FAQ PROJECTPLACE SECURITY

Size: px
Start display at page:

Download "FAQ PROJECTPLACE SECURITY"

Transcription

1 FAQ PROJECTPLACE SECURITY This FAQ sheet is intended to provide a better understanding of Projectplace and its security services with respect to areas such as backup, safeguards and certifications. For questions unanswered here or elsewhere on the Projectplace website, please contact Projectplace at security@projectplace.com Table of content 1. Privacy benefit 2. Third-party audits 3. Security audit 4. Physical access to user assets 5. Information protection 6. User data and safeguards 7. Sensitive data and encryption 8. Access to the databases 9. Customer data and Projectplace staff 10. Data-backup and data-retention policies 11. Backups and operating data 12. Projectplace servers 13. RTO, RPO and disaster recovery 14. User data and contract termination 15. Web-application attacks 16. User credentials and secure login 17. Additional password settings 18. Viruses and malware 19. Sensitive user information and SLA 20. Terms and conditions SLA 21. Two-factor authentication 22. Single-Sign-on (SSO) 23. Single-Sign-on (SSO) through SAML 24. Filtering IP addresses 25. IPCI DSS-certified service provider 26. In case of bankruptcy or a change in business 27. Information security management system 1. What is the additional privacy benefit of using a service within the EU? A significant competitive differentiator for Projectplace is its focus on providing user data integrity, which includes safeguarding potential access from overseas legislation such as, for example, the United States Patriot Act. All Projectplace systems are hosted in Stockholm, Sweden: user data never leaves the private cloud. The majority of competitors have data centres outside the EU and therefore lack immunity to such legislation. This, however, solely covers data stored in the Projectplace systems: data linked to projects in the Projectplace service through the use of integration tools (e.g. GoogleDrive and Dropbox) is not protected as described above. 2. What third-party audits are performed in the Projectplace environment? The Projectplace infrastructure and application are subject to vulnerability scans, regularly performed on a quarterly basis. Annual penetration tests are carried out by independent third parties. These tests are repeated whenever any significant changes occur in the Projectplace environment. Projectplace has an established information-security-management system, which was awarded ISO 27001certification by Intertek, an independent auditor. A copy of this certificate can be viewed on the company web site Furthermore, Projectplace entrusts external auditors (Deloitte) to evaluate its information security practices and general IT controls. 3. What is the approach used when a client requests to have a security audit of Projectplace conducted? Projectplace has an open policy that allows its clients to perform security audits of its service. The audit may be performed by either the client or a third-party supplier appointed by the client, provided that sufficient non-disclosure agreements have been completed and testing pre-conditions, defined by Projectplace, have been mutually agreed upon. Testing pre-conditions typically include dedicated timeframes, static source IP addresses, defined test types (avoiding destructive tests, such as denial of service and DNS poisoning), etc. 1 Faq Projectplace Security l 2013 by Projectplace International AB. All rights reserved.

2 Safeguarding against potential access from overseas legislation All Projectplace systems are hosted in Stockholm, Sweden and the customer data never leaves our private cloud therefore it is immune from overseas legislation from outside the EU, such as the United States Patriot Act. 4. How is physical access to user assets and/or information controlled and restricted solely to authorised staff? The Projectplace server environment is hosted in two separate colocation facilities and is operated by Qbranch 365/24 AB in Stockholm, Sweden. Qbranch AB, is a profitable, rapidly-growing co-location provider, assigned with an AAA rating. The ISO certified, service organisation provides server hall facilities with 24-hour physical security. This includes comprehensive identification, access control and monitoring systems, automatic fire protection, redundant climate control and fail-over power supply. All physical access to Projectplace data centres operated by QBranch is logged and monitored in real time. CCTV images from inside the data centre are retained for 90 days. 5. How is user information protected from unauthorised networkaccess, such as malicious internal users and external hackers? The network containing the Projectplace production servers (the service) is protected by redundant firewalls, intrusion detection systems and load balancers. The Projectplace service is located on a physically segregated network that requires two-factor authentication for administrative access from the office network. Projecplace proactively monitors and analyses firewall and systems, using its internal system for security information and event management to identify unusual traffic patterns, potential intrusion attempts and other security threats. Network monitoring services, provided by Qbranch 365/24 AB for the co-location facilities, are used as well. 6. How is data from a particular user segregated from that of other clients? What safeguards are in place to prevent users from accessing one another s data? Projectplace achieves logical separation of user data through object level access controls and encryption. In Projectplace, each object links to a file individually encrypted, using an AES-192 algorithm. Access controls are implemented at the object level to prevent unauthorised users from accessing data. Production or user data is not used in the Projectplace testing environment. Production and test environments are physically segregated; only dummy user data is used in testing. Projectplace does not store user data on backup media; instead, it relies on real-time replication of data (through mirroring and snapshots) in redundant systems for availability (hosted at co-location sites as described above). Security controls for the segregation of user data are identical in both environments. 2 Faq Projectplace Security l 2013 by Projectplace International AB. All rights reserved.

3 7. How is sensitive data, stored and transmitted by the Projectplace service protected? Which encryption methods are used? Data in transit is encrypted with 256 bit SSL (version 3) and TLS (version 1) protocols, using a 2048 bit RSA public key for key exchange. User data (including login information) is not sent through unencrypted channels. Details of the Projectplace encryption certificate can be viewed on the public web site. All documents stored in Projectplace are automatically encrypted with a unique key, using the AES-192 encryption algorithm. Documents are saved anonymously, rendering identification impossible. Encryption keys are stored separately, with precautions are taken to prevent unauthorised access both to encrypted documents and their corresponding encryption keys. User data is not stored in the Projectplace database; only the objects which refer to the encrypted files are stored in the data vault. Continuous security testing The Projectplace infrastructure and application are subject to vulnerability scans, regularly performed on a quarterly basis. Annual penetration tests are carried out by independent third parties. 8. Who at Projectplace has access to the databases? Only a very limited number of system operation team members (fewer than ten) have access to the production databases through two-factor authentication. 9. What customer data stored in the Projectplace system can be viewed by Projectplace staff? Only the user s contact information - i.e. name, address, address, phone numbers and project membership can be viewed by Projectplace support and sales staff. Projectplace administrators are able to see all project names and their members that have been created in the system. This information is neither shared with anyone, nor sold or marketed to any third party (see Privacy Statement: privacy-statement/.) Projectplace staff is prohibited from accessing user project data or uploaded documentation. In fact, the extensive encryption procedures effectively prevent anyone (including Projectplace staff) from accessing this information, using normal daily operations or existing tools. To obtain access to project data and recover project files, an administrator would need to retrieve the encryption key for each individual object and decrypt each file. To prevent unauthorised retrieval of customer data, mechanisms for access control (through two-factor authentication), logging and monitoring have been implemented. Faq Projectplace Security l 2013 by Projectplace International AB. All rights reserved. 3

4 Secure transmission over the Internet Data in transit is encrypted with 256 bit SSL (version 3) and TLS (version 1) protocols, using a 2048 bit RSA public key for key exchange. 10. What data-backup and data-retention policies and procedures are applied to the information stored in the Projectplace service? Multi-step mirroring and online backup routines for production databases and document storage systems have been put into effect by Projectplace. These mirrored data vaults are subject to security control identical to that of the production system. User data is not stored on removable backup media (i.e. tapes). Online backups (snapshots) of the Projectplace database do not contain user data (only object referrers). The backups serve the sole purpose of restoring the whole production system in the unlikely event of multiple server failure. Projectplace employees are unable to restore individual projects or documents from these backups. Upon client request, Projectplace has procedures in place for the removal and secure disposal of user data. These procedures include deleting encrypted files from the data vault, removing the referrer object and encryption key from Projectplace databases and overwriting the allocated memory space in the data vault so as to prevent restoration. At the end of their life cycle, all data vault disks are physically destroyed by disk shredders. Projectplace retains user data as long as clients remain members of the service. Projectplace can retain user data indefinitely for active project members, downloadable at any point in time by the user for offline retention. 11. How long are backups and operating data retained? Unless data is explicitly deleted by the project user, all project information is retained for the duration of the project. Once the user initiates project data deletion - e.g. by emptying a project s waste paper bin or terminating a project - the data disposal process is initiated, with user information no longer retained hereinafter. Object referrers and their associated encryption keys for deleted objects are deleted from the Projectplace database, which then initiates the garbage collection process, removing the encrypted file from the data vault and overwriting the data. Projectplace does not use backup tapes or other removable media to store user data. Once the data is purged from both primary and secondary systems, it is no longer available. 12. What is the backup schedule for Projectplace servers? How much data could a user potentially lose? Projectplace operates a fully redundant system with real-time database mirroring. All data generated on the Projectplace primary site is continuously backed up to its secondary site, via dual fibre connections. The Projectplace disaster recovery tests demonstrate zero data loss. Projectplace further promises to keep data loss to a minimum (estimated RTO and RPO approximately two minutes) in the event of an actual disaster. 13. What are the RTO and RPO of the disaster recovery solution for the Projectplace service? The Projectplace production system is run on a multi-site cluster at two geographically dispersed locations. All critical servers and applications are installed at both locations, which, in the case of a major disruption or disaster, ensure business continuity. All data stored in the primary database servers is mirrored to secondary servers in real time. Second- 4 Faq Projectplace Security l 2013 by Projectplace International AB. All rights reserved.

5 ary servers are located at the second Qbranch co-location facility and are configured to automatically take over production tasks. In the event one of the locations fails, the second site is configured to take over all production tasks with minimal service disruption and capacity loss (estimated RTO and RPO approximately two minutes). In the event of a major disruption or disaster at one or both production sites, an emergency response team, consisting of selected Projectplace staff, is summoned to activate the disaster recovery plan. Safe from prying eyes Projectplace staff is prohibited from accessing user project data or uploaded documentation. In fact, the extensive encryption procedures effectively prevent anyone (including Projectplace staff) from accessing this information, using normal daily operations or existing tools. 14. How is user data disposed of at the time of contract termination? Once a user initiates deletion of project data - for example, by emptying a project s waste paper bin or terminating a project, object referrers and their associated encryption keys are deleted from the Projectplace database. This initiates the garbage collection process, which removes the encrypted files from the data vault and overwrites the data. The process is identical for both primary and secondary data centres. User data is not stored on any removable storage systems or backup media. 15. What processes and procedures are in place to ensure that the web application is not vulnerable to known web-application attacks? Projectplace is constructed on a multi-tier architecture, consisting of web servers, application servers and database data storage. Projectplace has in place established coding standards and a software-development life cycle, with security incorporated from the very outset. Industry guidelines, such as The Open Web Application Security Project (OWASP), Secure Coding Guide, SANS CWE Top 25 and CERT Secure Coding are followed by the development team. Projectplace application security is tested by web application vulnerability scans and annual penetration tests at least once every quarter and whenever any significant change is made in the system. These tests are performed in accordance with OWASP testing guidelines. 16. What controls are implemented and enforced that protect user credentials and ensure a secure login procedure? All users are required to authenticate on the service with a unique username and password combination. User credentials are encrypted when transmitted over the Internet (HTTPS) and when at rest in the Projectplace database. User-identity verification is done via , using the self-service, challenge-response mechanism. Users are required to enter the activation code that is sent to their pre-defined address. By default, users are required to have passwords that consist of at least six characters in order to access the service. However, the client account manager can define the minimum password requirements for project members and enforce higher security standards. Password properties recommended by Projectplace are as follows: At least eight characters Upper and lower case characters Numeric characters Faq Projectplace Security l 2013 by Projectplace International AB. All rights reserved. 5

6 Over 99% uptime since 1998 Projectplace operates a fully redundant system with real-time database mirroring. All data generated on the Projectplace primary site is continu ously backed up to its secondary site, via dual fibre connections. Currently, settings for password history and account lockout are not supported by Projectplace. Users are required to re-authenticate after session expiration (one hour). 17. What additional password settings can be enabled on the service? Project administrators can set the minimum password requirement of between eight or ten characters.password complexity requirements can be set to none, one or both of the following: Both small and capital letters must be included in the password. Numeric characters must be included in the password. Password validity duration can be set to the following options: Never expire After 1 month After 3 months After 6 months After 12 months Please note these settings only apply to enterprise accounts. 18. How are client assets and/or information protected against damage potentially caused by viruses and other types of malware? Projectplace provides file integrity monitoring and anti-virus software for all our critical systems that are commonly affected by malware. 19. How are clients informed about any incident or breach that potentially exposes sensitive user information? Do standard agreements and SLAs include clauses that stipulate terms and conditions for the reporting of these types of incidents? Projectplace has in place established security incident responses and escalation procedures that ensure timely and effective handling of all situations. All clients are informed in the event of a security incident which may potentially expose their data or cause a major disruption to the service. Projectplace is in close contact with the Swedish CERT, the police and legal authorities to handle such cases. 20. Are custom SLAs supported by Projectplace? What terms and conditions in the standard SLAs are negotiable? Although Projectplace provides the best service for all its clients, custom SLAs are supported by Projectplace and are preferred by some larger clients. RTO/RPO, retention periods and notification mechanisms are among the negotiable terms of a custom SLA. In the past year, Projectplace maintained an uptime of 99.98%, independently monitored by third-party, Pingdom. 6 Faq Projectplace Security l 2013 by Projectplace International AB. All rights reserved.

7 21. Does Projectplace support two-factor (2-factor) authentication for the login procedure? Currently, the Projectplace service does not support two-factor authentication. However, the infrastructure is constructed in such a way so as to support encrypted authentication mechanisms that utilise strong passwords. All passwords and data in transit are encrypted, using SSL version 3 and TLS version 1 protocols over the Internet (HTTPS). To protect data stored in the Projectplace systems (including user credentials) the Advanced Encryption Standard (AES) protocol, renowned for its security, is used. Furthermore, Projectplace has a mature information security management system in place. Risks are continuously monitored and evaluated. Projectplace does not believe that two-factor authentication adds much value to its service security when taking into account the existing number of mitigating controls. These controls include, but are not limited to, strong passwords, account-lockout mechanisms, audit logging and monitoring. Seamless login process via SSO Projectplace supports Single-Sign-on (SSO), using the SAML and Active Directory Federation service for its enterprise clients. The SSO procedure allows network users to access Projectplace without having to log in separately. 22. Does Projectplace support Single-Sign-on (SSO) for the login procedure? Yes, Projectplace supports Single-Sign-on (SSO), using the SAML and Active Directory Federation service for its enterprise clients. The SSO procedure allows network users to access Projectplace without having to log in separately, with authentication federated from the Active Directory. When federated authentication is enabled, Projectplace does not validate a user s password. Instead, an assertion in the HTTP POST request is verified, allowing for SSO if the assertion proves to be true. This reflects the industry s standard procedure for SSO that is widely in use. When federated authentication is enabled, Projectplace does not validate a user s password. Instead, an assertion in the HTTP POST request is verified, allowing for SSO if the assertion proves to be true. This reflects the industry s standard procedure for SSO that is widely in use. 23. What features are supported by Single-Sign-on (SSO) through SAML? The implementation of SSO through SAML is mainly for end-user convenience, avoiding the need for users to remember multiple passwords. Currently, Projectplace does not support advanced SAML features which allow for centralised user accounts and access management (such as automatic deletion of users from the Projectplace system after removal from the client domain). This, however, is in the pipeline. 24. Can exposure be limited by limiting access to the system through filtering IP addresses? Currently Projectplace does not provide source IP-based access restriction as the service is intended for global access. With over 820,000 users, IP-source-address filtering is not a manageable access control for the Projectplace system. Faq Projectplace Security l 2013 by Projectplace International AB. All rights reserved. 7

8 Certified Security Projectplace s mature information security management system is awarded the ISO certificate. 25. Is Projectplace a PCI DSS-certified merchant/service provider? PCI DSS (Payment Card Industry Data Security Standard) is a set of security requirements and guidelines for merchants who store, process or transmit cardholder data. Projectplace outsources all its payment processing to DIBS. Cardholder data is not stored, transmitted or processed by Projectplace systems. Users are directed to the DIBS secure payment page for online purchasing and returned to Projectplace upon transaction completion. Since its systems never touch payment card data, Projectplace is not subject to PCI DSS. DIBS, however, is a PCI DSS-validated service provider for online payment processing. 26. In the event of Projectplace bankruptcy or a change in its line of business, does Projectplace provide an escrow agreement to safeguard user data and project data? Projectplace, one of the first SaaS providers and in existence since1998, is customarily used as an escrow medium for cross-organisational collaboration. For companies that work together but don t want project documentation to be hosted by either side, Projectplace is an invaluable solution. Whilst Projectplace does not by default support escrow agreements, it can offer its clients the technical assurance that all project documentation and plans are downloadable for off-line retention. All data stored on the Projectplace site is owned solely by the client. Once a project or account is deleted, the corresponding data is no longer retained. Users desiring to retain documents for a longer period of time are able to download project documentation. Users are also able to implement a routine backup procedure that downloads their documents for off-line retention. 27. Does Projectplace have an information security management system in place? Is Projectplace ISO certified? Yes, Projectplace has a very mature information security management system in place, whereby risks are continuously monitored and evaluated. Projectplace was awarded ISO certification in March of 2012, following an audit by Intertek. A copy of the certificate is available for viewing on the company web site. 8 Faq Projectplace Security l 2013 by Projectplace International AB. All rights reserved.

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

Security, trust and assurance

Security, trust and assurance Data sheet Security, trust and assurance A closer look at Projectplace safeguards Security: Projectplace protects every bit of your data Trust: Privacy is not dead at Projectplace, your data is yours Assurance:

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

Understanding Sage CRM Cloud

Understanding Sage CRM Cloud Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

GoodData Corporation Security White Paper

GoodData Corporation Security White Paper GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

Dean Bank Primary and Nursery School. Secure Storage of Data and Cloud Storage

Dean Bank Primary and Nursery School. Secure Storage of Data and Cloud Storage Dean Bank Primary and Nursery School Secure Storage of Data and Cloud Storage January 2015 All school e-mail is disclosable under Freedom of Information and Data Protection legislation. Be aware that anything

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

CONTENTS. Security Policy

CONTENTS. Security Policy CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

CONTENTS. PCI DSS Compliance Guide

CONTENTS. PCI DSS Compliance Guide CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not

More information

GiftWrap 4.0 Security FAQ

GiftWrap 4.0 Security FAQ GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels

More information

Security Information & Policies

Security Information & Policies Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

CyberSource Payment Security. with PCI DSS Tokenization Guidelines CyberSource Payment Security Compliance The PCI Security Standards Council has published guidelines on tokenization, providing all merchants who store, process, or transmit cardholder data with guidance

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

Enterprise level security, the Huddle way.

Enterprise level security, the Huddle way. Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

PCI Compliance for Cloud Applications

PCI Compliance for Cloud Applications What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things. Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?

More information

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

THE SECURITY OF HOSTED EXCHANGE FOR SMBs THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available

More information

How to complete the Secure Internet Site Declaration (SISD) form

How to complete the Secure Internet Site Declaration (SISD) form 1 How to complete the Secure Internet Site Declaration (SISD) form The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

Data Security Policy THE CTA. Guardian Electrical Solutions Ltd DATA SECURITY POLICY. Reviewed and approved by the Company Secretary Richard Roebuck

Data Security Policy THE CTA. Guardian Electrical Solutions Ltd DATA SECURITY POLICY. Reviewed and approved by the Company Secretary Richard Roebuck THE Data Security Policy CTA Reviewed and approved by the Company Secretary Richard Roebuck Signed 04/01/2013 INDEX SECTION DESCRIPTION 1.0 INTRODUCTION 2.0 AND ARRANGEMENTS 3.0 MONITORING THE SECURITY

More information

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99% Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the

More information

Media Shuttle s Defense-in- Depth Security Strategy

Media Shuttle s Defense-in- Depth Security Strategy Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

White Paper: Librestream Security Overview

White Paper: Librestream Security Overview White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing

More information

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Xerox Litigation Services In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Your Highest Priority is also Your Greatest Challenge Data breaches are not just

More information

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on

More information

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But

More information

ShareFile Security Overview

ShareFile Security Overview ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The

More information

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 -------------- w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------

More information

Service Overview CloudCare Online Backup

Service Overview CloudCare Online Backup Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house

More information

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 80% of compromised systems were card present or in-person transactions

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10 Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between

More information

FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY

FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY Page 1 of 6 Summary The Payment Card Industry Data Security Standard (PCI DSS), a set of comprehensive requirements for enhancing payment account

More information

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 1 Cloud Computing In the Industry Introduction to Cloud Computing The term cloud computing is simply the use of computing

More information

Cloud Software Services for Schools

Cloud Software Services for Schools Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Contact name Contact email Contact

More information

White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC.

White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC. White Paper ezcac: HIPAA Compliant Cloud Solution Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1 Copyright 2014, ezdi, LLC. TECHNICAL SAFEGUARDS Access Control 164.312 (a) (1)

More information

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing

More information

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 1.2.1 to 2.0

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 1.2.1 to 2.0 Payment Card Industry (PCI) Data Security Standard Summary of s from PCI DSS Version 1.2.1 to 2.0 October 2010 General General Throughout Removed specific references to the Glossary as references are generally

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

A Rackspace White Paper Spring 2010

A Rackspace White Paper Spring 2010 Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

The Education Fellowship Finance Centralisation IT Security Strategy

The Education Fellowship Finance Centralisation IT Security Strategy The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and

More information

Vendor Audit Questionnaire

Vendor Audit Questionnaire Vendor Audit Questionnaire The following questionnaire should be completed as thoroughly as possible. When information cannot be provided it should be noted why it cannot be provided. Information may be

More information

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started

More information

Safe and Sound Processing Telephone Payments Securely. A white paper from Barclaycard and Visa Europe leading the way in secure payments April 2015

Safe and Sound Processing Telephone Payments Securely. A white paper from Barclaycard and Visa Europe leading the way in secure payments April 2015 Safe and Sound Processing Telephone Payments Securely A white paper from Barclaycard and Visa Europe leading the way in secure payments April 2015 Executive summary The following information and guidance

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

BMC s Security Strategy for ITSM in the SaaS Environment

BMC s Security Strategy for ITSM in the SaaS Environment BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information

StratusLIVE for Fundraisers Cloud Operations

StratusLIVE for Fundraisers Cloud Operations 6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace

More information

Cloud Software Services for Schools

Cloud Software Services for Schools Cloud Software Services for Schools Supplier self-certification statements with service and support commitments Please insert supplier details below Supplier name Address Contact name Contact email Contact

More information

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129

<Choose> Addendum Windows Azure Data Processing Agreement Amendment ID M129 Addendum Amendment ID Proposal ID Enrollment number Microsoft to complete This addendum ( Windows Azure Addendum ) is entered into between the parties identified on the signature form for the

More information

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security COMPLIANCE Checklist For Employers Compliance HIPAA Security COMPLIANCE Checklist For Employers All of the following steps must be completed by April 20, 2006 (April 14, 2005 for Large Health Plans) Broadly speaking, there are three major

More information

Security and Data Protection for Online Document Management Software

Security and Data Protection for Online Document Management Software Security and Data Protection for Online Document Management Software Overview As organizations transition documents and company information to Software as a Service (SaaS) applications that are no longer

More information

Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013. Designtech Cloud-SaaS Hosting and Delivery Policy

Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013. Designtech Cloud-SaaS Hosting and Delivery Policy Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013 Page i Designtech Cloud-SaaS Hosting and Delivery Policy Designtech Cloud-SaaS Hosting and Delivery Policy, Version 1.0, 2013 Page ii

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

Implementation Guide

Implementation Guide Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

Secure and control how your business shares files using Hightail

Secure and control how your business shares files using Hightail HIGHTAIL FOR ENTERPRISE: SECURITY OVERVIEW Secure and control how your business shares files using Hightail Information the lifeblood of any business is potentially placed at risk every time digital files

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Information That Should Help You Sleep at Night

Information That Should Help You Sleep at Night Box Security Overview Information That Should Help You Sleep at Night Box s security controls and the ability to turn on and off folder access are key for us. Brian Davis President, Net Generation More

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Birst Security and Reliability

Birst Security and Reliability Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their

More information

PCI Compliance Considerations

PCI Compliance Considerations PCI Compliance Considerations This article outlines implementation considerations when deploying the Barracuda Load Balancer ADC in an environment subject to PCI Data Security Standard (PCI DSS) compliance.

More information

BANKING SECURITY and COMPLIANCE

BANKING SECURITY and COMPLIANCE BANKING SECURITY and COMPLIANCE Cashing In On Banking Security and Compliance With awareness of data breaches at an all-time high, banking institutions are working hard to implement policies and solutions

More information

How To Use Egnyte

How To Use Egnyte INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information

More information

Brochure Achieving security with cloud data protection. Autonomy LiveVault

Brochure Achieving security with cloud data protection. Autonomy LiveVault Achieving security with cloud data protection Autonomy LiveVault Can cloud backup be secure? Today, more and more companies recognize the value and convenience of using cloud backup to protect their server

More information

Keyfort Cloud Services (KCS)

Keyfort Cloud Services (KCS) Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency

More information

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

How To Backup Your Hard Drive With Pros 4 Technology Online Backup Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and

More information

Definitely a Trustworthy Investment

Definitely a Trustworthy Investment Definitely a Trustworthy Investment Physical and Logical Security of Conclude s SaaS Solutions 1. Introduction Conclude GmbH offers solutions in a so called Software-as-a-Service (SaaS), meaning Conclude

More information

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility. FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer

More information

How To Audit Health And Care Professions Council Security Arrangements

How To Audit Health And Care Professions Council Security Arrangements Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan

More information

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance

More information

Is Your IT Environment Secure? November 18, 2015. Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting

Is Your IT Environment Secure? November 18, 2015. Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting Is Your IT Environment Secure? November 18, 2015 Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting Clark Schaefer Consulting Serving elite and emerging companies with practical solutions

More information

HIPAA Security Matrix

HIPAA Security Matrix HIPAA Matrix Hardware : 164.308(a)(1) Management Process =Required, =Addressable Risk Analysis The Covered Entity (CE) can store its Risk Analysis document encrypted and offsite using EVault managed software

More information

Tableau Online Security in the Cloud

Tableau Online Security in the Cloud Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important

More information

Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: March 2011. Information Supplement: Protecting Telephone-based Payment Card Data

Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: March 2011. Information Supplement: Protecting Telephone-based Payment Card Data Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: March 2011 Information Supplement: Protecting Telephone-based Payment Card Data Table of Contents Executive Summary 3 Clarification of

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

CloudDesk - Security in the Cloud INFORMATION

CloudDesk - Security in the Cloud INFORMATION CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES

More information

U06 IT Infrastructure Policy

U06 IT Infrastructure Policy Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud Druva Phoenix: Enterprise-Class Data Security & Privacy in the Cloud Advanced, multi-layer security to provide the highest level of protection for today's enterprise. Table of Contents Overview...3 Cloud

More information

FMCS SECURE HOSTING GUIDE

FMCS SECURE HOSTING GUIDE FMCS SECURE HOSTING GUIDE October 2015 SHG-MNL-v3.0 CONTENTS INTRODUCTION...4 HOSTING SERVICES...4 Corporate Secure Hosting... 4 Hosting Partner... 4 Hosting Location... 4 Physical Security... 4 Risk and

More information