Nuance OnDemand provides security and reliablity.
|
|
|
- Baldric Robinson
- 10 years ago
- Views:
Transcription
1 provides security and reliablity. Achieving the highest level of security within IVR, Web and mobile customer service applications while meeting the challenges of security certification, compliance and ongoing auditing.
2 1 Table of contents 1 Introduction / p2 2 Security Overview / p3 Security Framework / p3 Physical Security / p3 Network Security / p4 Platform Security / p4 Administration Security / p5 Access and Control Security / p5 Application Security / p6 Management Security / p6 Data Security / p7 Certification Achievements / p7 3 Reliability / p7 Monitoring / p7 Business Continuity / p8 Customer Support / p8 4 Summary / p9
3 2 Introduction Each year, Enterprise applications handle billions of transactions that include confidential and sensitive consumer data, such as credit card numbers, healthcare information, and passwords. Evolving internet technologies, customer service channels, and deployment options have increased the chances for successful malicious attacks. More than ever before, consumers are aware of and concerned with fraud and privacy issues. As a result, many regulations and standards have been put into place to protect consumer data. It is essential for companies to demonstrate compliance with current legislation, and to be prepared for the barrage of new legislations being considered. Recent laws such as HIPAA (Health Insurance Portability and Accountability Act), Privacy Legislations, and Sarbanes-Oxley have had major implications for businesses. To maintain the highest levels of security within their IVR, Web and mobile customer care applications, many enterprises are turning to hosted solutions where they can rely on vendor experts to meet the difficult challenge of security certification, compliance and ongoing auditing. Nuance has been providing secure, hosted customer care solutions for over 10 years. Nuance s hosted customer care offer, (NOD), includes sophisticated security architecture, policies, guidelines, and best practices. The multi-layered implementation of physical and network infrastructure, management access and controls, and application security framework ensures robust protection for our customers sensitive data. Today, Nuance technology securely handles over 2B customer contacts annually. As the largest hosted speech automation platform in the world, Nuance OnDemand takes security to a whole new level to address privacy, data confidentiality, authentication, integrity, non-repudiation, access control, and communication security. Operating 24x7, 365 days a year, Nuance OnDemand s multi-layer security mitigates many levels of threats to your customers information so that your business consistently provides quality customer care. Nuance On Demand Multi-Layer Security Data Center and Physical Layer Network Layer Service Delivery Platform Layer Application Layer Information and Data Layer Access and Control Management Layer
4 3 Enterprises using Nuance s multi-tenant service platform include the largest U.S. retail banks, insurance, mobile service providers, and travel companies. And, as such, Nuance incorporates stringent security requirements for hosted services. has been designed from the ground up to handle Fortune 1000 enterprise security requirements and has incorporated many controls that meet compliance requirements. This document discusses the measures implemented within to secure every interaction with your most valuable assets your customers thus guaranteeing the confidentiality, integrity and security of their sensitive data. Security Overview Security from the ground up To adequately protect Personally Identifiable Information (PII), Nuance Enterprise Network Services has established a security management framework and team. The framework provides structure for information security within the organization. Within the framework, management approves the information security policy, assigns security roles, and co-ordinates and reviews the implementation of security across the organization. The team s information security advisors communicate regularly with external security specialists or groups, including relevant authorities, to keep up with industry trends, monitor standards and assessment methods, and provide suitable liaison points when handling information security incidents. The system is a Customer Care computing platform hosted in three geographically distributed locations within the continental US. Nuance partners with highly trusted SAS 70 Certified data centers (Internap, Qwest, CoreSite) which adhere to and are in compliance to and or certified according to stringent security standards, inclusive of SOX, ISO 27k, PCI DSS, and HIPAA (WIP). Nuance has worked closely on the architecture and design of our platform with internal and external security experts, ensuring compliance with Nuance s high standards for availability, security and integrity of customer data. User data is processed within the borders of the United States only. Security Framework Physical Security systems are housed in isolated segments within SAS 70 Certified data center locations. Data Center physical security employs four broad categories: Confidentiality Ensure that only authorized users can access any physical layer of our hosted infrastructure. Integrity Ensure access approval policy is continuously monitored and executed. Authentication Ensure multiple levels of authentication in the system. Audit Trail Ensure full historical reporting of any physical access. Requests for access require a service ticket for official review, acknowledgement, approval or rejection and historical tracking. Access is approved on a need-to-have basis only. Furthermore, all platform servers are stored in secured cages and are password protected.
5 4 Data centers are operated around the clock with onsite personnel. All persons must identify themselves with a data center provided or governmental approved picture ID (driver s license or passport). All Nuance employees must be on an approved data center list, and visitors must be matched to a Nuance-approved visitor request. All critical building areas are monitored via 24x7 security cameras and compartmentalized with steel high-security portals. Depending on the data center entry in the secured zones requires the use of biometric authentication. Data centers are operated 24x7 with onsite personnel. Maintenance personnel and personnel without regular established access require an approved data center escort while in the building. Other physical security characteristics include motion sensors, secure building entrances, exits and fire routes. Automatic fire extinguishing systems, redundant power distribution systems with independent backup generators and flood protection systems reside in certain locations. Network Security Information and the systems on which it resides interconnected by networks are important business assets. Maintaining, and ensuring network security at all levels is essential. achieves this network security through both technical means and administrative level controls. Nuance OnDemand network security includes the following: Firewalls Network Address Translation Network Segmentation Data Encryption Intrusion Detection Security Events Monitoring System Authentication The security management team determines the security features, service levels, and management requirements of all network services. The team manages and controls the networks, not only to protect them from threats, but also to maintain security for the systems and applications using the network, including information in transit. Detective, preventive, and corrective controls, along with appropriate user awareness procedures, protect against malicious code. Audit logs record all user activities, exceptions, and information security events. The security team preserves these logs to assist in future investigations and access control monitoring. Independent reviews are conducted on a regular basis to ensure that information security processes are adequate, complete, fit-for-purpose and enforced. Platform Security Nuance network services engineers harden the operating systems and infrastructure to protect its systems from various security vulnerabilities. Servers must deliver data in a secure, reliable fashion. Operating system, middleware and application hardening involves: Security sensitive installations Implementations and configurations of robust logging Encryption of sensitive communications Prudent configuration of access controls, least privilege and need-to-know Strong authentication
6 5 Hardened platforms further restrict system capabilities to only those that are explicitly required and tolerated for expected system functionality. Systems and software versions and upgrades are cross-checked and undergo suitable testing in a staging environment prior to acceptance for production deployment and use. Technical vulnerabilities of information systems are monitored and assessed by the security team. The team evaluates any exposures to such vulnerabilities and takes appropriate measures to address any associated risk. Procedures monitor the use of information processing facilities, and the team regularly reviews these activities. Administration Security Nuance ensures segregation of duties as a method for reducing the risk of accidental or deliberate system misuse. Due diligence with policies, process and procedures prevents any single person from accessing, modifying or using assets without authorization or detection. The initiation of an event is separate from its authorization. The design of these controls considers the possibility of collusion. Development, test and production environments for IT Infrastructure and Applications are segregated to reduce the risk of unauthorized access or changes to operational systems. The team establishes, documents, and reviews an access control procedure based on business and security requirements for access. Sensitive data at rest is not permitted, unless encrypted. Data in transmission is encrypted or otherwise protected via a dedicated link. Customer session data is normally accessed and transactions can be completed through a dedicated connection to customer backend systems. Each link is dedicated to a single customer and often encrypted (MPLS/SSL), further reducing risk of data exposure through strong technical controls. Nuance supports and recommends private data links for transmission over public Internet for data access but can also optionally provision a secure VPN tunnel. Access and Control Security Nuance employees access to sensitive data is granted on a need-to-have basis only, considering an employee s job role and the problem at hand. Each username is uniquely assigned to a person and assigned to a centrally defined role with associated privileges. Access roles might be elevated on a temporary basis but only after a security committee has determined the validity of a written request. Each elevation, system or data access request is logged in a separate audit system for later retrieval and analysis. Nuance s Business Continuity Plan outlines emergency access to the platform in case of disaster and highlights contact information for mission-critical personnel and their substitutes. The platform stores logs for each call for diagnostic and reporting purposes. Nuance s policy prevents any sensitive application data (account, PIN number input etc.) from being written to the logs. Instead, sensitive data is stored in-memory only and is masked in stored log files. The platform also provides a mechanism to mask or encrypt callers audio data. Nuance clients provide a public key and determine the encryption scheme for audio data. Only the client can decrypt the caller audio utterances and play them using the decryption key and a tool provided. All Nuance computers and terminals auto-lock after 15 minutes. Nuance employees manually lock or logout of systems before they leave their work place. User access roles are reviewed on a quarterly basis. Upon an employee s voluntary or involuntary job termination, electronic access to systems is immediately terminated, the user s badge is collected, and building access is granted only with escorts.
7 6 Application Security Nuance Products and Professional Services organizations adopted the Open Web Application Security Project (OWASP) as our framework for security standards in software and application development. Product design documents and customer application statements of work specify the security framework requirements as defined in OWASP guidelines. The design documents are translated to an agile development methodology as tasked for development and QA efforts. Nuance s Software Development Lifecycle (SDLC) ensures for the implementation of Open Web Application Security Project (OWASP) as part of its application software security development framework. Management Security Information, information systems, and all related assets are critical and vitally important to Nuance s business processes. Nuance takes appropriate steps to guard its assets from threats such as error, fraud, sabotage, terrorism, extortion, industrial espionage, privacy violation, service interruption, theft, and natural disaster. Nuance protects information assets in a manner commensurate with their sensitivity, value, and criticality. Security measures are employed regardless of the media on which information is stored, the systems that process information or the methods used to transport information. Such protection includes restricting access to information based on the two security principles of least privilege and need-to-know. Nuance management ensures that all assets, including information and information systems, are protected in a manner that is at least as secure as that required by our clients and other organizations in the same industry handling similar types of information. To achieve this objective, Nuance conducts annual reviews of the risks to its collective. Similarly, whenever a major security incident indicates that the lifecycle protection of these assets is insufficient, management takes prompt remedial action to reduce Nuance s exposure and thus mitigate the risk of harm to an asset. Information security training, guidance, direction, and authority are centralized in the Nuance Security Organization, which is responsible for establishing, maintaining and monitoring the enterprise information security policies, standards, guidelines, and procedures. Nuance employs a corporate security officer (CSO) overseeing implementation and compliance to all published security standards, business continuity planning, loss prevention and fraud prevention, and privacy. In addition, divisional security manager roles are assigned to control divisional compliance and adherence to s security certifications and standards. Nuance is annually audited for security and privacy compliance. includes a set of 15 policies detailing corporate and divisional requirements for handling PII and sensitive data. Every Nuance employee is annually trained and mandated to maintain and practice a working knowledge of security, privacy and ethics rules according to their job role. Nuance s Learning and Development team monitors employees progress with Nuance-provided security, privacy and ethics material and initiates sanctions in cases of non-compliance. Exhaustive legal contracts and stringent NDA s ensure Nuance s service partners obligation to protect Nuance information assets. As a solutions provider, Nuance s use of outside services is limited to exceptional cases and access to protected data is not granted to external personnel. Nuance uses critical judgment and a chain of policies before exposing sensitive information, even within the corporation, as a first method of protection. All employees must undergo background checks before receiving an offer of employment.
8 7 Nuance s systems security performance is evaluated on a quarterly basis by various external 3rd party security firms specializing in domain specific security standards. Nuance s security policies are reviewed and revised at least once annually. Data Security Client data reports and other tracking tool such as using our advanced reporting system, OnDemand Insight (ODI) are available through a secure OWASP compliant Web interface. Depending on the nature of the voice application and the security policy applied during application development, certain reports might contain individually identifiable or protected information by design. ODI access is secured via role-based username and password combinations. Web access is tunneled through https with at least 128-bit encryption and at least 1024-bit authentication key agreement. The server is authenticated with a X.509 certificate. Nuance can restrict access to the Web portal to a set of trusted IP addresses. Each client operates within its own Web tool domain, virtually eliminating any risk of contaminating data with other enterprise applications or leaking of confidential information into other accounts. Only a manually configured super user can designate second tier users and their role for reporting access within their company. ODI facilitates large-scale business metric and diagnostic analysis while adhering to an enterprise s security standards. Each role is defined as a subset of over 50 selectable criteria, with each user assigned to a specific role. Each client maintains reporting accounts and purges reporting data. The ODI reporting console provides an extensive audit trail of user interactions with the reporting system. ODI keeps detailed report data for about 3 days after the end-user s interaction with the system has ended, and it preserves aggregated data for 13 months before automatic purging. Certification Achievements The system is PCI DSS certified. PCI DSS provides an actionable framework for developing a robust payment card data security process including prevention, detection and appropriate reaction to security incidents Reliability Monitoring The Nuance operations team has extensive operational processes to support high availability. These processes include the selection of key human resources, support and contact processes, system monitoring processes, and system testing processes. For example, the network operations team uses HP Open View as the primary production monitoring system with agents that track performance of production servers and monitor health of the components in the system. Should an alarm trigger, the system notifies operations personnel and customers. Nuance operations staff will immediately begin to investigate and resolve the issue. As a result, in the event of a server, network, or site failure (or even latency issues), our 24x7 NOC will be alerted and can take immediate preventative actions to minimize any adverse effects. Nuance continuously monitors all servers, Internet connectivity, latency, availability, and bandwidth, maintaining these server and network performance logs for up to one year. The network operations team regularly reviews these logs as part of capacity planning.
9 8 Business Continuity The platform is stable, secure, and highly available. All platform components are deployed in a redundant architecture with no single point of failure. These hardened datacenter sites feature fully redundant fiber optic network access, power grid access, power generation and air handling, and are protected by a dry fire suppression system and state-of-the-art physical and electronic security systems. The data centers are located in three geographic regions within the US. All data centers operate in active/active mode with real-time application replication across the regions. Sites share normal call handling load. In the unlikely scenario of a data center disaster, the remaining datacenters are still capable of handling of planned daily traffic. Nuance s Business Continuity Plan mandates a complete switchover of traffic between data centers within minutes. Customer Support To maximize network reliability and availability, the support organization includes 3 tiers of support experts. With rigorous monitoring and testing procedures, the Nuance Network Operations Center (NOC) is the first line of defense. The NOC includes a full-time staff located in geographically distributed 24x7 centers with locations in Sunnyvale, California and Chenai, India. NOC engineers ensure that all Nuance OnDemand systems and client applications are up and running around-theclock. NOC engineers use tools that continuously monitor the health of every system component. These tools can alert personnel at the first sign of any problem so that potential issues can be resolved even before they impact the operations of the network. These tools can also initiate automated problem resolution procedures (such as running diagnostics). NOC engineers not only monitor network operation and respond to network emergencies but also provide a critical communication link between Nuance and its clients. NOC engineers record customer-reported problems in an automated problem-tracking system, and coordinate the on-going work necessary to quickly resolve them to the client s satisfaction. Nuance Technical Account Managers provide a second level of customer support and are dedicated representatives for each client. The Technical Account Manager is familiar with each client s personnel, applications, and operating procedures. They work closely with the client and with the Nuance engineering team (tier 3 support) to resolve complex issues. Nuance disallows support directly to end users, (i.e callers into our customers IVR application, or end users of a mobile application). Instead, the Service Level Agreement specifies the client s personnel who are authorized for support. This policy, together with the tiered support structure, ensures that a support incident will never reveal private data to an unauthorized person.
10 9 Summary Protecting sensitive customer information and keeping up with the increasing number of security standards is expensive and can become overwhelming for any Enterprise IT organization. Nuance not only has expertise in customer care, but also guarantees robust levels of security inclusive of the overall hosting package. is the largest enterprise-grade on-demand speech IVR, Web and mobile self-service platform. It provides stringent security and high availability at no additional cost, saving our clients millions of dollars on security alone. Our dedicated staff of security experts ensures adherence to the highest ethical, privacy and confidentiality standards. Nuance maintains PCI DSS certification and is working on implementation of HIPAA compliance and certifications. Our customers include some of the largest financial, transportation, entertainment, and mobile carriers in the world. More than ten years ago, the platform took its first call. Since then, Nuance has successfully operated a highly secure, highly available on-demand customer care data center earning the trust, respect and confidence of our customers. About Nuance Communications, Inc. Nuance Communications is reinventing the relationship between people and technology. Through its voice and language offerings, the company is creating a more human conversation with the many systems, devices, electronics, apps and services around us. Every day, millions of people and thousands of businesses experience Nuance through intelligent systems that can listen, understand, learn and adapt to your life and your work. For more information, please visit nuance.com. Copyright 2014 Nuance Communications, Inc. All rights reserved. Nuance, and the Nuance logo, are trademarks and/or registered trademarks, of Nuance Communications, Inc. or its affiliates in the United States and/or other countries. All other brand and product names are trademarks or registered trademarks of their respective companies. NUAN DI WP, Feb
Cloud Contact Center. Security White Paper
Cloud Contact Center Security White Paper Introduction Customers communicate with organizations in a variety of forms from phone conversations to email, web chat and social media. As each interaction may
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider
ClickTale Security Standards and Practices: Delivering Peace of Mind in Digital Optimization
Delivering Peace of Mind in Digital Optimization TABLE OF CONTENTS INTRODUCTION 2 PRIVACY AND ANONYMITY 3 ISO 27001 COMPLIANCE 5 APPLICATION-LEVEL SECURITY 6 PENETRATION TESTING AND SECURITY AUDITS 7 GENERAL
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Privacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
Secure and control how your business shares files using Hightail
HIGHTAIL FOR ENTERPRISE: SECURITY OVERVIEW Secure and control how your business shares files using Hightail Information the lifeblood of any business is potentially placed at risk every time digital files
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
customer care solutions
customer care solutions from Nuance nuance on demand white paper :: Nuance s Guaranteed Performance Migration Program The Guarantee Program The Nuance On Demand platform, technology, tools, and expertise
IBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
Brochure Achieving security with cloud data protection. Autonomy LiveVault
Achieving security with cloud data protection Autonomy LiveVault Can cloud backup be secure? Today, more and more companies recognize the value and convenience of using cloud backup to protect their server
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Secure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
BKDconnect Security Overview
BKDconnect Security Overview 1 Introduction 1.1 What is BKDconnect 1.2 Site Creation 1.3 Client Authentication and Access 2 Security Design 2.1 Confidentiality 2.1.1 Least Privilege and Role Based Security
SaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
Apteligent White Paper. Security and Information Polices
Apteligent White Paper Security and Information Polices Data and Security Policies for 2016 Overview Apteligent s Mobile App Intelligence delivers real-time user experience insight based on behavioral
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Information Security Services. Achieving PCI compliance with Dell SecureWorks security services
Information Security Services Achieving PCI compliance with Dell SecureWorks security services Executive summary In October 2010, the Payment Card Industry (PCI) issued the new Data Security Standard (DSS)
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
Secure networks are crucial for IT systems and their
ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
Managed Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
Security Overview. BlackBerry Corporate Infrastructure
Security Overview BlackBerry Corporate Infrastructure Published: 2015-04-23 SWD-20150423095908892 Contents Introduction... 5 History... 6 BlackBerry policies...7 Security organizations...8 Corporate Security
The Impact of HIPAA and HITECH
The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients
An Introduction to HIPAA and how it relates to docstar
Disclaimer An Introduction to HIPAA and how it relates to docstar This document is provided by docstar to our partners and customers in an attempt to answer some of the questions and clear up some of the
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our
ENDNOTE ONLINE SECURITY OVERVIEW FOR MY.ENDNOTE.COM In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our servers from attacks and other attempts
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
Birst Security and Reliability
Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:
Cloud Management. Overview. Cloud Managed Networks
Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity
Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%
Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Delivering peace of mind in digital optimization: Clicktale's security standards and practices
THE CLICKTALE DIFFERENCE Delivering peace of mind in digital optimization: Clicktale's security standards and practices CONTENTS INTRODUCTION... 2 PRIVACY AND ANONYMITY...2 ISO 27001 COMPLIANCE...4 APPLICATION-LEVEL
Level I - Public. Technical Portfolio. Revised: July 2015
Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
Altus UC Security Overview
Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.
INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc. Copyright 2016 Table of Contents INSTRUCTIONS TO VENDORS 3 VENDOR COMPLIANCE PROGRAM OVERVIEW 4 VENDOR COMPLIANCE
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
HIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered.
Real Security Outcomes. Delivered. Deploying healthcare and healthcare related services to the cloud can be frightening. The requirements of HIPAA can be difficult to navigate, and while many vendors claim
ACI ON DEMAND DELIVERS PEACE OF MIND
DELIVERS PEACE OF MIND SERVICE LINE FLYER ACI ON DEMAND ACCESS TO THE LATEST RELEASES OF FEATURE-RICH SOFTWARE AND SYSTEMS, INCLUDING INTEGRATION WITH VALUE- ADDED THIRD PARTIES IMPLEMENTATION CONFIGURED
IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet
IBM PowerSC Security and compliance solution designed to protect virtualized datacenters Highlights Simplify security management and compliance measurement Reduce administration costs of meeting compliance
BOLDCHAT ARCHITECTURE & APPLICATION CONTROL
ARCHITECTURE & APPLICATION CONTROL A technical overview of BoldChat s security. INTRODUCTION LogMeIn offers consistently reliable service to its BoldChat customers and is vigilant in efforts to provide
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Hosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
Security Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Log Management How to Develop the Right Strategy for Business and Compliance. Log Management
Log Management How to Develop the Right Strategy for Business and Compliance An Allstream / Dell SecureWorks White Paper 1 Table of contents Executive Summary 1 Current State of Log Monitoring 2 Five Steps
Windows Least Privilege Management and Beyond
CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has
Tenzing Security Services and Best Practices
Tenzing Security Services and Best Practices OVERVIEW Security is about managing risks and threats to your environment. The most basic security protection is achieved by pro-actively monitoring and intercepting
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance
White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
UCS Level 2 Report Issued to
UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs [email protected] Welcome to the UCS report which stands for Unified Certification
GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS
GOVERNANCE AND SECURITY BEST PRACTICES FOR PAYMENT PROCESSORS A White Paper by i2c, Inc. 1300 Island Drive Suite 105 Redwood City, CA 94065 USA +1 650-593-5400 [email protected] www.i2cinc.com Table of
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Security & Infra-Structure Overview
Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging
Log Management Standard Effective Date: 7/28/2015 1.0 INTRODUCTION The California State University, Chico system/application log management standard identifies event logging requirements, log review frequency,
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
System Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
Securing Unified Communications for Healthcare
Securing Unified Communications for Healthcare Table of Contents Securing UC A Unique Process... 2 Fundamental Components of a Healthcare UC Security Architecture... 3 Making Unified Communications Secure
White Paper. Support for the HIPAA Security Rule PowerScribe 360
White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as
