and password of at least eight characters. Authentication is established over a 128bit SSL V3 HTTPS encrypted protocol where passwords are subsequently stored in databases encrypted with a hash algorithm. Password and Operator Lock-Out To prevent brute force attacks, WalkMe accounts are locked after multiple failed login attempts. After a short period of time, the account is unlocked and the user can log in again. Users have the capability to change their password upon request if they forgot their username or password. They are sent confidential s that were provided upon their original signup. WALKME PLAYER The WalkMe Player is responsible for playback of all published Walk-Thrus. The WalkMe player is displayed in the form of a widget on top of the website pages. Once the original
6 website page content is loaded completely in the end users' browser, the WalkMe Player quickly communicates and downloads the WalkMe files from Amazon Cloudfront CDN into the browser's cache. These files, with a total size of KB, contain all the data that is needed in order to play the entire Walk-Thrus. Once downloaded, the WalkMe Player is displayed to the end-user. The Walk-Thru data will only be downloaded again if changes were made to any of the Walk-Thrus. The datatransfer process from the end users browser to WalkMe's web servers are done using the protocol of the webpage (HTTP OR HTTPS) and is determined by the website owner according to their specific needs. Because the request for WalkMe files from the servers are only made after the website page has been completely loaded, no lag or negative effect to the website performance is experienced or seen. PLAYER SECURITY ASPECTS The WalkMe architecture offers the following security advantages: 1) End-user browsers download static files from Amazon CloudFront CDN making no demands on CPU. In addition, no database queries are made.
7 2) End users have no need to download or use any special protocols as the entire system and communication are based on standard HTTP (80) and HTTPS (443) protocols and ports. a. No direct connections between the customers company servers and their endusers are required. All communications are handled and intermediated by WalkMe s web servers on Amazon EC2. b. In HTTPS mode, data is transferred in encrypted form with 128 bit SSL V3 using a trusted public certificate authority to ensure the authenticity of WalkMe s server to both parties. WALKME ANALYTICS WalkMe Analytics is a comprehensive statistics panel that provides rich, detailed information on Walk-Thru usage in the website or application. The data includes the number of Walk- Thrus performed and at which steps the end-users dropped from the Walk-Thrus. This enables the website/application owner to understand the problematic points of their current business process or Walk-Thru flow. Furthermore, the Analytics system enables the user to add mail-generated rules that let them instantly know of any high or low usage of Walk-Thrus and to determine any problems that might have occurred during the Walk-Thru playback process. The option for advanced users to send website related information that can be aggregated with the analytics data is available for even higher resolution data analysis. The call between the browser and the server is being done using an a-synchronized AJAX call, which has zero effect on user performance or the browser state. The request sent is encrypted with 128 bit SSL V3 using a trusted public certificate authority to ensure the authenticity of WalkMe s server to both parties.
8 IMPLEMENTATION MODELS WalkMe On-Premises Model For companies that require high security standards, which cannot be achieved using the SaaS Model, WalkMe offers the On-Premises Model, in which the entire WalkMe platform is installed locally on the client servers. Unlike the Self-Hosted Model above, where the Walk-Thru generated files are saved on the client servers during the editing process and the Analytics data are being stored on WalkMe Cloud, the entire creation-process and the Analytics will be saved on WalkMe servers that will be installed locally on the client servers, in the On-Premises Model. This way, the entire WalkMe solution is stored in-house on the client servers, and the endusers entire communication as well as the entire Walk-Thru-creation process will be performed against the client servers.
9 WalkMe On-Premises Model Enterprise Web Servers Enterprise LAN WalkMe Analytics Server Customer Web Servers (hosting WalkMe static files) Publish Process WalkMe Editor Server WalkMe Static files Walk-Thru Data Original Website content Walk-Thru Analytics Data Customer content owner End Users WEB VULNERABILITIES, PRIVACY AND DATA RETENTION WalkMe was built as a third-party application to seamlessly work inside websites and Webapplications. Therefore, WalkMe implemented a multi-tiered approach in providing the highest security services possible by both developing the platform itself in the highest security standards and utilizing Amazon's Web Services security. Content Filtering Since the Walk-Thru balloons contain user generated data, a real need to prevent any attempts of Cross Site Scripting (XSS) exists. This is a form of attack that injects malicious content
10 into the balloons and thereafter to the users browser. WalkMe prevents these kinds of attacks by having implemented an advanced content-filtering mechanism that is embedded in WalkMe's content servers. Therefore any attempts to insert scripts are automatically blocked within the server side before publishing any of the Walk-Thrus. Audit Trail and Logs in the WalkMe Editor User-activity within the WalkMe Editor is monitored and logged, enabling login & publishing data to be traced and attributed to a specific user, IP address, date, and time. This enables WalkMe customers to extend their control and auditing policies in the WalkMe platform. Data Collected by the WalkMe Player Application Even though WalkMe is a layer on top of the website itself, it does not collect any information regarding the end-users actions or data. Furthermore, it does not collect any information from the website itself. In order to deliver the highest quality statistics to the website owner, a summarized table of information about the overall usage of their Walk-Thru data is presented of only Walk-Thru progress details. For example, if an end-user plays a Walk-Thru that directs them in how to perform a procedure in their bank account on the bank's website, the only information that will be sent from the browser to WalkMe's servers are the Walk-Thru balloon steps that have been played as part of the Walk-Thru, along with the user IP address, domain, operating system, browser type, and the time of each balloon appearance. Secure Storage Even though the only information that is stored on WalkMe's servers is the Walk-Thru text, HTML parameters for identifying the correct location to place the balloons, and the progress of the Walk-Thru is kept private and safe by WalkMe s efforts and assurance to maintain all data confidential. All balloon text, images, and statistical information gathered from the WalkMe Player are stored within WalkMe s database servers, secured by a firewall. Every WalkMe customer is assigned a unique user ID with access control mechanisms embedded in the application and in the database that prevents unauthorized access. Although data may be stored on shared database servers, the data is strictly protected and segregated in a way that ensures that only authorized entities can have access to it.
12 agencies to develop, document, and implement an information security system for its data and infrastructure based on the National Institute of Standards and Technology Special Publication , Revision 3 standard. FISMA Moderate Authorization and Accreditation requires AWS to implement and operate an extensive set of security configurations and controls. This includes documenting the management, operational, and technical processes used to secure the physical and virtual infrastructure, as well as the third-party audit of the established processes and controls. AWS has received a three-year FISMA Moderate authorization for Infrastructure as a Service from the General Services Administration. AWS has also successfully achieved other ATOs at the FISMA Moderate level by working with government agencies to certify their applications and workloads. PCI DSS Level 1 AWS has achieved Level 1 PCI compliance. We have been successfully validated as a Level 1 service provider under the Payment Card Industry (PCI) Data Security Standard (DSS). Merchants and other service providers can now run their applications on our PCI-compliant technology infrastructure for storing, processing, and transmitting credit card information in the cloud. Other enterprises can also benefit by running their applications on other PCIcompliant technology infrastructure. PCI validated services include Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S3), Amazon Elastic Block Storage (EBS) and Amazon Virtual Private Cloud (VPC), Amazon Relational Database Service (RDS), Amazon Elastic Load Balancing (ELB), Amazon Identity and Access Management (IAM), and the underlying physical infrastructure and the AWS Management Environment. For more information please visit our PCI DSS Level 1 FAQs. ISO AWS has achieved ISO certification of our Information Security Management System (ISMS) covering our infrastructure, data centers, and services including Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3) and Amazon Virtual Private Cloud (Amazon VPC). ISO 27001/27002 is a widely-adopted global security standard that sets out requirements and best practices for a systematic approach to managing company and customer information that s based on periodic risk assessments. In
13 order to achieve the certification, a company must show it has a systematic and ongoing approach to managing information security risks that affect the confidentiality, integrity, and availability of company and customer information. This certification reinforces Amazon s commitment to providing transparency into our security controls and practices. AWS s ISO certification includes all AWS data centers in all regions worldwide and AWS has established a formal program to maintain the certification. A copy of our ISO certificate, available to AWS customers, describes the ISMS services and geographic scope. International Traffic In Arms Compliance The AWS GovCloud (US) region supports US International Traffic in Arms Regulations (ITAR) compliance. As a part of managing a comprehensive ITAR compliance program, companies subject to ITAR export regulations must control unintended exports by restricting access to protected data to US Persons and restricting physical location of that data to US land. AWS GovCloud (US) provides an environment physically located in the US and where access by AWS Personnel is limited to US Persons, thereby allowing qualified companies to transmit, process, and store protected articles and data under ITAR. The AWS GovCloud (US) environment has been audited by an independent third party to validate the proper controls are in place to support customer export compliance programs for this requirement. FIPS The Federal Information Processing Standard (FIPS) Publication is a US government security standard that specifies the security requirements for cryptographic modules protecting sensitive information. To support customers with FIPS requirements, the Amazon Virtual Private Cloud VPN endpoints and SSL-terminating load balancers in AWS GovCloud (US) operate using FIPS validated hardware. AWS works with AWS GovCloud (US) customers to provide the information they need to help manage compliance when using the AWS GovCloud (US) environment. OTHER COMPLIANCE INITIATIVES The flexibility and customer control that the AWS platform provides permits the deployment of solutions that meet industry-specific compliance requirements. HIPAA
14 Customers have built healthcare applications compliant with HIPAA s Security and Privacy Rules on AWS. AWS provides the security controls customers can use to help to secure electronic health records. CSA AWS has completed the Cloud Security Alliance (CSA) Consensus Assessments Initiative Questionnaire. This questionnaire published by the CSA provides a way to reference and document what security controls exist in AWS s Infrastructure as a Service offerings. The questionnaire (CAIQ) provides a set of over 140 questions a cloud consumer and cloud auditor may wish to ask of a cloud provider. More information regarding Amazon Web Services can be found at OPERATIONS Penetration Testing WalkMe's application and network are tested for security vulnerabilities by independent security experts as part of the secure development lifecycle. The tests include an array of penetration scenarios regardless of one that is tested independently by Amazon AWS, which tests its services frequently. In addition, WalkMe's security team makes sure to ensure that all aspects of security adhere to the highest standards. UPTIME, BUSINESS CONTINUITY AND DISASTER RECOVERY Capacity and Uptime WalkMe's architecture was designed with the appropriate mindset to manage large scale traffic and CPS (connections per second) in order to provide high quality speed, availability, and service for our customers. The massive usage by users requesting Walk-Thru data is achieved against Amazon Cloudfront, which has a service commitment of a Monthly Uptime Percentage (defined below) of at least 99.9%. Disaster Recovery and BCP
15 WalkMe's disaster recovery plan, which resides on Amazon's disaster recovery plans, ensures that customers experience no interruption of service in the event of a loss of data occurring at Amazon's data centers. WalkMe's primary and most crucial services are the Walk-Thrus themselves, which are stored on Amazon's Cloudfront CDN, supporting the most advanced methods of DRP. WalkMe's other and less crucial components are the WalkMe Editor and WalkMe Analytics which resides on Amazon EC2 and Amazon RDS, and are both supported by the most advanced methods of DRP. CONCLUSION WalkMe strives to provide the highest security possible for its customers by utilizing top-tier technology and products to provide the best user and customer experience possible. By emphasizing security and responsible planning for expected future growth with our partners and users, WalkMe has established the building blocks to provide the best step-by-step guidance tool on the internet to help millions of people around the world perform complicated tasks with ease. DISCLAMIER This document is for informational purposes only. WalkMe LTD. PROVIDES THIS DOCUMENT AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. No part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), without the prior written permission of WalkMe, LTD. except as otherwise permitted by law. Prior to publication, reasonable effort was made to validate this information. Actual savings or results achieved may be different than those outlined in the document. This document could include technical inaccuracies or typographical errors. Contact: WalkMe LTD. US Toll Free: WALKME ( )
WALKME WHITEPAPER WalkMe Architecture Introduction WalkMe - the Enterprise Class Guidance and Engagement Platform - drives users to action as they use software or websites. WalkMe is used by Enterprises
APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software
Self-Hosted Implementation May 2013 About WalkMe WalkMe is an easy-to-use platform for creating interactive onscreen Walk-Thrus that run on top of your actual website or web app. Unlike video tutorials,
Amazon Web Services: Risk and Compliance July 2012 (Please consult http://aws.amazon.com/security for the latest version of this paper) 1 This document intends to provide information to assist AWS customers
ANALYST BRIEF Securing Amazon It s a Jungle Out There PART 1 CONTROLS AND OPTIONS OFFERED BY AMAZON Author Rob Ayoub Overview Infrastructure as a service (IaaS) is a foundational component of modern cloud
Amazon Web Services: Risk and Compliance January 2011 (Please consult http://aws.amazon.com/security for the latest version of this paper) 1 This document intends to provide information to assist AWS customers
Amazon Web Services: Risk and Compliance January 2013 (Please consult http://aws.amazon.com/security for the latest version of this paper) Page 1 of 59 This document intends to provide information to assist
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
Building Energy Security Framework Philosophy, Design, and Implementation Building Energy manages multiple subsets of customer data. Customers have strict requirements for regulatory compliance, privacy
Connectik Platform Security and Reliability November, 2016 The information in this document may be subject to change without notice. All statements, information, and recommendations in the document are
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
Anypoint Platform Cloud Security and Compliance Whitepaper 1 Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security.
Page 2 Disclaimer THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF THE LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET
Security Model Overview WHITE PAPER November 2014 Table of Contents INTRODUCTION...................................................................... 1 APPLICATION SECURITY..............................................................
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
Amazon Web Services: Risk and Compliance May 2011 (Please consult http://aws.amazon.com/security for the latest version of this paper) 1 This document intends to provide information to assist AWS customers
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
Technical Guide Blue Jeans Network Security Features Blue Jeans Network understands an organization s need for secure communications. The Blue Jeans cloud-based video conferencing platform provides users
Technology Help Desk 412 624-HELP  technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for
Amazon Web Services: Risk and Compliance July 2015 (Consult http://aws.amazon.com/compliance/aws-whitepapers/ for the latest version of this paper) Page 1 of 128 This document is intended to provide information
Delivering Peace of Mind in Digital Optimization TABLE OF CONTENTS INTRODUCTION 2 PRIVACY AND ANONYMITY 3 ISO 27001 COMPLIANCE 5 APPLICATION-LEVEL SECURITY 6 PENETRATION TESTING AND SECURITY AUDITS 7 GENERAL
DLT Solutions and Amazon Web Services For a seamless, cost-effective migration to the cloud PREMIER CONSULTING PARTNER DLT Solutions 2411 Dulles Corner Park, Suite 800 Herndon, VA 20171 Duane Thorpe Phone:
September 2014 Version v1.8" Thank you for your interest in PasswordBox. On the following pages, you ll find a technical overview of the comprehensive security measures PasswordBox uses to protect your
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
Primex Wireless OneVue Architecture Statement Secure, cloud-based workflow, alert, and notification platform built on top of Amazon Web Services (AWS) 2015 Primex Wireless, Inc. The Primex logo is a registered
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider
Helping people make better decisions DATA SECURITY POLICY Kiilakiventie 1, 90250 Oulu, Finland tel: +358 10 423 7901 www.zef.fi/en GENERAL Server Operating system: Unix, Apache 2.x. User interface implemented
Introduction to AWS Security July 2015 Page 1 of 7 Table of Contents Introduction... 3 Security of the AWS Infrastructure... 3 Security Products and Features... 4 Network Security... 4 Inventory and Configuration
Application Security Best Practices Matt Tavis Principal Solutions Architect Application Security Best Practices is a Complex topic! Design scalable and fault tolerant applications See Architecting for
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
Amazon Web Services Agenda - Introduction to Amazon s Cloud - How ArcGIS users adopt Amazon s Cloud - Why ArcGIS users adopt Amazon s Cloud - Examples How did Amazon Get into Cloud Computing? On-Premise
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
Federal GIS Conference February 9 10, 2015 Washington, DC Using ArcGIS for Server in the Amazon Cloud Bonnie Stayer, Esri Amy Ramsdell, Blue Raster Session Outline AWS Overview ArcGIS in AWS Cloud Builder
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Paxata Security Overview Ensuring your most trusted data remains secure Nenshad Bardoliwalla Co-Founder and Vice President of Products firstname.lastname@example.org Table of Contents: Introduction...3 Secure Data
PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
Intermedia s Dedicated Exchange This is a practical guide to implementing Intermedia s Dedicated Hosted Exchange on AWS. Intermedia, the world s independent provider of Hosted Exchange, and AWS, the leading
BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits
Securing the Microsoft Cloud Page 1 Securing the Microsoft Cloud Microsoft recognizes that trust is necessary for organizations and customers to fully embrace and benefit from cloud services. We are committed
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
Druva Phoenix: Enterprise-Class Data Security & Privacy in the Cloud Advanced, multi-layer security to provide the highest level of protection for today's enterprise. Table of Contents Overview...3 Cloud
Whitepaper Security Best Practices for Evaluating Google Apps Marketplace Applications At a Glance Intended Audience: Security Officers CIOs of large enterprises evaluating Google Apps Marketplace applications
Security Whitepaper NetTec NSI provides a leading SaaS-based managed services platform that to efficiently backup, monitor, and troubleshoot desktops, servers and other endpoints for businesses. Our comprehensive
EXECUTIVE STRATEGY BRIEF Microsoft recognizes that security and privacy protections are essential to building the necessary customer trust for cloud computing to reach its full potential. This strategy
Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity
VIEWABILL Cloud Security and Operational Architecture featuring RUBY ON RAILS VAB_CloudSecurity V1 : May 2014 Overview The Viewabill.com cloud is a highly-secure, scalable and redundant solution that enables
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
White Paper Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration This paper focuses on security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support
SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS Jeff Cook November 2015 Summary Service Organization Control (SOC) reports (formerly SAS 70 or