Security & Infrastructure White Paper

Size: px
Start display at page:

Download "Security & Infrastructure White Paper"

Transcription

1 Proofing and approval made easy. Security & Infrastructure White Paper ProofHQ (Approvr Limited) 66 The High Street Northwood Middlesex HA6 1BL United Kingdom US: UK:

2 Introduction... 3 Security overview... 4 Perimeter & physical security... 4 Key security features and advantages... 5 Application security... 9 Advanced password security options... 9 Network connectivity Network security Data integrity Complete system redundancy Uptime / High availability Summary - Your data is secure and protected... 17

3 Introduction The accessibility, security and integrity of your data are integral to the success of your company and the reputation of our business. Because ProofHQ is delivered as a Software-as-a-Service (SaaS) solution, we understand that the reliability and uptime of our services are of utmost importance to your business and our success. Your data is secure with ProofHQ. The ProofHQ platform runs on a proven infrastructure designed to provide maximum security, performance, and reliability. ProofHQ partners with RackSpace who is a leader in hosting solutions to provide its customers and partners with state-of-the-art perimeter, network, server, application and data security to ensure privacy and availability. The data center infrastructure includes raised floors, state-of-the-art fire suppression, abundant and redundant high speed Internet connectivity, redundant power, and a self-contained cooling system. ProofHQ provides its software services to multiple users worldwide. The profile of our average customer is a fast-paced, small-to-medium sized business organization or a team or department within a large Fortune 500 or Global 2000 company. All of these customers, companies and organizations, regardless of their size, trust and rely on ProofHQ on a daily basis.

4 Security overview ProofHQ s security and infrastructure were designed to provide maximum performance and reliability with state-of-the-art physical and data security and redundancy. ProofHQ s security policy was architected with multiple layers of security, safeguards and redundancy to ward off external security threats. Perimeter & physical security ProofHQ is dedicated to developing and maintaining a state-of-the-art physical site security where it hosts its data and servers. ProofHQ hosts its primary servers and data with Rackspace in Chicago, Illinois. The data center s security includes on-site 24/7 staff, alarm systems, card key access, CCTV archived video and a host of other state-of-the-art security measures. With fully redundant power supplies, multiple backup generators, numerous of Tier 1 Internet providers, and laser-based early smoke detection, Rackspace s data center s have been configured to maximize safety, security and reliability.

5 Key security features and advantages Surveillance Physical access to the data center is controlled and monitored 24/7 by: Biometric scanning Security camera monitoring 24/7 onsite staff Unmarked facilities to help maintain low profile Physical security audited by an independent firm Data center access is limited to Rackspace data center technicians. Only authorized personnel are allowed to access the physical site and servers (including any remote, virtual or tele-access to the data center). Authorized personnel are required to pass through electronic and visual identity validation systems to enter the data center. Access to the data center is maintained by time-stamped logs for historical retrieval. All of ProofHQ s equipment (servers, routers, switches, storage devices) are stored in securely locked cabinets and cages.

6 Remote Access To ensure security, there is no direct data linkage or connected data lines between ProofHQ offices and the Rackspace data center. Remote Access to the ProofHQ Servers are strictly controlled and limited to authorized personnel only. Any authorized remote access is solely executed via encrypted communications. SSAE 16 Type II SOC 1 Rackspace is SSAE 16 Type II SOC 1 compliant which supersedes and effectively replaces the Statement on Auditing Standards (SAS) No. 70 Type II as designated by the U.S. Securities and Exchange Commission (SEC) as an acceptable method for a user organization's management to obtain assurance about service organization's internal controls without conducting separate assessments. A service auditor's examination performed in accordance with SSAE 16 ( SOC 1 Audit ) Type II SOC 1 ( SOC 1 Audit ) provides a detailed description of our controls and the effectiveness of those controls. The examination often includes controls over information technology and related processes. The SSAE 16 was created to update the US service organization reporting to mirror the new international service organization-reporting standard, the International Standard for Assurance Engagements (ISAE) No Rackspace recognizes the needs of their US, International and Global customers and has worked with the service auditor to have the report issued with a joint opinion that satisfies the requirements of both the SSAE 16 and the ISAE Building, fire suppression and power backup

7 The Chicago data center is a 34,000 sq. ft. state-of-the-art Gigabit Data Center situated in Chicago. The spacious facility features raised floors, state-ofthe-art redundant fiber optics and redundant self-contained fire suppression and cooling system. The data center s HVAC (Heating Ventilation Air Conditioning) system is N+1 redundant. This ensures that a duplicate system immediately comes online should there be an HVAC system failure. Every 90 seconds, all the air in the data center is circulated and filtered to remove dust and contaminants. With advanced fire suppression systems designed to stop fires from spreading in the unlikely event one should occur. If a total utility power outage ever occurs all of the data centers' power systems are designed to run uninterrupted, with every server receiving conditioned UPS (Uninterruptible Power Supply) power. The UPS power subsystem is N+1 redundant, with instantaneous failover if the primary UPS fails.

8 If an extended utility power outage occurs, the routinely tested, on-site diesel generators can run indefinitely.

9 Application security User authentication / Login security Users access ProofHQ only with a valid username and password combination thus ensuring secure access is restricted to specified users All ProofHQ users create a unique username and password when they create their ProofHQ account. These are encrypted using SSL while in transmission Users' credentials are verified before access to the ProofHQ applications is granted When logging into the system the user s secure session is created and monitored using a unique session identifier. Every subsequent request made by the user is authenticated using this unique session identifier. The security measures are transparent to the user Each additional request is re-verified and if the user s session cannot be authenticated or the user s status on the site has changed (i.e., the user is deleted from the system or Account by an Administrator), the user will not be allowed to access the system anymore ProofHQ uses Expiring Headers which enables users with the ability to ensure maximum security after they log out of ProofHQ eliminating the ability for other users to access cached pages in the browser Advanced password security options ProofHQ also provides an additional layer of password security by allowing Administrators to adjust a range of password options such as: Minimum password length The Administrator can determine what the minimum password length must be for all users within the account. To ensure a minimum level of password security, ProofHQ natively requires a minimum of 6 characters Password complexity Administrators can require users to use complex password credentials. Enabling this feature will require all users to include one or more of the following in their passwords: o At least one or more lower case character o At least one or more UPPER CASE character o o At least one or more digit (numeral) At least one or more special character one of the following ^ etc. Automatic password ageing Administrators can determine how often user passwords expire; forcing users to create a new password every specified number of days

10 Password repetition Administrators can prevent users from using previously entered passwords which will require the user to create a unique password when required Account lockout Additionally the Administrator can specify the number of times a user can reattempt an invalid login before their account is locked out. Once locked only an Administrator can unlock the user s account Below is a screenshot of the Advanced password settings: Permissions & rights management ProofHQ provides customizable permissions and rights management to accommodate a variety of customer needs. User Permissions are managed at both the Account level and at the Folder level allowing access to specified folders only and allowing the Administrator to further restrict user permissions at proof and file level. There are several types of user profiles that can exist within ProofHQ, each with their own permissions and level of access. In addition to the standard restrictions placed on a given user profile, the ProofHQ system uses folders that allow the Administrator to provide additional restrictions to items contained within these folders. Each proof created within the system can also be configured with the appropriate access and restrictions.

11 Creating a user allows you to select an appropriate permission profile A proof can be configured to restrict user access

12 Network connectivity To assure constant and continuous connectivity to the core internet backbones, ProofHQ s network infrastructure leverages Multi-Homed Bandwidth carriers. This ensures global access and uptime in the event of network discontinuity with a single carrier. Only high performance bandwidth is used throughout this network. To provide multiple redundancies in the flow of information to and from the data center, Rackspace partners with nine network providers. Every fiber carrier must enter the data center at separate points. This is to protect from complete service failures caused by an unlikely network cut. Fast and reliable network connections are guaranteed because of the Proactive Network Management methodology that monitors route efficiency and end-user performance, automatically improving the network's topology and configuration in real-time. The network's configuration, codeveloped with Cisco, guards against any single points of failure at the shared network level.

13 Network security ProofHQ has architected a multi-layered approached to secure and defend your data from external attack. We leverage state-of-the-art hardware and software security methods to prevent unauthorized intrusion by external users attempting to access your data. Our infrastructure proactively deters and monitors for external attacks and unauthorized intrusions. ProofHQ employs experienced engineers, system administrators and IT professionals who pass through rigorous testing, confidentiality agreements and background checks to secure your data. The ProofHQ team is proactively monitoring and deploying new security measures via software and hardware on a regular basis as appropriate. 3rd Party network auditing In addition to our own security measures, our network security is audited by industry leading 3rd party vendors. ProofHQ s multi-layer network security protection ProofHQ deploys a Multi-Layered Network Security Protection System to secure and defend your data from intrusion and attack. Between our servers which house customer data and the Internet, there are four layers of network security protection: 1. IDS (Intrusion detection system) The first line of defense to protect your data is the IDS that reside in front of the firewall. The IDS is specifically configured to provide on-demand and scheduled vulnerability scanning to block the most prevalent Worms, Trojans, BotNets and unauthorized intruders attacks on the web by analyzing header and packet information. Via the scanning process, each packet is inspected and either granted authorized access or denied before ever reaching the firewall. The IDS is the initial line of defense to eliminate unauthorized and unnecessary traffic and blocks it from gaining access to the Firewall. 2. Firewall All information and data requests that pass through the IDS must next pass through the firewall. The firewall places strict limits on ports and protocols and provides the second layer of protection for your data: NAT (Network Address Translation) also known as Network or IP Masquerading technology is used in the ProofHQ data center firewall to provide an extra layer of security. 3. Web server load balancing Web Server Load Balancing, while not strictly a security layer, also provides additional port screening and protocol protection. Web Server Load Balancing can identify common DoS attacks and screen them before reaching the server. It ensures that the URL requests being made are well formed, thus rejecting attempted exploits.

14 4. Web/Application servers The Web/Application server layer runs on Red Hat Linux with Apache as the Web Servers and ProofHQ as the application. Apache is configured to minimal configuration specifications required to run our application layer Application servers are configured to process HTTP requests only Other non-core Internet protocols and services are disabled Servers are locked down and secured at the operating system and system directory levels All non-essential ports and services have been blocked, locked and disabled Site operations Regular operations and system administrator meetings are held to discuss and review near-term and long-term industry compliant solutions ProofHQ proactively monitors industry security warnings, channels and alerts to uncover new and emerging security risks. ProofHQ engineers act immediately upon the discovery of any security risks or alerts ProofHQ proactively scans vendor-specific security channels, including: Cisco Systems, Microsoft Corporation, FreeBSD, Linux, plus community-based forums and channels. ProofHQ also subscribes to all common virus and bug notification and alerts lists. Security patches & upgrades The ProofHQ team routinely monitors, evaluates, tests and applies security patches, fixes, updates and upgrades Any other mission critical security patches, updates and upgrades from vendor and community channels are notified and sent to ProofHQ and are routinely evaluated, tested, and applied, if applicable, within hours of being notified

15 Data integrity We store a large number of data files within the ProofHQ customers accounts and thousands of files are continually being added every week. ProofHQ enlists a variety of methods to assure data integrity, including data protection based on network architecture, as described previously, plus software enabled SSL data encryption. Protected data storage Your data s integrity is protected by numerous layers of state-of-the-art hardware and software security features to prevent hackers or other unauthorized individuals from gaining access to it. With our multiple layer network security system, your data is safely sequestered well out of harm s way. The following details our approach to defense-in-depth security. Security model is reapplied with every request and enforced for the entire duration of the session. Application security model prevents customer data cross-over and ensures complete customer data segregation and privacy. Customer data is segmented from the Application layer providing additional security buffers. Virus scanning ProofHQ and application servers run the latest version of virus detection software. Virus scanning software is updated daily. SSL Data encryption All data transmissions are secured with 256 bit AES High Grade Encryption and Secure Socket Layer (SSL) that protects your data using both server authentication and data encryption. SSL encryption technology protects your data from being read during transmission from your computer to ProofHQ servers. SSL encryption software ensures that when the recipient of the transmitted data receives the information, the computer decrypts the information, authenticates the source and verifies the data integrity. SSL encryption technology leverages digital certificates to verify the identity of the data flow over the internet and allows for encryption and decryption by authorized (authenticated sources). ProofHQ uses GoDaddy for its SSL Digital Certificates. GoDaddy is worldwide the largest provider of new SSL certificates. GoDaddy certificates are recognized by EVERY major desktop and mobile browser enabling organizations of all sizes to secure e-business transactions cost-effectively. They are a founding member of the group that developed Extended Validation SSL Certificates, and one of the first Certification Authorities to offer the Extended Validation green bar. GoDaddy SSL Certificates are based on the established industry standards and have been WebTrust-certified by KPMG for 5 consecutive years.

16 System recovery ProofHQ deploys industry standard best practices to assure system recovery for any eventuality or scenario. Data backups and restoration ProofHQ has implemented rigorous backup procedures to ensure that your data is safely and accurately backed up. Mirrored and Redundant Data Stores ProofHQ maintains a mirrored and redundant copy of the entire storage system. This acts as a warm backup ensuring quick access and retrieval of data in the event of an emergency. Full Backup Snapshot ProofHQ maintains a full backup snapshot of the servers and data on a weekly basis with differential backups taking place every day. Database backups are made using Grandfather-father-son strategy U can access and download the entire contents of their data in ProofHQ using the backup functionality. The Backup is delivered to you as a zip file. It includes an XML export of all of your data (including comments and responses for all versions of all proofs), but does NOT include the original files that you uploaded as proofs Complete system redundancy System redundancy is the key to ensuring consistent and reliable uptime and to eliminating single points of failure. ProofHQ s infrastructure provides full redundancy of all key system components and services including hardware, internet connectivity and power systems. Redundancy is available on all key networking equipment including routers, switches, firewalls and load-balancing servers. Multiple load-balanced web servers and application servers are configured to ensure redundancy. If a web server fails, there are multiple web servers available to carry the website traffic and loads without interruption. Database and file servers use hardware RAID (redundant array of independent disks) technology to ensure availability during standard maintenance. This also ensures data integrity and redundancy in the event of any single hard drive failure without interruption or data loss to the user/customer. Routers and web servers are optimized and configured to accommodate maintenance, software upgrades, server rotation and configuration without a disruption of service.

17 Uptime / High availability ProofHQ provides industry-leading uptime and service with high availability and uptime. Real-time updating of systems can be found at: The measured uptime for ProofHQ typically exceeds 99.9%. (This is exclusive of scheduled maintenance which includes hardware and network maintenance as well as software updates.) Hardware maintenance is typically performed in windows between 12:00 am and 3:00 am Eastern Time on weekends to avoid inconveniencing customers. ProofHQ schedules software maintenance for weekend mornings (North America time) to ensure minimal customer disruption. ProofHQ uses real-time onsite and offsite alerts systems and site monitoring to ensure the availability and performance of distributed IT infrastructures e.g., servers, operating systems, network devices, network services, applications, and application components. Proactive monitoring enables ProofHQ engineers to attack problems immediately before they become critical or emergencies. Summary - Your data is secure and protected ProofHQ provides industry leading security and protection of your data. Whether you are working from your office, your home or on the road you can depend on ProofHQ to be available to you at your critical moments. The ability to access your data anytime from anywhere ensures that you remain productive, protected and connected to the information that you need to run your business. For more information or questions, please contact info@proofhq.com.

Central Desktop Security and Infrastructure

Central Desktop Security and Infrastructure Central Desktop Security and Infrastructure EXECUTIVE SUMMARY Central Desktop provides industry-leading security and protection of your data. Whether you are working from your office, your home, or on

More information

GiftWrap 4.0 Security FAQ

GiftWrap 4.0 Security FAQ GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels

More information

SECURITY + INFRASTRUCTURE

SECURITY + INFRASTRUCTURE WHITEPAPER SECURITY + INFRASTRUCTURE Central Desktop / Updated April 22, 2015 Table of contents Introduction 3 Security overview 4 Perimeter + physical security 4 Key security features + advantages 5 Surveillance

More information

StratusLIVE for Fundraisers Cloud Operations

StratusLIVE for Fundraisers Cloud Operations 6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

Digital Asset Management & Digital Rights Management...wrapped in Workflow

Digital Asset Management & Digital Rights Management...wrapped in Workflow Digital Asset Management & Digital Rights Management...wrapped in Workflow LightBox Network Integration Options LightBox Basic Startup time: 10 min. - All LightBox Network / LIVE features - Unlimited users

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,

More information

Security & Infra-Structure Overview

Security & Infra-Structure Overview Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4

More information

Birst Security and Reliability

Birst Security and Reliability Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their

More information

BroadData Unified Meeting Security Whitepaper v4.2

BroadData Unified Meeting Security Whitepaper v4.2 BroadData Unified Meeting Security Whitepaper v4.2 Introduction As organizations unlock the true potential of meeting over the Web as an alternative to costly and time-consuming travel, they do so in the

More information

ProjectManager.com Security White Paper

ProjectManager.com Security White Paper ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for

More information

SITECATALYST SECURITY

SITECATALYST SECURITY SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

SNAP WEBHOST SECURITY POLICY

SNAP WEBHOST SECURITY POLICY SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one

More information

SaaS Security for the Confirmit CustomerSat Software

SaaS Security for the Confirmit CustomerSat Software SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

How To Use Egnyte

How To Use Egnyte INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

Sophisticated Password Policy

Sophisticated Password Policy Hosted PRESENTS... Secure Your Source Code Studies show that companies of all sizes have begun adopting SaaS (Software as a Service) solutions in a faster pace as a way to implement IT services more quickly

More information

SaaS Security for Confirmit Horizons

SaaS Security for Confirmit Horizons SaaS Security for Confirmit Horizons January 2015 Confirmit Horizons v18.5 Arnt Feruglio Chief Operating Officer The Confirmit Horizons Software From its inception in 1997, the architecture and code of

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

KeyLock Solutions Security and Privacy Protection Practices

KeyLock Solutions Security and Privacy Protection Practices KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions Sage Nonprofit Online and Sage Virtual Services Frequently Asked Questions General What is Sage Nonprofit Online? Sage Nonprofit Online provides access to Sage 100 Fund Accounting, Sage Grant Management,

More information

SAS 70 Type II Audits

SAS 70 Type II Audits Thinking from IntraLinks SAS 70 Type II Audits SAS 70 Type II Audits Ensuring Data Security, Reliability and Integrity If your organization shares sensitive data over the Internet, you need rigorous controls

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

Understanding Sage CRM Cloud

Understanding Sage CRM Cloud Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4

More information

Enterprise level security, the Huddle way.

Enterprise level security, the Huddle way. Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

THE SECURITY OF HOSTED EXCHANGE FOR SMBs THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available

More information

redcoal EmailSMS for MS Outlook and Lotus Notes

redcoal EmailSMS for MS Outlook and Lotus Notes redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: support@redcoal.com Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal

More information

BOWMAN SYSTEMS SECURING CLIENT DATA

BOWMAN SYSTEMS SECURING CLIENT DATA BOWMAN SYSTEMS SECURING CLIENT DATA 2012 Bowman Systems L.L.C. All Rights Reserved. This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

Description of Hosted Services Security

Description of Hosted Services Security Compliance Management System Description of Hosted Services Security OVIYA SYSTEMS LLC 231 Market Pl, Ste.373, San Ramon, CA 94583 l Disclaimer: All rights reserved worldwide. Reprint only with permission

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

CONTENTS. Security Policy

CONTENTS. Security Policy CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER

More information

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider

More information

Blue Jeans Network Security Features

Blue Jeans Network Security Features Technical Guide Blue Jeans Network Security Features Blue Jeans Network understands an organization s need for secure communications. The Blue Jeans cloud-based video conferencing platform provides users

More information

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security

More information

Making the leap to the cloud: IS my data private and secure?

Making the leap to the cloud: IS my data private and secure? Making the leap to the cloud: IS my data private and secure? tax & accounting MAKING THE LEAP TO THE CLOUD: IS MY DATA PRIVATE AND SECURE? Cloud computing: What s in it for me? The more you know about

More information

KEEN - Reliable Infrastructure, Built to Last

KEEN - Reliable Infrastructure, Built to Last KEEN - Reliable Infrastructure, Built to Last 2 KEEN--Reliable Infrastructure, Built to Last A strong network infrastructure is the underpinning of the Knowledge Elements Education Network (KEEN). It is

More information

State of Texas. TEX-AN Next Generation. NNI Plan

State of Texas. TEX-AN Next Generation. NNI Plan State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...

More information

Genesys Meeting Center Version 4.0

Genesys Meeting Center Version 4.0 Genesys Meeting Center Version 4.0 Security Whitepaper February 2007 2004-2007 Genesys Conferencing Inc. This is a Genesys whitepaper. All rights reserved. Trademarks: Genesys Meeting Center is a trademark

More information

custom hosting for how you do business

custom hosting for how you do business custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide

More information

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R

More information

by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document

by New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.

More information

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several

More information

Powering the Cloud Desktop: OS33 Data Centers

Powering the Cloud Desktop: OS33 Data Centers OS33 Data Centers info@os33.com (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets

More information

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

Table of Contents. Page 1 of 6 (Last updated 30 July 2015) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Famly ApS: Overview of Security Processes

Famly ApS: Overview of Security Processes Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL

More information

YubiCloud OTP Validation Service. Version 1.2

YubiCloud OTP Validation Service. Version 1.2 YubiCloud OTP Validation Service Version 1.2 5/12/2015 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship product, the YubiKey, uniquely

More information

How To Secure Your Data Center From Hackers

How To Secure Your Data Center From Hackers Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL ARCHITECTURE & APPLICATION CONTROL A technical overview of BoldChat s security. INTRODUCTION LogMeIn offers consistently reliable service to its BoldChat customers and is vigilant in efforts to provide

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Security Whitepaper: ivvy Products

Security Whitepaper: ivvy Products Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security

More information

How To Use Quantum Rbs Inc. Small Business Backup

How To Use Quantum Rbs Inc. Small Business Backup Small Business Backup & Recovery (File Servers, Peer-to-Peer, Laptops, Desktops) Smart Features: Continuous Backup Anywhere Access to Backed Up Data Simple Rate Plan Secure Bank Grade Encryption Open Files

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Itron Cloud Services Offering

Itron Cloud Services Offering Itron Cloud Services Offering WHITE PAPER TABLE OF CONTENTS Introduction... 3 Types of Services... 3 Software as a Service (SaaS)...3 Managed Services...3 On-site Managed Services...3 Benefits... 3 Infrastructure...

More information

White Paper: Librestream Security Overview

White Paper: Librestream Security Overview White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing

More information

ITAR Compliant Data Exchange

ITAR Compliant Data Exchange ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/

More information

800 319 5581 800 319 5582 Fax www.protectmyministry.com www.mobilizemyministry.com

800 319 5581 800 319 5582 Fax www.protectmyministry.com www.mobilizemyministry.com 800 319 5581 800 319 5582 Fax www.protectmyministry.com www.mobilizemyministry.com Protect My Ministry websites including www.ministryopportunities.org have the following SSL Certificates and protection:

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

BMC s Security Strategy for ITSM in the SaaS Environment

BMC s Security Strategy for ITSM in the SaaS Environment BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...

More information

Altus UC Security Overview

Altus UC Security Overview Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...

More information

RL Solutions Hosting Service Level Agreement

RL Solutions Hosting Service Level Agreement RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,

More information

Features Security. File Versioning. Intuitive User Interface. Fast and efficient Backups

Features Security. File Versioning. Intuitive User Interface. Fast and efficient Backups IBackup Professional provides a secure, efficient, reliable, cost effective and easy to use Internet based backup solution with additional emphasis on security and data retention. IBackup Professional

More information

Secure access provided to sensitive documents - anytime, anywhere. Quick setup and easy administration of data room, documents and users

Secure access provided to sensitive documents - anytime, anywhere. Quick setup and easy administration of data room, documents and users Eliminate the Paper Chase V-Rooms Virtual Data Rooms is an Internet-based, on demand hosted service designed to speed the completion of financial transactions which may involve hundreds of participants

More information

Tenzing Security Services and Best Practices

Tenzing Security Services and Best Practices Tenzing Security Services and Best Practices OVERVIEW Security is about managing risks and threats to your environment. The most basic security protection is achieved by pro-actively monitoring and intercepting

More information

Enterprise Security Model in SAS Environment

Enterprise Security Model in SAS Environment Enterprise Security Model in SAS Environment WHITE PAPER Enterprise Security Model in SAS Environment Emerging internet threats coupled with strict compliance requirements of banks, financial institutions,

More information

Secure Your Source Code and Digital Assets

Secure Your Source Code and Digital Assets Hosted PRESENTS... Secure Your Source Code and Digital Assets - World's 1st Hosted SCM Solution Studies show that companies of all sizes have begun adopting SaaS (Software as a Service) solutions in a

More information

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

AVeS Cloud Security powered by SYMANTEC TM

AVeS Cloud Security powered by SYMANTEC TM Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

RSS Cloud Solution COMMON QUESTIONS

RSS Cloud Solution COMMON QUESTIONS RSS Cloud Solution COMMON QUESTIONS 1 Services... 3 Connectivity... 5 Support... 6 Implementation... 7 Security... 8 Applications... 9 Backups... 9 Email... 10 Contact... 11 2 Services What is included

More information

Managed Security Services for Data

Managed Security Services for Data A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified

More information

SERVICE LEVEL AGREEMENT

SERVICE LEVEL AGREEMENT SERVICE LEVEL AGREEMENT This Service Level Agreement (SLA) is provided by ECS and is intended to define services and responsibilities between ECS and customer. ECS along with contracted 3 rd party partners

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

eztechdirect Backup Service Features

eztechdirect Backup Service Features eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets

More information

White Paper. McAfee Web Security Service Technical White Paper

White Paper. McAfee Web Security Service Technical White Paper McAfee Web Security Service Technical White Paper Effective Management of Anti-Virus and Security Solutions for Smaller Businesses Continaul Security Auditing Vulnerability Knowledge Base Vulnerability

More information

White Paper. BD Assurity Linc Software Security. Overview

White Paper. BD Assurity Linc Software Security. Overview Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

BriteMail HOSTED EXCHANGE BRITE SECURITY FEATURES:

BriteMail HOSTED EXCHANGE BRITE SECURITY FEATURES: BriteMail HOSTED EXCHANGE BRITE SECURITY FEATURES: Data Replication Exchange 2010 real-time data replicates to protect critical information in the event of a hardware failure or database corruption. Multi-tenant

More information

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery WHITE PAPER HIPPA Compliance and Secure Online Data Backup and Disaster Recovery January 2006 HIPAA Compliance and the IT Portfolio Online Backup Service Introduction October 2004 In 1996, Congress passed

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive. SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,

More information