Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Similar documents
CLOUD FRAMEWORK & SECURITY OVERVIEW

ProjectManager.com Security White Paper

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Security Information & Policies

Blue Jeans Network Security Features

Security & Infra-Structure Overview

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

BKDconnect Security Overview

Projectplace: A Secure Project Collaboration Solution

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Security Controls for the Autodesk 360 Managed Services

IBX Business Network Platform Information Security Controls Document Classification [Public]

Autodesk PLM 360 Security Whitepaper

Birst Security and Reliability

Security Policy JUNE 1, SalesNOW. Security Policy v v

Client Security Risk Assessment Questionnaire

Enterprise level security, the Huddle way.

White Paper: Librestream Security Overview

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

Secure, Scalable and Reliable Cloud Analytics from FusionOps

ShareFile Security Overview

FormFire Application and IT Security. White Paper

GoodData Corporation Security White Paper

Clarizen Security White Paper

Advanced Service Desk Security

OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105

Cloud Management. Overview. Cloud Managed Networks

eztechdirect Backup Service Features

FileCloud Security FAQ

Data Storage That Looks at Business the Way You Do. Up. cloud

HIPAA Security Matrix

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Secure Hosting Solutions For SAGE Energy Management

White Paper How Noah Mobile uses Microsoft Azure Core Services

Security and Data Protection for Online Document Management Software

QuickBooks Online: Security & Infrastructure

Secure and control how your business shares files using Hightail

For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today!

KeyLock Solutions Security and Privacy Protection Practices

Retention & Destruction

Salesforce & HIPAA Compliance

Egnyte Security Architecture

Brochure Achieving security with cloud data protection. Autonomy LiveVault

Five keys to a more secure data environment

Citrix GoToAssist Service Desk Security

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Qualtrics. Security White Paper Lite. Defining our security processes. Revised February 23,

How To Secure Your Data Center From Hackers

IBM Connections Cloud Security

Famly ApS: Overview of Security Processes

HIPAA Privacy & Security White Paper

Addressing Cloud Computing Security Considerations

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

Passing PCI Compliance How to Address the Application Security Mandates

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

join.me architecture whitepaper

THE BLUENOSE SECURITY FRAMEWORK

Legalesign Service Definition Electronic signature and contract management service

The Education Fellowship Finance Centralisation IT Security Strategy

Network Security Administrator

MIGRATIONWIZ SECURITY OVERVIEW

Troux Hosting Options

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Supplier Information Security Addendum for GE Restricted Data

DriveHQ Security Overview

Security from a customer s perspective. Halogen s approach to security

EmpLive Technical Overview

Keyfort Cloud Services (KCS)

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Paxata Security Overview

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Vendor Risk Assessment Questionnaire

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Cloud Contact Center. Security White Paper

Understanding Sage CRM Cloud

How To Protect Your Data From Being Hacked

Sitefinity Security and Best Practices

REMOTE BACKUP-WHY SO VITAL?

Transcription:

Security overview

Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the cloud. Security of your project-related information, files, and interactions within our system is our top priority. Which is why we are constantly focusing our efforts on maintaining the reliability of our product, infrastructure, technologies, and procedures. As we provide you with an easy-to-use, flexible, and scalable project management application, it is vital for us to ensure a trustworthy and reliable service, with comprehensive security at all levels. Below, you can read an overview of our security model across five elements physical, network, system, application, and people. Physical security World-class datacenters Wrike hosts its servers at two trusted datacenters in separate geographical locations. Both datacenters located in San Jose, California and Reston, Virginia are compliant with SSAE 16 Type 2 auditing standard. The facilities feature 24/7 manned security, physical and biometric access controls, extensive seismic bracing, the latest in early-detection smoke and fire alarms, and digital surveillance systems. All our network components are constantly monitored by internal Wrike staff and by the colocation providers. Access to each system, network device, and application is limited to authorized personnel, and logged in detail with the event logs reviewed on regular basis. Uptime over 99% In over 6 years of continuous service, Wrike s uptime has consistently exceeded 99% to make sure you can access your tasks and projects when you need them. We also provide an innovative approach to the availability of your workspace: if Wrike is temporary unavailable due to technical reasons or scheduled maintenance, you can log in to the stand-alone, read-only replica of Wrike in order to access all your data. Find it at: https:// read.wrike.com.

Continuous data backup We are running a real-time database replication, so your data is backed up nearly every second to servers physically separated from the Wrike application servers, aiming to ensure fault tolerance. This means that your work will stay safe, even in the case of an unfortunate disaster. Network and System Security Tenable Network Security Infrastructure Wrike uses industry-standard network protection procedures, including firewall and router technologies, network intrusion detection/prevention systems, and alert mechanisms that allow us to detect and immediately prevent malicious traffic and network attacks. Regular internal network security audits and scanning give us overview for quick identification of outdated systems and services. Regular Updates and Patch Management According to in-house patch management policy: operating systems, software, frameworks, and libraries used in Wrike infrastructure are updated to the latest versions on a regular basis. Whenever a vulnerability in a product used by Wrike or Zero-Day vulnerability is publicly reported, immediate actions are taken in order to mitigate any potential risks for our customers we apply hot fixes and patches promptly upon availability. System Integrity Protection Wrike uses built-in operating systems and custom integrity check services in order to ensure the integrity of all critical files and system objects. A quick response to any potential unauthorized changes to the system helps assure that our customers are using authentic Wrike application services.

Application security Application Security Process A robust Application Security process is fully integrated into Wrike's Software Development Life Cycle (SDLC), that includes: Defined in-house security requirements and policies, and well-known security best practices applied in every stage of the lifecycle. Security review of architectures, design of features, and solutions. Iterative manual and automated (using static code analyzers) source code review for security weaknesses, vulnerabilities, and code quality, and providing of sufficient advice and guidance to the development team. Regular manual assessment and dynamic scanning of pre-production environment. Security trainings conducted for IT teams according to their respective job roles. Authentication and Access Control Each user in Wrike has an unique account with verified email address, and protected with a password. Passwords are checked to be compliant with password policy and stored securely using a strong hashing algorithm with unique salt for every password. Wrike also supports multiple methods of authentication, including Google Open ID and SAML, so that you just need to be signed in on those platforms in order to gain access to your Wrike account. The administrator in your Wrike account manages and controls individual user rights by granting specific types of user licenses. You can find all the details about various user roles in Wrike in our Help Section. Data Privacy and Sharing Wrike has self-certified compliance with U.S. E.U. and U.S.-Switzerland Safe Harbor Frameworks and is registered with the U.S. Department of Commerce's Safe Harbor Program. Your data, including tasks and folders, can only be accessed by other users within your Wrike account if those items were specifically shared with them, or if the items were placed in shared folders. Otherwise, your projects and tasks are not accessible by other Wrike users.

Wrike's Support team is always happy to help you with any Wrike-related issue. When troubleshooting or verifying the issue requires Support access to your account and data, that access can only be granted by you. By giving your exclusive security token to our Support team, we'll be able to delve deeper into solving your problem. This systemic approach ensures additional confidentiality for your data stored in Wrike. Data Encryption in Transit and At Rest Wrike uses 256-bit Secure Socket Layer (SSL) with a preferred AES algorithm in CBC mode and 2048-bit server key length. When you access Wrike via a web browser, mobile application, email add-in, or browser extension, SSL technology protects your information using both server authentication and data encryption. This is equivalent to network security methods used in banking and leading e-commerce sites. All users of Wrike get the same encryption reliability, regardless of their subscription type, so that your passwords, cookies, and sensitive information is reliably protected from all eavesdropping. User files uploaded to Wrike servers are automatically encrypted using AES 256-bit encryption. If someone were to gain physical access to the file storage, this data would be encrypted and impossible to read directly. The encryption key is stored in a secure key vault, which is a separate database decoupled from the file storage layer. Account and Content Recovery You can safely recover accidentally deleted items from Wrike s recycle bin. If a user is deleted by mistake, there is possibility to recover the deletion (including all their tasks) if you contact us no later than a month after the deletion took place.

Organizational Security Processes Designing and running datacenter infrastructure requires not just technology, but a disciplined approach to processes. This includes policies about escalation, management, knowledge sharing, risk, as well as the day-to-day operations. Wrike s security team has years of experience in designing and operating datacenters, and we continually improve our processes over time. Wrike has developed best-in-class practices for managing security and data protection risk. All of these elements are essential pieces of Wrike s security culture. Select Employees Only our highest clearance-level employees have access to our datacenter and the data stored in our databases: there are strict security policies for employee access, all security events are logged and monitored, and our authentication methods and data are stricty regulated. We limit access to customer data to employees with a job-related need, and require all those staff members to sign and agree to be bound by a confidentiality agreement. As-Needed Basis Accessing datacenter information, as well as customer data, is only done on an as-needed basis, and only when approved by the customer (i.e. as part of a support incident), or by senior security management for the purposes of providing support, maintenance, and improving service quality. Enterprise Grade Security If you have any security concerns, please contact our Sales team: 877-779-7453, and they will provide you with more detailed security overview. Would you like to learn more? Have a security concern? If you have any questions about the security of Wrike, you can contact our IT Security Team anytime at security@team.wrike.com.