Safe Harbor. Henning B. Treichl. Senior Sales Engineer salesforce.com

Size: px
Start display at page:

Download "Safe Harbor. Henning B. Treichl. Senior Sales Engineer salesforce.com"

Transcription

1 Henning B. Treichl Senior Sales Engineer salesforce.com Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include but are not limited to risks associated with developing and delivering new functionality for our service, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, risks associated with possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-Q for the most recent fiscal quarter ended April 30, This document and others are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.

2 EU-U.S. Safe Harbor Certification Salesforce.com is a Safe Harbor certified company f7cde/f241f27e774e882a85256c08005d a5fa?opendocument&highlight=2,salesforce Prototype: Det Borgernære Hospital

3 Why Cloud Computing and why Salesforce.com? Our Mission: Cloud Computing Driver, Catalyst & Evangelist 1960 s Mainframe 1980 s Client/server Today Enterprise Cloud Computing

4 Applications Moving to the Cloud 1960 s Mainframe 1980 s Client/server Today Cloud Computing Applications Platforms Moving to the Cloud 1960 s Mainframe 1980 s Client/server Today Cloud Computing Platforms

5 Collaboration Moving to the Cloud 1980 s Work Group Computing Lotus Notes Novell GroupWise 2000s Intranet Computing SharePoint Groove File Sharing Today Collaborative Computing What about risc? You are not first mover anymore Talk to your peers (cloud computing is global) Assess the cloud vendor and understand: Infrastructure Platform Services Operation procedures Standards and certifications Audits Try it and learn it (target the right projects)

6 Global Success in Public Sector Over 6,000 Government, Education & Nonprofit Customers General Government Economic Development Transportation Political Campaigns Science & Environment Health & Human Services Culture & Education Defense & Public Safety

7 Kaiser Permanente Powers IT Success with CRM and Force.com Initial CRM deployment in less than 4 months Data ambiguities and confusion removed Efficient custom app development frees up IT resources Complete sales productivity tools in hands of reps Kaiser Permanente receives consistently high marks in quality measurement and member satisfaction surveys. Part of our strategy to maintain and exceed those ratings involves implementing strategic technological innovations, such as Salesforce, that maximize employee productivity. - Jukka Valkonen Executive Director, Managing Enterprise Architect First Cloud Company to Exceed: $1.5 Billion + Annual Revenue Run Rate Quarterly Revenue ($M) Revenue through fiscal quarter ended 4/30/10

8 Strong Growth In New Customers 77,300+ Paying Customers The Cloud Computing Model Multi-tenant Automatic Upgrades Pay-as-you-go Real-time 5 Times Faster Half the Cost IDC White Paper sponsored by Salesforce.com: Force.com Cloud Platform Drives Huge Time to Market and Cost Savings, Doc # , September, 2009

9 Annual Unit Shipments (MM) Ten-Year Computing Cycles 10X the number of users per cycle 2000s Mobile Internet Computing 1990s Desktop Internet Computing 1980s Client/server Computing 1970s Mini Computing 1960s Mainframe Computing Next Generation Devices Changing How We Access the Internet Device Shipments Smartphones Notebook PCs Desktop E 2010E 2011E 2012E 2013E Source: Morgan Stanley Internet Mobile Report, December 2009

10 The Most Rigorous Security Standards in the Industry The World s Most Trusted Security that Improves in Real-Time with Testing by Every Customer Application Security ISO SSL encryption Identity confirmation SAS 70 Type II; SysTrust certified FDA 21 CFR Part 11 & Part 820 HIPAA compliant Network Security IP restrictions Fault tolerant, multi-layered firewall Intrusion detection 3 rd party assessments Facility Security 24 x 365 security Biometric readers Silent alarms CCTV Motion detection Facilities Security 24 x 365 on-site security All doors, including cages, are secured with biometric hand geometry readers. Five levels of biometric scanning including man-traps required to reach Salesforce cages Fully anonymous exteriors Digital camera (CCTV) coverage of entire facility All exterior walls are bullet resistant Entire perimeter bounded by concrete bollards/planters A silent alarm and automatic notification of appropriate law enforcement officials protect all exterior entrances. CCTV integrated with access control and alarm system. Motion-detection for lighting and CCTV coverage.

11 Application Security Login Authenticate Apply Data Security Rules View Filtered Content SSL data encryption Optional strict password security policies Highly secure session key management All passwords stored in MD-5 hash Application self-monitors for security violations Rich sharing rules allow for granular data security control Database access is strictly controlled at multiple levels for maximum security Support for a wide variety of SSO integration architectures User authentication & SSO 2 Salesforce.com 1 DMZ Authentication Proxy 3 Salesforce.com User Corporate Directory Salesforce.com authentication Delegated Authentication Single Sign-On with Token Generator

12 Japan Post Saves $10M with Force.com Custom apps: Accident claims, customer profiles, operations auditing, and many more Banking, insurance, and postal services to 100M+ customers 155M records managed 100,000 users $10M savings over traditional platforms 75% Less Dev Time ½ the Cost 91% Fewer Bugs

13 Public Sector Customer Progression Platform Project Program Business Impact Initial Rollout Operations Recruiting Vendor Case Collaboration Productivity Enhancement 360 Degree View of Client Constituent Service Call Center E-Gov Portal Intranets Employee Help Desk Constituent Communities Analysis and Reporting Performance Outcome Analysis Competitor Analysis Grants Permits & Licensing Planning Financial Tracking 6 7 Part of DNA! Relationship Activity User Adoption Asset Functionality Real-time Cloud Solutions for Public Sector Executive Team Global View of Visibility into Operational Cost-Benefit Outcome Vision, Values, Performance to Trend Measurement Customer Agency Throughput Ratios Analysis Measurement Metrics Plan Analysis to Improve Satisfaction Relationship Constituent Service & Engagement Case & Incident Permitting & Licensing Grants Fee-for-Service 360º View of Clients Call Center E=Gov Portals Profiles Case Collaboration Intake & Eligibility Assessments Permits & Inspections Code Enforcement Proposals Correspondence Tracking Constituent Correspondence Social Media Integration Community Online Forms Feeds Service Plans Project Financials Task & Activity Tracking Licensing Planning Progress Reports Agreements & Contracts Accurate Knowledge Project 360 Program Payments & Impact E-Commerce Forecasting & Chat Status Updates Milestones Dashboard IG / Oversight Scheduling Receipts Measurement Budgeting Partner Marketing & Outreach Social Apps Social Content Groups Case Processing Staffing & Resource Program Financials Revenue Forecasts Field Inspections Grant Genius Reporting HR, Finance & Ops General Recruiting & Time-off Volunteer Ledger & Cash Contract Audits & On-boarding Budgeting AP/AR E-Commerce Billing Compliance Information Technology Employee Asset Project Quality Improvement Agile Vendor Operations Helpdesk & Help Desks Assurance Ideas Development Governance Ticket Tracking

14 3 Steps to Success in the Cloud 1)Talk to your peers 2)Target the right projects 3)Get started now

Welcome to the Real-Time Cloud

Welcome to the Real-Time Cloud Welcome to the Real-Time Cloud Daniel Burton Sr. Vice President, Global Public Policy salesforce.com dburton@salesforce.com Safe Harbor Safe harbor statement under the Private Securities Litigation Reform

More information

5 Steps to Building a Successful Channel Program in the Cloud. Ron Huddleston SVP, ISV Alliances

5 Steps to Building a Successful Channel Program in the Cloud. Ron Huddleston SVP, ISV Alliances 5 Steps to Building a Successful Channel Program in the Cloud Ron Huddleston SVP, ISV Alliances Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation

More information

The Fastest Path to the Cloud Building Your SaaS Company on Force.com

The Fastest Path to the Cloud Building Your SaaS Company on Force.com The Fastest Path to the Cloud Building Your SaaS Company on Force.com Kai Mäkelä salesforce.com kmakela@salesforce.com Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act

More information

Increase HR Productivity with Salesforce.com platforms

Increase HR Productivity with Salesforce.com platforms Increase HR Productivity with Salesforce.com platforms Mark Schoemaker ISV Programs EMEA North @mschoemaker Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995:

More information

Creating Service Relevance for M2M Data

Creating Service Relevance for M2M Data Creating Service Relevance for M2M Data Jon Upton October 2014 M2M Summit jupton@salesforce.com Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation

More information

Salesforce.com and the financial services sector

Salesforce.com and the financial services sector Don t be clouded by the cloud: Salesforce.com and the financial services sector Martijn Simons Account Executive Financial Services @Martijn_On_Line In//martijn-simons Lien Ceulemans Corporate legal counsel

More information

Developers: Build Next Generation Apps. Michael Yeganeh Solution Engineering Lead myeganeh@salesforce.com

Developers: Build Next Generation Apps. Michael Yeganeh Solution Engineering Lead myeganeh@salesforce.com Developers: Build Next Generation Apps Michael Yeganeh Solution Engineering Lead myeganeh@salesforce.com Safe harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This

More information

Information Security and Privacy Advisory Board Why Governments Invest in Salesforce.com

Information Security and Privacy Advisory Board Why Governments Invest in Salesforce.com Information Security and Privacy Advisory Board Why Governments Invest in Salesforce.com John DeVoe Regional Manager, Public Sector December 5, 2008 The Cloud Computing Model Multi-tenant Pay-as-you-go

More information

The Desktop is Dead... Let s Talk About the Living! Bruce Richardson, Chief Enterprise Strategist brichardson@salesforce.com

The Desktop is Dead... Let s Talk About the Living! Bruce Richardson, Chief Enterprise Strategist brichardson@salesforce.com The Desktop is Dead... Let s Talk About the Living! Bruce Richardson, Chief Enterprise Strategist brichardson@salesforce.com The Customer Revolution Safe Harbor Safe harbor statement under the Private

More information

PLATFORM AS A SERVICE MULTI TENANCY AND OPEN STANDARDS. Peter Chittum @pchittum salesforce.com!

PLATFORM AS A SERVICE MULTI TENANCY AND OPEN STANDARDS. Peter Chittum @pchittum salesforce.com! PLATFORM AS A SERVICE MULTI TENANCY AND OPEN STANDARDS Peter Chittum @pchittum salesforce.com! Platform as a Service Multi Tenancy and Open Standards Peter Chittum Developer Evangelist @pchittum Safe Harbor

More information

Building the Global Cloud

Building the Global Cloud Building the Global Cloud Beyond IT Migration to the Enterprise Peter Coffee Head of Platform Research salesforce.com inc. Safe Harbor Safe harbor statement under the Private Securities Litigation Reform

More information

WELCOME! Webinar on roundcorner's donor engagement platform roundcause. with Childfund International, IRC, Salesforce Foundation and roundcorner

WELCOME! Webinar on roundcorner's donor engagement platform roundcause. with Childfund International, IRC, Salesforce Foundation and roundcorner WELCOME! Webinar on roundcorner's donor engagement platform roundcause with Childfund International, IRC, Salesforce Foundation and roundcorner Please stand by, we will get started soon. NOTE: Audio should

More information

Webhooks. Near-real time event processing with guaranteed delivery of HTTP callbacks. HBaseCon 2015

Webhooks. Near-real time event processing with guaranteed delivery of HTTP callbacks. HBaseCon 2015 Webhooks Near-real time event processing with guaranteed delivery of HTTP callbacks HBaseCon 2015 Alan Steckley Principal Software Engineer, Salesforce 2 Poorna Chandra Software Engineer, Cask 3 Safe Harbor

More information

Successfully Scaling an Agile Innovation Culture with Perforce

Successfully Scaling an Agile Innovation Culture with Perforce Successfully Scaling an Agile Innovation Culture with Perforce Steve Greene VP, Program Management Salesforce.com Mike Saha Sr. Manager, Release Engineering Salesforce.com Safe Harbor Safe harbor statement

More information

Welcome to the Force.com Developer Day

Welcome to the Force.com Developer Day Welcome to the Force.com Developer Day Sign up for a Developer Edition account at: http://developer.force.com/join Nicola Lalla nlalla@saleforce.com n_lalla nlalla26 Safe Harbor Safe harbor statement under

More information

Cloud to Cloud Integrations with Force.com. Sandeep Bhanot Developer Evangelist @cloudysan

Cloud to Cloud Integrations with Force.com. Sandeep Bhanot Developer Evangelist @cloudysan Cloud to Cloud Integrations with Force.com Sandeep Bhanot Developer Evangelist @cloudysan Safe Harbor Salesforce.com Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This

More information

Social Enterprise Java Apps

Social Enterprise Java Apps Social Enterprise Java Apps Safe Harbor Statement Safe harbor statement under the Private Securities Litigation Reform Act of 1995. This presentation may contain forward-looking statements that involve

More information

VerticalResponse for AppExchange: Past, Present and Future

VerticalResponse for AppExchange: Past, Present and Future VerticalResponse for AppExchange: Past, Present and Future Presented By: Joshua Feinberg: VP, Product Management Alex Scalisi: Sales Executive Special Guest Speaker: Judy Loehr: Senior Sales & Marketing

More information

SPRING 14 RELEASE NOTES

SPRING 14 RELEASE NOTES SPRING 14 RELEASE NOTES At Salesforce ExactTarget Marketing Cloud your success is our top priority and we re working hard to continuously improve the Marketing Cloud solutions you use. We recently reached

More information

Secure Coding SSL, SOAP and REST. Astha Singhal Product Security Engineer salesforce.com

Secure Coding SSL, SOAP and REST. Astha Singhal Product Security Engineer salesforce.com Secure Coding SSL, SOAP and REST Astha Singhal Product Security Engineer salesforce.com Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may

More information

The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution

The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution BEST PRACTICES WHITE PAPER The SMB IT Decision Maker s Guide: Choosing a SaaS Service Management Solution Nine Things to Look For in Your Next SaaS Service Desk Table of Contents Introduction...................................................

More information

Secure, private, and trustworthy: enterprise cloud computing with Force.com

Secure, private, and trustworthy: enterprise cloud computing with Force.com Secure, private, and trustworthy: enterprise cloud computing with Force.com WHITE PAPER Contents Abstract... 1 Introduction to security, privacy, and trust... 1 Cloud computing and information security

More information

Embracing the Cloud 5 Key Benefits From Salesforce.com. Mark Easley Sr. Director Sales Engineering Service Cloud measley@salesforce.

Embracing the Cloud 5 Key Benefits From Salesforce.com. Mark Easley Sr. Director Sales Engineering Service Cloud measley@salesforce. Embracing the Cloud 5 Key Benefits From Salesforce.com. Mark Easley Sr. Director Sales Engineering Service Cloud measley@salesforce.com Two Market Leaders Come Together Gartner Magic Quadrants Customer

More information

Our Mission: Cloud Computing Driver, Catalyst & Evangelist

Our Mission: Cloud Computing Driver, Catalyst & Evangelist Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions.

More information

Transforming Collaboration: Social networks inside and outside the enterprise

Transforming Collaboration: Social networks inside and outside the enterprise The Social Cloud Transforming Collaboration: Social networks inside and outside the enterprise Share Kaveh Vessali VP, Public Sector Solutions The Enterprise Cloud Computing Company Recognized Leadership

More information

Secrets of the Force.com Platform

Secrets of the Force.com Platform Salesforce Secrets of the Force.com Platform Peter Coffee Director, Platform Research salesforce.com Ed Lenta General Manager VMware Safe Harbor Safe harbor statement under the Private Securities Litigation

More information

Force.com: Secure Cloud Development. Varun Badhwar Force.com Security Manager

Force.com: Secure Cloud Development. Varun Badhwar Force.com Security Manager Force.com: Secure Cloud Development Varun Badhwar Force.com Security Manager Safe Harbor Statement Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may

More information

Contact Center Security: Moving to the Cloud

Contact Center Security: Moving to the Cloud white paper Contact Center Security: Moving to the Cloud Table of Contents Executive Overview 2 A Critical Attribute of a Cloud Provider: Proven Security 2 How Do Well-established Companies Chose a Cloud

More information

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active

More information

state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative

state of south dakota Bureau of Information & Telecommunications Provide a Reliable, Secure & Modern Infrastructure services well-designed innovative Strategic Plan 2015-2017 state of south dakota Bureau of Information & Telecommunications 1GOAL ONE: Provide a Reliable, Secure & Modern Infrastructure services security technology assets well-designed

More information

PROTECT YOUR WORLD. Identity Management Solutions and Services

PROTECT YOUR WORLD. Identity Management Solutions and Services PROTECT YOUR WORLD Identity Management Solutions and Services Discussion Points Security and Compliance Challenges Identity Management Architecture CSC Identity Management Offerings Lessons Learned and

More information

Level I - Public. Technical Portfolio. Revised: July 2015

Level I - Public. Technical Portfolio. Revised: July 2015 Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

Contact Center Security: Moving to the True Cloud

Contact Center Security: Moving to the True Cloud White Paper Contact Center Security: Moving to the True Cloud Today, Cloud is one of the most talked about trends in the IT industry. It s a paradigm many believe will have a widespread business impact.

More information

BMC Remedy OnDemand. Product Overview

BMC Remedy OnDemand. Product Overview Alf Abuhajleh January 2012 Table of Contents BMC Remedy OnDemand 2 What you get with your subscription 2 Applications... 2 Purchase Requirements... 2 Internationalization... 2 Infrastructure and Service-level

More information

Extranet Access Management Web Access Control for New Business Services

Extranet Access Management Web Access Control for New Business Services Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control

More information

Salesforce & HIPAA Compliance

Salesforce & HIPAA Compliance An ecfirst Case Study: Salesforce & HIPAA Compliance Salesforce Provides the Tool, You Are Responsible for Compliance 2014 All Rights Reserved ecfirst TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 WHAT IS SALESFORCE?...

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

CITIGROUP GLOBAL TECHNOLOGY CONFERENCE. September 2, 2014

CITIGROUP GLOBAL TECHNOLOGY CONFERENCE. September 2, 2014 CITIGROUP GLOBAL TECHNOLOGY CONFERENCE September 2, 2014 SAFE HARBOR This presentation contains forward-looking statements, including, among other things, statements regarding our growth prospects; our

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

ProjectManager.com Security White Paper

ProjectManager.com Security White Paper ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

All your apps & data in the cloud, all in one place.

All your apps & data in the cloud, all in one place. The Cloud Desktop For Business Unify Your Business IT Experience All your apps & data in the cloud, all in one place. The Cloud Desktop houses all of your organization's applications and data in one easy-to-access

More information

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the

More information

A Decade in SaaS. Stories from the front line. Dean Stockwell Professional Services Director (APAC) NetSuite Inc.

A Decade in SaaS. Stories from the front line. Dean Stockwell Professional Services Director (APAC) NetSuite Inc. A Decade in SaaS Stories from the front line Dean Stockwell Professional Services Director (APAC) NetSuite Inc. Agenda Benefits of SaaS The Real-World of SaaS Customer Expectations Enterprise SaaS - Case

More information

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider

More information

BMC s Security Strategy for ITSM in the SaaS Environment

BMC s Security Strategy for ITSM in the SaaS Environment BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...

More information

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France

F5 Identity and Access Management (IAM) Overview. Laurent PETROQUE Manager Field Systems Engineering, France F5 Identity and Access Management (IAM) Overview Laurent PETROQUE Manager Field Systems Engineering, France F5 s Security Strategy Protect Apps/Data Wherever They Reside Control Access to Apps/Data from

More information

BENEFITS OF A CLOUD ERP SYSTEM April 12, 2016

BENEFITS OF A CLOUD ERP SYSTEM April 12, 2016 BENEFITS OF A CLOUD ERP SYSTEM April 12, 2016 Ricardo de Rojas Senior Managing Consultant rderojas@bkd.com Colleen Gutirrez Senior Consultant II cgutirrez@bkd.com 1 TO RECEIVE CPE CREDIT Participate in

More information

ISO 27001 COMPLIANCE WITH OBSERVEIT

ISO 27001 COMPLIANCE WITH OBSERVEIT ISO 27001 COMPLIANCE WITH OBSERVEIT OVERVIEW ISO/IEC 27001 is a framework of policies and procedures that include all legal, physical and technical controls involved in an organization s information risk

More information

The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve

The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve The Benefits of Cloud Computing to the E-Commerce Industry July 2011 A whitepaper on how hosting on a cloud platform can lower costs, improve productivity and stability and remove issues around scalability.

More information

Understanding Sage CRM Cloud

Understanding Sage CRM Cloud Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4

More information

ITAR Compliant Data Exchange

ITAR Compliant Data Exchange ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/

More information

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1 TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1 Table of Contents 1. Operational Security 2. Physical Security 3. Network

More information

Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity

Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516) 773-3533 Ekartha India Pvt. Ltd. 814/B Law College Road Demech House, 4th Floor Erandwane, Pune, India Email: info@ekartha.com Web:

More information

How to Select the Right Remote Support Tool:

How to Select the Right Remote Support Tool: How to Select the Right Remote Support Tool: A practical guide for the support desk owner LogMeInRescue.com 1 Executive Summary Today s customer support and IT service organizations are charged with supporting

More information

DLP Vendors 8/8/2011. Data Loss Prevention: What We ve Learned from WikiLeaks TECH 15. A Few Good Questions

DLP Vendors 8/8/2011. Data Loss Prevention: What We ve Learned from WikiLeaks TECH 15. A Few Good Questions Data Loss Prevention: What We ve Learned from WikiLeaks TECH 15 Aubrey Turner Fishnet Security Pat Archbold - IntApp A Few Good Questions Do you know where your sensitive data resides and its current controls?

More information

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to

More information

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,

More information

Vendor Questionnaire

Vendor Questionnaire Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining

More information

Enterprise Cloud. Kerry Bailey President, Terremark

Enterprise Cloud. Kerry Bailey President, Terremark Enterprise Cloud Kerry Bailey President, Terremark November 29, 2011 Safe Harbor Statement NOTE: This presentation contains statements about expected future events and financial results that are forward-looking

More information

Camille Alberico, Sr Manager Eclipse Support Chris Orr, VP Customer Support Strategy

Camille Alberico, Sr Manager Eclipse Support Chris Orr, VP Customer Support Strategy Camille Alberico, Sr Manager Eclipse Support Chris Orr, VP Customer Support Strategy 1 Monday, September 14 Tuesday, September 15 4:40 5:30 pm 2:10 3:00 pm FORWARD-LOOKING STATEMENTS: This Presentation

More information

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION Laserfiche for Federal Government MEET YOUR AGENCY S MISSION HOW ENTERPRISE CONTENT MANAGEMENT Serves Civilian and Defense Agencies Whether a federal agency supports farmers in the field, soldiers overseas

More information

Healthy Harbor Project - Work From Home

Healthy Harbor Project - Work From Home Enterprise Roles for Cloud Computing Applications, Platforms and Extrastructures Peter Coffee Director, Platform Research salesforce.com Platform as a Service CIO Mandates Productive Reliable Secure Affordable

More information

Benefits of an ITIL Help Desk in the Cloud

Benefits of an ITIL Help Desk in the Cloud SOLUTION WHITE PAPER Benefits of an ITIL Help Desk in the Cloud A New ITIL Solution for Small-to-Medium Businesses Contents Introduction 1 Help Desk Needs in Smaller Environments 1 Power in the Cloud 3

More information

W H IT E P A P E R. Salesforce CRM Security Audit Guide

W H IT E P A P E R. Salesforce CRM Security Audit Guide W HITEPAPER Salesforce CRM Security Audit Guide Contents Introduction...1 Background...1 Security and Compliance Related Settings...1 Password Settings... 2 Audit and Recommendation... 2 Session Settings...

More information

Case Study Cloud Computing

Case Study Cloud Computing Case Study Cloud Computing Rotterdam Juli 2013 Robeco Ton Ligtvoet, Manager IT Contracts and Infra Projects For institutional investors 1 Facts and figures Robeco IT Servicing Asset Management, Pension

More information

Moving your enterprise systems to the cloud? What do you need to know to manage the risks? Jamie Levitt, Director

Moving your enterprise systems to the cloud? What do you need to know to manage the risks? Jamie Levitt, Director www.pwc.com Moving your enterprise systems to the cloud? What do you need to know to manage the risks? November 2015 Jamie Levitt, Director Disclaimer Certain matters reviewed today may represent services

More information

Enterprise Architecture Review Checklist

Enterprise Architecture Review Checklist Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish

More information

Security & Infra-Structure Overview

Security & Infra-Structure Overview Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4

More information

Secure and control how your business shares files using Hightail

Secure and control how your business shares files using Hightail HIGHTAIL FOR ENTERPRISE: SECURITY OVERVIEW Secure and control how your business shares files using Hightail Information the lifeblood of any business is potentially placed at risk every time digital files

More information

Aurora Hosted Services Hosted AD, Identity Management & ADFS

Aurora Hosted Services Hosted AD, Identity Management & ADFS 22/09/2013 Aurora Hosted Services Hosted AD, Identity Management & ADFS 1 Service Overview - Hosted Identity Management Core provides a fully managed solution hosted in Azure and connected directly to

More information

NAVIGATING THE MAZE. 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona. 2013 CIO Roundtable Retreat

NAVIGATING THE MAZE. 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona. 2013 CIO Roundtable Retreat NAVIGATING THE MAZE 2013 LEGAL CIO ROUNDTABLE RETREAT March 3-5, 2013 The Boulders Hotel Carefree, Arizona The Legal Cloud What is Cloud Computing? Working in the Cloud Cloud Computing is A way to work

More information

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.

More information

Marchex Investor Presentation. May 2013

Marchex Investor Presentation. May 2013 Marchex Investor Presentation May 2013 SAFE HARBOR STATEMENT This presentation contains forward-looking statements that involve substantial risks and uncertainties. All statements, other than statements

More information

Salesforce Automation

Salesforce Automation Salesforce Automation Bill Evanow Vice President, Sales salesforce.com Alana Kaselitz Principal Founder Echo Lane Jim Thompson Founder and CEO Rogue IT 1 July 16-17, 2009 Napa Valley Marriott Salesforce.com

More information

Cloud Vendor Evaluation

Cloud Vendor Evaluation Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business

More information

Six advantages of a cloud-based IT help desk

Six advantages of a cloud-based IT help desk WHITE PAPER Contents Introduction... 1 Six advantages of putting the IT help desk in the cloud... 1 Advantage #1: More proactive IT support...1 Advantage #2: More collaboration...2 Advantage #3: More point-and-click

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION Laserfiche for Federal Government MEET YOUR AGENCY S MISSION HOW ENTERPRISE CONTENT MANAGEMENT Serves Civilian and Defense Agencies Whether a federal agency supports farmers in the field, soldiers overseas

More information

REVOLUTIONIZING ADVANCED THREAT PROTECTION

REVOLUTIONIZING ADVANCED THREAT PROTECTION REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my

More information

Security and Data Center Overview

Security and Data Center Overview Security and Data Center Overview September, 2012 For more information, please contact: Matt McKinney mattm@canadianwebhosting.com 888-821-7888 x 7201 Canadian Web Hosting (www.canadianwebhosting.com)

More information

Driving revenue and competitive advantage with the cloud Fujitsu alliance with salesforce.com

Driving revenue and competitive advantage with the cloud Fujitsu alliance with salesforce.com Driving revenue and competitive advantage with the cloud Fujitsu alliance with salesforce.com If you are in IT management, Fujitsu is betting your key objectives include the following: Identify a cost-effective

More information

The Power of BMC Remedy, the Simplicity of SaaS WHITE PAPER

The Power of BMC Remedy, the Simplicity of SaaS WHITE PAPER The Power of BMC Remedy, the Simplicity of SaaS WHITE PAPER TABLE OF CONTENTS EXECUTIVE SUMMARY............................................... 1 BUSINESS CHALLENGE: MANAGING CHANGE.................................

More information

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)

State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents

More information

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and

More information

Stop Password Sprawl with SaaS Single Sign-On via Active Directory

Stop Password Sprawl with SaaS Single Sign-On via Active Directory CENTRIFY WHITE PAPER Stop Password Sprawl with SaaS Single Sign-On via Active Directory Abstract Organizations are rushing to SaaS in an effort to move business initiatives along faster than the traditional

More information

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT Foreword by Prof. Wolfgang Lassmann... 15 Foreword by Dr. Sachar Paulus... 17 1 Introduction...

More information

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning

More information

How to Select the Right Remote Support Tool

How to Select the Right Remote Support Tool How to Select the Right Remote Support Tool A practical guide for the professional help desk. Executive Summary A transformation of the workforce has altered end user expectations and business needs, driving

More information

Does Company Size Matter? Sizing up SaaS for your IT Help Desk SOLUTION WHITE PAPER

Does Company Size Matter? Sizing up SaaS for your IT Help Desk SOLUTION WHITE PAPER Does Company Size Matter? Sizing up SaaS for your IT Help Desk SOLUTION WHITE PAPER Table of Contents Organization Size and Sizing up SaaS for the IT Help Desk................... 1 What SaaS can bring

More information

Navigate Securely with Check Point and FishNet Security

Navigate Securely with Check Point and FishNet Security Navigate Securely with Check Point and FishNet Security Introductions Dan Thormodsgaard, VP of Solutions Architect for FishNet Security Dan Thormodsgaard, Director of Solutions Architecture. Dan Thormodsgaard

More information

Secure Coding. External App Integrations. Tim Bach Product Security Engineer salesforce.com. Astha Singhal Product Security Engineer salesforce.

Secure Coding. External App Integrations. Tim Bach Product Security Engineer salesforce.com. Astha Singhal Product Security Engineer salesforce. Secure Coding External App Integrations Astha Singhal Product Security Engineer salesforce.com Tim Bach Product Security Engineer salesforce.com Safe Harbor Safe harbor statement under the Private Securities

More information

Powering the Cloud Desktop: OS33 Data Centers

Powering the Cloud Desktop: OS33 Data Centers OS33 Data Centers info@os33.com (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

How To Understand The Business Drivers Of Software As A Service (Saas)

How To Understand The Business Drivers Of Software As A Service (Saas) The Business Drivers of Software as a Service (SaaS): Key Issues for Public Sector Executives January 2011 Spencer Stern Spencer Stern is the founder of Stern Consulting, which assists public sector agencies

More information

SaaS. A Cost Reduction Strategy or a Source of Strategic Advantage? Paul Selway Solution Architect

SaaS. A Cost Reduction Strategy or a Source of Strategic Advantage? Paul Selway Solution Architect SaaS A Cost Reduction Strategy or a Source of Strategic Advantage? Paul Selway Solution Architect The Architect The Architects Role I doubt we will ever all agree what an architect is! Sometimes we are

More information

SuccessFactors Announces First Quarter Fiscal 2010 Results

SuccessFactors Announces First Quarter Fiscal 2010 Results CONTACTS: CONTACT: Dominic Paschel SuccessFactors, Inc. Global Public & Investor Relations 415-262-4641 dpaschel@successfactors.com SuccessFactors Announces First Quarter Fiscal 2010 Results Q110 bookings

More information

The C Level View of CRM

The C Level View of CRM The C Level View of CRM Linus Chow Enterprise Cloud Architect linus.chow@salesforce.com In/linuschow Forward-Looking Statements Statement under the Private Securities Litigation Reform Act of 1995: This

More information