Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?



Similar documents
Troux Hosting Options

GiftWrap 4.0 Security FAQ

StratusLIVE for Fundraisers Cloud Operations

Five keys to a more secure data environment

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Security Controls for the Autodesk 360 Managed Services

Birst Security and Reliability

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version and higher

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Enterprise level security, the Huddle way.

White Paper. BD Assurity Linc Software Security. Overview

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Security & Infra-Structure Overview

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

CHIS, Inc. Privacy General Guidelines

USING GENIE REMOTELY

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Time to Value: Successful Cloud Software Implementation

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

Software as a Service (SaaS) Requirements

How To Protect Your Data From Being Hacked

Unisys Internet Remote Support

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Altus UC Security Overview

FileCloud Security FAQ

INNOVATE. MSP Services Overview SVEN RADEMACHER THROUGH MOTIVATION

MSP Service Matrix. Servers

Security aspects of e-tailing. Chapter 7

Use of The Information Services Active Directory Service (AD) Code of Practice

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Client Security Risk Assessment Questionnaire

On-Site Computer Solutions values these technologies as part of an overall security plan:

Retention & Destruction

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Injazat s Managed Services Portfolio

How To Use Egnyte

SAP Secure Operations Map. SAP Active Global Support Security Services May 2015

Medical Device Security Health Group Digital Output

SaaS architecture security

QuickBooks Online: Security & Infrastructure

Spooks in the Machine

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Security Policy JUNE 1, SalesNOW. Security Policy v v

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Data Security and Healthcare

Library Systems Security: On Premises & Off Premises

SAS 70 Type II Audits

STREAM FRBC

White Paper. Support for the HIPAA Security Rule PowerScribe 360

BOWMAN SYSTEMS SECURING CLIENT DATA

Supplier Information Security Addendum for GE Restricted Data

Application Development within University. Security Checklist

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

HIPAA Security Alert

GTS Software Pty Ltd. Remote Desktop Services

Fortinet Solutions for Compliance Requirements

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

SonicWALL PCI 1.1 Implementation Guide

Catapult PCI Compliance

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)

Cybersecurity Health Check At A Glance

BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

BlackBerry Enterprise Service 10 version 10.2 preinstallation and preupgrade checklist

Validating Enterprise Systems: A Practical Guide

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

Print4 Solutions fully comply with all HIPAA regulations

Remote Services. Managing Open Systems with Remote Services

White Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC.

Enterprise Architecture Review Checklist

Comparative study of security parameters by Cloud Providers

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

GoodData Corporation Security White Paper

How To Secure Your Data Center From Hackers

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Privacy + Security + Integrity

AUSTIN INDEPENDENT SCHOOL DISTRICT INTERNAL AUDIT DEPARTMENT TRANSPORTATION AUDIT PROGRAM

Support for the HIPAA Security Rule

RL Solutions Hosting Service Level Agreement

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

APC Enterprise KVM Switches

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

Ensuring HIPAA Compliance with eztechdirect Online Backup and Archiving Services

Building A Secure Microsoft Exchange Continuity Appliance

Interact Intranet Version 7. Technical Requirements. August Interact

Transcription:

SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several advantages. It does not require on-site software or IT support, as the complete system is managed by SIMCO and can be easily accessed from any computer connected to the Internet with a standard web-browser. There is no up-front capital purchase of hardware and software required SIMCO customers simply pay a monthly fee as they access the system. SIMCO software and customer data are maintained at two secure facilities and backed-up daily to ensure continuity of service. Life Science customers have the added benefit of a system that is already validated and compliant with FDA 21 CFR Parts 11 and 820. Unlike SaaS, COTS solutions typically require on-site hardware, software, installation, system validation, back-ups, maintenance and periodic upgrades, resulting in increased costs to the program and a serious distraction from the customer s core business. Security Explain the level of data encryption used for protecting CERDAAC transactions, as well as any additional security precautions SIMCO s security procedures and policies are continually audited by thousands of customers and are fully compliant with the most stringent regulatory requirements, including life science and nuclear industry requirements. The following security provisions are a few among the many SIMCO employs: Application Security Configurable password policies and security questions Session timeout settings User activity audit log recording authorized access and break-in attempts Team-based data sharing policies IP range address blocking Single sign-on and LDAP access control Field level data encryption

Physical Security Data center access limited to datacenter technicians Biometric scanning for controlled data center access Security camera monitoring at all data center locations 24x7 onsite staff provides additional protection against unauthorized entry Unmarked facilities to help maintain low profile Physical security audited by an independent firm Uninterrupted power supply and generator backup System Security System installation using hardened, patched OS System patching to provide ongoing protection Dedicated firewall and VPN providing port level security Managed backup solution Dedicated intrusion detection devices to provide an additional layer of protection against unauthorized system access Distributed Denial of Service (DDoS) mitigation Privacy What is SIMCO s privacy policy? Because we gather important information from our customers, SIMCO has established a privacy policy as a means to communicate our commitment to ensuring the privacy of customer data. We do not share, distribute, or reference any specific customer data to any third party except as may be required by law and not without prior written notice in order to give the customer adequate time to object to such disclosure or seek a protective order. SIMCO may use and access customer data, including but not limited to: help resolve or diagnose technical problems or support issues, administer or manage the service, improve the service, train employees, ensure or check compliance with the terms and conditions of our privacy policy and applicable law. SIMCO reserves the right to modify our privacy statement from time to time with prior written notice of any such modifications.

Authentication and Virus Protection Describe CERDAAC s authentication and virus protection methods SIMCO uses both server authentication and data encryption to protect customer data and restrict access. Our servers use Secure Sockets Layer (SSL) authentication with 128-bit Triple Data Encryption Standard (3DES) encryption. Our security infrastructure also includes an advanced security method based on dynamic data and encoded session identifications. Employee laptops and workstations are often the most vulnerable point in an enterprise network. Data stored on an employee laptop or desktop computer is less likely to be backed-up and more likely to be corrupted, lost or stolen. With SIMCO s solution, all customer data is maintained on secure SIMCO servers and backed up on a daily basis. SIMCO provides each user with a unique username and password that must be entered each time they log in. The password policy is configurable to each customer s needs. Each user s ability to view and edit data can be restricted based on their role in the organization. SIMCO does not require any software to be installed on the customer s servers or PC s. There are no executable programs to be downloaded, therefore virus detection is not required as part of SIMCO s offering. We do recommend, however, that users have an updated anti-virus solution running on their machines at all times. Backup and Continuity Plan What are SIMCO s backup procedures and business continuity plans? Backup All customer data is backed up to a Network Attached Storage (NAS) device on SIMCO servers in two secure datacenters. Backups occur daily. These backups are stored such that there are 7 days of daily, 4 weeks of weekly, 12 months of monthly, and up to 10 years of yearly backups available in case a restore is required.

Disaster Recovery SIMCO has a documented and validated disaster recovery process. The process anticipates multiple types of system failure and recovery at the application, database, network and facility levels. To ensure continuity of service, SIMCO maintains two separate, secure and mirrored systems. In the worst case of a complete facility disaster, SIMCO s SaaS solution will fail-over to the second system (located at a different datacenter). We expect this Domain Name System (DNS) change to take 30-60 minutes to propagate throughout the Internet. This fail-over system is set as read-only to enable customers to access their data, but to avoid synchronization and write-back problems that would occur upon restoration of the primary system. Upgrades and Downtime What is SIMCO s approach and policy regarding upgrades? How is system downtime handled? SIMCO regularly updates CERDAAC with new capabilities. These updates are managed entirely by SIMCO without burdening the customer s IT organization. SIMCO customers don t need to cling to outdated software or plan for expensive system upgrades. They can also expect superior customer support because every customer is running on the same version of software located in SIMCO s secure facilities. There is never a need for SIMCO to duplicate the customer s environment before diagnosing and resolving customer issues. SIMCO also offers a validated version of CERDAAC for life science customers. This version is compliant with the most stringent FDA guidelines (21 CFR Parts 11 and 820). All software updates go through multiple stages of testing and validation prior to being introduced to customers. Updates are performed outside of normal business hours (in the Continental U.S.). Once an update is made available, it is immediately available to all SIMCO customers, thus accelerating the discovery and resolution of any remaining bugs.

Integration Is the current solution able to integrate with existing software? Is so, please specify. CERDAAC provides a full Representational State Transfer (REST) and Web Services based Application Programming Interface (API) for programmatic integration with other systems. SIMCO s software also exposes Java and JavaScript class access, making the data mode appropriately available to third party integration. By leveraging these well established industry standards, SIMCO has successfully integrated with numerous client applications and databases. Data Ownership Does SIMCO own my data? SIMCO Electronics does not own your data you do. SIMCO ensures that your data is safe, secure and available. You have the ability to export your data from SIMCO s servers at your convenience. Disclaimer: The information in this document applies to CERDAAC 4.0 and on. Parts of this document do not apply to earlier versions of CERDAAC and to SIMCO Electronics internal software systems.