Security & Architecture

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Welcome to the CardSaver VoIP Billing & Call Management Demonstration © 2004, Parwan Electronics Corporation.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Network Security Testing Techniques Presented By:- Sachin Vador.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Lesson 1: Configuring Network Load Balancing
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Microsoft Load Balancing and Clustering. Outline Introduction Load balancing Clustering.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
CRM On Demand Integration Capabilities Joerg Wallmueller CRM Sales.
STEALTH Content Store for SharePoint using Windows Azure  Boosting your SharePoint to the MAX! "Optimizing your Business behind the scenes"
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Inventory Management & Administration System Tourism suite What is the PCI DSS? The PCI DSS stands for Payment Card Industry Data Security Standard.
Concepts of Database Management Sixth Edition
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
V 0.1Slide 1 Security – System Configuration How to configure WebSAMS? Access Control Other Information Configuration  system customization  system configuration.
Concepts of Database Management Eighth Edition
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Information Systems Security
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
Database Role Activity. DB Role and Privileges Worksheet.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Presented by Deepak Varghese Reg No: Introduction Application S/W for server load balancing Many client requests make server congestion Distribute.
9 Copyright © 2004, Oracle. All rights reserved. Getting Started with Oracle Migration Workbench.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
© Copyright 2008 Elluminate, Inc. Elluminate SAS and ELM Comparison Marc Stringer Sr. Systems Engineer.
Onsite CRM Security
Clouding with Microsoft Azure
SQL Database Management
KEEPS – a system for UELMA preservation and security
Blackboard Security System
Backups for Azure SQL Databases and SQL Server instances running on Azure Virtual Machines Session on backup to Azure feature (manual and managed) in SQL.
Review of IT General Controls
Chapter 19: Network Management
Welcome to the CardSaver VoIP Billing & Call Management Demonstration
KEEPS – a system for UELMA preservation and security
100% Exam Passing Guarantee & Money Back Assurance
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Managing Multi-User Databases
CONNECTING TO THE INTERNET
Module Overview Installing and Configuring a Network Policy Server
Introduction to Operating Systems
Security and Encryption
Introduction to Networking
Managing the IT Function
Introduction of Week 6 Assignment Discussion
Switchover from Teledeposit to VIRTUAL TERMINAL Moneris Solutions
Chapter 27: System Security
IT INFRASTRUCTURES Business-Driven Technologies
Data Center Colocation Services.
Keeping Member Data Safe
Data Center Colocation Services.
Web Application Server 2001/3/27 Kang, Seungwoo. Web Application Server A class of middleware Speeding application development Strategic platform for.
6. Application Software Security
NTC/302 NETWORK WEB SERVICES The Latest Version // uopcourse.com
NTC/302 NTC/ 302 ntc/302 ntc/ 302 NETWORK WEB SERVICES The Latest Version // uopstudy.com
NTC/302 NETWORK WEB SERVICES The Latest Version NTC 302 Entire Course Link
Presentation transcript:

Security & Architecture NetSuite’s Security & Architecture Kevin Brown © Copyright NetSuite Inc., All Rights Reserved.

Security and Architecture Introduction Security Confidentiality Integrity Availability SLC (Service Level Commitment) Architecture Compliance FAQ’s

Security

Security: Confidentiality Internet Firewalls Block unauthorized attempts to access our data center. Port scans are run regularly to identify any vulnerabilities within our network. 128-bit secure socket layer data encryption All data passed back and forth is encrypted Application-only Access System divided into layers that separate data from the application. Login gives access to the application layer…prevents malicious altering of data Role Level Access, Idle Disconnect and Account Lockout User has roles with access restrictions related to their job Detects idle connections and locks IE Window Two-Factor Authentication (Strong Authentication) Scheduled for phased release (9/07 – 11/07) One-time key entered to log into NetSuite IP Address Restriction Avail

Security: Integrity Data Integrity We will not view or access records without the customer’s permission We do not store passwords (sha-256 encrypted version of password, so we have no access to your password) Passwords can now managed in the application Two Phase commit and our structure ensures Integrity Use Oracle DB capabilities (two phase commit) to ensure transactional integrity A completed transaction is put on two individual sets of RAID array (double redundancy) Redundant Array of Inexpensive Drives provides for increased data reliability What does all of this mean? When a transaction is submitted, if the page returns, the data is there

Security: Availability Back-Up Nightly tape back-ups Remote archives of tape Hot Back-ups Disaster Recovery Currently we leverage Level(3)’s disaster recovery program and facilities Data restored from tape Redundancy Power Hardware Internet (We’ve got a back up!) Talk to upgraded DR avail

SLC Service Level Commitment (SLC) / Uptime 99.5% target uptime for each month First company to guarantee uptime Wait…We are the only company to guarantee uptime (at least in our market) Scheduled Maintenance Windows 5 hour period every Friday and Saturday starting at 10 p.m. Pacific Time Where possible targeted to local time URL for NetSuite monitoring http://status.netsuite.com/status.html

Architecture

Architecture Three-tier architecture Fault-tolerant session fail over the data delivery layer the application layer the database layer Fault-tolerant session fail over if one server fails, your connection is seamlessly handed over to another server Redundancy Power Hardware Internet (we’ve got a back up) This level of Architecture means security!

Architecture Continued

Performance / Storage Performance High Performance/Usage companies Load-Balancing ability to shift connections among servers to spread the load evenly Internet connection to the two major Internet backbone providers ensures that there are no data transmission bottlenecks to our data center High Performance/Usage companies Minimum GAAP and a fee for the server Numbers below are guidelines…check Sales Tools for details Tier Three GAAP $40,000 Server Fee $40,000 annually Tier Two GAAP $150,000 Server Fee $75,000 annually Tier One GAAP $225,000 Server Fee $100,000 annually Current Customers 10,000 transactions a day They do not own the hardware Does not ensure better application performance Still share application server (DB may respond better) Does provide more control

Compliance

Compliance: SAS 70 SAS 70 Report NDA required to release report Type II report (vs. Type I report) Type II more detailed / thorough Results: No Material Exceptions were noted Areas Audited Systems Development and Change Management System Data Back up Procedures Logical Security Physical Security Environmental Security

Compliance: PCI PCI Compliant (Payment Card Industry) Our Report on Compliance was accepted by both Ambiron TrustWave (highly respected PCI auditing service) and Visa Encrypted Credit Card View Users (except Administrator and Full Access) will not see unmasked credit card numbers except when entering a new Card Password requirements Certain Roles must change password every 90 days Seven (7) characters Sign release to be able to see un-encrypted cards To verify certification see Visa website http://usa.visa.com/download/merchants/cisp_list_of_cisp_compliant_service_providers.pdf

FAQ’s Who owns the data? The customer, they can export it through CSV (individual reports and full csv export), Web Services and ODBC. What happens if my ISP goes down? Call us and we’ll provide dial up instructions to reach our service (temporary solution). How Scalable is NS? We use load balancers to keep load consistent across the farm. We maintain the farm such that peak usage is within our acceptable range. The acceptable range is low enough to accommodate surges and spikes without performance degradation We also use our application so the appropriate level of management on the operations side can get visibility into future demand, therefore we have machines configured and ready to go before we need them. How often do we back up the data Nightly Where are the tapes stored The Tapes are archived at a remote location over 100 miles from the data center. Are Audit trails available? Yes, Login Audit trail and a Transaction Audit Trail.