Information Security and Privacy Advisory Board Why Governments Invest in Salesforce.com



Similar documents
Safe Harbor. Henning B. Treichl. Senior Sales Engineer salesforce.com

The Fastest Path to the Cloud Building Your SaaS Company on Force.com

5 Reasons CIOs are Adopting Cloud Computing in 2010 Application Development that s 5 Times Faster at 1/2 the Cost

5 Reasons CIOs are Adopting Cloud Computing in 2009 Application Development that s 5 Times Faster at 1/2 the Cost

Overview. FedRAMP CONOPS

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)

Lots of Updates! Where do we start?

Welcome to the Force.com Developer Day

FedRAMP Government Discussion Matt Goodrich, FedRAMP Director

Welcome to the Real-Time Cloud

Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity

Easy, practical and affordable

NeuStar Ultra Services Physical Security Overview

POSTAL REGULATORY COMMISSION

Course Details V1.0. Selinis Technologies Pvt Ltd. 2012, All Rights Reserved

NIST A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Public Cloud Offerings and Private Cloud Options. Week 2 Lecture 4. M. Ali Babar

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

ProjectManager.com Security White Paper

Secure Cloud Computing through IT Auditing

System Security Certification and Accreditation (C&A) Framework

elivering CRM Success in the Cloud

Security Language for IT Acquisition Efforts CIO-IT Security-09-48

U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS. Final Audit Report

ACSAC NOAA/NESDIS Case Study. December, 2006

glovia OM Cloud - based Enterprise Resource Planning A Presentation for Prospective Clients February 2014

Mission Assurance and Security Services

Fiscal Year 2007 Federal Information Security Management Act Report

Audit of the Board s Information Security Program

Compliance Risk Management IT Governance Assurance

Federal Cloud Computing Initiative Overview

Security from a customer s perspective. Halogen s approach to security

Okta Identity Management for Portals Built on Salesforce.com. An Architecture Review. Okta Inc. 301 Brannan Street San Francisco, CA 94107

Requirements For Computer Security

A Study of Infrastructure Clouds

FedRAMP Standard Contract Language

CloudAmp Analytics Dashboards. Documentation

Insight Zone. Data Security Executive Interview

Advancement in Salesforce using CPQ (Configure Price Quote) Technological Catalyst

Project Type Guide. Project Planning and Management (PPM) V2.0. Custom Development Version 1.1 January PPM Project Type Custom Development

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

Cloud Collaboration: Strategies and Technologies. Bud Porter-Roth Porter-Roth Associates

Cyber Security Assessment & Management (CSAM) CSAM C&A web

Unlocking the Commercial Potential in your Dynamics CRM Applications

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

Does Cloud Computing Still Matter? A Mainframer s Update. The trouble with cloud.

Cloud Security for Federal Agencies

Salesforce Turbo Implementation

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

Project #1: Supporting Development Needs Across Multiple Salesforce Projects for a US Company

Increase HR Productivity with Salesforce.com platforms

The Business Benefits of Integrated PSA. Rafat Hilal and Alexander D Aquila

OFFICE OF INSPECTOR GENERAL

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management

Essential Characteristics of Cloud Computing: On-Demand Self-Service Rapid Elasticity Location Independence Resource Pooling Measured Service

ISI INTERNATIONAL STRATEGY & INVESTMENT

CauseView Increases Oxfam Donations with Cloud-Based Workflow Process for Expiring Credit Cards

Get Confidence in Mission Security with IV&V Information Assurance

Secrets of the Force.com Platform

Embracing the Cloud 5 Key Benefits From Salesforce.com. Mark Easley Sr. Director Sales Engineering Service Cloud measley@salesforce.

Tamanna Roy Rayat & Bahra Institute of Engineering & Technology, Punjab, India talk2tamanna@gmail.com

White Paper. Understanding NIST FISMA Requirements

KICK-START CLOUD VENTURES

Cloud Computing; What is it, How long has it been here, and Where is it going?

U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment

Appendix 10 IT Security Implementation Guide. For. Information Management and Communication Support (IMCS)

Office of Inspector General

Salesforce Integration User Guide Version 1.1

ExpertusONE v4.4 Salesforce.com Connector

Central Application Tracking System (CATS) Privacy Impact Assessment (PIA) Version 1.0. April 28, 2013

Platform Leadership in Software as a Service: How Platforms Facilitate Innovation

Department of the Interior Privacy Impact Assessment

Qvidian Playbooks & Salesforce Setup Guide. Fall Release 2013

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Integrated Governance, Risk and Compliance (igrc) Approach

Final Audit Report. Report No. 4A-CI-OO

Salesforce Admin Course Content: Chapter 1 CRM Introduction Introduction to CRM? Why CRM?

Ernesto Ongaro BI Consultant February 19, The 5 Levels of Embedded BI

Grow Sales Faster with Sales Cloud. Richard Doyle Senior Alliances Manger

Cloud Computing: Government Adoption Case Studies Information Security and Privacy Advisory Board (ISPAB)

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Transitioning Your Clients to the Cloud from Initial Discussion to Implementation to Client Usage

International Trade Administration

DocuSign for Salesforce Administrator Guide v6.1.1 Rev A Published: July 16, 2015

Sophos Mobile Control

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

John Essner, CISO Office of Information Technology State of New Jersey

Current Products. B and M Communications LLC. The following is a list of our current offerings and services:

Learn Salesforce Basics

Healthy Harbor Project - Work From Home

Alert Technology Group 46 Empey St, Brantford ON Office Toll Free

2015 Analyst and Advisor Summit. Application Services Tom Kenyon, Vice President, Application Services Brendan Crowe, Director, Application Services

Cloud Collaboration: Strategies and Technologies. Bud Porter-Roth Porter-Roth Associates

Web-to-Case Overview. Best Practices. Tom Muskatevc Success Account Manager

Esri Managed Cloud Services and FedRAMP

Building the Global Cloud

Information Security for Managers

HARPER, RAINS, KNIGHT & COMPANY, P.A. CERTIFIED PUBLIC ACCOUNTANTS & CONSULTANTS RIDGELAND, MISSISSIPPI

I want customers to selfservice. place orders online

Transcription:

Information Security and Privacy Advisory Board Why Governments Invest in Salesforce.com John DeVoe Regional Manager, Public Sector December 5, 2008

The Cloud Computing Model Multi-tenant Pay-as-you-go Elastic Software as a Service Platform as a Service

The Global, Enterprise Standard for Cloud Computing Enterprise Std Enterprise Std ~65,000 ~30,000 ~25,800 ~21,000 ~20,000 ~ 12,000 ~9,000 ~6,300 ~5,500 ~5,000 ~4,000 ~4,000 ~3,500 ~3,200 ~3,000 ~2,900 Number of Subscribers

Over 4,000 Government, Education and Nonprofit Customers Economic Development Environment & Natural Resources Transportation General Government Public Safety & Justice Science & Tech Health & Human Services Education

U.S. OMB Encourages Software as a Service

The Secret? A Multi-Tenant Kernel Your Success. Your Data Your Metadata Your UI Your Code Your Apps Your Workflows Your Integrations Our Cloud. Automated Upgrades Continuous Innovation Better Usability Over Time Faster Over Time More Secure Over Time

Salesforce.com Trusted Security Security that has Continually Improved with Feedback from 51,000+ Customers

Security: Facilities Maximum Facilities Security 24 x 365 on-site security All doors, including cages, are secured with biometric hand geometry readers. Five levels of biometric scanning including man-traps required to reach Salesforce cages Fully anonymous exteriors Digital camera (CCTV) coverage of entire facility Entire perimeter bounded by concrete bollards/planters A silent alarm and automatic notification of appropriate law enforcement officials protect all exterior entrances. CCTV integrated with access control and alarm system. Motion-detection for lighting and CCTV coverage.

Multi-Tenant Application Security Login Authenticate Apply Data Security Rules View Filtered Content Password security policies Rich Sharing Rules User Profiles SSO/2-factor solutions

Business Information in the Cloud Manage Cases Projects Service Knowledge Analytics AppExchange Share Partners Content Ideas Salesforce to Salesforce Google Apps Build Infrastructure Database Application Operations Business Multi-Tenant Kernel

Galorath Reports Force.com App Development at a Fraction of the Cost of Java Build Any App: HR, Billing, Patient Tracking 5x the developer productivity of Java 10-25% more rapid requirements analysis & design 5-20% reduction in testing effort Overall project costs 30-40% less than Java effort can be expected to be reduced from 30% to 40% over developing the same project in JAVA for projects that are aligned to the Customer Relationship Management model, which serves as the basis for the Force.com Platform.

Salesforce.com Application Exchange 800+ Apps 65,000 Apps Installed 285,000+ Test Drives 450+ Total ISVs 30+ Japanese ISVs Pre-integrated Applications View, Try, Install Build on Force.com CRM & Non-CRM Apps

Government-to-Government AppExchange

Are you Ready? Typical Federal C&A Deliverables FIPS 199 Security Categorization Worksheet - NIST SP 800-37 Categorizes risk sensitivity to low, medium, or high SP 800-53 - Recommended Security Controls for Federal Information Systems Security Requirements Traceability Matrix (SRTM) NIST SP 800-37 FISMA Self Assessment NIST SP 800-26 & 800-37 System Security Plan NIST SP 800-18 Risk Assessment NIST SP-30 Security Test and Evaluation Plan and Report NIST SP 800-37 Raw Data from ST&E Security Assessment Report (SAR) NIST SP 800-37 Certification Report Plan of Action & Milestones (POAM) NIST SP 800-37 & 30 Contingency Plan (DR) NIST SP 800-42 Privacy Threshold Analysis (PTA)/Privacy Impact Analysis (PIA) OMB M-03-22 dated Sept 2003 Certification Statement with Request for Accreditation NIST SP 800-37 Accreditation Statement NIST SP 800-37

Recognition for Innovation in the Cloud 2008 Leader & Visionary 2007 Forrester Groundswell Award Innovations Awards Computing Systems Winner 2008 PC Magazine Editor s Choice: UE Technology of The Year Platform Visionary Top Ten Disruptors of 2006 2007 Product of the Year Top 100 Innovative Companies Application Leader & Visionary April, 2008 Platform Visionary Market Leader Enterprise CRM Best CRM & On-Demand Platform Top 10 Entrepreneurs & Cool Company