Secure, Scalable and Reliable Cloud Analytics from FusionOps



Similar documents
Birst Security and Reliability

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Security & Infra-Structure Overview

StratusLIVE for Fundraisers Cloud Operations

Enterprise level security, the Huddle way.

Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM

GiftWrap 4.0 Security FAQ

Itron Cloud Services Offering

SNAP WEBHOST SECURITY POLICY

Time to Value: Successful Cloud Software Implementation

Troux Hosting Options

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

What is the Cloud, and why should it matter?

BOLDCHAT ARCHITECTURE & APPLICATION CONTROL

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

SaaS Security for the Confirmit CustomerSat Software

Client Security Risk Assessment Questionnaire

PROTECTING YOUR VOICE SYSTEM IN THE CLOUD

ProjectManager.com Security White Paper

White Paper: Librestream Security Overview

Salesforce & HIPAA Compliance

Perceptive Software Platform Services

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Understanding Sage CRM Cloud

Powering the Cloud Desktop: OS33 Data Centers

Security & Infrastructure White Paper

KeyLock Solutions Security and Privacy Protection Practices

Altus UC Security Overview

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

NetSuite Data Center Fact Sheet

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

White Paper The simpro Cloud

White Paper How Noah Mobile uses Microsoft Azure Core Services

Five keys to a more secure data environment

Infrastructure as a Service (IaaS) Dancik International and Peak 10

UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM

Cloud Contact Center. Security White Paper

BMC s Security Strategy for ITSM in the SaaS Environment

CA Cloud Overview Benefits of the Hyper-V Cloud

Famly ApS: Overview of Security Processes

Secure and control how your business shares files using Hightail

SaaS Security for Confirmit Horizons

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.

Security and Managed Services

Autodesk PLM 360 Security Whitepaper

Things You Need to Know About Cloud Backup

Level I - Public. Technical Portfolio. Revised: July 2015

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO Annual 3rd party application Pen Tests.

Security Controls for the Autodesk 360 Managed Services

HEC Security & Compliance

Tenzing Security Services and Best Practices

Securing the Service Desk in the Cloud

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan

Keyfort Cloud Services (KCS)

FormFire Application and IT Security. White Paper

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

CONTENTS. Security Policy

Global ediscovery Client Data Security. Managed technology for the global legal profession

With Eversync s cloud data tiering, the customer can tier data protection as follows:

SysAid Cloud Architecture Including Security and Disaster Recovery Plan

CHIS, Inc. Privacy General Guidelines

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Security Information & Policies

Anypoint Platform Cloud Security and Compliance. Whitepaper

White Paper. Software as a Service by Yardi. Secure, seamless hosting and support

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Security from a customer s perspective. Halogen s approach to security

by New Media Solutions 37 Walnut Street Wellesley, MA p f Avitage IT Infrastructure Security Document

custom hosting for how you do business

twilio cloud communications SECURITY ARCHITECTURE

Security Policy JUNE 1, SalesNOW. Security Policy v v

<cloud> Secure Hosting Services

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Injazat s Managed Services Portfolio

Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk

Security aspects of e-tailing. Chapter 7

IBX Business Network Platform Information Security Controls Document Classification [Public]

RMS. Privacy Policy for RMS Hosting Plus and RMS(one) Guiding Principles

GoodData Corporation Security White Paper

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

THE BLUENOSE SECURITY FRAMEWORK

Blue Jeans Network Security Features

UCS Level 2 Report Issued to

Business process efficiency is improved with task management, alerts, notifications and automated process workflows.

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Transcription:

White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com

World-class security... 4 Physical Security... 4 Network Security... 4 Data and Application Security... 5 Secure data-backup strategy... 5 Secure internal policies and procedures... 5 Certifications... 6 SSAE16 Audited... 6 Safe Harbor certification... 6 True multi-tenancy... 7 Proven enterprise scalability... 7 High-availability and reliability... 7 Disaster Recovery... 8 2 White Paper

Secure, scalable and reliable cloud analytics from FusionOps Dedicated to providing immediate value securely and easily To protect the privacy of customers and safeguard customer and partner information, FusionOps has adopted the best practices for delivering analytics through the cloud. World-class security Physical security Network security Data and application security Secure data-backup strategy Secure internal policies and procedures Third-party certifications (including SSAE16 Type II SOC1, SOC2; PCI compliance) True multi-tenancy Proven enterprise scalability High-availability Disaster recovery This white paper will review in detail each of these key areas adopted by FusionOps to provide secure, scalable and reliable cloud analytics. If you have additional questions on FusionOps security safeguards and procedures, please contact FusionOps at: Email: support@fusionops.com Call: (408) 524-2222 3 White Paper

World-class security FusionOps has partnered with Rackspace to provide secure, scalable and reliable analytics in the cloud. FusionOps and Rackspace have taken a multi-layered approach to ensuring your data and information is safe. Physical Security FusionOps data and application is hosted at Rackspace, a state-of-the-art data center with 24X7 security and 14,000 customers in eight data centers worldwide. Access control and physical security Rackspace has 24X7 manned security, including foot patrols and perimeter inspections Biometric scanning for controlled data center access Data center access is limited to trained data center technicians and certified security and networking teams 24X7 video surveillance throughout the facility and perimeter Physical security audits by an independent party Unmarked facilities to help maintain low profile Network Security In addition to physically securing the facility, FusionOps and Rackspace have also taken measures to ensure the network is secure. All systems are firewall protected Constant network monitoring for latencies, intrusions (IDS) and vulnerabilities Dedicated network and distributed denial-of-service (DDos) mitigation Continuous proactive improvement in network topology and configuration All publicly accessed devices are setup in a demilitarized zone (DMZ) Network access via Cisco VPN with 3DES encryption Security audits by third-parties 4 White Paper

Data and Application Security FusionOps and Rackspace have enforced tight operating system and application level security and procedures. Operating System All hardware has hardened operating system Security patches and updates are applied on a regular basis Continuous monitoring and resource optimization All machines can only be accessed by named accounts Automatic periodic password expiration Detailed logs and audit trails Data and Application FusionOps security model restricts customer access to secure data Email address must be confirmed by users following the registration process before a customer account is set up All passwords are stored in an encrypted form and must be regenerated on a periodic basis Virus scanning and detection on all disk drives FusionOps automatically locks an account after a pre-defined number of failed login attempts All network communication is secured using the strongest encryption products including VeriSign certificates (128-bit SSL) and 3DES encryption for Cisco VPN Detailed logs and audit trails of both customer and FusionOps access history Account closure Once a customer closes an account with FusionOps, all information will be maintained securely for the period of time specified in the service agreement before it will be permanently removed. Secure data-backup strategy Rackspace has 24X7 Managed Backup Technicians to monitor backup jobs, perform data restores, change configurations or answer any backup questions. 24X7 Managed backup and storage services Data is stored on carrier-class disk storage using RAID disks Data backup is performed on a nightly basis and stored onto tape media Secure internal policies and procedures FusionOps and Rackspace have adopted business processes that follow security 5 White Paper

best practices to restrict access to confidential information and maintain tight security over time. ISO 17799-based policies and procedures that are regularly reviewed as part of SSAE 16 audit process All employees trained on documented information security and privacy procedures Access to confidential information restricted to authorized personnel only, according to documented processes Systems access logged and tracked for auditing purposes Secure document-destruction policies for all sensitive information Fully documented change-management procedures Certifications Rackspace is audited by independent third-parties. SSAE16 Type II SOC1, SOC2 The Rackspace data center is SSAE16 examined For more information on Rackspace and SSAE16, please visit http://www.rackspace.com For more information on SSAE16, please visit http://www.ssae16.org/what-is-ssae-16/ssae-16-definition.htm Safe Harbor certification The Rackspace data center is SSAE16 Type II examined and Safe Harbor certified For more information on Rackspace and Safe Harbor, please visit http://www.rackspace.com/downloads/pdfs/safeharborcertification.pdf For more information on Safe Harbor, please visit http://www.export.gov/safeharbor/ 6 White Paper

True multi-tenancy FusionOps has been developed using patented composite software and secure cloud-to enterprise integration technology, ensuring maximum scalability, reliability and performance. FusionOps enables, for the first time in the industry, customizations for every user and secure integration with on-premise enterprise applications without loss of multi-tenancy or impact on on-premise IT and security infrastructure. Proven enterprise scalability FusionOps currently delivers cloud analytics and other services to large manufacturing companies including Fortune 500 companies with global operations. Built on a Big Data database, FusionOps can scale to handle almost any data volume and thousands of users at a customer site. FusionOps enables real-time analytics of large enterprise Big Data, including millions of transactions, dozens of plants, billions in material spend, and enormous volumes of analytics data. FusionOps cloud analytics infrastructure can scale to meet your needs as they grow. High-availability and reliability A Tier-1 network with a fully redundant architecture ensures high-availability and reliability for your enterprise needs. Networking components Tier-1 network with 8 different providers High-performance bandwidth Constant monitoring for latencies and intrusion Fully redundant, enterprise-class routing equipment 1 Hour hardware repair and replacement guarantees Environmental controls Redundant N+1 HVAC systems Humidity and temperature controlled State-of-the-art fire suppression system Power Conditioned power provides all devices with Uninterrupted Power Supply 7 White Paper

Disaster Recovery FusionOps data and application are hosted at Rackspace, where they provide complete disaster recovery to help to ensure business continuity. Flexible backup schedule Offsite tape rotation Replication of critical files between data centers Application, database & full server failover Disaster recovery plan & testing Active/passive failover or geographic load balancing Full support for off-site replication to customer managed data center Team of certified disaster recovery engineers to design, deploy & manage the system and solution Independently audited disaster recovery and business continuity plans 8 White Paper