SuccessFactors focuses on cloud security. So you can focus on business WHITE PAPER



Similar documents
SAP Cloud: Focusing on security So you can focus on business

Top 10 reasons to move to the cloud

Cloud Contact Center. Security White Paper

Autodesk PLM 360 Security Whitepaper

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

The ROI of a New Learning Management System (LMS)

Security Controls for the Autodesk 360 Managed Services

IBX Business Network Platform Information Security Controls Document Classification [Public]

Security & Infra-Structure Overview

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Birst Security and Reliability

Projectplace: A Secure Project Collaboration Solution

ClickTale Security Standards and Practices: Delivering Peace of Mind in Digital Optimization

Five keys to a more secure data environment

Secure, Scalable and Reliable Cloud Analytics from FusionOps

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

GoodData Corporation Security White Paper

Famly ApS: Overview of Security Processes

SAP Product and Cloud Security Strategy

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

FormFire Application and IT Security. White Paper

Secure and control how your business shares files using Hightail

<cloud> Secure Hosting Services

BMC s Security Strategy for ITSM in the SaaS Environment

Addressing Cloud Computing Security Considerations

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

SaaS Security for the Confirmit CustomerSat Software

HEC Security & Compliance

SaaS Security for Confirmit Horizons

Blue Jeans Network Security Features

Delivering peace of mind in digital optimization: Clicktale's security standards and practices

SITECATALYST SECURITY

PCI Requirements Coverage Summary Table

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Enterprise level security, the Huddle way.

SNAP WEBHOST SECURITY POLICY

Retention & Destruction

Security Policy JUNE 1, SalesNOW. Security Policy v v

University of Pittsburgh Security Assessment Questionnaire (v1.5)

CHECKLIST: Top 10 reasons to move to the cloud

Media Shuttle s Defense-in- Depth Security Strategy

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

FileCloud Security FAQ

White Paper How Noah Mobile uses Microsoft Azure Core Services

TOP SECRETS OF CLOUD SECURITY

Altus UC Security Overview

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

THE BLUENOSE SECURITY FRAMEWORK

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

PCI DSS Reporting WHITEPAPER

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

How To Motivate and Retain Key Employees

KeyLock Solutions Security and Privacy Protection Practices

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO Annual 3rd party application Pen Tests.

Security Overview Enterprise-Class Secure Mobile File Sharing

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

Vendor Questionnaire

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105

Security & Infrastructure White Paper

Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity

Privacy + Security + Integrity

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

WHITEPAPER Workforce Planning Pitfalls

ProjectManager.com Security White Paper

Adobe Systems Incorporated

Security Whitepaper: ivvy Products

CBIO Security White Paper

HIPAA Privacy & Security White Paper

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Complying with PCI Data Security

CONTENTS. Security Policy

Achieving PCI Compliance Using F5 Products

Tableau Online Security in the Cloud

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Powering the Cloud Desktop: OS33 Data Centers

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9

Cherwell Software Hosted Environment

Global ediscovery Client Data Security. Managed technology for the global legal profession

Passing PCI Compliance How to Address the Application Security Mandates

WALKME WHITEPAPER. WalkMe Architecture

Making the leap to the cloud: IS my data private and secure?

Protecting systems and patient privacy

With Eversync s cloud data tiering, the customer can tier data protection as follows:

Level I - Public. Technical Portfolio. Revised: July 2015

Understanding Sage CRM Cloud

A Decision Maker s Guide to Securing an IT Infrastructure

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

Transcription:

SuccessFactors focuses on cloud security So you can focus on business WHITE PAPER

SuccessFactors focuses on cloud security So you can focus on business In the past, business software for everything from HR management to accounting and customer relationship management was accessible only to companies with deep pockets firms that were capable of making massive up-front investments. Today, technology has leveled the playing field. But has the security caught up with the new playbook? At SuccessFactors, we believe it has. Core business applications are now available to everyone, from the largest enterprises to small and midsize businesses, through cloud computing. Thanks to cloud computing, core business applications are now available to everyone, from the largest enterprises to small and midsize businesses. Simply put, the applications and their associated data are delivered over the Internet. Software-as-a-Service, or SaaS, has become a business model as well as an application delivery model. SaaS offers the unique quality of multitenancy, which primarily differentiates it from the application service provider (ASP) model or from in-house applications. With SaaS, just one software instance can serve many customers (or tenants). The ASP model, providing software over a network, forced business executives to confront their fears of putting mission-critical information on third-party servers. 1 Security concerns in a SaaS model are similar to those for the ASP model. Will people steal our information? Will leaks compromise confidential data? The top concerns for the SaaS model s ability to handle security issues focus on identity management, data storage, and data transmission. SuccessFactors understands the critical importance of information protection and recognizes the contribution that information security makes to an organization s strategic initiatives and overall risk management. SuccessFactors has implemented security controls and practices for its SaaS offerings that are designed to protect the confidentiality, integrity, and availability of customer information hosted by SuccessFactors. Additionally, SuccessFactors continually works to strengthen and improve those security controls and practices. The current best practices associated with information security involve a layered approach, what the industry calls defense in depth. Regardless of the software delivery model, security cannot be implemented at a single make or break point. For a SaaS provider to ensure data security for sensitive information, it must have a comprehensive, multifaceted security program in place. SuccessFactors takes a holistic approach to information security, implementing a multilayered defense at all the touch points in the information flow both the physical and logical, applied across the database, middleware, application, and network and communication layers to offer complete data privacy, transparency, and audit controls. This paper explores why SuccessFactors should be your trusted provider including the top security concerns associated with the SaaS model, the layers of information security, and the security controls and practices of SuccessFactors. The company has taken all the necessary steps as well as a few extra to help you meet the high demands of security in a SaaS world. 1 Progress Software. SaaS Security and Pricing 2

Top security concerns of the SaaS delivery model As companies use software delivered through a SaaS model, their overarching concerns focus on vulnerabilities related to identity management, data storage, and data transmission. The SaaSbased offerings from SuccessFactors include built-in security features to resolve these concerns. Identity management Modern SaaS architecture usually involves a Web-based application and communication that occurs over the public Internet. Customers should feel confident that the communication between the user and the service provider leverages Secure Sockets Layer (SSL) or Transport Layer Security (TLS) encryption. SaaS providers should also provide a choice: some customers will need the SaaS provider to handle all security from top to bottom, while others will want a vendor that can integrate with their industry-standard identity management solutions. The SuccessFactors solution is capable of handling all of the above, as well as the following: Internal authentication: SuccessFactors uses an internal repository of user profiles when customers choose not to integrate their identity management product into SuccessFactors Platform. Federated authentication (single sign-on): The SuccessFactors single sign-on (SSO) implementation requires users first to be authenticated by their authorizing system (LDAP) through tokens (MD5, SHA-1, HMAC encryption, DES, 3DES) or Security Assertion Markup Language (SAML 1.1, 2.0). Then they will be redirected to the SuccessFactors website. The trust mechanism between the customer and the SuccessFactors solutions will pass identity information to the solutions. The primary transport protocol for this trust mechanism is standard HTTPS. SSO without federation: SuccessFactors solutions deliver a public encryption key to a customer s authentication server. With this key, customers can connect to their cloud applications by pre-establishing trust. Separate authorization and authentication modules: Authentication methods may change as the SaaS platform matures. Because the authorization component is generally interwoven throughout the core code, SuccessFactors ensures that user data and function permissions validation are separate from the authentication module(s). The SuccessFactors authorization module also logs every action, and the application validates every request to prevent cross-scripting attacks. Password protection: SuccessFactors solutions require strong passwords that conform to specific requirements and also mandates regular password changes. No administrator: Users have identities for accessing information instead of relying on a centralized administrator account. Data storage In an ASP model, each customer has unique hardware that keeps data segregated at all times. In a SaaS model, heterogeneous data may reside within a single instance of a database. To address information privacy concerns, current regulations require the segregation of heterogeneous data within a SaaS environment. SaaS vendors must demonstrate that they can separate customer data for each customer not only to satisfy the regulations but also to give customers peace of mind. If the how of data storage is a concern for your organization, a SaaS provider should be prepared to answer all your questions. 3

SuccessFactors segregates heterogeneous data by using the following approach to build its application architecture and store the data: Unique database tables: Most companies providing shared Web access have one set of database tables in a normalized database shared by many customers. In contrast, SuccessFactors customers share the network security infrastructure, Web servers, application servers, and database instance, but each customer has its own set of database tables within its own unique database schema, which ensures complete segregation of tenants data. Encrypted data storage: All encrypted data is stored on disk using a minimum of AES 128-bit encryption. Secure levels: The top two tiers (application and Web in later levels) are completely stateless. By not keeping sessions in memory or writing to disk, SuccessFactors solutions dramatically reduce the security risk of these two tiers. This approach also simplifies the construction of load-balanced server farms, as there is no need to keep the workloads on any given server. Movement of data: It is important to remember that data is moving through multiple tiers, and each level must ensure data security. The SuccessFactors solution uses the best-practice defense-in-depth strategy to provide segregation of data at all layers. Data transmission SaaS uses the public Internet to transmit data. For this reason, transmission security, such as SSL and TLS, must be designed into the system. SSL and TLS create secure tunnels for information transmissions. Unfortunately, the use of distinct communication channels for each customer is counterintuitive and costly, and can become a maintenance nightmare. Therefore, the use of private lines should be avoided. Instead, focus on controls. The SuccessFactors solution prevents eavesdropping, tampering, and forgery by using cryptographic controls, by employing a defense-indepth strategy, and by enforcing these three security requirements: Confidentiality: Data can be viewed only by the intended recipient. Integrity: Data cannot be altered without detection. Nonrepudiation: The recipient of the data has proof that the data originated from SuccessFactors. Furthermore, the SuccessFactors solution secures communications by employing these data transfer options: Secure Web communication: The SuccessFactors solution implements SSL technology, consisting of a public key and a private key, to protect sensitive information. The public key is used to encrypt information, and the private key is used to decipher it. When a Web browser points to a secured domain, an SSL handshake authenticates the server (website) and the client (Web browser). An encryption method is established with a unique session key. Customers may then begin a secure session that guarantees message privacy and message integrity. Secure messaging: All outgoing email notifications sent from SuccessFactors solutions are securely encrypted using TLS, which makes it difficult to tamper with the email message contents and to send spoofed emails. Secure FTP with Pretty Good Privacy (PGP) encryption: Data files can be transmitted by secure FTP to SuccessFactors FTP server or a customer s FTP server. Files are PGP-encrypted before transmission. Encryption keys: Encryption keys are securely protected and rotated on a scheduled basis. 4

The layers of information security SuccessFactors addresses security concerns at the physical, database, middleware, application, and network and communication layers. The following sections describe how. SaaS providers must provide multilevel protection to guard against business disruptions, from power outages to illegal access by an intruder. Layer 1: Physical site For most businesses, downtime is simply not an option. That s why data centers, which house the servers on which your mission-critical applications run, require multilevel protection to guard against business disruptions, from power outages to illegal access by an intruder. Even so, investing in this level of security can be cost-prohibitive, which is why many companies choose to outsource to a trusted provider. SuccessFactors partners with localized world leaders in co-location hosting centers to provide environmentally controlled, secure facilities that use an integrated security management system, which includes electronic photo ID badging, cardholder access control, biometrics, recorded digital video surveillance, and alarm monitoring. All SuccessFactors data centers are ANSI/TIA/EIA-942 Tier III+ rated facilities. They provide continuous monitoring; multiple, redundant UPS-protected power circuits with generator backup; smoke detection units; fire suppression systems; 24-hour, year-round onsite security personnel; and intrusion detection alarm systems. In addition, the facilities include safeguards that: Block illegal entry via biometric readers, bulletproof walls, and concrete pillars Monitor the entire facility by using closed-circuit cameras located in equipment areas, corridors, and mechanical, shipping, as well as receiving areas Immediately act on security breaches through the use of silent alarms, which automatically notify security and law enforcement personnel if a breach occurs Avoid downtime by preventing power spikes, surges, and brownouts with redundant power links to local utilities, backup batteries, and uninterruptible power supplies, and by interconnecting to the largest aggregation of global Tier 1 networks Shield against fire, natural disasters, and weather shifts with fire-suppression systems; heat, temperature, airflow, and humidity monitoring; and earthquake-safe designs Technical vulnerability management SuccessFactors has implemented technical vulnerability management to reduce risks resulting from the exploitation of technical vulnerabilities. The use of operator logs and fault logging ensure the identification of information system problems. System monitoring is used to check the effectiveness of the controls that are adopted and to verify conformity to SuccessFactors information security policies and standards. The company uses industry-leading security partners to conduct daily and monthly penetration tests on the production environment, and customers also can perform their own application vulnerability testing. 5

Layer 2: Database Database environments used in cloud computing can vary significantly. For example, some environments support a multi-instance model, while others support a multi-tenant model. The SuccessFactors solution supports a multi-tenant model. Data must be secured while at rest, in transit, and in use, and access to the data must be controlled. The use of advanced security mechanisms in the SuccessFactors solution secures data while at rest and secures access to the data: Advanced security: SuccessFactors solutions use an advanced security method based on dynamic data and encoded session identifications. The company hosts the site in a secure server environment that uses multiple firewalls, access controls, intrusion detection systems, and other advanced technology to prevent interference or access from outside intruders. Load balancing: SuccessFactors solutions are load balanced at every tier in the infrastructure, from the network to the database servers. Database servers are also clustered for failover. Attack prevention: With activity monitoring and blocking, SuccessFactors solutions employ a protection layer for databases that analyzes network traffic to prevent attacks. An applicationlevel firewall monitors and validates all traffic between the application and database tiers to prevent attacks such as SQL injections from reaching the database server. Access control: SuccessFactors requires that all access to information processing facilities and business processes be controlled according to business and security requirements. In all cases, the concept of least privilege determines computer access. Users are limited to the minimum set of privileges required to perform the required function. Database audits: Regular database audits allow SuccessFactors to maintain records demonstrating proof of origin, all alterations/additions/deletions, the date timestamp of a data change, and approvals where appropriate. To maintain an audit log s viability, the log is unalterable, encrypted, and kept on a network segment to which system engineers do not have access. Classification of information: All information, regardless of medium or form, is classified to reflect its level of confidentiality or importance to SuccessFactors and its customers. All customer data is classified confidential. Data encryption: The SuccessFactors solution encrypts data in a way that doesn t affect applications it decrypts the data on the fly when applications access the data, but it keeps the data encrypted for other types of access. The solution uses a minimum of AES 128-bit encryption to secure data at the block level of the SuccessFactors storage systems. SuccessFactors key management has passed the FIPS 140-2 level 3 certification testing. Backup and restore: SuccessFactors runs full and incremental data backups weekly and full archive logs backups daily. SuccessFactors stores backed-up data on an encrypted disk using AES 128-bit encryption. This data is available for rapid reimplementation and system restores if the original data becomes corrupt. 6

Layer 3: Middleware The architecture of the software and hardware used to deliver cloud services can vary significantly among public cloud providers. The cloud provider determines the physical location of the infrastructure as well as the design and implementation of the reliability, resource pooling, scalability, and other logic needed in the support framework. Application servers are built on the programming interfaces of Internet-accessible services, which typically involve multiple cloud components communicating with each other over application programming interfaces (APIs). It is important to understand the technologies the cloud provider uses and the implications that the technical controls involved will have on the security and privacy of the system throughout its life cycle. SuccessFactors ensures that safeguards are in place to enforce authentication, authorization, and other identity and access management functions. Multifactor authentication is superior to standard password authentication because it requires, for example, biometrics or a dongle to authenticate the user. Who you are, what you know, and what you have are the three basic pillars of multifactor authentication. At SuccessFactors, multifactor authentication is an absolute must for SuccessFactors administrators who manage the production environment. Other safeguards include the following: Single sign-on and identity federation SAML 2.0 assertion Integration between the SuccessFactors public cloud and identity management systems on the premises Fully delegated administration Layer 4: Application SuccessFactors applications are written in Java and adhere to the J2EE specification. The applications dynamically produce every page and send it to the user s desktop encrypted using SSL. No static HTML pages or content are delivered by the applications unless required by the customer. SuccessFactors unique and proprietary XML schema provides a single consistent software code base that is configurable to your particular business requirements. This approach helps SuccessFactors to continually test software to ensure security, since every customer runs the same version of the code. SuccessFactors applications employ extensive security measures to protect against the loss, misuse, and unauthorized alteration of data. The SuccessFactors solution helps to achieve the following: Protect applications from insider threats, with tight encryption through a 128-bit SSL connection. Using open standards (HTML and JavaScript) ensures that applications do not require any changes or special permissions on a user s desktop. Avoid risky plug-ins and downloads that can cause viruses or other threats, by using browser-based administrative functions, such as password resets. Guard against phishing and pharming by using email encryption and regular virus scans, as well as plain text emails, to eliminate the possibility of a hidden link that can gather information from users. Protect against improper logins by requiring user logins each time the application is opened, by using one-way SHA-1 hash encrypted passwords, and by using automatic logouts after 30 minutes and account locks after multiple failed logins. Provide best practice security at all levels function, transaction, field, and data by using role-based permissions (RBP). 7

Enforce segregation of duties by ensuring that no individual can breach security through dual privileges. No person can hold a role that exercises audit, control, or review authority over another concurrently held role. Phishing and pharming: SuccessFactors protects you against both Phishing is an attempt to obtain access credentials, such as user names and passwords, by fake email or by text, instant, or direct message to unsuspecting recipients. Pharming is an attempt to redirect a website s traffic to another site for malicious intent. SuccessFactors takes extra precautions, because even if you know how to protect yourself, other people in your organization may not. Layer 5: Network and communication When securing a network infrastructure, it s important to strike a balance between security and availability of applications, which is why every component of the IT network from the point of entry on the network down to the final place where information is stored must be meticulously configured, deployed, maintained, and continually tested for optimal performance. Rock-solid equipment, such as routers, switches, and load balancers, is configured to provide secure, highly available access. Using solid equipment is a good first step. Then, SuccessFactors takes extra steps to maintain the balance between rigorous protection and continuous availability. SuccessFactors goes the extra distance to accomplish the following: Every component of the IT network must be meticulously configured, deployed, maintained, and continually tested for optimal performance. Reinforce security with connections to multiple Tier 1 Internet service providers (ISPs) for highly available network access. All network equipment is redundant, providing seamless failover between devices. Web, application, and database tiers are configured as secure segments and are tuned for maximum performance. Limit internal network traffic to pass along only the data required by the application. SuccessFactors uses a multitiered network architecture and limits end-user traffic to the front demilitarized zone (DMZ) tier of Web servers. A firewall-controlled, segregated virtual local area network (VLAN) isolates each tier of the system from the other tiers, and each tier is set up on its own hardware stack. All requests are individually validated before independent requests to the next tier are generated. Incoming user requests are passed through the firewall down to the load balancers, and load balancers distribute the traffic to the appropriate Web server (presentation tier) for processing. The Web server then makes independent requests to the application tier, and the application tier makes independent requests to the database tier. At each level, the incoming request is validated against business and security rules to protect against malicious access. Requests that fail validation are terminated. Traffic within each tier is restricted. Only required ports are enabled on servers and permitted between VLANs. The firewall separating the application and database tiers uses a default policy that drops all traffic unless specifically required. SuccessFactors has implemented 11 security patents at this point. 8

Industry-leading security partners SuccessFactors works with the best security and monitoring service providers to: Ensure individual server performance and uptime by using remote, agentless server monitoring Maintain a smooth user experience through global, transaction-based monitoring Stop network intrusions by using complete security coverage, including two separate 24-hour year-round security teams Prevent malicious server attacks with host-based intrusion detection Protect against potential threats by using thorough and proven application vulnerability testing Identify information-system problems by using detailed logs Verify the effectiveness of security controls and compliance with information-security policies and standards via system monitoring Security measures that interrupt the daily flow of information are counterproductive. SuccessFactors security controls and practices Implementing procedures to control what and how changes occur within the SuccessFactors cloud environment, providing user education, and fostering security awareness are as important as how many firewalls are in front of your sensitive data. This section describes the controls SuccessFactors has put in place, including information security incident management, consistent and proven security measures, information security standards, security education and awareness, and compliance standards. Information security incident management SuccessFactors implements formal event reporting and follows escalation procedures if an information security incident occurs. Real-time notifications of vulnerabilities and security incidents are entered into the SuccessFactors ticketing system, and the appropriate SuccessFactors personnel are notified. All actions taken to resolve a problem are documented, so all problems can be tracked to completion. Information security staff will generate a report regarding the need for enhanced or additional controls to limit the frequency, damage, and cost of future occurrences, as well as required revisions to information security policies. Consistent, proven security measures Security controls and processes are vital, but establishing the right procedures can be challenging. Yes, you need strong security measures, but you also need to maintain the continuity of your business operations. Security measures that interrupt the daily flow of information are counterproductive. SuccessFactors was one of the first SaaS companies to successfully complete the newest SSAE 16 SOC 2 audit in 2011. Customers can review all of the procedures, along with the auditors findings, used to secure their data in SuccessFactors applications. SuccessFactors multitiered approach helps ensure a balance between control and ease of use. Users can stay productive, and your information stays secure. And when changes are made to the environment, they are logged, approved, and verified through a centralized, online application. This multitiered approach is one of the reasons why SuccessFactors has been able to successfully release product updates and enhancements four times a year without fail. 9

SuccessFactors information security standards SuccessFactors business assets include information and the information-processing environment that supports it. For SuccessFactors, identifying, implementing, maintaining, and improving information security is essential to maintaining legal compliance and a competitive edge. The company has established strict policies, standards, and procedures regarding all activities associated with how employees, contractors, and third-party vendors approach the SuccessFactors information-processing environment. In addition to its high security standards, SuccessFactors documents critical processes to ensure consistent, predictable results. The importance of information security is reflected in the company s standards and in its requirement that all employees acknowledge in writing that they understand their roles and responsibilities regarding information security. SuccessFactors security education and awareness Some of the biggest data leaks in recent months have been the result of social engineering or simple carelessness. Employees who unwittingly give access to confidential data through lost or stolen laptops left unencrypted have caused some of the largest data leaks of all time. Ongoing security training for all employees about the latest security scams, periodic reviews of security policies, and signed acknowledgments that the employees have read and understand the policies go a long way toward keeping information security top of mind. At SuccessFactors, security responsibilities are addressed throughout a person s tenure with the company to ensure that employees, as well as contractors and third-party vendors, understand their responsibilities. SuccessFactors involves all employees, contractors, and third-party vendors in annual security awareness training. SuccessFactors compliance standards SuccessFactors complies with the latest standards, including: All policies based on ISO 27002 Applications tested to OWASP standards Infrastructure hardened to CIS standards U.S. government FISMA accreditation (OPM/DHS/NTIS) PCI certified SSAE 16 SOC 2 auditing every year SSAE 16 SOC 2 or ISO 27002 certification for the data center Safe Harbor certification BS 10012 standard for the management of personal information SuccessFactors has established intercompany agreements internally that permit the company to manage data using all of its resources globally. All contracts with sub processors include appropriate provisions to ensure that SuccessFactors adheres to all of the European Union data privacy requirements. 10

Conclusion As malicious software, identity theft, and online system exploitation threaten today s computing environments, securing sensitive corporate data has never been more imperative. Government regulations require and end users demand higher levels of security, yet businesses struggle to implement a sound security infrastructure that protects them from existing and emerging threats. Have security solutions caught up with this demand? At SuccessFactors, a seasoned team of industry experts who specialize in creating secure, reliable environments will help you save on IT staffing and build-out costs to safeguard your critical applications and data while keeping your business operations intact. We relentlessly focus on security so you don t have to. Our comprehensive approach at the physical, database, middleware, application, and network and communication layers literally builds security into every aspect of our business. In fact, we work every day to help companies just like yours achieve the best possible business results, with Business Execution Software solutions that incorporate the latest research, the smartest technology, and the most secure systems on the planet. Providing a safe yet highly accessible environment is something that many corporate behind-the-firewall implementations are struggling to achieve. SuccessFactors ability to offer applications that are affordable, configurable, and secure makes us the industry leader. About SuccessFactors, an SAP company SuccessFactors is the leading provider of cloud-based Business Execution Software and delivers business alignment, team execution, people performance, and learning management solutions to organizations of all sizes across more than 60 industries. With approximately 15 million subscription seats globally, we strive to delight our customers by delivering innovative solutions, content and analytics, process expertise, and best practices insights from serving our broad and diverse customer base. Today, we have more than 3,500 customers in more than 168 countries using our application suite in 35 languages. Copyright 2012 SuccessFactors, Inc. 11

SuccessFactors Global Headquarters 1500 Fashion Island Blvd. Suite 300 San Mateo, CA 94404, USA TOLL FREE 800 809 9920 PHONE 650 645 2000 FAX 650 645 2099 EMEA +45 33 349 349 APAC +612 9238 6680 successfactors.com San Mateo, California Boston, Massachusetts San Francisco, California Copenhagen, Denmark Paris, France Munich, Germany Zürich, Switzerland London, United Kingdom Beijing, China Hong Kong, China Tokyo, Japan Manila, Phillipines Singapore Seoul, South Korea Sao Paulo, Brazil Mexico City, Mexico Dublin, Ireland Shanghai, China Bangalore, India Brisbane, Australia Sydney, Australia