About Acquia. Acquia Cloud Site Factory allows you to rapidly build mobile- ready brand, campaign, and franchise websites on a turnkey cloud platform.

Size: px
Start display at page:

Download "About Acquia. Acquia Cloud Site Factory allows you to rapidly build mobile- ready brand, campaign, and franchise websites on a turnkey cloud platform."

Transcription

1 SERVICE DEFINITION

2 About Acquia Acquia is a private, fast- growth company supporting enterprises that use the free and open- source content- management system Drupal. Co- founded by Drupal's creator in 2007, Acquia provides customers with software, consultation, hosting, and services to help them launch sites faster and keep them running with more confidence. Drupal Commons is the better way to social business. It's everything your community needs collaboration, community, and more at a far lower total cost than proprietary software. Drupal Commons enables social networking to create productive interactions among employees, customers, and the web. Whether your community is public or private, Drupal Commons does it. Acquia Cloud is a Platform as a Service (PaaS) that delivers superb Drupal hosting for developers and enterprises. Used by some of the world's largest and best- known Drupal sites, Acquia's battle- tested hosting environment is configured, expertly tuned, and optimized for Drupal. Acquia Network provides expert Drupal answers, tools, and support. It's a package that stands behind you, ensuring successful site migration, launch, operation, and growth. Add cloud hosting for the most- complete Drupal solution available anywhere. Get smarter, be more productive, and sleep better knowing that we've got your back. Acquia Cloud Site Factory allows you to rapidly build mobile- ready brand, campaign, and franchise websites on a turnkey cloud platform.

3 High performance Acquia Cloud is Drupal- tuned and pre- configured with advanced performance technologies, including Varnish, Nginx, APC, and Memcached. Drupal sites hosted on Acquia Cloud perform better, at a much lower cost than custom- built alternatives, and benefit from Acquia s continuous platform improvements. Fully managed platform Acquia delivers your Drupal hosting platform as a service, simplifying site monitoring and eliminating operations headaches for your web team. Unparalleled developer experience Separate development, testing, and production environments are deployed automatically from Git or SVN. Drag and drop code, databases, and files between environments. Full Drush support lets you control Drupal functions from the command line. And if something goes wrong, easily roll back code or restore from automatic backups. Optimized for Drupal Acquia Cloud only hosts Drupal websites and is tuned specifically for Drupal performance. Your site gets a high PHP memory allotment, Drupal- specific LAMP stack tuning, opcode caching, Pressflow compatibility, and much more. The result is faster rendering of dynamic content and improved site reliability. Simplified Drupal infrastructure For sites that need high performance and scalability, Acquia Cloud offers everything you need. And because Acquia delivers this infrastructure as a service, you ll reduce costs and simplify site management efforts. Backed by the Acquia Network, Acquia Cloud subscribers gain additional knowledge, training materials, tools, and cloud services to enhance their web experiences.

4 Support Services Network Services Network Services refers to automated services delivered electronically to Acquia Network members and the Acquia Drupal installations that they manage. The network services are designed to provide information and functionality that help Acquia Drupal site administrators keep their sites trouble- free. The online documentation library is a set of Acquia Drupal documentation that includes original documentation specific to Acquia Drupal and the Acquia Network as well as useful documentation from other sources. Update Notifications The software update notifications service alerts Acquia Network subscribers to the availability of updates for their Acquia Drupal installation. This service is powered by the Acquia Network Module within Acquia Drupal. This module reports the current version of all components to the Acquia Network. Unlike the update notifications provided by Drupal.org, the update notifications provided by the Acquia Network are filtered and prioritized by a rigorous automated and human- assisted testing an review processs that assess each update in isolation and in conjunction with it's dependencies. Update notifications that pass this rigorous process are less likely to introduce troublesome regression issues or open new vulnerabilities. The Acquia Network also provides tools to help site administrators assess the importance of each update, convert notifications into work items, and assign and track these work items across teams of administrators in order to ensure effectively and transparent system maintenance procedures. Heartbeat monitoring The uptime monitoring service reports information about the availability of the subscribed site. The service regularly queries the site to determine if Acquia Drupal is fully operational. Modification detection The fork detection service gathers and reports local changes to the Acquia Drupal source code that could result in unexpected behavior. The Acquia Network Module within Acquia Drupal continuously monitors all code in the installation for modifications. This information helps site administrators avoid inadvertent changes that can lead to system instablility and helps Acquia tech support staff more quickly isolate root cause. When a fork is detected, Acquia support staff will work with the customer to assess the supportability of the environment on a case by case basis. Remote cron The remote cron service remotely activates the Cron service on subscribed sites running in environments that do not provide sufficient access to the local Cron service. This service ensures execution of regularly scheduled maintenance tasks and events that require the cron service including search indexing, content syndication, automated s, etc.

5 Mollom spam blocking The Mollom spam blocking service helps protect subscribed sites from unwanted user- generated content including link spam, abusive or innappropriate text- based content, robot- generated user registrations, etc. The Mollom service utilizes the Mollom Module within Acquia Drupal to intercept designated user- generated comment and registrations, evaluate them for spam content, and then either block the submission or challenge the user with a computer- aided Turing test (CAPTCHA). The Mollom service incorporates sophisticated algorithms and feedback mechanisms that enable the service to become more effective over time and to adapt quickly to emergent spam generation techniques. The Mollom service is available in a limited version and full version. Mollom limited has no encryption, no failover, and has a daily limit of 100 ham submissions, 100 correct captchas, and 5000 requests. Mollom full has SSL encryption, failover, and has a daily limit of 10,000 ham submissions, 10,000 correct captchas, and 500,000 requests. The Mollom service is operated by Mollom BVBA and is distributed by Acquia under license. Access Channels Acquia provides support through a variety of access channels. All Acquia Network members have access to special discussion forums where they can interact with Acquia support staff and with each other. The subscriber forums are pro- actively moderated by Acquia to keep discussions polite and on topic. The subscriber forums are designed for general information sharing and collaboration and cannot be used as a substitute for traditional ticket management. There is no specific service level agreement for Acquia support staff participation in the forums. Web tickets The Acquia Network console contains an web interface where members can open and manage support tickets. Acquia Network members with the access channel entitlement may may interact with Acquia support staff via . In order to ensure efficient capture of essential information, all tickets are opened via the web interface. Subsequent communications regarding the ticket may occur over . Chat Acquia Network members with the chat access channel entitlement may interact with Acquia support staff through a web- based chat interface within the Acquia Network console. In order to ensure efficient capture of essential information, all tickets are opened via the web interface. Subsequent communications regarding the ticket may occur over chat. Telephone Acquia Network members with the telephone access channel entitlement may interact with Acquia support staff by telephone.

6 Service Level Acquia Network subscriptions offer a full range of service levels to meet the needs of every project. Named Contacts Names contacts refers to the maximum number of individual Acquia Network member accounts that can be associated with this subscription. Every person who has at least one subscription on the Acquia Network has a unique member account. Members accounts may be associated with multiple subscriptions, which useful for individuals who are responsible for managing multiple Acquia Drupal installations. Similarly, subscriptions may have multiple named contacts to allow multiple administrators or developers to work together in managing the Acquia Drupal servers. The named contacts associated with each subscription may use the task management features of the Acquia Network to work together on processing update notifications and open technical support tickets. Hours The hours of operation are the days of the week and hours of the day during which Acquia support staff process tickets. Maximum initial response time The maximum initial response time is the interval between the submission of a ticket and the initial response by Acquia. Maximum tickets A ticket is an individual issue that focuses on one aspect of the an Acquia product or service e.g. use of a specific documented feature of the product or assistance with a specific problem or error message. A single support ticket may involve multiple interactions with Acquia support staff. Support Scope The support scope defines the kinds of tickets that are supported. Emergency escalation Emergency escalation is the automatic escalation to Level 3 support for Severity 1 emergency tickets. Installation troubleshooting Acquia provides assistance and advice for installing Acquia Drupal in supported environments. General how- to & troubleshooting Acquia provides assistance in the configuration of Acquia Drupal and the Acquia Network and general trouble shooting. Security best practices Acquia provides assistance in resolving and avoiding security vulnerabilities with Acquia Drupal.

7 Module selection advice Acquia suggests Drupal modules that may be useful in addressing customer requirements. Comprehensive requirements definition and module selection is offered separately as a professional services engagement through Acquia Professional Services and Acquia partners. Migration best practices Acquia offers general advice and best practices for migrating existing web sites to Acquia Drupal. Detailed, site specific migration assessment, recommendations, and implementation is available separately as a professional services engagement through Acquia Professional Services and Acquia partners. Performance best practices Acquia provides generalized guidelines and suggestions for optimizing performance of Acquia Drupal. Detailed site- specific performance assessment, recommendation and implementation is available separately as a professional services engagement through Acquia Professional Services and Acquia partners. Architecture best practices Acquia provides generalized architectural guidelines and suggestions for structuring Acquia Drupal implementations. Detailed site- specific architecture assessment, recommendation and implementation is available separately as a professional services engagement through Acquia Professional Services and Acquia partners. Module dev. best practices Acquia provides generalized guidelines and suggestions for developing custom modules for Acquia Drupal. Requirements definition, code review, debugging, and custom development is available separately as a professional services engagement through Acquia Professional Services and Acquia partners. Long Term Support Scope For each major release of Acquia Drupal designated as a Long Term Support release, Acquia provides active maintenance for three years and extended maintenance for an additional year. During the active maintenance period, Acquia will proactively attempt to resolve product defects and incompatibilities that arise in supported environments. During the extended maintenance period, Acquia will attempt to resolve Severity 1 defects only. Optional Add- ons Optional add- on services are available to enhance Acquia Network subscriptions. Technical account management A technical account manager is a senior Acquia support engineer who is dedicated to a small number of Enterprise level Acquia Network customers. Your technical account manager can take the time to learn the details of your environment, proactively provide guidance and support, and function as an extended member of your team. Access to a technical account manager is an optional service available to Production Enterprise level Acquia Network customers.

8 Additional named contacts You may purchase additional named contacts to expand the number of individuals associated with your subscription who are allowed to open tickets associated with your subscription. Additional tickets If your subscription includes a limit on the number of tickets, you may purchase additional tickets as needed. 7X24 response coverage Available as an optional add- on for Enterprise level Acquia Network subscribers, 7X24 response coverage gives you the assurance of knowing you can contact Acquia support staff at any hour of day. Call Acquia sales for additional details and pricing. Custom software engineering Custom software engineering is available as an optional add- on service for Enterprise level Acquia Network subscribers. Call Acquia sales for additional details and pricing. Support Options Developer Pro Pro Plus Enterprise on Dev Cloud Managed Cloud Infrastructure support 24x7 w/ 1 hr response for critical infra failures 24x7 w/ 1 hr response for critical infra failures 24x7 w/ 1 hr response for critical infra failures 24x7 w/ 1 hr response for critical infra failures Highly available, proactive monitoring and resizing. Infrastructure failure Proactive recovery of infrastructure only. Proactive recovery of infrastructure only. Proactive recovery of infrastructure only. Proactive recovery of infrastructure only. Highly available, fully managed will recover site for any reason. Drupal Support None 1- business day response for non- critical issues 1- business day response for non- critical issues 1- business day response for non- critical issues 24/7 Critical 1 hour response, Site/App failure Support will advise how to bring site back on line for critical tickets filed by customers. Diagnosis only. Support will advise how to bring site back on line for critical tickets filed by customers. Diagnosis only. Support will advise how to bring site back on line for critical tickets filed by customers. Diagnosis only. RA provides access to logs, code, and Drupal admin accounts to bring the site back up. Will recover site for any reason proactively. Security breach, DDOS,? Will recover site, secure site and help with diagnosis. Will manage DDOS with services. Traffic spike impacting site infrastructure Ops will proactively file a ticket suggesting DIY resizing. Site may go off- line. Resizing or reboots will cause Ops will proactively file a ticket suggesting DIY resizing. Site may go off- line. Resizing or reboots will cause downtime. Ops will proactively file a ticket suggesting DIY resizing. Site may go off- line. Resizing or reboots will cause Ops will proactively file a ticket suggesting DIY resizing. Site may go off- line. Resizing or reboots will cause downtime. Ops will diagnose resizing necessary and proactively resize in a highly available manner.

9 downtime. downtime. Resize infrastructure DIY with downtime. DIY with downtime. DIY with downtime. DIY with downtime. Proactive, highly available, 99.95% SLA Caching strategies File support ticket File support ticket Unlimited Drupal support, Advisory hours e.g. Performance, Scaling. Unlimited Drupal support, diagnose caching infrastructure, tune custom infrastructure systems and implement recommendations. e.g. Varnish, Memcache, APC Customize infrastructure DIY: SSL, PHP Memory size, Concurrent PHP process count, Memcache size, Resize, Reboot DIY: SSL, PHP Memory size, Concurrent PHP process count, Memcache size, Resize, Reboot DIY: SSL, PHP Memory size, Concurrent PHP process count, Memcache size, Resize, Reboot DIY: SSL, PHP Memory size, Concurrent PHP process count, Memcache size, Resize, Reboot Customization, and tuning of infrastructure fully managed by operations Cloud onboarding DIY. Customers must be able to debug PHP error messages, review logs, use Drush for debugging. Server resizing with downtime may be necessary. DIY. Customers must be able to debug PHP error messages, review logs, use Drush for debugging. Server resizing with downtime may be necessary. Support will advise how to diagnose site migration failures and identify common pitfalls in migrations. DIY. Customers must be able to debug PHP error messages, review logs, use Drush for debugging. Server resizing with downtime may be necessary. Support will advise how to diagnose site migration failures and identify common pitfalls in migrations. DIY. Customers must be able to debug PHP error messages, review logs, use Drush for debugging. Server resizing with downtime may be necessary. Unlimited support may be used to help with onboarding advice. A rigorous sizing, migration, load testing, onboarding audit process greatly reduces the risk profile of a cloud migration. Acquia s expertise, auditing, hands on remote administration help to not let you fail.

10 Acquia Hosting Acquia Hosting is delivered by means of Acquia operations and support personnel, Acquia- developed systems to monitor and provision cloud servers, and network services to ensure clients operate reliable trouble- free websites. Acquia Hosting is a services layer built atop Amazon Web Services, the largest and most sophisticated Cloud Computing Platform in the world. Amazon Web Services (AWS) provides a suite of network services which offer a reliable infrastructure for hosting Drupal sites. This security document outlines the policies and procedures Acquia upholds in its commitment to customer service, security, and risk mitigation. Security Accreditations HIPAA SOC 1/SSAE 16/ISAE 3402 (formerly SAS70) SOC 2 SOC 3 PCI DSS Level 1 ISO FedRAMP SM DIACAP and FISMA ITAR FIPS CSA MPAA In order to maintain the level of security we provide to our customers, not all specific details about network topology, physical locations, and security procedures are available to the public. Keeping this information private afford us a higher degree of security from would- be hackers. Acquia is committed to maintaining a high degree of transparency and trust with its customers, so we will make as much information available to our customers that we can legally and safely disclose surrounding these network specifics. Acquia will share with its customers, under NDA, a reasonable level of transparency in the processes Acquia maintains. Links to Acquia Hosting Documentation Acquia Hosting Documentation can be found here: hosting/ This resource section describes how Customers interact with Acquia Hosting, SVN code management, file and database storage locations, SSL policies, directory structure and additional helpful information.

11 Acquia Hosting Architecture Overview Acquia Hosting utilizes AWS services, including Elastic Compute Cloud (EC2), Elastic Block Storage (EBS) and Simple Storage Service (S3) to provide dedicated hosting resources to it's customers. Acquia Hosting customers are provisioned with multiple EC2 instances configured in a load balanced arrangement behind a primary and hot- spare EC2 instance acting as a software load balancer. On each EC2 server node, Linux (currently Ubuntu Server), Apache, MySQL, and PHP are installed and configured in a manner suitable for high- traffic Drupal sites. For customers with larger hosting needs, MySQL is delegated to it's own tier of EC2 instances (2 or more nodes) and configured in an Active- Active replication configuration. Each customer's cluster is provisioned with an EBS and files are replicated using Gluster File System. Load balancers are provisioned with nginx software load balancer, and varnish reverse- proxy caching server to maintain high- availability and performance by using memory- based data caching. Provisioning tools Acquia uses custom API tools to provision new hosting clusters, attach file stores, install the software and dependencies, and provide uniformity in each customer's environment. Puppet is used to manage configurations, and apply security updates and configuration changes across all clusters.

12 Redundancy, High- Availability (HA) and Failover Acquia Hosting was developed to be a high- availability hosting environment. If individual EC2 instances are degraded, a new one can be configured automatically in order to prevent downtime. Each cluster is designed to remain performant in the event of a single node removed from service. Load balancers are provisioned with hot- spares to provide HA at the topmost tier. The database tier was also designed with HA in mind using MySQL replication. Physical Network Hardware, Firewalls AWS provides its users with a complete firewall solution, configured in a deny- all mode until ports are explicitly opened by Acquia. Acquia configures additional firewall rules based on protocol, service port, and/or source IP address filtering. Systems Access Controls (Acquia and Amazon) Acquia limits access to AWS servers under its management, as well as all the information the servers contain, strictly to our operations team. Access to servers is only done through password protected SSH keys. Each Acquia employees SSH key is password protected and stored on an encrypted volume. Customers only have access to a non- privileged account. Database backups are only available through authenticated URLs. Acquia's access to customer hosted web site data is restricted to Acquia's hosting engineers, support engineers, and network operations. These staff members are all full- time employees of Acquia. Full text of Acquia s policy regarding user access (Policy #AC166) is available to Customers upon request. Acquia employees and customers have no physical access to AWS datacenters. AWS datacenters are housed in nondescript facilities. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two- factor authentication a minimum of two times to access datacenter floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff. Access attempts via SSH are logged and retained for retrieval and audit purposes. Operating Systems and Patch Management Acquia utilizes Puppet to synchronize, document, and deploy security patches to EC2 instances. Acquia currently has standardized on Ubuntu Server as the supported Linux distribution. DDOS, Network Vulnerability Assessments, IDS Systems AWS Network Security provides significant security against traditional security issues including integrated DDOS protection, Man In the Middle (MITM) Attacks, IP Spoofing, Port Scanning, Packet Sniffing, etc. Additional security is provided by AWS via authentication and security of the host and guest operating system within the virtualized environment. Isolation of each guest operating system from within the Xen hypervisor provides an additional level of security.

13 Encryption Encryption is supported of EBS volumes. Backup Policies and Disaster Recovery Procedures Acquia maintains a comprehensive backup solution which includes website code, static assets/files, and databases. The backup policy is listed below. Customers are provided the ability to download nightly database dumps of which the last three days are retained. The other backups listed are not accessible by customers but are available simply by requesting assistance from Acquia Support. Acquia s Disaster Recovery efforts are aided by the fact that there are no single points of failure of the system as a whole, and we utilize AWS infrastructure physically remote from our office facilities. In practice, a disaster affecting one or more of our offices would not impact the security of Customer data. It is Acquia s policy to employ restoration of Customer services in the event of a major disaster through the best reasonable timeframes. AWS Availability Zones are separate yet interconnected nodes on the overall worldwide AWS network. Best attempts would be made to restore services in an alternate availability zone in the event service in the current zone was severely impacted. Hosting Access (SSH, MySQL ports, FTP, SVN) All access to the hosting environment s root directory is done through version control, there is no write- access to this directory. For that reason FTP is not permissible. SSH is available upon request, but through an un- privileged user account to enhance security and stability of the configuration. If required, customer s can elect to open a port for remote MySQL database access. SSL / HTTPS It is supported, and strongly suggested, to configure SSL certificates on the primary domain name in order to provide SSL security for administrative functions on the site, as well as any secure transactions taking place. Acquia can set up customers with SSL certificates but cannot allow transfers of existing certificates into Acquia hosting. Security Policy Regarding Confidential Information Handling of Sensitive Data by Employees, Data Destruction Policies It is Acquia s policy to adhere to standard best practices regarding security of information while at rest and while in use within systems we maintain. Access to sensitive data is only available to the full- time employee who needs it in order to perform their job function. Destruction of data policies Sensitive Data is never stored for extended periods of time outside of the AWS infrastructure and on physical media such as CD or external hard drives. Access to client s databases would only ever be transferred outside of the AWS environment in the event it was needed to help solve a customer s problem, and local problem resolution steps were required. After this problem was rectified, the files would be purged. In practice, Customer sensitive information is never stored on company laptops, mobile devices or physical media outside of the protections AWS allows. Information is uploaded directly to servers or copied between servers via SSH.

14 Paper media is not used at our offices for printing sensitive information, as there is never a need to transfer database information to paper. Incident Response Process and Monitoring Acquia s Incident Response Policy is to notify customers within 24 hours of a Sev- 0 issue, which would impacts multiple customers. A security breach would be automatically classified as a Sev- 0 issue. Our goal is to make this notification to customers within one hour. This policy is shared with all new operations team members and listed on Acquia s intranet and other shared resources. Most of Acquia s infrastructure/operations as well as engineering teams are based in the same co- located office space in order to be centrally located. Acquia uses Nagios monitoring to provide instant access to vital metrics of the servers we provision in the AWS infrastructure. Over 25 metrics are monitored and linked to alerts via , SMS, and pager. Metrics include but are not limited to disk utilization, CPU utilization, memory usage and swap activity, processes running, DB size and storage space available, as well as many Drupal- specific metrics important to monitor. Acquia s Support team is available on a 24x7 notice in the event of a critical (site impacting) issue and will respond within 30 minutes to assist. Acquia Support is available via the Acquia Support Subscription for problems and assistance for issues related to hosting, as well as any Drupal- related problem. Included with the Acquia Enterprise Support Subscription is a minimum of two site monitoring solutions which can be employed to monitor the Drupal site itself. Heartbeat monitoring is available via a Drupal module which communicates with the Acquia Network on ever cron run. If the heartbeat is not received, the Customer s authorized contacts could be notified via alerts. Acquia also employs external site monitoring via Pingdom (or similar service) to measure page load time as well as overall uptime, using 60 second intervals. If a series of five or more pings show the site off- line, Acquia Support is notified and a critical ticket is typically filed on behalf of the customer. Acquia will typically make best efforts to reach out to the customer to see put steps in place to assist with meeting a resolution. AWS provides their own monitoring on all of the included systems as an additional measure of security and awareness. Certifications / Audits by Acquia and AWS Acquia seeks certifications as needed to provide the level of security required by specific customers. We are always looking for 3 rd party assessments and validation that our security policies are greater than what is required in the market today. Acquia recently provided a hosting system compliant with the Federal Information Security Management Act (FISMA) or a Federal Agency, in order to host one of their websites. We also retain consultants on staff with high levels of federal clearance required to work on specific government projects including Department of Defense, Defense Systems Cooperative Alliance, The Executive Office of the President and many others. Acquia maintains an annual security audit conducted internally to address the overall security of its practices. As ongoing awareness and attention towards security is very important, Acquia s engineering team is made up of experienced information security professionals who regularly review and test our infrastructure. A well- defined development process addresses and highlights vulnerabilities and prioritizes them for implementation. AWS maintains PCI / DSS Level 1, ISO 27001, SAS 70 Type II compliance.

15 Acquia's Commitment to Security in Partnership with Our Customers Physical Inspection of Acquia and AWS Facilities, Policy Surrounding Audits or Security Meetings Acquia will cooperate with Customers to provide tours and inspections of Acquia office facilities and meet with Acquia management personnel to discuss security policy or other procedures. Considering the nature of our hosting operations and that all physical machines hosting Customer websites are based within AWS secure environments, during such review of Acquia facilities very little infrastructure or physical systems would be accessible. AWS does not permit tours or inspection of its facilities by guests, Customers, or strategic partners such as Acquia. Therefore we could not facilitate any type of physical inspection for Customer to inspect AWS hosting facilities or infrastructure. Information requested by a Customer of Acquia, which has been released to Acquia by AWS under NDA, will be protected and not released in order to adhere to these confidentiality provisions. Acquia maintains some infrastructure on its premises, for example IP phone switches and LAN equipment, but none of such equipment is used to host customer websites or store Sensitive Customer Information. Customer Initiated Security or Penetration Testing Acquia s policy is to allow and encourage network vulnerability testing, penetration testing, initiated bythe Customer and at Customer s expense. Acquia s policy is to request 24 hours of notice, or reasonable timeframe of notice, before such tests, and to complete them during normal business hours. The possibility exists that our monitoring will generate critical alerts if certain conditions are met simulating a brute- force attack, port scanning, or similar penetration testing technique, etc. Acquia also requests these tests are designed in such a way not to impact other Acquia customers in order to prevent interruptions or degradation of other customer s services. Change Management Policies and Notification Procedures Acquia s policy regarding changes to infrastructure in use by customers is to make these changes with as little customer impact as reasonably possible. Acquia is committed to delivering industry- leading, reliable hosting services. Delivering these services requires, on occasion, system maintenance. This document describes the policies that apply to each class of system maintenance. The full text of Acquia s Hosting Patch Management Process (Policy #CC086) is available for Customer s to review if requested. This document contains flowcharts, policies outlining roles and responsibilities over patch management as well as testing. Acquia High- Availability Hosting's 99.95% SLA applies to maintenance downtime as well as unscheduled downtime. Scheduled Maintenance Acquia's high availability hosting architecture enables the vast majority of system maintenance to take place without a risk of downtime. Customers will be notified at least 48 hours in advance of scheduled system maintenance with a risk of significant site downtime. This maintenance will be scheduled during non- US business hours (11PM to 7AM Eastern Time). Upon request, maintenance may be performed at a time mutually agreeable to the customer and Acquia. Emergency Maintenance From time to time, a site or infrastructure emergency may require immediate maintenance. Acquia reserves the right to perform emergency maintenance to correct site problems, address critical security issues, and to respond to critical alerts. Commercial reasonable efforts will be made to avoid site downtime.

16 Customer- Requested Maintenance Acquia support will implement customer- requested changes that carry a risk of outage at time a mutually agreeable to the customer and Acquia. Privacy policy Acquia s Privacy Policy is located here: us/legal/privacy- policy This document outlines security policies we employ by Customers and guests of our website, use of services through our website, collection of personal information, and information disclosure policies. Additional resources: services/acquia- cloud/hosting- services

KeyLock Solutions Security and Privacy Protection Practices

KeyLock Solutions Security and Privacy Protection Practices KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout

More information

Building Success on Acquia Cloud:

Building Success on Acquia Cloud: Building Success on Acquia Cloud: 10 Layers of PaaS TECHNICAL Guide Table of Contents Executive Summary.... 3 Introducing the 10 Layers of PaaS... 4 The Foundation: Five Layers of PaaS Infrastructure...

More information

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud Simone Brunozzi, AWS Technology Evangelist, APAC Fortress in the Cloud AWS Cloud Security Model Overview Certifications & Accreditations Sarbanes-Oxley (SOX) compliance ISO 27001 Certification PCI DSS

More information

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility. FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer

More information

VIEWABILL. Cloud Security and Operational Architecture. featuring RUBY ON RAILS

VIEWABILL. Cloud Security and Operational Architecture. featuring RUBY ON RAILS VIEWABILL Cloud Security and Operational Architecture featuring RUBY ON RAILS VAB_CloudSecurity V1 : May 2014 Overview The Viewabill.com cloud is a highly-secure, scalable and redundant solution that enables

More information

319 MANAGED HOSTING TECHNICAL DETAILS

319 MANAGED HOSTING TECHNICAL DETAILS 319 MANAGED HOSTING TECHNICAL DETAILS 319 NetWorks www.319networks.com Table of Contents Architecture... 4 319 Platform... 5 319 Applications... 5 319 Network Stack... 5 319 Cloud Hosting Technical Details...

More information

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II AWS Security CJ Moses Deputy Chief Information Security Officer Security is Job Zero! Overview Security Resources Certifications Physical Security Network security Geo-diversity and Fault Tolerance GovCloud

More information

Live Guide System Architecture and Security TECHNICAL ARTICLE

Live Guide System Architecture and Security TECHNICAL ARTICLE Live Guide System Architecture and Security TECHNICAL ARTICLE Contents 1. Introduction... 2 2. Hosting Environment... 2 2.1. Standards - Compliancy... 3 2.2. Business Continuity Management... 3 2.3. Network

More information

Building Energy Security Framework

Building Energy Security Framework Building Energy Security Framework Philosophy, Design, and Implementation Building Energy manages multiple subsets of customer data. Customers have strict requirements for regulatory compliance, privacy

More information

CLOUD SERVICES FOR EMS

CLOUD SERVICES FOR EMS CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery

More information

With Eversync s cloud data tiering, the customer can tier data protection as follows:

With Eversync s cloud data tiering, the customer can tier data protection as follows: APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software

More information

Cloud S ecurity Security Processes & Practices Jinesh Varia

Cloud S ecurity Security Processes & Practices Jinesh Varia Cloud Security Processes & Practices Jinesh Varia Overview Certifications Physical Security Backups EC2 Security S3 Security SimpleDB Security SQS Security Best Practices AWS Security White Paper Available

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

Security Features: Lettings & Property Management Software

Security Features: Lettings & Property Management Software Security Features: Lettings & Property Management Software V 2.0 (23/02/2015) Table of Contents Introduction to Web Application Security... 2 Potential Security Vulnerabilities for Web Applications...

More information

BMC s Security Strategy for ITSM in the SaaS Environment

BMC s Security Strategy for ITSM in the SaaS Environment BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...

More information

Acquia Cloud. Success You Can Build On. Acquia Cloud Technology. acquia.com. Drupal-Tuned Platform

Acquia Cloud. Success You Can Build On. Acquia Cloud Technology. acquia.com. Drupal-Tuned Platform acquia.com Acquia Cloud Success You Can Build On Acquia Cloud is a continuous delivery cloud platform optimized to run Drupal websites. Architected for resiliency and designed to accelerate deployment,

More information

Famly ApS: Overview of Security Processes

Famly ApS: Overview of Security Processes Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL

More information

Netop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing

Netop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing Netop Environment Security Unified security to all Netop products while leveraging the benefits of cloud computing Contents Introduction... 2 AWS Infrastructure Security... 3 Standards - Compliancy...

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

SysAid Cloud Architecture Including Security and Disaster Recovery Plan

SysAid Cloud Architecture Including Security and Disaster Recovery Plan SysAid Cloud Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid Cloud: Datacenters Network, Hardware, and Software Components Disaster Recovery Plan

More information

Acquia Hosting Services. Version: v1 By: Dave Gully, Regional Sales Manager. Date: April 2014

Acquia Hosting Services. Version: v1 By: Dave Gully, Regional Sales Manager. Date: April 2014 Acquia Hosting Services Version: v1 By: Dave Gully, Regional Sales Manager Date: April 2014 Acquia Inc. d/b/a Acquia Ltd, Advantage House, Reading, UK www.acquia.com Table of Contents 1. Acquia Drupal

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Magento Enterprise Cloud Edition A Platform-as-a-Service for Your Business. Peter Sheldon VP Strategy, Magento Commerce

Magento Enterprise Cloud Edition A Platform-as-a-Service for Your Business. Peter Sheldon VP Strategy, Magento Commerce Magento Enterprise Cloud Edition A Platform-as-a-Service for Your Business Peter Sheldon VP Strategy, Magento Commerce 88% of Organizations Have a Cloud 1 st Strategy Source: Gartner Forecast Analysis:

More information

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

CounselorMax and ORS Managed Hosting RFP 15-NW-0016 CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting

More information

Mirantis OpenStack Express: Security White Paper

Mirantis OpenStack Express: Security White Paper Mirantis OpenStack Express: Security White Paper Version 1.0 2005 2014 All Rights Reserved www.mirantis.com 1 Introduction While the vast majority IT professionals are now familiar with the cost-saving

More information

Intel Enhanced Data Security Assessment Form

Intel Enhanced Data Security Assessment Form Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized

More information

Building Success on Acquia Cloud. Buyer s Guide

Building Success on Acquia Cloud. Buyer s Guide Building Success on Acquia Cloud Buyer s Guide Building Success on Acquia Cloud Table of Contents Executive Summary.... 3 Benefits and Challenges of Developing Drupal Sites in the Cloud... 4 Benefits and

More information

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility

More information

19.10.11. Amazon Elastic Beanstalk

19.10.11. Amazon Elastic Beanstalk 19.10.11 Amazon Elastic Beanstalk A Short History of AWS Amazon started as an ECommerce startup Original architecture was restructured to be more scalable and easier to maintain Competitive pressure for

More information

THE BLUENOSE SECURITY FRAMEWORK

THE BLUENOSE SECURITY FRAMEWORK THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

Anypoint Platform Cloud Security and Compliance. Whitepaper

Anypoint Platform Cloud Security and Compliance. Whitepaper Anypoint Platform Cloud Security and Compliance Whitepaper 1 Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security.

More information

WALKME WHITEPAPER. WalkMe Architecture

WALKME WHITEPAPER. WalkMe Architecture WALKME WHITEPAPER WalkMe Architecture Introduction WalkMe - the Enterprise Class Guidance and Engagement Platform - drives users to action as they use software or websites. WalkMe is used by Enterprises

More information

Acquia Support Services. Acquia Network Support Services. Version: v1 By: Dave Gully, Regional Sales Manager. Date: April 2014

Acquia Support Services. Acquia Network Support Services. Version: v1 By: Dave Gully, Regional Sales Manager. Date: April 2014 Acquia Support Services Acquia Network Support Services Version: v1 By: Dave Gully, Regional Sales Manager Date: April 2014 Acquia Inc. d/b/a Acquia Ltd, Advantage House, Reading, UK www.acquia.com Table

More information

Enterprise Architecture Review Checklist

Enterprise Architecture Review Checklist Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish

More information

CA Cloud Overview Benefits of the Hyper-V Cloud

CA Cloud Overview Benefits of the Hyper-V Cloud Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Accellion Security FAQ

Accellion Security FAQ A N A C C E L L I O N W H I T E P A P E R Accellion Security FAQ Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto, CA 94303 info@accellion.com

More information

Security Practices, Architecture and Technologies

Security Practices, Architecture and Technologies Security Practices, Architecture and Technologies CONTACT: 36 S. Wall Street Columbus, OH 43215 1-800-VAB-0300 www.viewabill.com 1 CONTENTS End-to-End Security Processes and Technologies... 3 Secure Architecture...

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

Tk20 Network Infrastructure

Tk20 Network Infrastructure Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...

More information

Web Application Deployment in the Cloud Using Amazon Web Services From Infancy to Maturity

Web Application Deployment in the Cloud Using Amazon Web Services From Infancy to Maturity P3 InfoTech Solutions Pvt. Ltd http://www.p3infotech.in July 2013 Created by P3 InfoTech Solutions Pvt. Ltd., http://p3infotech.in 1 Web Application Deployment in the Cloud Using Amazon Web Services From

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com

Hosted Exchange. Security Overview. Learn More: Call us at 877.634.2728. www.megapath.com Security Overview Learn More: Call us at 877.634.2728. www.megapath.com Secure and Reliable Hosted Exchange Our Hosted Exchange service is delivered across an advanced network infrastructure, built on

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information

University of Pittsburgh Security Assessment Questionnaire (v1.5)

University of Pittsburgh Security Assessment Questionnaire (v1.5) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided

More information

Migrating a running service to AWS

Migrating a running service to AWS Migrating a running service to AWS Nick Veenhof Ricardo Amaro DevOps Track https://events.drupal.org/barcelona2015/sessions/migrating-runningservice-mollom-aws-without-service-interruptions-and-reduce

More information

FTP-Stream Data Sheet

FTP-Stream Data Sheet FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control

More information

SERVICE SCHEDULE PUBLIC CLOUD SERVICES

SERVICE SCHEDULE PUBLIC CLOUD SERVICES SERVICE SCHEDULE PUBLIC CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract

More information

BeBanjo Infrastructure and Security Overview

BeBanjo Infrastructure and Security Overview BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits

More information

QuickBooks Online: Security & Infrastructure

QuickBooks Online: Security & Infrastructure QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

Apteligent White Paper. Security and Information Polices

Apteligent White Paper. Security and Information Polices Apteligent White Paper Security and Information Polices Data and Security Policies for 2016 Overview Apteligent s Mobile App Intelligence delivers real-time user experience insight based on behavioral

More information

CONTENT OUTLINE. Background... 3 Cloud Security... 3. Instance Isolation:... 4. SecureGRC Application Security... 5

CONTENT OUTLINE. Background... 3 Cloud Security... 3. Instance Isolation:... 4. SecureGRC Application Security... 5 Page 2 Disclaimer THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF THE LICENSE AGREEMENT OR NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET

More information

Security Information & Policies

Security Information & Policies Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER

More information

TECHNOLOGY WHITE PAPER Jan 2016

TECHNOLOGY WHITE PAPER Jan 2016 TECHNOLOGY WHITE PAPER Jan 2016 Technology Stack C# PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache CloudWatch Paypal Overview

More information

MIGRATIONWIZ SECURITY OVERVIEW

MIGRATIONWIZ SECURITY OVERVIEW MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...

More information

Stephen Coty Director, Threat Research

Stephen Coty Director, Threat Research Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst

More information

The remedies set forth within this SLA are your sole and exclusive remedies for any failure of the service.

The remedies set forth within this SLA are your sole and exclusive remedies for any failure of the service. The remedies set forth within this SLA are your sole and exclusive remedies for any failure of the service. NETWORK INTERNAL NETWORK The internal network includes cables, switches, routers, and firewalls

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

Our Cloud Offers You a Brighter Future

Our Cloud Offers You a Brighter Future Our Cloud Offers You a Brighter Future Qube Global Software Cloud Services are used by many diverse organisations including financial institutions, international service providers, property companies,

More information

Enterprise level security, the Huddle way.

Enterprise level security, the Huddle way. Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network

More information

The Education Fellowship Finance Centralisation IT Security Strategy

The Education Fellowship Finance Centralisation IT Security Strategy The Education Fellowship Finance Centralisation IT Security Strategy Introduction This strategy outlines the security systems in place to optimise, manage and protect The Education Fellowship data and

More information

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide

More information

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Application Security Best Practices. Matt Tavis Principal Solutions Architect Application Security Best Practices Matt Tavis Principal Solutions Architect Application Security Best Practices is a Complex topic! Design scalable and fault tolerant applications See Architecting for

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

TECHNOLOGY WHITE PAPER Jun 2012

TECHNOLOGY WHITE PAPER Jun 2012 TECHNOLOGY WHITE PAPER Jun 2012 Technology Stack C# Windows Server 2008 PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

How To Use Egnyte

How To Use Egnyte INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information

More information

Cloud Vendor Evaluation

Cloud Vendor Evaluation Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

Secure networks are crucial for IT systems and their

Secure networks are crucial for IT systems and their ISSA The Global Voice of Information Security Network Security Architecture By Mariusz Stawowski ISSA member, Poland Chapter Secure networks are crucial for IT systems and their proper operation. Essential

More information

CHOOSING A RACKSPACE HOSTING PLATFORM

CHOOSING A RACKSPACE HOSTING PLATFORM CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project

More information

Network Virtualization Platform (NVP) Incident Reports

Network Virtualization Platform (NVP) Incident Reports Network Virtualization Platform (NVP) s ORD Service Interruption During Scheduled Maintenance June 20th, 2013 Time of Incident: 03:45 CDT While performing a scheduled upgrade on the Software Defined Networking

More information

Cloud Management. Overview. Cloud Managed Networks

Cloud Management. Overview. Cloud Managed Networks Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity

More information

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and

More information

GoodData Corporation Security White Paper

GoodData Corporation Security White Paper GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share

More information

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module

Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant Ellucian Cloud Services Joe Street Cloud Services, Sr. Solution Consultant Confidentiality Statement The information contained herein is considered proprietary and highly confidential by Ellucian Managed

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

Analyzing HTTP/HTTPS Traffic Logs

Analyzing HTTP/HTTPS Traffic Logs Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that

More information

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started

More information

Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida

Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida Amazon Web Services Primer William Strickland COP 6938 Fall 2012 University of Central Florida AWS Overview Amazon Web Services (AWS) is a collection of varying remote computing provided by Amazon.com.

More information

Invest in your business with Ubuntu Advantage.

Invest in your business with Ubuntu Advantage. Invest in your business with Ubuntu Advantage. Expert advice. Specialist tools. Dedicated support. Introducing Ubuntu Advantage Contents 02 Introducing Ubuntu Advantage 03 Ubuntu Advantage 04 - Landscape

More information

EXECUTIVE SUMMARY CONTENTS. 1. Summary 2. Objectives 3. Methodology and Approach 4. Results 5. Next Steps 6. Glossary 7. Appendix. 1.

EXECUTIVE SUMMARY CONTENTS. 1. Summary 2. Objectives 3. Methodology and Approach 4. Results 5. Next Steps 6. Glossary 7. Appendix. 1. CONTENTS 1. Summary 2. Objectives 3. Methodology and Approach 4. Results 5. Next Steps 6. Glossary 7. Appendix EXECUTIVE SUMMARY Tenzing Managed IT services has recently partnered with Amazon Web Services

More information

Security and Information Policies

Security and Information Policies Security and Information Policies 1 Data and Security Policies for 2015-2016 Overview Crittercism's Mobile App Intelligence delivers real-time user experience insight based on behavioral and operational

More information

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things. Privacy and Security FAQ Privacy 1. Who owns the data that organizations put into Google Apps? 2. When can Google employees access my account? 3. Who can gain access to my Google Apps administrative account?

More information

This Service Level Agreement (hereinafter referred to as the SLA ) is an agreement entered into between:

This Service Level Agreement (hereinafter referred to as the SLA ) is an agreement entered into between: 1. Parties This Service Level Agreement (hereinafter referred to as the SLA ) is an agreement entered into between: XL Internet Services BV, Delftsestraat 5b, NL-3013 AB Rotterdam, the Netherlands, registered

More information

Managing and Maintaining Windows Server 2008 Servers

Managing and Maintaining Windows Server 2008 Servers Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led

More information

Injazat s Managed Services Portfolio

Injazat s Managed Services Portfolio Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information