My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2025
>
01/21/2025
>
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/27/2025 5:03:20 PM
Creation date
1/21/2025 2:16:24 PM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Information Technology
Item #
26
Date
1/21/2025
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
762
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
SOLICITATION # CH16012 <br />mechanisms to achieve confidentiality and integrity protections, as appropriate." All secondary <br />storage media (hard drives, disk drives, and tapes) containing customer data are maintained <br />within Salesforce's secure production data centers until the media has been sanitized and <br />destroyed. Salesforce relies on physical access controls as a compensating control to protect the <br />data. <br />For primary data storage, Salesforce provides customers with a built-in capability to apply field - <br />level encryption, using 128-bit keys with AES encryption, for a selection of custom fields included <br />in the Force.com Platform and Salesforce Services. Field -level encryption ensures the data <br />associated with designated fields is encrypted in storage. <br />SAP <br />Ariba <br />Sensitive data elements, including PCI Primary Account Numbers and system <br />account parameters for internal application communications, are stored in <br />Ariba databases encrypted by the AES (Advanced Encryption Standard) and <br />Triple DES (Data Encryption Standard) encryption algorithms with a minimum <br />key length of 128 bits. Encryption technology is also applied for the client <br />connection to the Web site and to the hosted application passwords in <br />storage. Customer user passwords are one way hashed using SHA256 and <br />salted with random data. Limited Ariba Operations personnel have data query <br />access and monitoring rights for the Ariba Hosting program. <br />Field lass <br />Hanna <br />SAP provides for enterprise -grade and industry -standard security. SAP HANA <br />Enterprise Cloud datacenters are enterprise -class security with enterprise - <br />class protection including data encryption, network encryption, firewalling, <br />network isolation, and intrusion detection. HANA data is protected in multiple <br />different ways. SAP HANA Enterprise Cloud is a managed cloud service that <br />employs either a VPN or MPLS connection for transit. By default VPN is <br />encrypted and MPLS can be encrypted. The customer procures the method of <br />connection. At installation, HANA data can be encrypted using a feature called <br />Data Volume Encryption. This encryption protects data in the persistence <br />layer. Storage volume access is restricted to the customer account that <br />created the volume, thus denying all other customer accounts the permission <br />to view or access the volume that includes data isolation, masking, zoning and <br />Logical Unit (LUN) binding. Strict user and access management, authorization <br />management according to the need -to -know principle for administrative <br />accounts, and security logging and security monitoring for critical activities or <br />access, also protect data stored in HANA. <br />Hybris <br />The Hybris platform uses SSL (https) for both the web application tier <br />(browsers and WebService APIs) as well as communicating with back office <br />systems. <br />Data at rest is something that has to be taken into consideration in the <br />application requirements by the partner/customer or PS teams. If encryption is <br />required the application teams need to work on implementing the methods to <br />encrypt and secure the data, for example encrypting data fields in the <br />database. <br />SuccessFactors <br />Each customer's data is maintained in a separate database schema <br />eliminating data segmentation breaches. Each schema has separate <br />authentication credentials and assigned resource profile to restrict access <br />rights and resource consumption. Encryption for data at rest uses the AES256 <br />cipher. All application access is encrypted -in -transit over HTTPS with 128-bit <br />TLS encryption. <br />carahsoft 95 carahsoft <br />
The URL can be used to link to this page
Your browser does not support the video tag.