CAMPUSPRESS TECHNICAL & SECURITY GUIDE
|
|
- Edward Booth
- 6 years ago
- Views:
Transcription
1 CAMPUSPRESS TECHNICAL & SECURITY GUIDE CAMPUSPRESS
2 2 WHAT IS IN THIS GUIDE? TABLE OF CONTENTS INTRODUCTION... 3 HOSTING... 5 DATACENTERS & HOSTING REGIONS... 6 BACKUPS AND DISASTER RECOVERY... 8 RELIABILITY AND SLA... 8 SECURITY... 9 PRIVACY & DATA DEVELOPMENT CHANGE MANAGEMENT PROCEDURES CODE AUDITS AND GUIDELINES DEVELOPMENT ENVIRONMENTS... 12
3 3 INTRODUCTION OUR STORY CampusPress has grown from a single idea in 2005 into the largest and most trusted provider of educational blogging and WordPress hosting in the world. To date, we host well over 5 million WordPress blogs and sites for thousands of schools and universities all over the globe. This includes nearly 1,000 CampusPress white-label networks. We also host and manage the hugely popular Edublogs.org network. AN INCSUB PROJECT CampusPress is part of a team of 60 WordPress experts - a company called Incsub. We re also the same folks behind WPMU DEV. With CampusPress, you get access to our entire team and resources. Based in Australia, but with employees located all over the globe, the CampusPress and Incsub team consists of some of the best technological and educational minds in the biz.
4 4 OVERVIEW We provide fully managed WordPress Multisite hosting and services for education organizations. SERVICES INCLUDE Hosting on our enterprise level network Managed upgrades of WordPress core, plugins and themes A curated list of available WordPress plugins and themes SSO authentication (Shibboleth, LDAP, CAS, Google Apps, etc.) 24/7 priority support Testing environment Custom design and development Training services (in-person or virtual) FEATURES INCLUDE Accessibility ready themes Contact forms, surveys, polls Documents, media libraries Embedding of media (videos, widgets, etc.) Event calendars Forums Google analytics Google maps Image galleries Language translation (automatic/google and manual) SEO optimization Social sharing Wikis And more...
5 5 HOSTING HOSTING OVERVIEW CampusPress has carefully selected partners for hosting data centers to physically house the servers that we use. CampusPress staff remotely manage and maintain the servers and applications in these datacenters. The two partners include Amazon Web Services (AWS) and Peer1. CampusPress, and our customers, are able to leverage certifications and security assurances by these partners as it relates to physical security. All datacenters include the highest levels of 24//365 on-site security, regulated climate control, redundant power, automated off-site backups, and industry-leading network infrastructure. AMAZON WEB SERVICES Amazon Web Services is trusted by governments and institutions world-wide. For security reasons, Amazon does not share specifics such as physical locations or network infrastructure with the public. Certifications include ISO27001:2005, SSAE16 SOC 1, SOC 2, SOC 3, and PCI-DSS ROC. PEER1 Peer1 also hosts many of the largest websites on the web, including WordPress.com and WordPress VIP. Certifications include SSAE 16, CSAE 3416, and ISAE 3402.
6 6 DATACENTERS & HOSTING REGIONS In order to comply with local legal requirements, each customer can choose to be fully hosted in one of four regions, including: Australia Hosted in Amazon Web Services Sydney Region. aws.amazon.com Canada Hosted in Peer1 s Toronto datacenter. peer1.com/infrastructure/datacenter-toronto United Kingdom Hosted in Peer1 s Portsmouth, UK datacenter. peer1.com/infrastructure/datacenter-portsmouth United States Hosted in Peer1 s San Antonio, TX datacenter. peer1.com/infrastructure/datacenter-san-antonio INFRASTRUCTURE AND ARCHITECTURE Our fully managed networks include multiple web, database, mail, and load balancing servers. We re generally able to add, replace, and do maintenance on hardware without impacting performance or needing scheduled downtime. We only host WordPress Multisite, and fine-tuned to support it, including Apache web servers with PHP, NGINX for load balancing, and MYSQL databases.
7 7 Customer Segregation We use Docker containers with Ansible to isolate each WordPress install from each other, while still allowing each site to benefit from the scalability that comes with our infrastructure. Customer code base is separated in unique Bitbucket repositories. File Storage In our US and AU regions, all images, documents, and other user files are uploaded securely to Amazon S3 so that they are able to be served at much faster speeds using Amazon s vast cloud network. CloudFlare As a CloudFlare Certified Partner, we make available their services at no additional costs to help protect and accelerate sites we host. This includes a CDN, advanced DDOS protection, and Railgun speed improvements. Cache and Traffic Spikes All text content on the public side is cached automatically so that no matter how many visitors your site gets, speeds stay fast. We handle billions of page views each year, and are confident we can handle the largest of any sudden traffic spikes. SSL & HTTPS We encourage enabling https/ssl protection for all logged in user activity. Customers can provide SSL certs or we can obtain certs via CloudFlare.
8 8 BACKUPS AND DISASTER RECOVERY There are multiple backup and replication processes in place. Networks are hosted on a cluster of multiple web and database servers for built-in replication and redundancy. Nightly database backups are encrypted and then stored with Amazon S3. Backups are kept for at least 30 days. Backups are verified and full restores are tested on a bi-weekly basis. Our data center partners, Peer1 and Amazon, both also perform their own regular backups of their servers that are stored off site (but within the same country) in order to protect against natural disasters or catastrophic events. In many cases, our extensive database logs can be used to roll back or recreate content and data as well. Restore times depend on the size of the WordPress network and the cause of the disaster, but full backup recovery should take no more than 24 hours. PERFORMANCE MONITORING We use a variety of tools to automatically monitor performance and reliability of the service, including Munin, Nagios, StatsD/Graphite, Pingdom, and New Relic. All services are set to send automated alerts to our support and systems teams, which are monitored and handled 24/7. These tools also provide us with a wealth of information and data so that our team can constantly work to improve performance and efficiency in our service. RELIABILITY AND SLA We offer a 99.9% up-time SLA to our enterprise level customers, as will be detailed in the formal agreement. See status.campuspress.com for latest performance statistics.
9 9 SECURITY GENERAL SECURITY INFORMATION The security and reliability of our service is our number one priority. In addition to the general WordPress security features, we have staff who perform daily checks of industry security blogs, websites and newsletters to keep on top of any potential vulnerabilities that pertain to the systems we use or employ. We use ClamAV for all servers and TrendMicro and Norton for our desktops with regular updates as needed. Any WordPress core, plugin, or theme security patches will be applied within 24 hours of release. See wordpress.org/about/security for details on the security of the WordPress source. EMPLOYEE POLICIES Every CampusPress employee goes through background checks and an onboarding process that includes a trial period where access to customer servers and data is provided only when working directly under the supervision of another staff member. CampusPress staff only have access to systems that are directly required to complete the functions of their job. We use dual factor authentication for all critical systems and communications services, and automatically log all staff activity. All CampusPress staff undergo initial training to ensure proper understanding of all security related processes. Staff regularly attend industry conferences and otherwise stay informed of best practices and relevant trends. SECURITY BREACHES AND NOTIFICATIONS POLICY Should any security related event occur, our policy is to alert our customers via no later than 24 hours of our team becoming aware of the event. We will work closely with any customers effected to determine next steps such as end-user notifications, needed patches, and how to avoid any similar event in the future.
10 10 PRIVACY & DATA PERSONALLY IDENTIFIABLE INFORMATION We only require a username and address to log in and use the WordPress network. Customers may choose to also provide names. We do not collect, store, require, or transmit PII data related to health, financial institutions, mailing addresses, government ID numbers, etc. Only CampusPress staff have access to customer data. Our hosting partners, including Amazon Web Services, Peer1, and CloudFlare, do not have logical access to WordPress networks, the database, or user data that we host. Should a customer request, we will completely destroy and delete all data and content from a given user. PRIVACY POLICY The full end-user privacy agreement is found at campuspress.com/privacy. In general, we don t sell, share, or publish any user data. We only collect and store data for the purposes of providing the WordPress hosting service. EXPORTS AND DATABASE DUMPS Should a customer leave us, or should a local archive of user data be required, we can provide a complete export and database dump of a network. We will completely purge all customer data within three months of cancelling service.
11 11 DEVELOPMENT CHANGE MANAGEMENT PROCEDURES In order to ensure the reliability of our service, we ve implemented a change management policy that we follow for all updates, upgrades, and code changes. We perform all WordPress core, plugin and theme updates, general improvements, and server maintenance during a regularly scheduled weekly window. All changes are thoroughly tested by our developers and quality assurance team as follows: 1. Tested fully in local testing environment by technical team. 2. Automated and unit testing in multiple development environments. 3. Manual testing by QA team in multiple development environments using all major browsers and operating systems, including mobile devices. 4. Full deployment to small subset of live networks and all development/test networks that willingly participate in beta testing program. 5. Final manual code and performance review by technical team leadership. 6. Full deployment to all customers during next regular Primary Updates window (Tuesdays) and an update published to our change log alerting customers. 7. Continuous monitoring by technical and support teams. 8. For any significant changes that end users may notice, we ll provide documentation and warning to Super Administrators well in advance. CODE AUDITS AND GUIDELINES We have automatic and manual code reviews in place for all plugins and themes that are added to any site we host. All plugins and themes must adhere to the WordPress Coding Standards as well as a list of guidelines that we provide in our documentation section.
12 12 BITBUCKET AND VERSION CONTROL We use Bitbucket for version control. Customers that have custom themes should initiate a pull request to alert our team of developers to initiate a code review. Depending on the queue and complexity of the theme (or edit), a review can take up to 24 hours (or more for complex themes). DEVELOPMENT ENVIRONMENTS We can set you up with a testing environment in which to upload themes or major changes to before moving to production. For individual sites, we have a clone tool, which can be used for testing out a new theme or adding new content, and then writing over the existing site with just a few clicks. GETTING STARTED AND FREE TRIALS We regularly set up free trial and/or demo networks for potential customers to use to asses our service. The first thing we need to know for all new networks (demo or production) is the URL to use (like sites.yourschool.edu or blogs.yourschool.edu). From there, we will create the network and send you the needed DNS entry to point the domain to our servers. If you have an existing network, we ll start with a test migration and a manual review of all existing plugins and themes. Questions? contact@campuspress.com or call
For Australia January 2018
For Australia January 2018 www.sysaid.com SysAid Cloud Architecture Including Security and Disaster Recovery Plan 2 This document covers three aspects of SysAid Cloud: Datacenters Network, Hardware, and
More informationDHIS2 Hosting Proposal
www.knowarth.com 1 Table of Contents 2 Cloud Consulting & Hosting... 3 2.1 Cloud Consulting & Hosting includes... 3 2.2 DHIS2 Hosting features... 4 2.2.1 Best-practice installation... 4 2.2.2 Uptime and
More informationFor USA & Europe January 2018
For USA & Europe January 2018 www.sysaid.com SysAid Cloud Architecture Including Security and Disaster Recovery Plan 2 This document covers three aspects of SysAid Cloud: Datacenters Network, Hardware,
More informationBeBanjo Infrastructure and Security Overview
BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits
More informationTwilio cloud communications SECURITY
WHITEPAPER Twilio cloud communications SECURITY From the world s largest public companies to early-stage startups, people rely on Twilio s cloud communications platform to exchange millions of calls and
More informationInterCall Virtual Environments and Webcasting
InterCall Virtual Environments and Webcasting Security, High Availability and Scalability Overview 1. Security 1.1. Policy and Procedures The InterCall VE ( Virtual Environments ) and Webcast Event IT
More informationAUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE
AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated
More informationA company built on security
Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for
More informationMagento Commerce Architecture and Security Model Last updated: Aug 2017
Magento Commerce Architecture and Security Model Last updated: Aug 2017 Architecture The Magento Commerce architecture is designed to provide a highly secure environment. Each customer is deployed into
More informationWhite Paper The simpro Cloud
White Paper The simpro Cloud White Paper The simpro Cloud Executive Summary... 1 Cloud Overview... 1 Global Data Centre Network... 2 Cloud Architecture... 3 Primary Objectives... 3 Data Security... 4 Certification
More informationWhat can the OnBase Cloud do for you? lbmctech.com
What can the OnBase Cloud do for you? lbmctech.com The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, long tracks of outstanding
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationTB+ 1.5 Billion+ The OnBase Cloud by Hyland 600,000,000+ content stored. pages stored
the onbase cloud ONBASE CLOUD // Experience Matters The OnBase Cloud by Hyland When it comes to cloud deployments, experience matters. With experience comes more functionality, an established history of
More informationMaintain Data Control and Work Productivity
DATA SHEET CloudAlly Backup The Complete Microsoft 365 Solution: Office 365 Exchange, SharePoint, and OneDrive KEY CAPABILITIES CloudAlly s cloud-to-cloud backup solution for the complete Microsoft cloud
More informationMaintMaster Technical White Paper
MaintMaster Technical White Paper Welcome to MaintMaster! MaintMaster is a leading tool for return on operational reliability for discrete manufacturing. This White Paper covers most of the technical aspects
More informationCisco Meraki Privacy and Security Practices. List of Technical and Organizational Measures
Cisco Meraki Privacy and Security Practices List of Technical and Organizational Measures Introduction Meraki takes a systematic approach to data protection, privacy, and security. We believe a robust
More informationAWS continually manages risk and undergoes recurring assessments to ensure compliance with industry standards.
Security Practices Freshservice Security Practices Freshservice is online IT service desk software that allows IT teams of organizations to support their users through email, phone, website and mobile.
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationTRACKVIA SECURITY OVERVIEW
TRACKVIA SECURITY OVERVIEW TrackVia s customers rely on our service for many mission-critical applications, as well as for applications that have various compliance and regulatory obligations. At all times
More informationMYOB Advanced SaaS. Why choose MYOB Advanced? Fact Sheet. What is MYOB Advanced SaaS?
Fact Sheet MYOB Advanced SaaS Why choose MYOB Advanced? When you re considering a cloud-based ERP system for your business, you can be overwhelmed with the copious amount of options. Before selecting the
More informationEdge for All Business
1 Edge for All Business Datasheet Zynstra is designed and built for the edge the business-critical compute activity that takes place outside a large central datacenter, in branches, remote offices, or
More informationCriminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud
Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains
More informationIntermedia s Private Cloud Exchange
Intermedia s Private Cloud Exchange This is a practical guide to implementing Intermedia s Private Cloud Exchange on AWS. Intermedia, the world s independent provider of Hosted Exchange, and AWS, the leading
More informationLayer Security White Paper
Layer Security White Paper Content PEOPLE SECURITY PRODUCT SECURITY CLOUD & NETWORK INFRASTRUCTURE SECURITY RISK MANAGEMENT PHYSICAL SECURITY BUSINESS CONTINUITY & DISASTER RECOVERY VENDOR SECURITY SECURITY
More informationEnterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE
Enterprise Overview Benefits and features of s Enterprise plan 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com This paper summarizes the benefits and features of s Enterprise plan. State of
More informationKerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook
Kerio Cloud Cloud Hosted Enterprise-Class Email, Calendars, Contacts, Tasks, and Instant Messaging Twitter LinkedIn Facebook Presented by Adam Bielawski June 15, 2016 Why Kerio? Kerio provides safe, simple,
More informationInformation Security Policy
Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated
More informationThere are also a range of security and redundancy systems designed to improve the speed, reliability, stability and security of the simpro Cloud.
The simpro Cloud Executive Summary The simpro Cloud environment is an enterprise-grade cloud network designed specifically to host simpro s software offerings in an easy to use and reliable platform. simpro
More informationCTS performs nightly backups of the Church360 production databases and retains these backups for one month.
Church360 is a cloud-based application software suite from Concordia Technology Solutions (CTS) that is used by churches of all sizes to manage their membership data, website, and financial information.
More informationSecurity and Compliance at Mavenlink
Security and Compliance at Mavenlink Table of Contents Introduction....3 Application Security....4....4....5 Infrastructure Security....8....8....8....9 Data Security.... 10....10....10 Infrastructure
More informationENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE
ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE INTRODUCTION In line with commercial industry standards, the data center used by EndNote employs a dedicated security team to protect our
More informationLiferay Security Features Overview. How Liferay Approaches Security
Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................
More informationSCALEFAST COMMERCE CLOUD INFRASTRUCTURE
SCALEFAST COMMERCE CLOUD INFRASTRUCTURE ALWAYS-ON, GLOBAL ECOMMERCE INFRASTRUCTURE Scalefast provides the highest level of availability, performance and security for your online store. We take care of
More informationDaxko s PCI DSS Responsibilities
! Daxko s PCI DSS Responsibilities According to PCI DSS requirement 12.9, Daxko will maintain all applicable PCI DSS requirements to the extent the service prov ider handles, has access to, or otherwise
More informationInformation Security Practices
3 Phillip Street, 13-03 Royal Group Building, Singapore 048693 www.trustsphere.com Information Security Practices TrustSphere Pte Ltd Co Reg No. 200614342Z Contents 1 Physical security... 4 2 Network security...
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationKantanMT.com. Security & Infra-Structure Overview
KantanMT.com Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions...
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationAutomate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds
EXECUTIVE BRIEF SHAREBASE BY HYLAND Automate sharing. Empower users. Retain control. With ShareBase by Hyland, empower users with enterprise file sync and share (EFSS) technology and retain control over
More informationWEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM
SECURITY ANALYTICS WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM BLAZING PERFORMANCE, HIGH AVAILABILITY AND ROBUST SECURITY FOR YOUR CRITICAL WEB APPLICATIONS OVERVIEW Webscale is a converged multi-cloud
More informationThe Nasuni Security Model
White Paper Nasuni enterprise file services ensures unstructured data security and privacy, enabling IT organizations to safely leverage cloud storage while meeting stringent governance and compliance
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationIdentifying Workloads for the Cloud
Identifying Workloads for the Cloud 1 This brief is based on a webinar in RightScale s I m in the Cloud Now What? series. Browse our entire library for webinars on cloud computing management. Meet our
More informationCLOUDALLY EBOOK. Best Practices for Business Continuity
CLOUDALLY EBOOK 8 Disaster Recovery Best Practices for Business Continuity Introduction Disaster can strike at any moment, and it s impossible to plan for every eventuality. When Hurricane Katrina hit
More informationSDL Privacy Policy Cloud Services
SDL Privacy Policy Cloud Services Software-As-A-Service Products Version 11-04-2017 v1.4 SDL plc Globe House Clivemont Road, Maidenhead SL6 7DY England www.sdl.com SDL Tridion Infrastructure Summary This
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationThe Cloud Changes Nothing and Everything! Amazon.com, Inc. and its affiliates. All rights reserved.
The Cloud Changes Nothing and Everything! Amazon.com, Inc. and its affiliates. All rights reserved. About How Amazon did Amazon Web Services Deep experience in building and operating global web scale systems?
More informationSecurity Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
More informationISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045
Solution Brief 8815 Centre Park Drive, Columbia MD 21045 About delivers business critical software and services that transform high-volume cryptic log data into actionable, prioritized intelligence that
More informationCore Services for ediscovery Perfection
BEST-IN-CLASS DATA ENVIRONMENTS. Core Services for ediscovery Perfection MANAGE MANAGE IMPLEMENT IMPLEMENT ASSESS Core Services for ediscovery Perfection George Jon is an ediscovery infrastructure specialist
More informationKroll Ontrack VMware Forum. Survey and Report
Kroll Ontrack VMware Forum Survey and Report Contents I. Defining Cloud and Adoption 4 II. Risks 6 III. Challenging Recoveries with Loss 7 IV. Questions to Ask Prior to Engaging in Cloud storage Solutions
More informationWatson Developer Cloud Security Overview
Watson Developer Cloud Security Overview Introduction This document provides a high-level overview of the measures and safeguards that IBM implements to protect and separate data between customers for
More informationAsset Bank - Shared Hosting. Service Description
Asset Bank - Shared Hosting Service Description Date: 12th December 2016 Version: Status: d19 Released Introduction This document describes Bright Interactive s Shared Hosting Service, the hosting environment
More informationSecurity & Privacy Guide
Security & Privacy Guide October 2017 Carbon Black, Inc. 1100 Winter St,, Waltham, MA 02451 USA Tel: 617.393.7400 Fax: 617.393.7499 E-mail: support@carbonblack.com Web: http://www.carbonblack.com Copyright
More informationSECURITY PRACTICES OVERVIEW
SECURITY PRACTICES OVERVIEW 2018 Helcim Inc. Copyright 2006-2018 Helcim Inc. All Rights Reserved. The Helcim name and logo are trademarks of Helcim Inc. P a g e 1 Our Security at a Glance About Helcim
More informationVendor Security Questionnaire
Business Associate Vendor Name Vendor URL Vendor Contact Address Vendor Contact Email Address Vendor Contact Phone Number What type of Service do You Provide Covenant Health? How is Protected Health Information
More informationDeploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform
Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,
More informationDELIVERING PERFORMANCE, SCALABILITY, AND AVAILABILITY ON THE SERVICENOW NONSTOP CLOUD
DELIVERING PERFORMANCE, SCALABILITY, AND AVAILABILITY ON THE SERVICENOW NONSTOP CLOUD Overview Organizations, regardless of size, rely upon access to IT and business data and services for their continued
More informationHow to host and manage enterprise customers on AWS: TOYOTA, Nippon Television, UNIQLO use cases
How to host and manage enterprise customers on AWS: TOYOTA, Nippon Television, UNIQLO use cases Kazutaka Goto - Evangelist, cloudpack Ken Tamagawa - Sr. Manager, Solutions Architecture, Amazon Web Services
More informationWHITE PAPER. Header Title. Side Bar Copy. Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER
Side Bar Copy Header Title Header Title 5 Reasons to Consider Disaster Recovery as a Service for IBM i WHITEPAPER Introduction Due to the complexity of protecting ever-changing infrastructures and the
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationCloud Transformation and Significance of Security
Cloud Transformation and Significance of Security Mohit Sharma, Chief Architect & Cloud Evangelist @onlinesince2009 www.cloudsec.com Datacenter Management Change Management Policy Physical Network Management
More informationP a g e 1. Teknologisk Institut. Online kursus k SysAdmin & DevOps Collection
P a g e 1 Online kursus k72751 SysAdmin & DevOps Collection P a g e 2 Title Estimated Duration (hrs) Ruby on Rails - Fundamentals 1,5 Ruby on Rails - Database Fundamentals 1,22 Python: The Basics 3,5 Python:
More informationA Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud
A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,
More informationDue Diligence March 2018 Page 1 of 6. Company
Page 1 of 6 Company Company details Services offered Selectapension Limited, Selectapension House, Eridge Road, Crowborough, East Sussex, TN6 2SL, 01892 669494, www.selectapension.com. Registered in England
More informationWHITE PAPER- Managed Services Security Practices
WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to
More informationSecurity & Compliance in the AWS Cloud. Amazon Web Services
Security & Compliance in the AWS Cloud Amazon Web Services Our Culture Simple Security Controls Job Zero AWS Pace of Innovation AWS has been continually expanding its services to support virtually any
More informationHow can you implement this through a script that a scheduling daemon runs daily on the application servers?
You ve been tasked with implementing an automated data backup solution for your application servers that run on Amazon EC2 with Amazon EBS volumes. You want to use a distributed data store for your backups
More informationBuild an open hybrid cloud and paint it red and blue
Build an open hybrid cloud and paint it red and blue Khaled Elbedri Technical sales lead, Microsoft Ismail Dhaoui EMEA Senior Specialist Solutions Architect, Red Hat Tuesday, May 8, 2018 Agenda RH & MS
More informationCogeco Peer 1 PCI DSS Compliance. Overview
Cogeco Peer 1 PCI DSS Compliance Overview Cogeco Peer 1 provides Payment Card Industry Data Security Standards (PCI DSS) compliant Managed Hosting in select datacenters, facilitated by the availability
More informationSecurity Overview. Technical Whitepaper. Secure by design. End to end security. N-tier Application Architecture. Data encryption. User authentication
Technical Whitepaper Security Overview As a team, we have a long history of developing and delivering HR software solutions to customers worldwide, including many of the world s most-demanding organisations.
More informationYou Might Know Us As. Copyright 2016 TierPoint, LLC. All rights reserved.
April 14, 2016 You Might Know Us As. 2012 2014 2 TierPoint Corporate Overview TierPoint Data Center Footprint* TierPoint Key Statistics Employees: 870 Markets: 24 Data Centers: 38 Total Raised Floor: 599,000
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationSecurity Specification
Security Specification Security Specification Table of contents 1. Overview 2. Zero-knowledge cryptosystem a. The master password b. Secure user authentication c. Host-proof hosting d. Two-factor authentication
More informationAmit Panchal Enterprise Technology Strategist
Amit Panchal Enterprise Technology Strategist amitp@microsoft.com Who is Amit Panchal IT Industry Personal Education Executive Experience MORE DEVICES I love my PC, my phone, and my slate. MORE MOBILE
More informationThe Interactive Guide to Protecting Your Election Website
The Interactive Guide to Protecting Your Election Website 1 INTRODUCTION Cloudflare is on a mission to help build a better Internet. Cloudflare is one of the world s largest networks. Today, businesses,
More informationData Center Operations Guide
Data Center Operations Guide SM When you utilize Dude Solutions Software as a Service (SaaS) applications, your data is hosted in an independently audited data center certified to meet the highest standards
More informationSingle-Tenant vs. Multi-Tenant Enterprise Software
Single-Tenant vs. Multi-Tenant Enterprise Software Choosing between single-tenancy and multi-tenancy comes down to an organization's business objectives and requirements. Which trade-offs are you willing
More informationCloud Security Whitepaper
Cloud Security Whitepaper Sep, 2018 1. Product Overview 3 2. Personally identifiable information (PII) 3 Using Lookback without saving any PII 3 3. Security and privacy policy 4 4. Personnel security 4
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationDon t Be the Next Headline! PHI and Cyber Security in Outsourced Services.
Don t Be the Next Headline! PHI and Cyber Security in Outsourced Services. June 2017 Melanie Duerr Fazzi Associates Partner, Director of Coding Operations Jami Fisher Fazzi Associates Chief Information
More informationTechnical Brief SUPPORTPOINT TECHNICAL BRIEF MARCH
Technical Brief 1 SupportPoint Cloud is a SaaS solution that makes it easy for people to get the information and guidance they need to navigate through complex business processes. SupportPoint Cloud Client
More informationStorage Made Easy. SoftLayer
Storage Made Easy Providing an Enterprise File Fabric for SoftLayer STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR SOFTLAYER The File Fabric is a comprehensive multi-cloud data security solution built on
More informationInventory and Reporting Security Q&A
Inventory and Reporting Security Q&A General Q. What is Inventory Reporting, Collection, and Analysis? A. Inventory Reporting, Collection, and Analysis is a tool that discovers, collects, and analyzes
More informationWORKSHARE SECURITY OVERVIEW
WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationQuickBooks Online Security White Paper July 2017
QuickBooks Online Security White Paper July 2017 Page 1 of 6 Introduction At Intuit QuickBooks Online (QBO), we consider the security of your information as well as your customers and employees data a
More informationTHE DEFINITIVE GUIDE TO BACKUP FOR OFFICE 365
THE DEFINITIVE GUIDE TO BACKUP FOR OFFICE 365 ENSURING COMPLETE AND EFFECTIVE DATA PROTECTION FOR OFFICE 365 TABLE OF CONTENTS THE TRUTH ABOUT SAAS DATA LOSS THE TOP 4 REASONS YOU NEED BACKUP FOR OFFICE
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationConfiguration and Day 2 Operations First Published On: Last Updated On:
Configuration and Day 2 Operations First Published On: 05-12-2017 Last Updated On: 12-26-2017 1 Table of Contents 1. Configuration and Day 2 Operations 1.1.Top Day 2 Operations Knowledge Base Articles
More informationPretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance
PretaGov Australia SaaS Hosting with Fully Managed Services, Support and Maintenance Introduction to PretaGov PretaGov operates a Government Community Plone CMS (content management system) SaaS Cloud exclusively
More informationAPPLICATION & INFRASTRUCTURE SECURITY CONTROLS
APPLICATION & INFRASTRUCTURE SECURITY CONTROLS ON THE KINVEY PLATFORM APPLICATION KINVEY PLATFORM SERVICES END-TO-END APPLICATION & INFRASTRUCTURE SERCURITY CONTROLS ENTERPRISE DATA & IDENTITY 2015 Kinvey,
More informationManaging Performance in Liferay DXP: An Overview of Liferay Connected Services
Managing Performance in Liferay DXP: An Overview of Liferay Connected Services Executive Summary Liferay Connected Services (LCS) is an online platform that helps our customers successfully manage their
More informationAWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE
AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE Education Edition 2018 1 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes
More informationData Security at Smart Assessor
Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5
More informationA guide for assembling your Jira Data Center team
A guide for assembling your Jira Data Center team Contents 01 Getting started 02 Helpful roles for your Jira Data Center team 03 Helpful expertise for your Jira Data Center team 04 Pro tips & best practices
More informationCyber security tips and self-assessment for business
Cyber security tips and self-assessment for business Last year one in five New Zealand SMEs experienced a cyber-attack, so it s essential to be prepared. Our friends at Deloitte have put together this
More informationWITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:
SOLUTION OVERVIEW: ALERT LOGIC THREAT MANAGER WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE Protecting your business assets and sensitive data requires regular vulnerability assessment,
More informationOpen Source Container-Based Cloud Hosting
Open Source Container-Based Cloud Hosting is proud to offer Lagoon: an open source, secure, high-performance, cloud-based container hosting solution designed by developers for developers. We empower developers
More information