WALKME WHITEPAPER. WalkMe Architecture
|
|
|
- Philomena Carroll
- 10 years ago
- Views:
Transcription
1 WALKME WHITEPAPER WalkMe Architecture
2 Introduction WalkMe - the Enterprise Class Guidance and Engagement Platform - drives users to action as they use software or websites. WalkMe is used by Enterprises from a wide range of industries and verticals to increase sales and conversion rates, boost UX, reduce support costs, and improve employee productivity. Comprehensive step-by-step guidance, delivered through a sequence of tip balloons, is delivered without requiring the user to leave the screen, to watch video tutorials or to read tedious manuals or FAQ pages. WalkMe is a cloud-based platform designed to help professionals customer service managers, user experience managers, training professionals, SaaS providers and sales managers guide and engage prospects, customers, employees and partners through any online experience. WalkMe s human-like algorithm delivers contextual guidance, so that the right people receive the right guidance - specific to each employee s role, tasks, actions and device. WalkMe accurately adapts to any screen size and resolution. All of this is accomplished without any changes or integration to the underlying software. Using WalkMe does not require download. WalkMe has received wide industry recognition and acclaim - Cool Vendor by Gartner, Red Herring Top 100 Award, Top Apps That Will Change Your Business by CIO Magazine, Silicon Valley's TiE50 Award, and more. 1
3 What is WalkMe? WalkMe s mission is to make using the web as easy as possible for every person by reinventing the learning curve for any website, online service or software. WalkMe s easy-to-use tool requires no integration. A Walk-Thru can be built in minutes, and a launcher placed on your site with the click of a button. WalkMe offers a secure, reliable, and scalable platform. As a pure software-asa-service (SaaS) company, all of WalkMe's servers, databases, and storage are located in a top tier and secure cloud network. In order to provide customers with the greatest flexibility, WalkMe utilizes Amazon Web Services (AWS). Due to WalkMe's architecture, clients can be confident that WalkMe will not affect site performance. WalkMe Modules 1. WalkMe Editor The Editor is a Firefox extension that enables website and application owners to create Walk-Thrus for their websites. Walk- Thrus are saved on our database and stored there as drafts. In this state, Walk- Thrus are not seen or available to any of the end-users until publication. 2. WalkMe Player The WalkMe Player is responsible for playback of all published Walk-Thrus. The WalkMe player is displayed in the form of a widget on top of the website pages. Once the original website page content is loaded completely in the end-users' browser, the WalkMe Player downloads the WalkMe files from Amazon Cloudfront CDN to the browser's cache 3. Analytics Module The analytics module is designed to help understand and improve the way the users are navigating your site. Using WalkMe s analytics and goals, you will better understand your site s flow and how to mitigate common problem areas. 2
4 Pure SaaS Implentation The WalkMe SaaS solution model is based on Amazon Web Services (AWS). WalkMe s servers are located on Amazon EC2, while the Walk-Thru details are stored on Amazon RDS. The published content thereafter is saved on Amazon S3 and is instantly deployed to Amazon CloudFront CDN for fast download rates for all WalkMe end-users. End users send analytics data from their browser directly to WalkMe EC2 Servers. In this architecture our clients have zero implementation required and only need to add the WalkMe snippet into the website HTML pages as required (similar to Google Analytics). 3
5 Self-Hosted Model Internet Intranet / Internet WalkMe Servers Customer Web Servers (hosting WalkMe static files) DB Transfer WalkMe Package Walk- Thru Editing, Analytics Reading WalkMe Static files Access website to create the walk- thrus on Original Website content WalkMe usage data End Users Editor User A Self-Hosted model does not require any on premise installation, and is the most simple solution. This package is comprised of static files only and can be installed on any web server. If WalkMe is used on an intranet website, at least one workstation must be able to connect to both the intranet site and the Internet. Walk-Thru creation can occur only from this workstation. End users need internet access to collect data for WalkMe analytics; however this is not necessary for WalkMe usage. Note that WalkMe analytics does not collect any sensitive data. 4
6 Self-Hosted Model, Proxy PlayerServer The Self Hosted Proxy PlayerServer differs from the standard Self Hosted option in that the proxy server is installed on premise. The proxy will send data to WalkMe's PlayerServer, and data will be stored on WalkMe's database. Thus, there is no direct communication between end users and WalkMe's servers. The proxy server is an application server and does not need a database. 5
7 Infrastructure Security (AWS) WalkMe's network infrastructure works and communicates with Amazon AWS, Amazon EC2, Amazon S3, Amazon Cloudfront, and Amazon RDS. Amazon Web Services (AWS) delivers a highly scalable cloud computing platform with high availability and reliability. In order to provide end-to-end security and privacy, AWS provides a wide range of security features that ensures confidentiality, integrity, and availability of its data. 6
8 SOC 1/SSAE 16/ISAE 3402 Amazon Web Services publishes the Service Organization Controls 1 (SOC 1), Type 2 report. The audit for this report is conducted in accordance with the Statement on Standards for Attestation Engagements No. 16 (SSAE 16) and the International Standards for Assurance Engagements No (ISAE 3402) professional standards. This dual report can meet a broad range of auditing requirements for U.S. and international auditing bodies. The SOC 1 report audit attests that AWS control objectives are appropriately designed and that the individual controls defined to safeguard customer data are operating effectively. Our commitment to the SOC 1 report is ongoing and we plan to continue our process of periodic audits. This audit replaces the Statement on Auditing Standards No. 70 (SAS 70) Type II report. FISMA Moderate AWS complies with the Federal Information Security Management Act (FISMA). FISMA requires federal agencies to develop, document, and implement an information security system for its data and infrastructure based on the National Institute of Standards and Technology Special Publication , Revision 3 standard. FISMA Moderate Authorization and Accreditation requires AWS to implement and operate an extensive set of security configurations and controls. This includes documenting the management, operational, and technical processes used to secure the physical and virtual infrastructure, as well as the third-party audit of the established processes and controls. AWS has received a three-year FISMA Moderate authorization for Infrastructure as a Service from the General Services Administration. AWS has also successfully achieved other ATOs at the FISMA Moderate level by working with government agencies to certify their applications and workloads. 7
9 ISO AWS has achieved ISO certification for Information Security Management System (ISMS) covering infrastructure, data centers, and services including Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3) and Amazon Virtual Private Cloud (Amazon VPC). ISO 27001/27002 is a widely-adopted global security standard that sets out requirements and best practices for a systematic approach to managing company and customer information that s based on periodic risk assessments. In order to achieve this certification, a company must show it has a systematic and ongoing approach to managing information security risks that affect the confidentiality, integrity, and availability of company and customer information. AWS s ISO certification includes all AWS data centers in all regions worldwide, and AWS has established a formal program to maintain the certification. 8
10 WalkMe Security WalkMe was built as a third-party application to seamlessly work inside websites and Web applications. WalkMe has implemented a multi-tiered approach to provide the highest security services within the platform. WalkMe's application and network are tested for security vulnerabilities by independent security experts as part of the secure development lifecycle. These tests include an array of penetration scenarios independent of those tested by AWS, In addition, WalkMe's security team ensures that all aspects of security adhere to the highest standards. 9
11 Login and Authentication All users, creators, and administrators of WalkMe s platform are assigned a unique user account and authorization level. All users authenticate to WalkMe with an and password of at least eight characters. Authentication is established over a 128bit SSL V3 HTTPS encrypted protocol where passwords are subsequently stored in databases with a SHA-2 algorithm + SALT. To prevent brute-force attacks, after multiple failed login attempts WalkMe will require the user to use a CAPTCHA test in order to login. Users have the capability to change their password upon request if they forgot their username or password. They are sent confidential s that are provided during signup. WalkMe Cookies Like other Web-based applications, WalkMe uses first-party cookies for authentication purposes when users log into the editor. The WalkMe player stores data to maintaining WalkMe's player state: monitoring compilation of Walk-Thru playback and analytics.to this end WalkMe uses first party cookies, third party cookies (local storage), first party local storage.no personal data is saved and no information about user usage of the website is monitored. 10
12 Content Filtering Walk-Thru balloons contain user-generated data. WalkMe prevents attempts of Cross Site Scripting (XSS). This form of attack injects malicious content into balloons on the users browser. WalkMe prevents this kind of attack with an advanced content-filtering mechanism that is embedded on WalkMe's content servers. Therefore, any attempts to insert scripts are automatically blocked from the server before Walk-Thrus are published. 11
13 Data Collected by the WalkMe Player Application WalkMe does not collect any data regarding the end-users information or actions, or any information about the website itself. In order to deliver the highest quality statistics to the website owner, information about Walk-thru usage is collected and displayed on WalkMe s analytics platform on analytics.walkme.com. All data is transferred via HTTPS protocol. Secure Storage WalkMe does not store any sensitive or classified information, the only information that is stored on WalkMe's servers is the Walk-Thru text, HTML parameters for identifying the correct location of balloons, and WalkMe analytics data. This information is kept private and safe on WalkMe s database servers, which are secured by a firewall. Each WalkMe customer is assigned a unique user ID which prevents unauthorized access. Although data may be stored on shared database servers, it is strictly protected and segregated in a way that ensures that only authorized users have access. 12
14 Uptime, Business Continutiy, and Disaster Recovery Capacity and Uptime WalkMe strives to provide the best possible service to our clients: as such our architecture is designed with durability in mind. Walk-Thru files and information are globally spread to minimize latency and increase performance. Disaster Recovery and BCP WalkMe's disaster recovery plan, which resides on Amazon's disaster recovery plan, ensures that customers experience no interruption of service in the event of a loss of data occurring at Amazon's data centers. WalkMe's primary components are the Walk-Thrus which are stored on Amazon's Cloudfront CDN, supporting the most advanced methods of DRP. WalkMe's other and less crucial components are the WalkMe Editor and WalkMe Analytics, which resides on Amazon EC2 and Amazon RDS and are both supported by DRP. 13
How To Create A Walkme.Com Walkthrus.Com Website And Help With Your Website Or App On A Pc Or Mac Or Ipad (For Pc) Or Mac (For Mac) Or Ipa (For Ipa) Or Pc
WALKME SOLUTION ARCHITECTURAL WHITE PAPER WHAT IS WALKME FOR SALESFORCE? WalkMe enables Salesforce to build and overlay interactive Walk-Thrus that intuitively guide users to self-task successfully with
Self-Hosted Implementation
Self-Hosted Implementation May 2013 About WalkMe WalkMe is an easy-to-use platform for creating interactive onscreen Walk-Thrus that run on top of your actual website or web app. Unlike video tutorials,
With Eversync s cloud data tiering, the customer can tier data protection as follows:
APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software
Blue Jeans Network Security Features
Technical Guide Blue Jeans Network Security Features Blue Jeans Network understands an organization s need for secure communications. The Blue Jeans cloud-based video conferencing platform provides users
319 MANAGED HOSTING TECHNICAL DETAILS
319 MANAGED HOSTING TECHNICAL DETAILS 319 NetWorks www.319networks.com Table of Contents Architecture... 4 319 Platform... 5 319 Applications... 5 319 Network Stack... 5 319 Cloud Hosting Technical Details...
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
First Edition 2014. WalkMe User Manual
First Edition 2014 WalkMe User Manual Creating Your First Walk-Thru Create a Walk-Thru Creating a Walk-Thru is simple and straightforward, Check out this gallery for a guide, or use the Walk-thru on the
Helping people make better decisions DATA SECURITY POLICY. Kiilakiventie 1, 90250 Oulu, Finland tel: +358 10 423 7901 www.zef.
Helping people make better decisions DATA SECURITY POLICY Kiilakiventie 1, 90250 Oulu, Finland tel: +358 10 423 7901 www.zef.fi/en GENERAL Server Operating system: Unix, Apache 2.x. User interface implemented
Enterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
Security Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
BeBanjo Infrastructure and Security Overview
BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits
Expand Your Infrastructure with the Elastic Cloud. Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager
Expand Your Infrastructure with the Elastic Cloud Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager Today we re going to talk about The Cloud Scenarios Questions You Probably
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
Security and Data Protection for Online Document Management Software
Security and Data Protection for Online Document Management Software Overview As organizations transition documents and company information to Software as a Service (SaaS) applications that are no longer
THE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
SECURITY AND REGULATORY COMPLIANCE OVERVIEW
Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW BetterCloud for Office 365 Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for
Anypoint Platform Cloud Security and Compliance. Whitepaper
Anypoint Platform Cloud Security and Compliance Whitepaper 1 Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security.
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
Live Guide System Architecture and Security TECHNICAL ARTICLE
Live Guide System Architecture and Security TECHNICAL ARTICLE Contents 1. Introduction... 2 2. Hosting Environment... 2 2.1. Standards - Compliancy... 3 2.2. Business Continuity Management... 3 2.3. Network
SECURITY AND REGULATORY COMPLIANCE OVERVIEW
Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms. As
Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud
Simone Brunozzi, AWS Technology Evangelist, APAC Fortress in the Cloud AWS Cloud Security Model Overview Certifications & Accreditations Sarbanes-Oxley (SOX) compliance ISO 27001 Certification PCI DSS
ClickTale Security Standards and Practices: Delivering Peace of Mind in Digital Optimization
Delivering Peace of Mind in Digital Optimization TABLE OF CONTENTS INTRODUCTION 2 PRIVACY AND ANONYMITY 3 ISO 27001 COMPLIANCE 5 APPLICATION-LEVEL SECURITY 6 PENETRATION TESTING AND SECURITY AUDITS 7 GENERAL
Our Key Security Features Are:
September 2014 Version v1.8" Thank you for your interest in PasswordBox. On the following pages, you ll find a technical overview of the comprehensive security measures PasswordBox uses to protect your
ProjectManager.com Security White Paper
ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for
Learning Management Redefined. Acadox Infrastructure & Architecture
Learning Management Redefined Acadox Infrastructure & Architecture w w w. a c a d o x. c o m Outline Overview Application Servers Databases Storage Network Content Delivery Network (CDN) & Caching Queuing
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
Securing SaaS Applications: A Cloud Security Perspective for Application Providers
P a g e 2 Securing SaaS Applications: A Cloud Security Perspective for Application Providers Software as a Service [SaaS] is rapidly emerging as the dominant delivery model for meeting the needs of enterprise
Building Energy Security Framework
Building Energy Security Framework Philosophy, Design, and Implementation Building Energy manages multiple subsets of customer data. Customers have strict requirements for regulatory compliance, privacy
Web Application Deployment in the Cloud Using Amazon Web Services From Infancy to Maturity
P3 InfoTech Solutions Pvt. Ltd http://www.p3infotech.in July 2013 Created by P3 InfoTech Solutions Pvt. Ltd., http://p3infotech.in 1 Web Application Deployment in the Cloud Using Amazon Web Services From
Cloud Computing An Auditor s Perspective
Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP [email protected] December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction
Primex Wireless OneVue Architecture Statement
Primex Wireless OneVue Architecture Statement Secure, cloud-based workflow, alert, and notification platform built on top of Amazon Web Services (AWS) 2015 Primex Wireless, Inc. The Primex logo is a registered
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration
White Paper Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration This paper focuses on security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support
Intunex Oy Skillhive Service Description 1 / 6
Intunex Oy Skillhive Service Description 1 / 6 About Skillhive Skillhive is a social business application designed for connecting and sharing expertise within organizations. Skillhive enables employees
custom hosting for how you do business
custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide
Tableau Online Security in the Cloud
Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important
Delivering peace of mind in digital optimization: Clicktale's security standards and practices
THE CLICKTALE DIFFERENCE Delivering peace of mind in digital optimization: Clicktale's security standards and practices CONTENTS INTRODUCTION... 2 PRIVACY AND ANONYMITY...2 ISO 27001 COMPLIANCE...4 APPLICATION-LEVEL
DLT Solutions and Amazon Web Services
DLT Solutions and Amazon Web Services For a seamless, cost-effective migration to the cloud PREMIER CONSULTING PARTNER DLT Solutions 2411 Dulles Corner Park, Suite 800 Herndon, VA 20171 Duane Thorpe Phone:
SaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Secure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
Famly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
MIGRATIONWIZ SECURITY OVERVIEW
MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...
Security Whitepaper. NetTec NSI Philosophy. Best Practices
Security Whitepaper NetTec NSI provides a leading SaaS-based managed services platform that to efficiently backup, monitor, and troubleshoot desktops, servers and other endpoints for businesses. Our comprehensive
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider
Vodafone Total Managed Mobility
Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle
Security Practices, Architecture and Technologies
Security Practices, Architecture and Technologies CONTACT: 36 S. Wall Street Columbus, OH 43215 1-800-VAB-0300 www.viewabill.com 1 CONTENTS End-to-End Security Processes and Technologies... 3 Secure Architecture...
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
Opsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview
Opsview in the Cloud Monitoring with Amazon Web Services Opsview Technical Overview Page 2 Opsview In The Cloud: Monitoring with Amazon Web Services Contents Opsview in The Cloud... 3 Considerations...
The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
Agenda. - Introduction to Amazon s Cloud - How ArcGIS users adopt Amazon s Cloud - Why ArcGIS users adopt Amazon s Cloud - Examples
Amazon Web Services Agenda - Introduction to Amazon s Cloud - How ArcGIS users adopt Amazon s Cloud - Why ArcGIS users adopt Amazon s Cloud - Examples How did Amazon Get into Cloud Computing? On-Premise
Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%
Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the
Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire
SAMPLE CREDIT UNION INFORMATION SECURITY DUE DILIGENCE QUESTIONNAIRE FOR POTENTIAL VENDORS Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire 1. Physical security o Where is
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213
ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone 317-362-1213 Application Compatibility Many organizations have business critical or internally
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Amazon Web Services: Risk and Compliance January 2011
Amazon Web Services: Risk and Compliance January 2011 (Please consult http://aws.amazon.com/security for the latest version of this paper) 1 This document intends to provide information to assist AWS customers
SERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
OrgChart Now Information Security Overview. OfficeWork Software LLC
OrgChart Now Information Security Overview OfficeWork Software LLC Version 1.3 May 13, 2015 OrgChart Now Information Security Overview Introduction OrgChart Now is a SaaS (Software as a Service) product
Solutions to Trust. NEXThink V5 What is New?
Solutions to Trust NEXThink V5 What is New? HIGHLIGHTS What is New? ITSM: IT services analytics in real-time Analytics and product usability Security Analytics for all web & cloud applications Product
CONTENTS. PCI DSS Compliance Guide
CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not
Unleashing the power of real-time collaboration:
Unleashing the power of real-time collaboration: Security overview of Cisco WebEx solutions Whitepaper Unleashing the power of real-time collaboration: Security overview of Cisco WebEx solutions. WebEx
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud
Druva Phoenix: Enterprise-Class Data Security & Privacy in the Cloud Advanced, multi-layer security to provide the highest level of protection for today's enterprise. Table of Contents Overview...3 Cloud
Application Security Best Practices. Matt Tavis Principal Solutions Architect
Application Security Best Practices Matt Tavis Principal Solutions Architect Application Security Best Practices is a Complex topic! Design scalable and fault tolerant applications See Architecting for
LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely
LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely LIVE CHAT CLOUD SECURITY Introduction Security is a top priority online it is vital that
SysAid Cloud Architecture Including Security and Disaster Recovery Plan
SysAid Cloud Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid Cloud: Datacenters Network, Hardware, and Software Components Disaster Recovery Plan
Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
Clever Security Overview
Clever Security Overview Clever Security White Paper Contents 3 Introduction Software Security 3 Transport Layer Security 3 Authenticated API Calls 3 Secure OAuth 2.0 Bearer Tokens 4 Third Party Penetration
SaaS Security for Confirmit Horizons
SaaS Security for Confirmit Horizons January 2015 Confirmit Horizons v18.5 Arnt Feruglio Chief Operating Officer The Confirmit Horizons Software From its inception in 1997, the architecture and code of
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
Security in the Sauce Labs Cloud
SAUCE LABS REPORT Security in the Sauce Labs Cloud Practices and protocols used in Sauce s infrastructure and Sauce Connect Overview It s impossible to deny that in this day and age internet security should
AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II
AWS Security CJ Moses Deputy Chief Information Security Officer Security is Job Zero! Overview Security Resources Certifications Physical Security Network security Geo-diversity and Fault Tolerance GovCloud
Security & Infra-Structure Overview
Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4
ACL ANALYTICS. Installation and Activation Guide
ACL ANALYTICS Installation and Overview... 2 Installation and Licensing... 2 Activation... 2 System Requirements... 2 Installing and Activating ACL Analytics... 3 Step 1: Download and Install ACL Analytics...
http://media.amazonwebservices.com/pdf/aws_security_whitepaper.pdf http://media.amazonwebservices.com/pdf/aws_security_whitepaper.
1. Cloud Costs Questions a. Are there any better ways for us to predict / manage our transfer costs than what we discussed in the meeting today? [DSB] There is currently no methodology with AWS to purchase
Logz.io See the logz that matter
See the logz that matter How Logz.io Secures Customer Log Data White Paper A certain amount of confidence is needed when relying on third party vendors to manage and handle your online data and log files
The Global Attacker Security Intelligence Service Explained
White Paper How Junos Spotlight Secure Works The Global Attacker Security Intelligence Service Explained Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
ONLINE ACCESS ONLINE ACCESS FAQS FAQS
ONLINE ACCESS ONLINE ACCESS FAQS FAQS How do I create an Online Access Account? There are three options for setting up an Online Access Account 1. Use your member number and temporary password given to
RMS. Privacy Policy for RMS Hosting Plus and RMS(one) Guiding Principles
RMS Privacy Policy for RMS Hosting Plus and RMS(one) Guiding Principles RMS Privacy Policy for RMS Hosting Plus and RMS(one) Guiding Principles RMS aims to provide the most secure, the most private, and
SaaS-Based Employee Benefits Enrollment System
Situation A US based industry leader in Employee benefits catering to large and diverse client base, wanted to build a high performance enterprise application that supports sizeable concurrent user load
