Birst Security and Reliability



Similar documents
Secure, Scalable and Reliable Cloud Analytics from FusionOps

StratusLIVE for Fundraisers Cloud Operations

Enterprise level security, the Huddle way.

GiftWrap 4.0 Security FAQ

Security & Infra-Structure Overview

Troux Hosting Options

Security Policy JUNE 1, SalesNOW. Security Policy v v

SNAP WEBHOST SECURITY POLICY

IBX Business Network Platform Information Security Controls Document Classification [Public]

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Understanding Sage CRM Cloud

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Altus UC Security Overview

GoodData Corporation Security White Paper

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Supplier Information Security Addendum for GE Restricted Data

KeyLock Solutions Security and Privacy Protection Practices

Tenzing Security Services and Best Practices

White paper. SAS Solutions OnDemand Hosting Overview

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

Level I - Public. Technical Portfolio. Revised: July 2015

White Paper: Librestream Security Overview

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Security Controls for the Autodesk 360 Managed Services

Security & Infrastructure White Paper

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Retention & Destruction

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

Autodesk PLM 360 Security Whitepaper

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

DriveHQ Security Overview

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

HEC Security & Compliance

Small Business IT Risk Assessment

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Security aspects of e-tailing. Chapter 7

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.

SaaS Security for the Confirmit CustomerSat Software

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

FormFire Application and IT Security. White Paper

BMC s Security Strategy for ITSM in the SaaS Environment

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

ProjectManager.com Security White Paper

Privacy + Security + Integrity

ClickTale Security Standards and Practices: Delivering Peace of Mind in Digital Optimization

INCIDENT RESPONSE CHECKLIST

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

Supplier Security Assessment Questionnaire

Fax

Five keys to a more secure data environment

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Addressing Cloud Computing Security Considerations

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

System Security Plan University of Texas Health Science Center School of Public Health

Delivering peace of mind in digital optimization: Clicktale's security standards and practices

Securing the Service Desk in the Cloud

CLOUD FRAMEWORK & SECURITY OVERVIEW

CloudDesk - Security in the Cloud INFORMATION

Security Information & Policies

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

Secure and control how your business shares files using Hightail

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Clarizen Security White Paper

SITECATALYST SECURITY

Powering the Cloud Desktop: OS33 Data Centers

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

HIPAA Privacy & Security White Paper

Vendor Audit Questionnaire

Injazat s Managed Services Portfolio

Client Security Risk Assessment Questionnaire

Security Whitepaper: ivvy Products

White Paper How Noah Mobile uses Microsoft Azure Core Services

The Information Security Problem

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

CONTENTS. Security Policy

Famly ApS: Overview of Security Processes

Secure Hosting Solutions For SAGE Energy Management

QuickBooks Online: Security & Infrastructure

HIPAA Security Matrix

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan

Projectplace: A Secure Project Collaboration Solution

Cloud Security Trust Cisco to Protect Your Data

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Things You Need to Know About Cloud Backup

Document ID. Cyber security for substation automation products and systems

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud

Transcription:

Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information

2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their information, Birst maintains high standards of data security. Birst relies upon a stateof-the-art secure data center, enforces strict internal product controls, and regularly audits its policies and procedures using third party auditors. The key tenets of Birst s security initiatives are: Security designed from the ground up in the application, network, hardware, and operational procedures Birst operations are SOCI / SOCII Type II certified and follow ISO 27001 policies A modern data center that is SOCI / SOCII Type II certified and follows ISO 27001 policies Adherence to security best practices for code development, testing, and operations Birst has passed the rigorous security audits of leading financial services companies and corporations in the Fortune 500. Regular external review of the policies and procedures for Birst security and operations Regular validation and testing of system security by third parties Birst has passed the rigorous security audits of leading financial services companies and corporations in the Fortune 500. The following sections of this white paper cover the key areas of Birst security in detail, including: Physical Security, System Security, Operational Security, Reliability, and Application and Data Security.

3 Physical Security A key aspect of security is the physical security of the hardware containing thecustomer data. Birst uses the leading hosting providers, Rackspace and Internap, for its data center. Birst data centers with Internap (Primary) and Rackspace (Backup) have the following physical safeguards: Data center staff mans the data center 24 hours a day, 7 days a week At Internap, data center access is limited to Internap Technicians and Birst Operations Team. At Rackspace, data center access is limited to Rackspace data center technicians only. Entry to the data center is regulated by biometric scans (e.g., hand geometry or iris scan) and man traps Interior and external security camera surveillance monitoring, with the tapes stored for review Unmarked facilities, to maintain a low profile Physical security audits by an outside firm Further information about Rackspace and Internap security policies and procedures is available at www.internap.com and www.rackspace.com. Birst makes sure the networks and hardware containing the data are hardened and tested against attack. System Security In addition to making sure that the infrastructure containing customer data is physically secure, Birst makes sure the networks and hardware containing the data are hardened and tested against attack. This includes: Hardware security requirements include: New hardware is provisioned with a hardened operating system (only 8 necessary programs and services) Security patches are applied on a regular basis Provisioning follows documented policies and procedures All systems are firewall protected All public-facing machines are in a Demilitarized Zone (DMZ), in which a firewall separates public-facing from internal hardware Intrusion Detection Systems (both Network- and Host-based) constantly monitor the internal network, provides daily status emails, and provides weekly vulnerability scans of all internal machines Virus scanning and detection are on all machines Quarterly vulnerability testing is conducted by a third party All machines can only be accessed by named accounts, so that a detailed log of activities is available

4 Operational Security It is not enough to have a security physical and network environment, they must be operated in a secure manner. Rackspace and Internap work with Birst as a team and have the following operational security provisions: Data center operational security includes: 8 ISO 27001-based policies and procedures that are regularly reviewed as part of 8 the SOCI / SOCII Type II audit process 8 Access to confidential information is limited to authorized personnel only, 8 in accordance with documented processes 8All employees are trained on documented information security and 8 privacy procedures 8 Multiple and thorough background security checks are conducted for all 8 data center personnel 8 Systems access is logged and tracked for auditing purposes 8 Secure document destruction policies and procedures are followed 8 Change management procedures are fully documented 8 Disaster Recovery (DR) and Business Continuity (BC) plans are in place Birst Corporate operational security includes: 8 Birst has fully documented policies and procedures that are independently 8 reviewed In addition to securing your data, Birst ensures that it will be available when you need it. 8 All employees are trained (on hire and annually) on documented information 8 security and privacy procedures 8 Background checks are performed on all employees who have access to 8 customer data 8 Access to the production network is limited to authorized personnel, who 8 access it using a secure, site-to-site Virtual Private Network (VPN) 8 Access to customer data is limited to authorized personnel only, according 8 to documented processes 8 Independently reviewed Disaster Recovery and Business Continuity plans

5 Reliability In addition to securing your data, Birst ensures that it will be available when you need it. Birst data centers provide a very reliable infrastructure for the hosting of the Birst application 100% infrastructure and network uptime System redundancy is provided at all levels, to ensure that your data is still available even in those rare situations when the first line of defense falters. This includes redundancy for electrical power, HVAC (heating, ventilation and air conditioning), fire suppression, internet service, networking hardware, application hardware, and data storage N+1 redundant HVAC (i.e., there is at least one independent backup component to ensure system functionality continues in the event of a system failure) Advanced fire suppression Power N+1 redundant Uninterruptable Power Supply Birst solutions have been designed from the ground up to protect the security of your information. Onsite and regularly tested diesel generators for utility outages, with onsite fuel storage Network Multiple Internet Service Providers (ISPs) Fully redundant, enterprise-class routing equipment Intentional network underutilization, so that spikes are easily managed Distributed Denial Of Service (DDOS) mitigation Replacement or repair of hardware within one hour Data support 24 hours a day, 7 days a week Regular backup of critical customer data is provided. Backups are encrypted using industry standard strong encryption and stored both onsite and offsite (at the Birst Disaster Recovery site) All devices within the Birst production infrastructure are fully redundant, highly available (HA) configurations. All devices are hot swappable, requiring no down time for hardware failure and replacement

6 Application and Data Security A secure infrastructure cannot protect your data if the applications providing access to your data are not secure. Birst solutions have been designed from the ground up to protect the security of your information. Application security User access to Birst involves two components: Authentication, and Authorization Authentication Customers authenticate themselves to the Birst application via forms-based authentication, OpenID (www.openid. net), or SAML2 Passwords are never stored in cleartext, but are hashed using PBKDF2 or BCRYPT, to defend against offline attacks Passwords can be reset, but never recovered Authorization the Birst solution contains administrator access controls that an account administrator can use to manage the breadth of functions and features available to their subscribers Communication encryption Secure Socket Layer (SSL3 / TL5) connections secure all communication Birst documents all login (success and failure), logout, administrative, and database events for auditing Birst automatically locks account access after a number of failed login attempts within a specified period Security is built into our documented software development lifecycle, based upon guidelines from the Open Source Web Application Security Project (OWASP www.owasp.org) and SANS Institute (www.sans.org) Birst utilizes multiple third-parties to perform Web Application Vulnerability analysis on all major releases Data security Birst employs deletion tools that meet or exceed the United States Department of Defense and National Security Agency requirements for secure deletion Once a customer cancels their account with Birst, their information will be securely maintained for the period of time specified in their terms of service or contract. During this period, the customer can access their information only if they re-activate their account. After this period is concluded, the account data is permanently deleted from the Birst data center and is no longer accessible Birst can optionally fully encrypt (using industry standard strong encryption) your data at rest

7 Certifications The Internap data center is SOC 2 Type II certified The Rackspace data center is SAS 70 Type II examined, and PCI and Safe Harbor certified If you have additional questions regarding Birst security safeguards and procedures, please contact the Birst sales team at: Email: sales@birst.com Toll Free Phone: (866) 940-1496 Birst Inc. 153 Kearny Street San Francisco, CA 94108 Call toll free: (866) 940-1496 Email us: info@birst.com www.birst.com About Birst Birst is the only enterprise-caliber Business Intelligence platform born in the cloud - giving business teams the ability and agility to solve real problems. Fast. Engineered with automated data integration and powerful analytics, along with the ease of use of the cloud, Birst is less costly and more flexible than legacy BI and more powerful than Data Discovery. Find out why Gartner named Birst a Challenger in its most recent BI Magic Quadrant and why more than a thousand businesses rely on Birst for their analytic needs. Learn to think fast at www.birst.com and join the conversation @birstbi.