NetSuite Data Center Fact Sheet



Similar documents
Secure, Scalable and Reliable Cloud Analytics from FusionOps

Understanding Sage CRM Cloud

Itron Cloud Services Offering

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

Security & Infra-Structure Overview

Security Policy JUNE 1, SalesNOW. Security Policy v v

Cloud Contact Center. Security White Paper

Cloud Contact Center. Security White Paper

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

Keyfort Cloud Services (KCS)

ProjectManager.com Security White Paper

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Autodesk PLM 360 Security Whitepaper

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Famly ApS: Overview of Security Processes

FormFire Application and IT Security. White Paper

Security and Data Center Overview

Security Whitepaper: ivvy Products

Level I - Public. Technical Portfolio. Revised: July 2015

PRIVATE, TRUSTWORTHY AND SCALEABLE Providing Secure Remote Service and Support. white paper

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

GiftWrap 4.0 Security FAQ

Security Controls for the Autodesk 360 Managed Services

Supplier Security Assessment Questionnaire

StratusLIVE for Fundraisers Cloud Operations

SuiteCloud Platform. The Ultimate Business Cloud Platform. SuiteCloud Developer Tools Features. BENEFITS FOR ISVs. Data Sheet BENEFITS FOR CUSTOMERS

IBM Connections Cloud Security

SAS 70 Type II Audits

Tenzing Security Services and Best Practices

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

White paper. SAS Solutions OnDemand Hosting Overview

Powering the Cloud Desktop: OS33 Data Centers

BEST PRACTICES FOR COMMERCIAL COMPLIANCE

White Paper How Noah Mobile uses Microsoft Azure Core Services

SaaS Security for the Confirmit CustomerSat Software

Enterprise level security, the Huddle way.

Birst Security and Reliability

Information Technology Security Procedures

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Cloud Management. Overview. Cloud Managed Networks

<cloud> Secure Hosting Services

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

Security & Infrastructure White Paper

vcloud SERVICE Virtual Tech in partnership with Equinix - vcloud Service

Our Cloud Offers You a Brighter Future

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Security Information & Policies

Supplier Information Security Addendum for GE Restricted Data

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Security Considerations

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

IBX Business Network Platform Information Security Controls Document Classification [Public]

Retention & Destruction

Privacy + Security + Integrity

SaaS architecture security

Security from a customer s perspective. Halogen s approach to security

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

twilio cloud communications SECURITY ARCHITECTURE

HIPAA Privacy & Security White Paper

PRODUCT SHEET: CA Arcot Cloud Services Data Centers CA Arcot cloud services data centers. True multi-tenancy and scalability

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

SECURITY IN A HOSTED EXCHANGE ENVIRONMENT

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Hosted Testing and Grading

System Security Plan University of Texas Health Science Center School of Public Health

NeuStar Ultra Services Physical Security Overview

BroadData Unified Meeting Security Whitepaper v4.2

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk

CONTENTS. Security Policy

Addressing Cloud Computing Security Considerations

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Security and Data Protection for Online Document Management Software

KeyLock Solutions Security and Privacy Protection Practices

White Paper The simpro Cloud

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

QuickBooks Online: Security & Infrastructure

PCI Requirements Coverage Summary Table

CLOUD FRAMEWORK & SECURITY OVERVIEW

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

The Anti-Corruption Compliance Platform

Best Practices For Department Server and Enterprise System Checklist

How To Use Egnyte

Brainloop Cloud Security

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Injazat s Managed Services Portfolio

Security April Solving the data security challenge with our enhanced private and hybrid cloud services

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Microsoft s cybersecurity commitment

Delivering peace of mind in digital optimization: Clicktale's security standards and practices

Cloud Management. Overview. Cloud Managed Networks

BMC s Security Strategy for ITSM in the SaaS Environment

Supplier IT Security Guide

SNAP WEBHOST SECURITY POLICY

The evolution of data connectivity

Transcription:

NetSuite Data Center Fact Sheet Enterprise-Class Data Management, Security, Performance and Availability NetSuite is the world s largest cloud ERP vendor, supporting over 20,000 organizations, processing over 70 billion requests per year, investing over $38 million in R&D annually, and having greater than 4 million unique logins per quarter. NetSuite also has a track record since 1998 of maintaining the security of our customers records. NetSuite Data Center Architecture NetSuite operates two geographically separated data centers in California and Massachusetts. The data centers operate in active/active mode. Each data center provides data mirroring, disaster recovery and failover capabilities for the other should one data center become non-operational. Both data center facilities are operated by a leading collocation provider, which provides earthquake and fire protection, along with heating, cooling and backup power. The NetSuite application is multi-tenant, and all servers, storage and hard drives are built on several layers of redundancy. Facts about NetSuite s Data Center Infrastructure Data Management Redundancy: Many layers in the NetSuite system implement multiple levels of redundancy. This design allows one or more elements to fail without any interruption in service by having multiple, redundant systems online to automatically assume processing on behalf of the failed component.

Disaster Recovery: Data in both the California data center and the Massachussetts data center is replicated and synchronized to the other data center by way of a proprietary replication mechanism built in house. In the event that the primary data center fails, all operations fail over to the secondary data center. This failover procedure is tested and proven on the live site twice annually. The failover procedure is automated and can be triggered in push button fashion. NetSuite has operations engineers geographically distributed from each other, as well as the data centers in order to be able to execute a failover in any disaster scenario. Scalability: As of January 2014, trailing 12 months, NetSuite supports over 20,000 organizations with over 6 billion customer requests per month. NetSuite has designed its systems to accommodate surges and spikes in usage, and to scale upward smoothly to address increased volume and transactions. Application Security Encryption: Transmission of users unique ID and passwords, as well as all data in the resultant connection, are encrypted with industry standard SSL. Application-Only Access: The system is divided into layers that separate data from the NetSuite application itself. Users of the application can only access the application features, and not the underlying database or other infrastructure components. Role-Level Access and Idle Disconnect: Customers can assign each end user a specific role with specific permissions to only see and use those features related to his or her own job. There is a complete audit trail whereby changes to each transaction are tracked by the user login details and a timestamp for each change is provided. The system also detects idle connections and automatically locks the browser screen to prevent unauthorized access from an unattended computer screen. IP Address Restrictions: Restrictions on accessing a NetSuite account from specific computers and/or locations can be enforced. This is very useful for customers who are concerned not only about who is able to access their NetSuite account, but from where they access it as well. This feature significantly reduces the risk of unauthorized third parties accessing a user s account. Robust Password Policies: NetSuite offers fine-grained password configuration options from the length of the user s passwords, to the

expiration of a user s password at any timeframe they desire. Customers can set up strict password policies to ensure that new passwords vary from prior passwords, and that passwords are complex enough to include a combination of numbers, letters and special characters. Accounts are also locked out after several unsuccessful attempts. For customers who desire a higher level of access control, NetSuite offers multifactor authentication using a simple physical token. In addition to entering their own passwords, users must possess physical tokens that generate random one-time passwords. These cryptographically robust passwords prevent key loggers, shoulder surfers, phishers and password crackers from accessing a user s account. Operational Security Continuous Monitoring: NetSuite employs numerous intrusion detection systems (IDS) to identify malicious traffic attempting to access its networks. Unauthorized attempts to access the data center are blocked, and any unauthorized connection attempts are logged and investigated. Enterprise-grade anti-virus software is also in place to guard against trojans, worms, viruses and other malware from affecting the corporate software and applications. Separation of Duties: In addition to mandatory employee background checks at all levels of NetSuite operations, job responsibilities are separated. The principle of least authority (POLA) is followed and employees are given only those privileges that are necessary to do their duties. Physical Access: Both data centers operators maintain stringent physical security policies and controls to allow unescorted access to pre-authorized NetSuite Operations personnel: The first layer of security includes photo ID proximity access cards and a biometric identification system. This multifactor authentication system provides additional assurance against lost badge risks or other attempts at impersonation. Proximity card reader devices are located at major points of entry and are used to secure critical areas within the data centers. Single-person portals and T-DAR man traps guarantee that only one person is authenticated at one time to prevent tailgating. Reliable detection and prevention of tailgating and piggybacking through secure doors significantly increases the effectiveness of the access control system.

In addition, all perimeter doors are alarmed and monitored and all exterior perimeter walls, doors, windows and the main interior entry are constructed of materials that afford Underwriters Laboratory (UL) rated ballistic protection. Vegetation and other objects around the data center are landscaped in a manner such that an intruder would not be concealed. Guarded Premises: On-premise security guards monitor all alarms, personnel activities, access points and shipping and receiving, and ensure that entry and exit procedures are correctly followed on a 24x7 basis. Guards are provided with ongoing awareness training and skillsbuilding. Numerous CCTV video surveillance cameras with pan-tilt-zoom capabilities are located at points of entry to the collocation and other secured areas within the perimeter. Video is monitored and is stored for review for non-repudiation. Dedicated Security Team: NetSuite employs a 9 person global security team dedicated to enforcing security policies, monitoring alerts and investigating any anomalous behavior within the system. This team is active 24x7 from multiple worldwide locations. All access to production is reviewed and granted by the security team. Data Center Performance Audits: NetSuite Operations management implements such auditing controls as appropriate for SSAE 16 Type II, ISAE 3402 Type II and PCI compliance. NetSuite s comprehensive risk management process has been modelled after the National Institute of Standards and Technology s (NIST) special publication 800-30 and the ISO 27000 series of standards. Periodic audits are carried out to help ensure that personnel performance, procedural compliance, equipment serviceability, updated authorization records and key inventory rounds are above par. Security Certifications: NetSuite has passed a SSAE 16 Type II and ISAE 3402 Type II audits, is certified for PCI-DSS, and is EU-US Safe Harbor certified. NetSuite has defined its Information Security Management System in accordance with NIST standards, including 800-53 and ISO27000 series standards. NetSuite s SSAE 16 Type II and ISAE 3402 Type II audit is prepared by and audited by a Big Four audit firm. SSAE 16 Type II and ISAE 3402 Type II reports show that we have been through an in-depth audit of our control environment, including controls over data and network security, backup and restoration procedures, system availability and application development. The requirements of Section 404 of the Sarbanes-Oxley Act

make a SAS 70 Type II audit report essential to the process of reporting on the effectiveness of internal control over a company s financial reporting. In complying with PCI-DSS requirements, NetSuite offers optional 3D Secure credit card authentication also known as Verified by Visa and MasterCard SecureCode. 3D Secure adds a higher level of credit card fraud protection. It requests shoppers to create authentication passwords for their credit cards, or requires them to enter their password if they already have one assigned. The EU-US Safe Harbor is key for the transfer of personal data from European Union (EU) countries to the United States. EU organizations know that organizations that are self-certifying to the U.S.-EU Safe Harbor Framework provide adequate privacy protection, as defined in the European Commission s Directive on Data Protection. NetSuite adheres to the Safe Harbor Privacy Principles published by US Department of Commerce with respect to personal data about individuals in the EEA received from its subsidiaries, customers and other business partners. NetSuite s participation in the U.S.-EU Safe Harbor program can be confirmed by viewing the public list of Safe Harbor organizations posted on http://safeharbor.export.gov/list.aspx. NetSuite has achieved the International Organisation for Standardization (ISO) 27001 certification, the leading international standard for measuring information security management systems (ISMS). The standard requires a systematic examination of security risks, threats, vulnerabilities and their impact. To achieve certification, an organization must design and implement a comprehensive suite of information security controls and adopt an overarching management process to ensure that information security controls continue to meet the organization s needs on an ongoing basis. NetSuite s compliance with this important industry certification demonstrates the company s continued commitment to maintaining and improving its information security management and data custodianship programs.

Performance Scalable Application Architecture: NetSuite s application runs on a three tiered architecture. All three tiers web, application, and database are horizontally scalable and support multi-data center deployment. NetSuite currently operates on over 1000 hosts in production. Performance Team: NetSuite invests heavily in performance at every layer. This includes a dedicated performance team of developers and DBAs whose sole purpose is to proactively verify application performance benchmarks and tune the application for maximum performance. High Performance Databases: NetSuite runs on high performance database server hardware with multiple cores and maximum RAM configuration. NetSuite production database servers run exclusively on flash SSD storage ensuring the fastest possible database IO performance available in the industry. Availability Service Level Commitment: NetSuite s SLC guarantees a 99.5% uptime (outside the scheduled service windows) for the NetSuite production applications for all our customers. A credit is available if NetSuite does not deliver its application services with 99.5% uptime. We have consistently averaged an actual uptime of 99.98% and provide customers a publicly available webpage to display system status at all times at http://status.netsuite.com. World Class Hosting Operations Team: NetSuite has a global team of dedicated hosting operations personnel with decades of cumulative experience running large cloud and SaaS business applications demanding high performance and high availability. This team proactively monitors the health of the entire system with industry leading alert and trend based tools designed to identify and resolve events before they impact the live site. This team provides 24x7 coverage to respond to any incident with automated recovery procedures. Redundant Internet Connections: The network was built to meet or exceed commercial telecommunications standards worldwide for availability, integrity and confidentiality. Both NetSuite data centers have three 1 Gbps diverse-path pipes, designed so that any two connections

can simultaneously fail without impacting user experience. This redundancy ensures reliable connectivity and maximum uptime with no single-point data transmission bottlenecks to or from the data center. Additionally each data center has 2 dedicated 10Gbps circuits for data replication. Backup Power Systems: NetSuite has designed a solution for clean, continuous power. Uninterruptible power systems (UPSs) are provisioned in a redundant configuration support environmental controls in the collocation spaces. Each UPS battery system is designed to carry full load for 15 minutes without a generator. Emergency generators typically provide backup power in less than 10 seconds and are sized to support the entire facility at maximum load. In addition to UPS systems, NetSuite makes use of power management modules and power distribution units on data center floors for a physically integrated and electrically redundant system for source selection, isolation, distribution, monitoring and control of power to computer equipment loads. HVAC Systems: Air conditioning in both data centers is configured to allow for proper heat dissipation, permitting the sites to operate within an acceptable temperature range. To maintain the flow of air conditioning, an N+1 redundant system of HVAC units is employed within each location. The HVAC units are powered by normal and emergency electrical systems to maintain their availability. Additionally, cold water tanks have been installed to keep air conditioning units functioning when transition from direct power to generator power during emergencies is required. Fire Suppression: The latest fire suppression methods have been employed at NetSuite s data centers. The systems utilize state-of-the-art sniffer systems, augmented by heat detection and dry-pipe sprinkler systems. Seismic Engineering: NetSuite-operated data centers provide seismic isolation equipment to cushion facilities against movement, in addition to installing earthquake bracing on all equipment racks. Racks are anchored to the concrete slab below the site s raised floor.