My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2025
>
01/21/2025
>
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/27/2025 5:03:20 PM
Creation date
1/21/2025 2:16:24 PM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Information Technology
Item #
26
Date
1/21/2025
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
762
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
SOLICITATION # CH16012 <br />The multitenant architecture and secure logical controls address separation of Customer Data. The <br />Salesforce infrastructure is divided into a modular architecture based on "instances". Each instance <br />is capable of supporting several thousand customers in a secure and efficient manner. Salesforce <br />uses the instance architecture to continue to scale and meet the demands of our customers. There <br />are appropriate controls in place designed to prevent any given customer's Salesforce instance from <br />being compromised. This functionality has been designed and undergoes robust testing through an <br />on -going process by both Salesforce and its customers. <br />QTS <br />The QTS cloud makes use of unique managed service provider architecture layer(s). Information <br />systems, particularly those based on cloud architecture models, are made up of different service <br />layers. The layers of the QTS cloud that are defined in its System Security Plan, and are not <br />leveraged by any other Provisional Authorizations, are: Infrastructure as a Service (laaS). Note: <br />Please refer to NIST SP 800-145 for information on cloud computing architecture models. <br />SAP <br />Ariba <br />Ariba recognizes that security is a critical component of effective <br />electronic commerce architecture and takes necessary security <br />measures to protect any information passed between buyers and <br />suppliers. Ariba implements security using a variety of hardware, <br />software, and procedural best practices. Full details about our security <br />mechanisms and procedures are available in Chapter 3 of the Ariba <br />Cloud Technical Infrastructure Whitepaper. <br />Hanna <br />N/A, HANA Enterprise Cloud is a private managed cloud <br />SuccessFactors <br />We understand the critical importance of information protection and <br />recognize the contribution that information security makes to an <br />organization's strategic initiatives and overall risk management. <br />We have implemented security controls and practices designed to <br />protect the confidentiality, integrity, and availability of customer <br />information. We continually work to strengthen and improve those <br />security controls and practices as well. <br />The current best practices associated with information security involve <br />a layered approach, what the industry calls "defense in depth." <br />Regardless of the software delivery model, security cannot be <br />implemented at a single "make or break" point. For a SaaS provider to <br />facilitate data security for sensitive information, it must have a <br />comprehensive, multifaceted security program in place. We take a <br />holistic approach to information security, implementing a multilayered <br />defense at all the touch points in the information flow —both the <br />physical and logical, applied across the database, middleware, <br />application, and network and communication layers —to offer complete <br />data privacy, transparency, and audit controls. <br />VMware <br />Compliance Reference Architecture Framework (RAF) that provides a consistent method for <br />VMware, its partners, and customers to assess and evaluate the impact of regulations on virtual and <br />cloud environments. The intent of the RAF is to provide a single framework for VMware, its partners, <br />and organizations to address a variety of compliance requirements across an IT infrastructure. This <br />includes: Product Applicability Guide (PAG), Architecture Design Guide (ADG), and a Validated <br />Reference Architecture (VRA). <br />FireEye <br />High-level architecture diagrams following industry best practices utilizing both virtual and physical <br />controls are available and contained in the SOC 2 Type 2 report. <br />VirtueStream <br />Virtustream Cloud Platform Security (for the Infrastructure -as -a -Service environment) is designed, <br />built, and operated to provide highest level of infrastructure security available. <br />Proposed State of Utah Security Architecture <br />carahsoft 90 carahsoft <br />
The URL can be used to link to this page
Your browser does not support the video tag.