Secure Your Source Code and Digital Assets



Similar documents
Sophisticated Password Policy

Privacy + Security + Integrity

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

Secure Data Hosting. Your data is our top priority.

Security Policy JUNE 1, SalesNOW. Security Policy v v

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

How To Use Quantum Rbs Inc. Small Business Backup

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

How To Use Egnyte

Security in the Sauce Labs Cloud. Practices and protocols used in Sauce s infrastructure and Sauce Connect

RemotelyAnywhere. Security Considerations

Brochure Achieving security with cloud data protection. Autonomy LiveVault

Security in the Sauce Labs Cloud

Blaze Vault Online Backup. Whitepaper Data Security

UBS KeyLink Quick reference WEB Installation Guide

SaaS architecture security

SITECATALYST SECURITY

Support for the HIPAA Security Rule

Hosted File Backup for business. Keep your data safe with our cloud backup service

Features Security. File Versioning. Intuitive User Interface. Fast and efficient Backups

Fax

PRESENTS... How to Access Remote SourceSafe Fast & Securely?

Enterprise level security, the Huddle way.

ELPBack Online Backup Whitepaper Data Security Version 5.5.x Jun 2008 Protecting Tomorrow with yesterday ELPBack Offsite Backup Whitepaper Data

System Security. Your data security is always our top priority

by New Media Solutions 37 Walnut Street Wellesley, MA p f Avitage IT Infrastructure Security Document

BOWMAN SYSTEMS SECURING CLIENT DATA

Hosted Acronis Backup Cloud. Keep your data safe with our cloud backup service, powered by Acronis

FormFire Application and IT Security. White Paper

SaaS Security for the Confirmit CustomerSat Software

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup

Security & Infrastructure White Paper

Hosted Testing and Grading

A Decision Maker s Guide to Securing an IT Infrastructure

Famly ApS: Overview of Security Processes

Security & Infra-Structure Overview

KeyLock Solutions Security and Privacy Protection Practices

Security. TestOut Modules

Did you know your security solution can help with PCI compliance too?

Hosted File Back-up for business. Keep your data safe with our cloud back-up service

Definitely a Trustworthy Investment

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA

SVA Backup Plus Features

Service Overview CloudCare Online Backup

A. The Treeno Data Center maintains audited advanced security systems equal to the most sophisticated systems of large corporations.

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.

CloudDesk - Security in the Cloud INFORMATION

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

Online Backup Solution Features

Click. Schedule. Relax.

SECURITY DOCUMENT. BetterTranslationTechnology

Premier Services Program (PSP) Tools: Security Overview

Secure, Scalable and Reliable Cloud Analytics from FusionOps

LogMeIn HIPAA Considerations

White Paper. Securing and Integrating File Transfers Over the Internet

How To Backup Your Hard Drive With Pros 4 Technology Online Backup

Retention & Destruction

CTS2134 Introduction to Networking. Module Network Security

techsafe Features Technology Partners th Street - Vero Beach, FL (772) Page 1/

Introduction. Ease-of-Use

ereview Security Overview Security Overview

CallRail Healthcare Marketing. HIPAA and HITECH Compliance for Covered Entities using Call Analytics Software

owncloud Architecture Overview

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

ASP Technology & Security Overview

eztechdirect Backup Service Features

100% Web-Based Time & Labor Management

HealthcareBookings.com Security Set Up

Move from traditional IT Solutions to Cloud Computing. Mauritius Telecom your partner for Cloud services

Storage Guardian Remote Backup Restore and Archive Services

Online Backup by Mozy. Common Questions

GiftWrap 4.0 Security FAQ

IBX Business Network Platform Information Security Controls Document Classification [Public]

KineticD Security White Paper

RL Solutions Hosting Service Level Agreement

IaaS. Move from traditional IT Solutions to Cloud Computing. Mauritius Telecom your partner for Cloud services. PaaS

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Veeam Cloud Connect. Version 8.0. Administrator Guide

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

How To Secure Your Data Center From Hackers

Security Practices, Architecture and Technologies

Everything you need to know!

S y s t e m A r c h i t e c t u r e

Product Guide. Sawmill Analytics, Swindon SN4 9LZ UK tel:

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Zen Internet. Online Data Backup. Zen Vault Express for Windows. Issue:

The City of New York

WhatsUp Gold v16.3 Installation and Configuration Guide

SECURE AUTOMATED RELIABLE

Passing PCI Compliance How to Address the Application Security Mandates

HIPAA. considerations with LogMeIn

1. Secure 128-Bit SSL Communication 2. Backups Are Securely Encrypted 3. We Don t Keep Your Encryption Key VERY IMPORTANT:

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

Microsoft Exchange ActiveSync Administrator s Guide

Security Policy Revision Date: 23 April 2009

SSL VPN Technical Primer

Birst Security and Reliability

Transcription:

Hosted PRESENTS... Secure Your Source Code and Digital Assets - World's 1st Hosted SCM Solution Studies show that companies of all sizes have begun adopting SaaS (Software as a Service) solutions in a faster pace as a way to implement IT services more quickly and to lower IT costs. SCM Anywhere Hosted is the world's 1st hosted SCM (software configuration management) solution. It is delivered as a SaaS application and comes with fully integrated version control, issue tracking, build automation and professional service to manage your whole software development life cycle. SCM Anywhere Hosted is hosted in Primus Data Center to ensure that you have the most reliable access to mission-critical data and uncompromised security. Dynamsoft has heavily invested in SCM Anywhere Hosted's development, infrastructure, support and maintenance. As a software development company, we fully understand the importance of source code and digital assets security. We designed SCM Anywhere Hosted to operate at a level of security that most in-house operations can't match. This white paper describes SCM Anywhere Hosted's security features and gives an overview of the data center. SCM Anywhere Hosted Security Features SCM Anywhere Hosted incorporates a range of security features that secure your source code and digital assets from accidents and malevolent attacks. Here's how the features break down. Copyright 2009 Dynamsoft. All Rights Reserved. Page 1 of 8

Secure Sockets Layer (SSL) Protocol Secure Sockets Layer (SSL) is a strong cryptography and security protocol used to safeguard sensitive data during transmission over open, public networks. Originally developed by Netscape to secure online financial transactions, SSL is now one of the leading security protocols on the web. Today, SSL supports millions of online transactions every day and is the de facto standard for secure online credit card purchases, stock trading and banking. SCM Anywhere Hosted provides 128-bit SSL encryption to protect your data, including passwords and data files, being transferred across the Internet. Sophisticated Password Policy Passwords are the front line of computer security. SCM Anywhere Hosted uses an industry-standard approach to password policy. We enable granular control of password length, memory, complexity and expiration. The 'Minimum password length' and 'Password must meet complexity requirements' settings can make a password very difficult to hack. Copyright 2009 Dynamsoft. All Rights Reserved. Page 2 of 8

The 'Enforce password history' feature prevents old passwords from being reused again and again. The 'Maximum password age' feature can force the user to change his/her password after a certain period. And if an attacker cracks the password, he/she only has access to the database until the password expires. Also, since the password must be changed periodically, it is difficult for attackers to crack. The 'Lock out' option prevents hackers from guessing at passwords. This feature is particularly important for network applications, like SCM Anywhere Hosted. Here s an example. If a server responds to a login request in 100 milliseconds, an attacker can try 36,000 different passwords in 1 hour. By using the 'Lock out' setting, administrators can minimize the number of password attempts within a specified time frame. For example, if an administrator mandates a 10-minute lock out after five incorrect attempts, the attacker can only try 30 passwords within one hour. This obviously makes a password much safer. Copyright 2009 Dynamsoft. All Rights Reserved. Page 3 of 8

Independent and Isolated Databases for Each Customer In the SCM Anywhere Hosted server, each customer's data is stored in an independent, dedicated database that's isolated from other customers' data. Customers can only access their specified database, and operations on one database will have no influence on other customers' data. Database Encryption, the Ultimate Way SCM Anywhere Hosted provides database encryption, which is an ultimate approach to protect your data. With database encryption, all of your file content stored in SQL Server is encrypted by a passphrase you provide during the encryption process. Under the unlikely worst scenario, even if your database is copied without your permission, no one can read a single file in your repository unless they know your passphrase. Copyright 2009 Dynamsoft. All Rights Reserved. Page 4 of 8

Cache File Encryption for Speed and Security SCM Anywhere Hosted uses a sophisticated cache mechanism to reduce server workload and improve performance. For the cached files, SCM Anywhere Hosted uses Blowfish encryption to ensure the security of data during the process of caching. The passphrase is randomly generated by the server when it is started and discarded when the server is down. Combined with database encryption, cache file encryption guarantees that no file content is written to hard disk without being encrypted. Login Log for Monitoring Suspicious Activity You can use SCM Anywhere Hosted's Login Log to view the 10 latest login attempts to Hosted Server using your organization ID and user name. Using this feature, you can easily identify any suspicious activity in your account. For example, you did not use SCM Anywhere Hosted yesterday, but you see a login log for yesterday or you use SCM Anywhere only from the office but you see an unfamiliar IP in the login log. Once the suspicious activities are identified, proper measurements can be taken to stop the damage. Copyright 2009 Dynamsoft. All Rights Reserved. Page 5 of 8

Flexible IP & MAC Filter Rules You can set up IP & MAC filter rules in SCM Anywhere Hosted. You can create rules for a collection of IP and MAC addresses that allow only specified addresses to access your SCM Anywhere Hosted account. If you choose not to define rules, then all traffic is allowed. The optional IP filter adds another layer of security. For example, if you only access SCM Anywhere Hosted from your office, you add your office IP address in the filter so your SCM Anywhere Hosted account cannot be accessed from outside of your office. If you also access SCM Anywhere Hosted from home, you can add the IP address of your home in the filter. In the case that your IP address is dynamic (using dial-up), you can simply input your network interface card's MAC address into the filter. Also you can use MAC addresses exclusively to make sure only the specified physical machine can access your SCM Anywhere Hosted account. Copyright 2009 Dynamsoft. All Rights Reserved. Page 6 of 8

Note: IP Filter does not apply to the SCM Anywhere Hosted web portal on the Dynamsoft website. SSL Certificate for Web Site Access All your account information on our website is encrypted by SSL Certificate. Secure Backup Encryption SCM Anywhere Hosted offers onsite and offsite backup. All backups are password encrypted. Plus, the backup folder is also encrypted using Microsoft Windows 2003 Public Key Infrastructure (PKI) file system. The Primus Data Center A secure data center is the cornerstone of the SCM Anywhere Hosted SaaS service. Having a secure and resilient data centre ensures high availability and business continuity for our customers, and for us. We offer a secure, state-of-art data center by partdata center gives our customers the most reliable access to mission-critical data and nering with Primus. Though hosting with Primus is more costly, we're convinced Primus uncompromised security. The following are Primus Data Center security features. To learn more about additional features, such as data center redundancy, please visit http://www.scmsoftwareconfigurationmanagement.com/products/scmhosted_datacent er.aspx Copyright 2009 Dynamsoft. All Rights Reserved. Page 7 of 8

24x7 monitoring and technical support Biometric access control systems and video camera surveillance Gas fire suppression system and pre-action sprinkler systems Massive power distribution systems with full redundant battery UPS backup and diesel generator protection Redundant fiber-based multi-homed internet backbone Diesel generator power backup system Summary SCM Anywhere Hosted offers unrivalled security. It features SSL encryption, password policy, independent and isolated database, database encryption, cache file encryption, login log, IP & MAC filter rule, SSL certificate for web site access and backup encryption. A world-class Primus data center is used to ensure the physical security of the servers. For more information about Dynamsoft SCM Anywhere Hosted, please visit: http://www.scmsoftwareconfigurationmanagement.com/products/software-configuration -Management-SCM-Hosting.aspx Disclaimer: The purpose of the document is only to describe the technical features of SCM Anywhere Hosted. The features described in the document cannot be considered as a technical guarantee or offering from Dynamsoft. Some features may not be available in some hosting plans. Dynamsoft may change, add or remove the features at Dynamsoft's sole discretion. Copyright 2009 Dynamsoft. All Rights Reserved. Page 8 of 8