SuccessFactors focuses on cloud security. So you can focus on business WHITE PAPER
|
|
|
- Tabitha Morton
- 10 years ago
- Views:
Transcription
1 SuccessFactors focuses on cloud security So you can focus on business WHITE PAPER
2 SuccessFactors focuses on cloud security So you can focus on business In the past, business software for everything from HR management to accounting and customer relationship management was accessible only to companies with deep pockets firms that were capable of making massive up-front investments. Today, technology has leveled the playing field. But has the security caught up with the new playbook? At SuccessFactors, we believe it has. Core business applications are now available to everyone, from the largest enterprises to small and midsize businesses, through cloud computing. Thanks to cloud computing, core business applications are now available to everyone, from the largest enterprises to small and midsize businesses. Simply put, the applications and their associated data are delivered over the Internet. Software-as-a-Service, or SaaS, has become a business model as well as an application delivery model. SaaS offers the unique quality of multitenancy, which primarily differentiates it from the application service provider (ASP) model or from in-house applications. With SaaS, just one software instance can serve many customers (or tenants). The ASP model, providing software over a network, forced business executives to confront their fears of putting mission-critical information on third-party servers. 1 Security concerns in a SaaS model are similar to those for the ASP model. Will people steal our information? Will leaks compromise confidential data? The top concerns for the SaaS model s ability to handle security issues focus on identity management, data storage, and data transmission. SuccessFactors understands the critical importance of information protection and recognizes the contribution that information security makes to an organization s strategic initiatives and overall risk management. SuccessFactors has implemented security controls and practices for its SaaS offerings that are designed to protect the confidentiality, integrity, and availability of customer information hosted by SuccessFactors. Additionally, SuccessFactors continually works to strengthen and improve those security controls and practices. The current best practices associated with information security involve a layered approach, what the industry calls defense in depth. Regardless of the software delivery model, security cannot be implemented at a single make or break point. For a SaaS provider to ensure data security for sensitive information, it must have a comprehensive, multifaceted security program in place. SuccessFactors takes a holistic approach to information security, implementing a multilayered defense at all the touch points in the information flow both the physical and logical, applied across the database, middleware, application, and network and communication layers to offer complete data privacy, transparency, and audit controls. This paper explores why SuccessFactors should be your trusted provider including the top security concerns associated with the SaaS model, the layers of information security, and the security controls and practices of SuccessFactors. The company has taken all the necessary steps as well as a few extra to help you meet the high demands of security in a SaaS world. 1 Progress Software. SaaS Security and Pricing 2
3 Top security concerns of the SaaS delivery model As companies use software delivered through a SaaS model, their overarching concerns focus on vulnerabilities related to identity management, data storage, and data transmission. The SaaSbased offerings from SuccessFactors include built-in security features to resolve these concerns. Identity management Modern SaaS architecture usually involves a Web-based application and communication that occurs over the public Internet. Customers should feel confident that the communication between the user and the service provider leverages Secure Sockets Layer (SSL) or Transport Layer Security (TLS) encryption. SaaS providers should also provide a choice: some customers will need the SaaS provider to handle all security from top to bottom, while others will want a vendor that can integrate with their industry-standard identity management solutions. The SuccessFactors solution is capable of handling all of the above, as well as the following: Internal authentication: SuccessFactors uses an internal repository of user profiles when customers choose not to integrate their identity management product into SuccessFactors Platform. Federated authentication (single sign-on): The SuccessFactors single sign-on (SSO) implementation requires users first to be authenticated by their authorizing system (LDAP) through tokens (MD5, SHA-1, HMAC encryption, DES, 3DES) or Security Assertion Markup Language (SAML 1.1, 2.0). Then they will be redirected to the SuccessFactors website. The trust mechanism between the customer and the SuccessFactors solutions will pass identity information to the solutions. The primary transport protocol for this trust mechanism is standard HTTPS. SSO without federation: SuccessFactors solutions deliver a public encryption key to a customer s authentication server. With this key, customers can connect to their cloud applications by pre-establishing trust. Separate authorization and authentication modules: Authentication methods may change as the SaaS platform matures. Because the authorization component is generally interwoven throughout the core code, SuccessFactors ensures that user data and function permissions validation are separate from the authentication module(s). The SuccessFactors authorization module also logs every action, and the application validates every request to prevent cross-scripting attacks. Password protection: SuccessFactors solutions require strong passwords that conform to specific requirements and also mandates regular password changes. No administrator: Users have identities for accessing information instead of relying on a centralized administrator account. Data storage In an ASP model, each customer has unique hardware that keeps data segregated at all times. In a SaaS model, heterogeneous data may reside within a single instance of a database. To address information privacy concerns, current regulations require the segregation of heterogeneous data within a SaaS environment. SaaS vendors must demonstrate that they can separate customer data for each customer not only to satisfy the regulations but also to give customers peace of mind. If the how of data storage is a concern for your organization, a SaaS provider should be prepared to answer all your questions. 3
4 SuccessFactors segregates heterogeneous data by using the following approach to build its application architecture and store the data: Unique database tables: Most companies providing shared Web access have one set of database tables in a normalized database shared by many customers. In contrast, SuccessFactors customers share the network security infrastructure, Web servers, application servers, and database instance, but each customer has its own set of database tables within its own unique database schema, which ensures complete segregation of tenants data. Encrypted data storage: All encrypted data is stored on disk using a minimum of AES 128-bit encryption. Secure levels: The top two tiers (application and Web in later levels) are completely stateless. By not keeping sessions in memory or writing to disk, SuccessFactors solutions dramatically reduce the security risk of these two tiers. This approach also simplifies the construction of load-balanced server farms, as there is no need to keep the workloads on any given server. Movement of data: It is important to remember that data is moving through multiple tiers, and each level must ensure data security. The SuccessFactors solution uses the best-practice defense-in-depth strategy to provide segregation of data at all layers. Data transmission SaaS uses the public Internet to transmit data. For this reason, transmission security, such as SSL and TLS, must be designed into the system. SSL and TLS create secure tunnels for information transmissions. Unfortunately, the use of distinct communication channels for each customer is counterintuitive and costly, and can become a maintenance nightmare. Therefore, the use of private lines should be avoided. Instead, focus on controls. The SuccessFactors solution prevents eavesdropping, tampering, and forgery by using cryptographic controls, by employing a defense-indepth strategy, and by enforcing these three security requirements: Confidentiality: Data can be viewed only by the intended recipient. Integrity: Data cannot be altered without detection. Nonrepudiation: The recipient of the data has proof that the data originated from SuccessFactors. Furthermore, the SuccessFactors solution secures communications by employing these data transfer options: Secure Web communication: The SuccessFactors solution implements SSL technology, consisting of a public key and a private key, to protect sensitive information. The public key is used to encrypt information, and the private key is used to decipher it. When a Web browser points to a secured domain, an SSL handshake authenticates the server (website) and the client (Web browser). An encryption method is established with a unique session key. Customers may then begin a secure session that guarantees message privacy and message integrity. Secure messaging: All outgoing notifications sent from SuccessFactors solutions are securely encrypted using TLS, which makes it difficult to tamper with the message contents and to send spoofed s. Secure FTP with Pretty Good Privacy (PGP) encryption: Data files can be transmitted by secure FTP to SuccessFactors FTP server or a customer s FTP server. Files are PGP-encrypted before transmission. Encryption keys: Encryption keys are securely protected and rotated on a scheduled basis. 4
5 The layers of information security SuccessFactors addresses security concerns at the physical, database, middleware, application, and network and communication layers. The following sections describe how. SaaS providers must provide multilevel protection to guard against business disruptions, from power outages to illegal access by an intruder. Layer 1: Physical site For most businesses, downtime is simply not an option. That s why data centers, which house the servers on which your mission-critical applications run, require multilevel protection to guard against business disruptions, from power outages to illegal access by an intruder. Even so, investing in this level of security can be cost-prohibitive, which is why many companies choose to outsource to a trusted provider. SuccessFactors partners with localized world leaders in co-location hosting centers to provide environmentally controlled, secure facilities that use an integrated security management system, which includes electronic photo ID badging, cardholder access control, biometrics, recorded digital video surveillance, and alarm monitoring. All SuccessFactors data centers are ANSI/TIA/EIA-942 Tier III+ rated facilities. They provide continuous monitoring; multiple, redundant UPS-protected power circuits with generator backup; smoke detection units; fire suppression systems; 24-hour, year-round onsite security personnel; and intrusion detection alarm systems. In addition, the facilities include safeguards that: Block illegal entry via biometric readers, bulletproof walls, and concrete pillars Monitor the entire facility by using closed-circuit cameras located in equipment areas, corridors, and mechanical, shipping, as well as receiving areas Immediately act on security breaches through the use of silent alarms, which automatically notify security and law enforcement personnel if a breach occurs Avoid downtime by preventing power spikes, surges, and brownouts with redundant power links to local utilities, backup batteries, and uninterruptible power supplies, and by interconnecting to the largest aggregation of global Tier 1 networks Shield against fire, natural disasters, and weather shifts with fire-suppression systems; heat, temperature, airflow, and humidity monitoring; and earthquake-safe designs Technical vulnerability management SuccessFactors has implemented technical vulnerability management to reduce risks resulting from the exploitation of technical vulnerabilities. The use of operator logs and fault logging ensure the identification of information system problems. System monitoring is used to check the effectiveness of the controls that are adopted and to verify conformity to SuccessFactors information security policies and standards. The company uses industry-leading security partners to conduct daily and monthly penetration tests on the production environment, and customers also can perform their own application vulnerability testing. 5
6 Layer 2: Database Database environments used in cloud computing can vary significantly. For example, some environments support a multi-instance model, while others support a multi-tenant model. The SuccessFactors solution supports a multi-tenant model. Data must be secured while at rest, in transit, and in use, and access to the data must be controlled. The use of advanced security mechanisms in the SuccessFactors solution secures data while at rest and secures access to the data: Advanced security: SuccessFactors solutions use an advanced security method based on dynamic data and encoded session identifications. The company hosts the site in a secure server environment that uses multiple firewalls, access controls, intrusion detection systems, and other advanced technology to prevent interference or access from outside intruders. Load balancing: SuccessFactors solutions are load balanced at every tier in the infrastructure, from the network to the database servers. Database servers are also clustered for failover. Attack prevention: With activity monitoring and blocking, SuccessFactors solutions employ a protection layer for databases that analyzes network traffic to prevent attacks. An applicationlevel firewall monitors and validates all traffic between the application and database tiers to prevent attacks such as SQL injections from reaching the database server. Access control: SuccessFactors requires that all access to information processing facilities and business processes be controlled according to business and security requirements. In all cases, the concept of least privilege determines computer access. Users are limited to the minimum set of privileges required to perform the required function. Database audits: Regular database audits allow SuccessFactors to maintain records demonstrating proof of origin, all alterations/additions/deletions, the date timestamp of a data change, and approvals where appropriate. To maintain an audit log s viability, the log is unalterable, encrypted, and kept on a network segment to which system engineers do not have access. Classification of information: All information, regardless of medium or form, is classified to reflect its level of confidentiality or importance to SuccessFactors and its customers. All customer data is classified confidential. Data encryption: The SuccessFactors solution encrypts data in a way that doesn t affect applications it decrypts the data on the fly when applications access the data, but it keeps the data encrypted for other types of access. The solution uses a minimum of AES 128-bit encryption to secure data at the block level of the SuccessFactors storage systems. SuccessFactors key management has passed the FIPS level 3 certification testing. Backup and restore: SuccessFactors runs full and incremental data backups weekly and full archive logs backups daily. SuccessFactors stores backed-up data on an encrypted disk using AES 128-bit encryption. This data is available for rapid reimplementation and system restores if the original data becomes corrupt. 6
7 Layer 3: Middleware The architecture of the software and hardware used to deliver cloud services can vary significantly among public cloud providers. The cloud provider determines the physical location of the infrastructure as well as the design and implementation of the reliability, resource pooling, scalability, and other logic needed in the support framework. Application servers are built on the programming interfaces of Internet-accessible services, which typically involve multiple cloud components communicating with each other over application programming interfaces (APIs). It is important to understand the technologies the cloud provider uses and the implications that the technical controls involved will have on the security and privacy of the system throughout its life cycle. SuccessFactors ensures that safeguards are in place to enforce authentication, authorization, and other identity and access management functions. Multifactor authentication is superior to standard password authentication because it requires, for example, biometrics or a dongle to authenticate the user. Who you are, what you know, and what you have are the three basic pillars of multifactor authentication. At SuccessFactors, multifactor authentication is an absolute must for SuccessFactors administrators who manage the production environment. Other safeguards include the following: Single sign-on and identity federation SAML 2.0 assertion Integration between the SuccessFactors public cloud and identity management systems on the premises Fully delegated administration Layer 4: Application SuccessFactors applications are written in Java and adhere to the J2EE specification. The applications dynamically produce every page and send it to the user s desktop encrypted using SSL. No static HTML pages or content are delivered by the applications unless required by the customer. SuccessFactors unique and proprietary XML schema provides a single consistent software code base that is configurable to your particular business requirements. This approach helps SuccessFactors to continually test software to ensure security, since every customer runs the same version of the code. SuccessFactors applications employ extensive security measures to protect against the loss, misuse, and unauthorized alteration of data. The SuccessFactors solution helps to achieve the following: Protect applications from insider threats, with tight encryption through a 128-bit SSL connection. Using open standards (HTML and JavaScript) ensures that applications do not require any changes or special permissions on a user s desktop. Avoid risky plug-ins and downloads that can cause viruses or other threats, by using browser-based administrative functions, such as password resets. Guard against phishing and pharming by using encryption and regular virus scans, as well as plain text s, to eliminate the possibility of a hidden link that can gather information from users. Protect against improper logins by requiring user logins each time the application is opened, by using one-way SHA-1 hash encrypted passwords, and by using automatic logouts after 30 minutes and account locks after multiple failed logins. Provide best practice security at all levels function, transaction, field, and data by using role-based permissions (RBP). 7
8 Enforce segregation of duties by ensuring that no individual can breach security through dual privileges. No person can hold a role that exercises audit, control, or review authority over another concurrently held role. Phishing and pharming: SuccessFactors protects you against both Phishing is an attempt to obtain access credentials, such as user names and passwords, by fake or by text, instant, or direct message to unsuspecting recipients. Pharming is an attempt to redirect a website s traffic to another site for malicious intent. SuccessFactors takes extra precautions, because even if you know how to protect yourself, other people in your organization may not. Layer 5: Network and communication When securing a network infrastructure, it s important to strike a balance between security and availability of applications, which is why every component of the IT network from the point of entry on the network down to the final place where information is stored must be meticulously configured, deployed, maintained, and continually tested for optimal performance. Rock-solid equipment, such as routers, switches, and load balancers, is configured to provide secure, highly available access. Using solid equipment is a good first step. Then, SuccessFactors takes extra steps to maintain the balance between rigorous protection and continuous availability. SuccessFactors goes the extra distance to accomplish the following: Every component of the IT network must be meticulously configured, deployed, maintained, and continually tested for optimal performance. Reinforce security with connections to multiple Tier 1 Internet service providers (ISPs) for highly available network access. All network equipment is redundant, providing seamless failover between devices. Web, application, and database tiers are configured as secure segments and are tuned for maximum performance. Limit internal network traffic to pass along only the data required by the application. SuccessFactors uses a multitiered network architecture and limits end-user traffic to the front demilitarized zone (DMZ) tier of Web servers. A firewall-controlled, segregated virtual local area network (VLAN) isolates each tier of the system from the other tiers, and each tier is set up on its own hardware stack. All requests are individually validated before independent requests to the next tier are generated. Incoming user requests are passed through the firewall down to the load balancers, and load balancers distribute the traffic to the appropriate Web server (presentation tier) for processing. The Web server then makes independent requests to the application tier, and the application tier makes independent requests to the database tier. At each level, the incoming request is validated against business and security rules to protect against malicious access. Requests that fail validation are terminated. Traffic within each tier is restricted. Only required ports are enabled on servers and permitted between VLANs. The firewall separating the application and database tiers uses a default policy that drops all traffic unless specifically required. SuccessFactors has implemented 11 security patents at this point. 8
9 Industry-leading security partners SuccessFactors works with the best security and monitoring service providers to: Ensure individual server performance and uptime by using remote, agentless server monitoring Maintain a smooth user experience through global, transaction-based monitoring Stop network intrusions by using complete security coverage, including two separate 24-hour year-round security teams Prevent malicious server attacks with host-based intrusion detection Protect against potential threats by using thorough and proven application vulnerability testing Identify information-system problems by using detailed logs Verify the effectiveness of security controls and compliance with information-security policies and standards via system monitoring Security measures that interrupt the daily flow of information are counterproductive. SuccessFactors security controls and practices Implementing procedures to control what and how changes occur within the SuccessFactors cloud environment, providing user education, and fostering security awareness are as important as how many firewalls are in front of your sensitive data. This section describes the controls SuccessFactors has put in place, including information security incident management, consistent and proven security measures, information security standards, security education and awareness, and compliance standards. Information security incident management SuccessFactors implements formal event reporting and follows escalation procedures if an information security incident occurs. Real-time notifications of vulnerabilities and security incidents are entered into the SuccessFactors ticketing system, and the appropriate SuccessFactors personnel are notified. All actions taken to resolve a problem are documented, so all problems can be tracked to completion. Information security staff will generate a report regarding the need for enhanced or additional controls to limit the frequency, damage, and cost of future occurrences, as well as required revisions to information security policies. Consistent, proven security measures Security controls and processes are vital, but establishing the right procedures can be challenging. Yes, you need strong security measures, but you also need to maintain the continuity of your business operations. Security measures that interrupt the daily flow of information are counterproductive. SuccessFactors was one of the first SaaS companies to successfully complete the newest SSAE 16 SOC 2 audit in Customers can review all of the procedures, along with the auditors findings, used to secure their data in SuccessFactors applications. SuccessFactors multitiered approach helps ensure a balance between control and ease of use. Users can stay productive, and your information stays secure. And when changes are made to the environment, they are logged, approved, and verified through a centralized, online application. This multitiered approach is one of the reasons why SuccessFactors has been able to successfully release product updates and enhancements four times a year without fail. 9
10 SuccessFactors information security standards SuccessFactors business assets include information and the information-processing environment that supports it. For SuccessFactors, identifying, implementing, maintaining, and improving information security is essential to maintaining legal compliance and a competitive edge. The company has established strict policies, standards, and procedures regarding all activities associated with how employees, contractors, and third-party vendors approach the SuccessFactors information-processing environment. In addition to its high security standards, SuccessFactors documents critical processes to ensure consistent, predictable results. The importance of information security is reflected in the company s standards and in its requirement that all employees acknowledge in writing that they understand their roles and responsibilities regarding information security. SuccessFactors security education and awareness Some of the biggest data leaks in recent months have been the result of social engineering or simple carelessness. Employees who unwittingly give access to confidential data through lost or stolen laptops left unencrypted have caused some of the largest data leaks of all time. Ongoing security training for all employees about the latest security scams, periodic reviews of security policies, and signed acknowledgments that the employees have read and understand the policies go a long way toward keeping information security top of mind. At SuccessFactors, security responsibilities are addressed throughout a person s tenure with the company to ensure that employees, as well as contractors and third-party vendors, understand their responsibilities. SuccessFactors involves all employees, contractors, and third-party vendors in annual security awareness training. SuccessFactors compliance standards SuccessFactors complies with the latest standards, including: All policies based on ISO Applications tested to OWASP standards Infrastructure hardened to CIS standards U.S. government FISMA accreditation (OPM/DHS/NTIS) PCI certified SSAE 16 SOC 2 auditing every year SSAE 16 SOC 2 or ISO certification for the data center Safe Harbor certification BS standard for the management of personal information SuccessFactors has established intercompany agreements internally that permit the company to manage data using all of its resources globally. All contracts with sub processors include appropriate provisions to ensure that SuccessFactors adheres to all of the European Union data privacy requirements. 10
11 Conclusion As malicious software, identity theft, and online system exploitation threaten today s computing environments, securing sensitive corporate data has never been more imperative. Government regulations require and end users demand higher levels of security, yet businesses struggle to implement a sound security infrastructure that protects them from existing and emerging threats. Have security solutions caught up with this demand? At SuccessFactors, a seasoned team of industry experts who specialize in creating secure, reliable environments will help you save on IT staffing and build-out costs to safeguard your critical applications and data while keeping your business operations intact. We relentlessly focus on security so you don t have to. Our comprehensive approach at the physical, database, middleware, application, and network and communication layers literally builds security into every aspect of our business. In fact, we work every day to help companies just like yours achieve the best possible business results, with Business Execution Software solutions that incorporate the latest research, the smartest technology, and the most secure systems on the planet. Providing a safe yet highly accessible environment is something that many corporate behind-the-firewall implementations are struggling to achieve. SuccessFactors ability to offer applications that are affordable, configurable, and secure makes us the industry leader. About SuccessFactors, an SAP company SuccessFactors is the leading provider of cloud-based Business Execution Software and delivers business alignment, team execution, people performance, and learning management solutions to organizations of all sizes across more than 60 industries. With approximately 15 million subscription seats globally, we strive to delight our customers by delivering innovative solutions, content and analytics, process expertise, and best practices insights from serving our broad and diverse customer base. Today, we have more than 3,500 customers in more than 168 countries using our application suite in 35 languages. Copyright 2012 SuccessFactors, Inc. 11
12 SuccessFactors Global Headquarters 1500 Fashion Island Blvd. Suite 300 San Mateo, CA 94404, USA TOLL FREE PHONE FAX EMEA APAC successfactors.com San Mateo, California Boston, Massachusetts San Francisco, California Copenhagen, Denmark Paris, France Munich, Germany Zürich, Switzerland London, United Kingdom Beijing, China Hong Kong, China Tokyo, Japan Manila, Phillipines Singapore Seoul, South Korea Sao Paulo, Brazil Mexico City, Mexico Dublin, Ireland Shanghai, China Bangalore, India Brisbane, Australia Sydney, Australia
SAP Cloud: Focusing on security So you can focus on business
SAP Cloud: Focusing on security So you can focus on business Vinod Choudhary William Harmer III Ralph Salomon 2013 SAP AG or an SAP affiliate company. All rights reserved. SAP Cloud: Focusing on security
Top 10 reasons to move to the cloud
Checklist: Top 10 reasons to move to the cloud WHITE PAPER Checklist: Top 10 reasons to move to the cloud There are many reasons to move to the cloud, including rapid deployment, reduced support, improved
Cloud Contact Center. Security White Paper
Cloud Contact Center Security White Paper Introduction Customers communicate with organizations in a variety of forms from phone conversations to email, web chat and social media. As each interaction may
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
The ROI of a New Learning Management System (LMS)
The ROI of a New Learning Management System (LMS) How to Construct a Successful Business Case WHITE PAPER PERFORMANCE MANAGEMENT IN A SMALL-BUSINESS CULTURE How to Construct a Successful Business Case
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Security & Infra-Structure Overview
Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
Birst Security and Reliability
Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
ClickTale Security Standards and Practices: Delivering Peace of Mind in Digital Optimization
Delivering Peace of Mind in Digital Optimization TABLE OF CONTENTS INTRODUCTION 2 PRIVACY AND ANONYMITY 3 ISO 27001 COMPLIANCE 5 APPLICATION-LEVEL SECURITY 6 PENETRATION TESTING AND SECURITY AUDITS 7 GENERAL
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
Secure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
Famly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
SAP Product and Cloud Security Strategy
SAP Products and Solutions SAP Product and Cloud Security Strategy Table of Contents 2 SAP s Commitment to Security 3 Secure Product Development at SAP 5 SAP s Approach to Secure Cloud Offerings SAP s
Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Secure and control how your business shares files using Hightail
HIGHTAIL FOR ENTERPRISE: SECURITY OVERVIEW Secure and control how your business shares files using Hightail Information the lifeblood of any business is potentially placed at risk every time digital files
<cloud> Secure Hosting Services
Global Resources... Local Knowledge Figtree offers the functionality of Figtree Systems Software without the upfront infrastructure investment. It is the preferred deployment solution for organisations
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
Addressing Cloud Computing Security Considerations
Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
SaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
HEC Security & Compliance
HEC Security & Compliance SAP Security, Risk & Compliance Office November, 2014 Public Version 2.0 Details Introduction Overview Security Offering Approach Certifications Introduction Dear Customer, Information
SaaS Security for Confirmit Horizons
SaaS Security for Confirmit Horizons January 2015 Confirmit Horizons v18.5 Arnt Feruglio Chief Operating Officer The Confirmit Horizons Software From its inception in 1997, the architecture and code of
Blue Jeans Network Security Features
Technical Guide Blue Jeans Network Security Features Blue Jeans Network understands an organization s need for secure communications. The Blue Jeans cloud-based video conferencing platform provides users
Delivering peace of mind in digital optimization: Clicktale's security standards and practices
THE CLICKTALE DIFFERENCE Delivering peace of mind in digital optimization: Clicktale's security standards and practices CONTENTS INTRODUCTION... 2 PRIVACY AND ANONYMITY...2 ISO 27001 COMPLIANCE...4 APPLICATION-LEVEL
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
Enterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
SNAP WEBHOST SECURITY POLICY
SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
CHECKLIST: Top 10 reasons to move to the cloud
CHECKLIST: Top 10 reasons to move to the cloud CHECKLIST: Top 10 reasons to move to the cloud There are many reasons to move to the cloud, including rapid deployment, reduced support, improved flexibility,
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%
Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
TOP SECRETS OF CLOUD SECURITY
TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3
Altus UC Security Overview
Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
THE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk
Xerox Litigation Services In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Your Highest Priority is also Your Greatest Challenge Data breaches are not just
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
PCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud
Druva Phoenix: Enterprise-Class Data Security & Privacy in the Cloud Advanced, multi-layer security to provide the highest level of protection for today's enterprise. Table of Contents Overview...3 Cloud
How To Motivate and Retain Key Employees
How To Motivate and Retain Key Employees Consistent and Objective Results for Performance Reviews, Succession, and Compensation Management WHITEPAPER SuccessFactors Calibration How To Motivate and Retain
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests.
THE BRIGHTIDEA CLOUD INFRASTRUCTURE INTRODUCTION Brightidea s world-class cloud infrastructure is designed and certified to handle the most stringent security, reliability, scalability, and performance
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
THE SECURITY OF HOSTED EXCHANGE FOR SMBs
THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105
OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105 CONTENTS OVERVIEW 3 SOFTWARE DESIGN 3 CUSTOMER ARCHITECTURE.. 4 DATA CENTERS. 4 RELIABILITY. 5 OPERATIONS
Security & Infrastructure White Paper
Proofing and approval made easy. Security & Infrastructure White Paper ProofHQ (Approvr Limited) 66 The High Street Northwood Middlesex HA6 1BL United Kingdom Email: [email protected] US: +1 214 519
Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity
Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516) 773-3533 Ekartha India Pvt. Ltd. 814/B Law College Road Demech House, 4th Floor Erandwane, Pune, India Email: [email protected] Web:
Privacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
WHITEPAPER Workforce Planning Pitfalls
WHITEPAPER Workforce Planning Pitfalls Six tips for delivering the workforce of the future for consistent business success Executing talent management activities before they re needed is an earmark of
ProjectManager.com Security White Paper
ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
CBIO Security White Paper
One Canon Plaza Lake Success, NY 11042 www.ciis.canon.com CBIO Security White Paper Introduction to Canon Business Imaging Online Canon Business Imaging Online ( CBIO ) is a cloud platform for Canon s
HIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture
Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture 2 Data Security and Privacy Principles for IBM SaaS Contents 2 Introduction
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
CONTENTS. Security Policy
CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Tableau Online Security in the Cloud
Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Powering the Cloud Desktop: OS33 Data Centers
OS33 Data Centers [email protected] (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets
Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?
SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several
Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October 2015. Page 1 of 9
Security CLOUD VIDEO CONFERENCING AND CALLING Whitepaper October 2015 Page 1 of 9 Contents Introduction...3 Security risks when endpoints are placed outside of firewalls...3 StarLeaf removes the risk with
Cherwell Software Hosted Environment. www.creekpointe.com [email protected] 864.297.4959 +1 800.613.1426
Cherwell Software Hosted Environment Cherwell Software, LLC ( Cherwell ) provides an efficient, expedient, and secure hosted environment so that customers are guaranteed exceptional performance and reliability.
Global ediscovery Client Data Security. Managed technology for the global legal profession
Global ediscovery Client Data Security Managed technology for the global legal profession Epiq Systems is a global leader in providing fully integrated technology products and services for ediscovery and
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
WALKME WHITEPAPER. WalkMe Architecture
WALKME WHITEPAPER WalkMe Architecture Introduction WalkMe - the Enterprise Class Guidance and Engagement Platform - drives users to action as they use software or websites. WalkMe is used by Enterprises
Making the leap to the cloud: IS my data private and secure?
Making the leap to the cloud: IS my data private and secure? tax & accounting MAKING THE LEAP TO THE CLOUD: IS MY DATA PRIVATE AND SECURE? Cloud computing: What s in it for me? The more you know about
Protecting systems and patient privacy
Protecting systems and patient privacy Philips Remote Services Security Remote services deliver the benefi ts of faster, easier problem resolution and less system downtime during troubleshooting and clinical
With Eversync s cloud data tiering, the customer can tier data protection as follows:
APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software
Level I - Public. Technical Portfolio. Revised: July 2015
Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center
Understanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.
Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
