My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Clerk
>
Agenda Packets / Staff Reports
>
City Council (2004 - Present)
>
2025
>
01/21/2025 Regular & Special SA
>
Item 26 - Agreement with Allied Network Solutions, Inc. for Adobe Software and Subscription
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
1/27/2025 5:03:20 PM
Creation date
1/21/2025 2:16:24 PM
Metadata
Fields
Template:
City Clerk
Doc Type
Agenda Packet
Agency
Information Technology
Item #
26
Date
1/21/2025
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
762
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
SOLICITATION # CH16012 <br />Hanna <br />Initial encrypted data load - physical encrypted data transfer possible <br />Encrypted connection to HEC DC - SAP solutions support various VPN-device <br />vendors and specifications that can be used to setup a secure and encrypted <br />tunnel between cloud solutions from SAP on the customer network segment <br />and the customer site. <br />Optional Data at Rest encryption - HANA encryption at Rest activated during <br />system build upon request. <br />Moreover data at rest is properly protected against unauthorized access, <br />these controls include <br />-Physical security controls in SAP HEC Datacenters in place <br />-Physical separation of "online" storage and backup (physically separated DC <br />sections) <br />-Strict User and Access Management (segregation of duties) <br />-Authorization Management according to the need to know principle also for <br />administrative accounts, e.g. DBAs have limited authorizations to perform DB <br />operation only <br />-Security Logging and Security Monitoring for critical activities / access <br />Optional encryption in transit can be configured on customer request which <br />requires a different subset of DC's from delivery perspective. <br />Hybris <br />Encryption is provided through SSL connectivity at the web application layer <br />as well as VPN secure encrypted tunnel for back -office integration <br />connectivity. Further encryption capabilities are available through the hybris <br />Advanced Security Module (optional). <br />SuccessFactors <br />All data in the system is treated as highly sensitive information. The <br />application and infrastructure offers Strong Encryption, Encryption in Transit <br />and Encryption at Rest, including the following (some of these are options that <br />are not included in the base services): <br />Transport Layer Security (TLS) technology, consisting of a public key and a <br />private key, to protect sensitive information. The public key is used to encrypt <br />information and the private key is used to decipher it. When a Web browser <br />points to a secured domain, a handshake authenticates the server (website) <br />and the client (browser). An encryption method is established with a unique <br />session key. Customers may then begin a secure session that facilitates <br />message privacy and integrity. <br />Hitachi SAN storage arrays provide a reliable safe, secure data storage <br />environment. We use AES-256 bit encryption to secure data at the block level <br />of our storage systems. <br />Backups are performed ""disk to disk"". Data is transported over 3DES VPN <br />and stored on encrypted disk using Data Domain replication technology <br />VMware <br />VMWare IaaS Services <br />Data in transit will be encrypted based upon the customers selected method of transport (SSL or <br />IPSEC VPN). <br />Data at rest encryption is the responsibility of the customer. By example HyTrust is an endpoint <br />encryption choice for many vCloud Air customers. <br />VMWare AirWatch <br />AirWatch leverages strong, non-proprietary encryption algorithms to protect applicable data at rest <br />and in transit. Due to FOIA restrictions and the competitive nature of the EMM landscape, we cannot <br />provide specific encryption algorithms and protocols. <br />FireEye <br />Each of the FireEye offered solutions have their own implementations and practices concerning <br />encryption <br />carahsoft <br />carahsoft <br />
The URL can be used to link to this page
Your browser does not support the video tag.