How To Build A Microstrategy Product Line
|
|
|
- Russell Ross
- 5 years ago
- Views:
Transcription
1 MicroStrategy Enterprise Cloud: Security Framework
2 Copyright Information All Contents Copyright 2012 MicroStrategy Incorporated. All Rights Reserved. MicroStrategy, MicroStrategy 6, MicroStrategy 7, MicroStrategy 7i, MicroStrategy 7i Evaluation Edition, MicroStrategy 7i Olap Services, MicroStrategy 8, MicroStrategy 9, MicroStrategy Distribution Services, MicroStrategy MultiSource Option, MicroStrategy Command Manager, MicroStrategy Enterprise Manager, MicroStrategy Object Manager, MicroStrategy Reporting Suite, MicroStrategy Power User, MicroStrategy Analyst, MicroStrategy Consumer, MicroStrategy Delivery, MicroStrategy BI Author, MicroStrategy BI Modeler, MicroStrategy Evaluation Edition, MicroStrategy Administrator, MicroStrategy Agent, MicroStrategy Architect, MicroStrategy BI Developer Kit, MicroStrategy Broadcast Server, MicroStrategy Broadcaster, MicroStrategy Broadcaster Server, MicroStrategy Business Intelligence Platform, MicroStrategy Consulting, MicroStrategy CRM Applications, MicroStrategy Customer Analyzer, MicroStrategy Desktop, MicroStrategy Desktop Analyst, MicroStrategy Desktop Designer, MicroStrategy ecrm 7, MicroStrategy Education, MicroStrategy etrainer, MicroStrategy Executive, MicroStrategy Infocenter, MicroStrategy Intelligence Server, MicroStrategy Intelligence Server Universal Edition, MicroStrategy MDX Adapter, MicroStrategy Narrowcast Server, MicroStrategy Objects, MicroStrategy OLAP Provider, MicroStrategy SDK, MicroStrategy Support, MicroStrategy Telecaster, MicroStrategy Transactor, MicroStrategy Web, MicroStrategy Web Business Analyzer, MicroStrategy World, Application Development and Sophisticated Analysis, Best In Business Intelligence, Centralized Application Management, Information Like Water, Intelligence Through Every Phone, Intelligence To Every Decision Maker, Intelligent E-Business, Personalized Intelligence Portal, Query Tone, Rapid Application Development, MicroStrategy Intelligent Cubes, The Foundation For Intelligent E-Business, The Integrated Business Intelligence Platform Built For The Enterprise, The Platform For Intelligent E-Business, The Scalable Business Intelligence Platform Built For The Internet, Industrial-Strength Business Intelligence, Office Intelligence, MicroStrategy Office, MicroStrategy Report Services, MicroStrategy Web MMT, MicroStrategy Web Services, Pixel Perfect, Pixel-Perfect, MicroStrategy Mobile, MicroStrategy Integrity Manager and MicroStrategy Data Mining Services are all registered trademarks or trademarks of MicroStrategy Incorporated. All other company and product names may be trademarks of the respective companies with which they are associated. Specifications subject to change without notice. MicroStrategy is not responsible for errors or omissions. MicroStrategy makes no warranties or commitments concerning the availability of future products or versions that may be planned or under development. Patent Information This product is patented. One or more of the following patents may apply to the product sold herein: U.S. Patent Nos. 6,154,766, 6,173,310, 6,260,050, 6,263,051, 6,269,393, 6,279,033, 6,567,796, 6,587,547, 6,606,596, 6,658,093, 6,658,432, 6,662,195, 6,671,715, 6,691,100, 6,694,316, 6,697,808, 6,704,723, 6,741,980, 6,765,997, 6,768,788, 6,772,137, 6,788,768, 6,798,867, 6,801,910, 6,820,073, 6,829,334, 6,836,537, 6,850,603, 6,859,798, 6,873,693, 6,885,734, 6,940,953, 6,964,012, 6,977,992, 6,996,568, 6,996,569, 7,003,512, 7,010,518, 7,016,480, 7,020,251, 7,039,165, 7,082,422, 7,113,993, 7,127,403, 7,174,349, 7,181,417, 7,194,457, 7,197,461, 7,228,303, 7,260,577, 7,266,181, 7,272,212, 7,302,639, 7,324,942, 7,330,847, 7,340,040, 7,356,758, 7,356,840, 7,415,438, 7,428,302, 7,430,562, 7,440,898, 7,486,780, 7,509,671, 7,516,181, 7,559,048, 7,574,376, 7,617,201, 7,725,811, 7,801,967, 7,836,178, 7,861,161, 7,861,253, 7,881,443, 7,925,616, 7,945,584, 7,970,782 and 8,005,870. Other patent applications are pending.
3 I. Introduction... 2 II. Employing Best Practices... 4 Expertise... 4 Certifications & Compliance... 4 III. Application, Platform and Physical Security... 4 Application Security... 4 Platform Security... 8 Physical Security and Protection... 9 IV. Operational Readiness Vulnerability Assessments System Surveillance Incident Management Communication Plan V. Redundancy Disaster Recovery and Business Continuity VI. Comprehensive Security in the Cloud... 13
4 I. Introduction MicroStrategy Cloud is revolutionizing business intelligence. In this new BI delivery model, MicroStrategy customers can rely on a fully managed platform for building analytical applications. Within the cloud infrastructure, MicroStrategy takes on the responsibility of building and maintaining the hardware and software infrastructure. This includes all of the BI software and in many cases, data integration, and data hosting software. Consequently a customer s data may reside inside the MicroStrategy Cloud environment. Many organizations have legitimate concerns about the privacy and security of their data in the cloud. MicroStrategy understands this and protecting its customers data is of paramount importance. Threats to data security can come in many forms, including cyber-attacks, on-site tampering, as well as destruction due to acts of nature. These threats exist whether an organization manages its own data or entrusts it to an organization like MicroStrategy. Protecting data against a wide array of highly complex and insidious dangers is not easy. That is why MicroStrategy Cloud has assembled a dedicated services team and charged them with putting in place stringent security measures, based on industry best practices. MicroStrategy s goal is to ensure its customers data is as safe and secure as possible in the MicroStrategy Cloud environment. Moreover, MicroStrategy continues to invest and innovate to stay ahead of the evolving threats to data security. Data is protected through multiple layers of safeguards. MicroStrategy employs a multi-pronged strategy to securing systems and data. First, MicroStrategy ensures that the cloud environment meets or exceeds industry best practices by investing in expertise and staying compliant with the many industry standards and frameworks. Second, MicroStrategy has put in place a wide array of counter-measures to ensure application, platform, and physical security. Third, MicroStrategy uses independent, third-party audit services and uses internal monitoring and alerting systems to neutralize any threats. Finally, MicroStrategy ensures high availability through the use of redundancy and reliable backup procedures. Table 1 on the next page provides a summary of MicroStrategy s multi-pronged strategy as well as specific tactics. 2
5 Table 1. Overview of MicroStrategy Cloud Security Strategies Strategy Detail Best Practice Expertise & Investment Certifications & Compliance Cyber and Physical Security Application Security Platform Security Physical Security Operational Readiness System Audits Monitoring, Alerting, and Reporting Redundancy and Business Continuity Redundancy Business Continuity Customers leverage MicroStrategy s significant investment in securing the cloud environment using best practices. Security controls can be mapped to many common industry frameworks including ISO27001/2, PCI, and HIPAA. User, project and object level authentication Support for LDAP and single sign-on Enables enforcement of password management policies such as encryption, strength, and duration Secure data transmission Perimeter firewalls Intrusion detection and updated security patches Multi-tier architecture Support for secure connectivity (SSL, VPN, SSH, and others) IP obfuscation and Encrypted communication Dedicated and isolated VLAN, VPC, and VMs SSAE-16 Type II compliant hosting facility 24x7 security including video surveillance Biometric access to locked cages Redundant, fault-tolerant designs Independent audits of security controls Internal reviews to assess conformance to the information security policy Network Operation Centers (NOC) that operate 24x7 and have global reach Continuous monitoring of logs, alerts, and notifications Well defined incident management, escalation process, and communication plan Redundant infrastructure, including servers and network components Redundant operating environments (VMs) Data and system recovery processes support customers business continuity plans With MicroStrategy Cloud, organizations now have access to MicroStrategy s award-winning business intelligence without the challenges and high costs of standing-up and managing an entire infrastructure. Instead, companies are provided with a dedicated and experienced operations team to build and manage a performance-optimized environment, alleviating the need to budget for and rely on a thinly spread internal IT team. This, coupled with MicroStrategy s focus on data privacy and security, gives customers the ability to deliver high-performance and secure applications with unparalleled efficiency. 3
6 II. Employing Best Practices Expertise Cyber-security is a highly specialized expertise that is evolving continuously. This is driven by the rapid advancements in cyber attacks fueled by well-funded and vigilant hackers. In the 2010 edition of its Annual Threat Review, Symantec noted that attacks were up 93% from the previous year. In order to keep pace with cyber security threats, MicroStrategy employs a highly qualified team of security experts to develop a security program around adaptive defense. Adaptive defense automates cyber security processes, enabling MicroStrategy to automatically adjust defensive posture in response to incidents and imminent threats. The foundation of adaptive defense is the system of people, processes, and tools that tightly couples security and systems management. Since inception, MicroStrategy has been built with the philosophy of bringing together the best, brightest and most experienced engineers and computer scientists. The MicroStrategy Cloud Services team is no exception. This group of highly experienced software, BI, ETL, network, storage, and security engineers have put in place industry triedand-tested security countermeasures and processes to safeguard data throughout the cloud environment. Certifications and Compliance MicroStrategy has developed a comprehensive compliance management program that is used to manage the health and security posture of every layer in the managed cloud environment. MicroStrategy Cloud controls are based on the Cloud Security Alliance control matrix. As such, controls can be mapped to common industry frameworks including SSAE 16, ISO27001/2, PCI, and HIPAA. III. Application, Platform, and Physical Security There are at least three areas of vulnerability that any public facing computing platform must protect. First, at the application layer, the system must be able to thwart any unauthorized attempt to access data. Second, at the platform layer, the underlying architecture and control mechanisms should ensure the integrity and security of the data. Third, at the physical layer, sufficient obstacles must be put in place to make it difficult for any unauthorized persons to access the systems directly. Any security counter measures that are put in place must, at a minimum, protect these three areas of vulnerability. This section describes the details of how application, platform, and physical security are applied to MicroStrategy Cloud. APPLICATION SECURITY Overview A successful application security implementation uses a multi-layered approach to role-based authentication control (RBAC). This ensures only authorized users are able to access the system and users are only able to view or update data they are authorized to see. MicroStrategy s multi-tiered approach to application-level security begins with basic user authentication. In addition to its native authentication, MicroStrategy supports single sign on (SSO), direct authentication via LDAP, and database authentication. Once users are authenticated within the MicroStrategy BI application, access to data is governed by the permissions granted to a specific user. As a matter of convenience, users can be organized into groups in order to manage privileges for sets of users. MicroStrategy also provides additional mechanisms, such as security roles and object level security, that allow fine-grained control over projects, 4
7 dashboards, reports, and metrics. At the data level, MicroStrategy employs the use of connection maps, security filters, as well as robust cube and caching techniques. For customers using data integration services to support ETL functions there are a number of additional security features built-in to ensure highly secure data transfer. Authentication Modes The MicroStrategy business intelligence platform supports several authentication modes including LDAP, Single Sign-On, database, as well as MicroStrategy-based authentication. Each mode is differentiated based on the authentication authority. The authentication authority is the system that verifies and accepts the login and password credentials provided by the user. This robust set of authentication mechanisms delivers powerful authentication capabilities across all levels of an application, including at the user, project, and object levels. User Level Security Users In order to access a MicroStrategy application, a user must first log in to the system using a login ID and password. Based on individual privileges, a user can then perform tasks such as creating objects or executing reports and documents. Each MicroStrategy Cloud customer environment is assigned its own metadata and users are created to be metadata-specific. In essence, the customer environment is a private cloud with a unique user base that is managed by the customer. Groups Users can be organized into user groups. Groups provide a convenient way to manage a large number of users. Instead of assigning privileges and security to individual users, customers may assign them to groups and the users will inherit those privileges. Privileges Privileges give users access to specific MicroStrategy functionality. Privileges can be assigned to users and user groups directly or through security roles. When privileges are assigned to specific users or groups, those rights are available to users across all projects. On the other hand, when assigned through security roles, privileges are limited to specific projects only. In this way, MicroStrategy enables an additional level of authentication. Project Level Security Security Roles A security role is a collection of project-level privileges that are assigned to users and groups. For example, a customer might have two types of users with different functionality needs: the Executive users who need to run, sort, and print reports, and the Business Analysts who need additional capabilities to drill and change subtotal definitions. In this case, two security roles are needed to suit each different type of users. 5
8 All three dimensions of user authorization - application functionality privileges, object access permissions, and data access security - may be defined at the user, group, or security role level. Object Level Security MicroStrategy Objects Individual MicroStrategy metadata objects are governed by their own security permissions called Access Control Lists (ACL). Each data abstraction object, business abstraction object, report component, and report definition can be assigned a unique ACL, which grants users or user groups a set of permissions for the object. Permissions define the degree of control users have over individual objects in the system. For example, in the case of a report, a user may have permission to view the report definition and execute the report but not modify the report definition or delete the report. Security filters enable customers to control what warehouse data users can see when accessed through MicroStrategy. A security filter can be assigned to a user or group to narrow the result set when they execute reports or browse elements. The security filter applies to all reports and all attribute element requests submitted by a user. Security filters serve a similar function to database-level techniques such as database views and row level security. Database Objects In a database, security restrictions for database logins can be placed on tables, rows, and columns. MicroStrategy s BI platform accesses data sources using database connections. Separate database connections can be created to access the same data source with different logins. MicroStrategy users and user groups are linked to database connections using connection maps. All users allocated to a database connection will log in to the database with the same credentials and will be subject to the security settings in the data source. Furthermore, database views may include restrictions associated with each database login within their definition. This login, obtained from the database connection information, limits the rows that are selected by the view when processing queries. These security views provide row-level security for every query submitted by the user. Since an administrator defines this security view inside the data source, all query tools accessing the data source with a particular login will use the view. The SQL statement used to create the database view can also be used within MicroStrategy to define a logical table in the metadata. 6
9 Connection mappings allow customers to assign a user or group in the MicroStrategy system to a specific login ID on the data warehouse RDBMS. The mappings are typically used to take advantage of one of several RDBMS data security techniques (security views, split fact tables by rows, split fact tables by columns) that may be currently implemented. MicroStrategy s comprehensive application, object access, and data access security provides granular control in the MicroStrategy Cloud. Cube and Cache Security Caches and cubes are specific to each unique system environment, which runs in a separate virtual environment and is not accessible by any other MicroStrategy customer. Data stored in memory in Intelligent Cubes and caches are secured using a variety of different approaches. Both cubes and caches can be encrypted using MicroStrategy s encryption technology. Cache and cube based data also take full advantage of the physical security environment of the MicroStrategy Cloud infrastructure outlined earlier in this document. Data Transmission MicroStrategy Cloud Data Integration Services (MCDIS) is an optional service that supports basic ETL functions and allows customers to move data securely into the MicroStrategy Cloud Data Warehouse environment. To reduce vulnerability when using MicroStrategy ETL services in the Cloud, data is moved using a secure agent running behind the customer s firewall directly to the MicroStrategy Cloud. No proprietary data passes through or resides on any intermediate or third party servers. The ETL Services are restricted to only storing metadata required to perform tasks in a multi-tenant repository. The MCDIS service is optimized to work with MicroStrategy Cloud Data Warehouse Service (MSDWS) for customers who chose not to implement their own data integration process. Customers who have their own data integration standards can utilize their in-house tools as long as proper connectivity between the customer network and MicroStrategy can be established. 7
10 PLATFORM SECURITY Network Architecture MicroStrategy Cloud is implemented using a high-performance, multi-tier, scalable web architecture that inherently provides a wide range of security features. The system is comprised of four logical layers, namely the user, web server, application, and data access layers. The network is characterized by secure external connectivity, secure intranetwork communication, database isolation, and stringent port controls. A multi-tier architecture ensures isolation of application and database components. The MicroStrategy Cloud Secure Connectivity (MCSC) network was architected in such a way as to establish secure connectivity between the MicroStrategy Cloud infrastructure and customer networks. The MCSC provides a secure connection between MicroStrategy and the customer s network in order for the MicroStrategy Cloud environment to access data from the customer environment. The MCSC is built on a secure computing infrastructure inside an isolated segment of the MicroStrategy Cloud network and is managed by MicroStrategy Information Systems professionals. The MCSC uses equipment that is self-contained and MCSC security practices are designed to protect electronic information and ensure system integrity. MicroStrategy Cloud is architected for security. Perimeter firewalls, Isolated VLANs and encrypted communication secure the cloud network. 8
11 Within the MCSC, each customer is provided with a dedicated VLAN to ensure network isolation. In essence, each customer operates in an exclusive virtual private cloud (VPC). By default, all internal IP addresses are obfuscated to reduce the risk of unauthorized network penetration. Remote access to external customer networks is through a secured VPN tunnel. Other alternative access may be granted based on the customer requirements and security risk assessment. In addition, the MCSC supports use of digital certificates. This enables the use of encrypted (SSL) communication with all client web browsers. Perimeter firewalls are used to create a demilitarized zone (DMZ) and thereby isolate internal sub-systems from Internet traffic. These firewalls are configured to prevent communication on any unnecessary ports. This reduces the network s susceptibility to port-scanning," a tactic often employed by hackers to find active ports and exploit known vulnerabilities. In addition, any remote server calls (e.g. RPC, RMI) are strictly prohibited on any MCSC server. Such remote calls are hazardous because they allow hackers to access and control remote and distributed processes. System Security Restrictive permissions to files, services, and system settings are applied to all MCSC servers. Access Control Lists (ACLs) are used to limit access. All unnecessary operating system services are removed or disabled before system deployment in MCSC. All users are required to authenticate using a unique username and password to access any MCSC computer. An up-to-date antivirus scanner is installed on all MCSC computers and vulnerability scans are conducted on all MCSC computing equipment regularly. Security and other important patches provided by MCSC equipment vendors are routinely reviewed and applied by MicroStrategy Information Systems professionals. All virtual machines deployed in the MCSC are governed by the same system security practices of physical machines. Physical Security and Protection MicroStrategy Cloud servers are housed exclusively in SSAE16 Type II compliant hosting environments. This means that physical access to the servers on which customer data resides is highly restricted. Moreover, the facilities are constructed to prevent damage caused by deliberate acts of vandalism or that caused by acts of nature. Below is a list of security features found at MicroStrategy Cloud s data centers. ACCESS CONTROL AT HOSTING FACILITIES 24-hour manned security, including foot patrols and perimeter inspections Biometric scanning for access Dedicated concrete-walled Data Center rooms Computing equipment in access-controlled steel cages Video surveillance throughout facility and perimeter Building engineered for local seismic, storm, and flood risks Tracking of asset removal FACILITY ENVIRONMENTAL CONTROLS Humidity and temperature control Redundant (N+1) cooling system POWER Underground utility power feed Redundant (N+1) CPS/UPS systems Redundant power distribution units (PDUs) Redundant (N+1) diesel generators with on-site diesel fuel storage 9
12 NETWORK Concrete vaults for fiber entry Redundant internal networks Network neutral; connects to all major carriers and located near major Internet hubs High bandwidth capacity FIRE DETECTION AND SUPPRESSION VESDA (very early smoke detection apparatus) Dual-alarmed, dual-interlock, multi-zone, pre-action dry pipe water-based fire suppression VI. Operational Readiness VULNERABILITY ASSESSMENTS MicroStrategy leverages internal risk management and audit functions to provide independent assessments of risk as part of an on-going cycle of audit. Third party auditors are leveraged to provide a final assessment of the control framework and to ensure MicroStrategy is executing controls as documented. MicroStrategy Cloud Security teams maintain the security policy, provides security training to employees, and performs application security reviews. These reviews assess the confidentiality, integrity, and availability of data, as well as conformance to the information security policy. SYSTEM SURVEILLANCE MicroStrategy Cloud operations has established Network Operation Centers (NOC) around the world and offers 24x7 monitoring services. MicroStrategy s Information Security teams monitor logs, alerts and notifications from a variety of systems in order to proactively detect and manage threats. In addition, software agents are deployed across all tiers of the MicroStrategy Cloud framework to monitor hardware, storage, networking, virtualization, operating system, and application, providing real-time visibility into the environment. INCIDENT MANAGEMENT In the event of a triggered alert, the alert is triaged and the appropriate issue resolution process is initiated. The objective of this process is to highlight and identify the appropriate level of resources and expertise to isolate and neutralize any threats. The process has a well-defined escalation path and communication plan. It also calls for a postmortem of any significant alerts in order to prevent repeat incidents by identifying, and then subsequently rectifying, any gaps in existing controls. COMMUNICATION PLAN In compliance with federal, state, or foreign law (as applicable), MicroStrategy has implemented processes to provide notification to customers of lost or compromised data based on the severity of the security threat and the results of any individual attack. 10
13 VI. Redundancy MicroStrategy Cloud s infrastructure is architected with redundancy in mind. A variety of backup mechanisms and failover processes help contribute to MicroStrategy Cloud s uptime SLA. This protects against a number of different potential causes of disruption including power outages, loss of Internet connection, as well as hardware failure. The MicroStrategy cloud has dual, independent 10GB connections to the Internet backbone. Each line is brought in from a different carrier. In the event that there is disruption to one carrier s service, the additional connection will remain live. Hardware redundancy is also key to providing uninterrupted service. The cloud infrastructure is designed with redundant load balancers, firewalls as well as physical servers. While typically the mean time-to-failure for such devices is quite long, any of these components are subject to breakdown. Automatic failover mechanisms are also built into the MicroStrategy Cloud infrastructure for these hardware devices. The system would automatically recognize any disabled device and direct traffic to only the remaining functioning hardware. The MicroStrategy Cloud infrastructure includes both hardware and VM redundancy. As noted earlier, all software in the MicroStrategy Cloud runs inside virtual machines. These VMs provide selfcontained operating environments that enable a highly effective redundancy strategy. A separate VM is created for each software sub-system, including the MicroStrategy BI application, data warehouse, data integration service, and so on. Redundant VMs are then deployed across different physical servers. Should one of the VMs fail, the system would continue to operate using the backup VM. Similarly, in the event of physical server failure, the system would still continue to operate using the backup VMs on the backup servers. In any situation involving a component failure, an alert is automatically generated and distributed to the MicroStrategy Cloud Operations team. At that point, the incidence management process would kick in and steps would be taken to remediate the problems. 11
14 DISASTER RECOVERY AND BUSINESS CONTINUITY System Recovery System reconstruction in the event of a disaster requires MicroStrategy s teams to be able to restore the hardware and software infrastructure to its original state. To support this, MicroStrategy has established and documented processes to re-create the base operating environment. This includes both the hardware and system software components. MicroStrategy s use of VMs to run customer specific software, then enables its engineers to very easily restore the application software to the last known state. Data Recovery MicroStrategy backup policies and procedures are designed to ensure limited downtime to the customer should an unforeseen incident occur that impacts the quality or availability of customer data. MicroStrategy considers the use of additional US as well as international hosting facilities as it is warranted. In a fully operational setting, all customer data will be redundantly stored in separate offsite locations. Initial services are based in Ashburn, VA. MicroStrategy will make use of off-site backups to support disaster recovery. MicroStrategy Cloud Services will perform a scheduled backup on a nightly basis of the following: MicroStrategy environment including metadata Customer access control lists Virtual environment parameters and settings Applicable audit logs This backup is persisted in a storage device located in the MicroStrategy Cloud data center and is subject to the same physical security as other MicroStrategy Cloud infrastructure. These backups are retained for a period of 30 days, at which point they are permanently deleted. These backup procedures are designed as part of an overall effort to support customers business continuity plans. 12
15 VI. Comprehensive Security in the Cloud MicroStrategy Cloud delivers a fully managed, high performance platform as a service which customers leverage to build BI applications rapidly with no capital investment. Securing data is a critical requirement in the cloud environment. MicroStrategy Cloud has been architected from the ground up to include a wide range of countermeasures to protect the data it houses. The security controls in place map to many of the common frameworks and standards including SSAE-16 Type II, ISO27001, PCI, HIPAA and others. These controls exist at the application, platform, and physical layers, where every system is highly vulnerable to attacks. Protecting the large volumes of data is of paramount importance for a BI cloud service. MicroStrategy Cloud s infrastructure is designed to provide a high degree of data security. Moreover, MicroStrategy continues to invest and innovate to stay ahead of the evolving cyber-security threats. The resulting security framework meets the security needs of any organization deploying business intelligence in the MicroStrategy Cloud. This allows customers to leverage and rely on the MicroStrategy Cloud security infrastructure and focus their efforts, instead, on developing business intelligence tools to solve business problems. 13
16 COLL MicroStrategy Incorporated 1850 Towers Crescent Plaza Tysons Corner, VA
MicroStrategy Express: Security Framework
MicroStrategy Express: Security Framework I. Introduction... 2 II. Employing Best Practices... 2 Expertise... 2 Certifications and Compliance... 2 III. Application, Platform, and Physical Security... 3
ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics
MicroStrategy Analytics: Delivering Secure Enterprise Analytics Copyright Information All Contents Copyright 2015 MicroStrategy Incorporated. All Rights Reserved. Trademark Information MicroStrategy, MicroStrategy
Secure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview
Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
CONTENTS. Security Policy
CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER
WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices
WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices MicroStrategy Mobile App Platform Copyright Information All Contents Copyright 2014 MicroStrategy Incorporated.
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
Frequently Asked Questions
MICROSTRATEGY CLOUD Frequently Asked Questions v20120611 ARCHITECTURE AND ENVIRONMENT 1. Where is the MicroStrategy Cloud service hosted? MicroStrategy Cloud is hosted at secure MicroStrategy co-location
Secure and control how your business shares files using Hightail
HIGHTAIL FOR ENTERPRISE: SECURITY OVERVIEW Secure and control how your business shares files using Hightail Information the lifeblood of any business is potentially placed at risk every time digital files
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider
MicroStrategy Cloud Enterprise User Guide Version 2
MicroStrategy Cloud Enterprise User Guide Version 2 Service Definition and Policies February 26, 2014 Copyright 2014 MicroStrategy, Inc. All Rights Reserved. TABLE OF CONTENTS MicroStrategy Cloud Platform
Five keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
MicroStrategy Professional Services
MicroStrategy Professional Services GET THE MOST FROM WHAT YOU OWN. We help businesses unleash the value of their MicroStrategy technology. MicroStrategy Professional Services works with you to set up,
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Retention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices
WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices Mobile App Platform Copyright Information All Contents Copyright 2014 Incorporated. All Rights Reserved.
Tableau Online Security in the Cloud
Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Altus UC Security Overview
Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
CloudDesk - Security in the Cloud INFORMATION
CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES
Overview. Edvantage Security
Overview West Virginia Department of Education (WVDE) is required by law to collect and store student and educator records, and takes seriously its obligations to secure information systems and protect
Birst Security and Reliability
Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
ProjectManager.com Security White Paper
ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
Security & Infrastructure White Paper
Proofing and approval made easy. Security & Infrastructure White Paper ProofHQ (Approvr Limited) 66 The High Street Northwood Middlesex HA6 1BL United Kingdom Email: [email protected] US: +1 214 519
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk
Xerox Litigation Services In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Your Highest Priority is also Your Greatest Challenge Data breaches are not just
Cloud Assurance: Ensuring Security and Compliance for your IT Environment
Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Security & Infra-Structure Overview
Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4
Famly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Secure Hosting Solutions For SAGE Energy Management
Secure Hosting Environment Partnerships In order to provide advanced levels of infrastructure security, Armstrong has partnered with two entities. Logicalis Inc. is recognized as a Channel Company s 2015
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Hosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
SaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
<cloud> Secure Hosting Services
Global Resources... Local Knowledge Figtree offers the functionality of Figtree Systems Software without the upfront infrastructure investment. It is the preferred deployment solution for organisations
Managed Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant
Ellucian Cloud Services Joe Street Cloud Services, Sr. Solution Consultant Confidentiality Statement The information contained herein is considered proprietary and highly confidential by Ellucian Managed
BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table
BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Agio Remote Monitoring and Management
Remote Monitoring and Management s Remote Monitoring & Management is a 24x7x365 service in which we proactively manage your infrastructure and IT environment to make sure it s in a healthy state and stays
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
Powering the Cloud Desktop: OS33 Data Centers
OS33 Data Centers [email protected] (866) 796-0310 www.os33.com It is hard to overstate the importance of security and uptime, which is why we obsess over making sure that your corporate information assets
SafeNet Authentication Service Security Considerations
SafeNet Authentication Service Security Considerations Publication Date: Nov. 2012 Revision 1.1 Information provided is confidential and proprietary to SafeNet, Inc. ( SafeNet ) Executive Summary Service
Security Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS
7QUESTIONSYOUNEEDTOASKBEFORE CHOOSINGACOLOCATIONFACILITY FORYOURBUSINESS ExecutiveBrief P a g e 1 Executive Brief 7 Questions You Need to Ask Before Choosing a Colocation Facility for Your Business Choosing
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Level I - Public. Technical Portfolio. Revised: July 2015
Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
MicroStrategy Course Catalog
MicroStrategy Course Catalog 1 microstrategy.com/education 3 MicroStrategy course matrix 4 MicroStrategy 9 8 MicroStrategy 10 table of contents MicroStrategy course matrix MICROSTRATEGY 9 MICROSTRATEGY
How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,
This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.
SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Understanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
PICO Compliance Audit - A Quick Guide to Virtualization
WHITE PAPER August 2011 Passing Compliance Audit: Virtualize PCI-compliant Workloads with the Help of HyTrust and Trend Micro Deep Security HYTRUST AND TREND MICRO DEEP SECURITY TOC Contents Virtualization
System Security Plan University of Texas Health Science Center School of Public Health
System Security Plan University of Texas Health Science Center School of Public Health Note: This is simply a template for a NIH System Security Plan. You will need to complete, or add content, to many
ITAR Compliant Data Exchange
ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/
THE SECURITY OF HOSTED EXCHANGE FOR SMBs
THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Troux Hosting Options
Troux Hosting Options Introducing Troux Hosting Options Benefits of a Hosted Troux Environment...3 Convenience...3 Time-to-Value...3 Reduced Cost of Ownership...3 Scalability and Flexibility...3 Security...4
Security from a customer s perspective. Halogen s approach to security
September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving
BKDconnect Security Overview
BKDconnect Security Overview 1 Introduction 1.1 What is BKDconnect 1.2 Site Creation 1.3 Client Authentication and Access 2 Security Design 2.1 Confidentiality 2.1.1 Least Privilege and Role Based Security
ClickTale Security Standards and Practices: Delivering Peace of Mind in Digital Optimization
Delivering Peace of Mind in Digital Optimization TABLE OF CONTENTS INTRODUCTION 2 PRIVACY AND ANONYMITY 3 ISO 27001 COMPLIANCE 5 APPLICATION-LEVEL SECURITY 6 PENETRATION TESTING AND SECURITY AUDITS 7 GENERAL
System Security. Your data security is always our top priority
Your data security is always our top priority Data security is an important factor for every client, our continued investment in the latest technology methods and world class data centres show our commitment
Cloud Management. Overview. Cloud Managed Networks
Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity
