security
DESCRIPTION
This presentation is the eighth and final in the series titled, "Enterprise Collaboration Shouldn't Be a Pile of Legos." You will learn about Jive's top-of-the-line security features. For more information, download the full eBook here: http://bit.ly/1wm9nr7 Jive is the world's #1 social business platform. We help employees, customers and partners connect, collaborate and communicate to achieve breakthrough results in sales, marketing, customer service and workforce productivity.TRANSCRIPT
![Page 1: Security](https://reader036.vdocuments.mx/reader036/viewer/2022070303/54b6aed44a7959a47b8b45d2/html5/thumbnails/1.jpg)
Enterprise Security
![Page 2: Security](https://reader036.vdocuments.mx/reader036/viewer/2022070303/54b6aed44a7959a47b8b45d2/html5/thumbnails/2.jpg)
Jive is used by some of the most security-conscious enterprises in the world.
![Page 3: Security](https://reader036.vdocuments.mx/reader036/viewer/2022070303/54b6aed44a7959a47b8b45d2/html5/thumbnails/3.jpg)
No compromises approach to security, compliance, privacy, and availability.
Adherence to the strictest standards in the industry.
Highly trained and experienced staff.
Best-of-breed technology.
Flexibility to meet diverse customer requirements.
![Page 4: Security](https://reader036.vdocuments.mx/reader036/viewer/2022070303/54b6aed44a7959a47b8b45d2/html5/thumbnails/4.jpg)
Secure Data Centers Logical Isolation Security Monitoring Best-in-Class Hardware Strict Access Controls Everything is Audited Hardened Operating Systems Separated Services Strict Ingress and Egress Points
Jive Security Architecture
![Page 5: Security](https://reader036.vdocuments.mx/reader036/viewer/2022070303/54b6aed44a7959a47b8b45d2/html5/thumbnails/5.jpg)
VirtualizationNetwork Infrastructure Security
![Page 6: Security](https://reader036.vdocuments.mx/reader036/viewer/2022070303/54b6aed44a7959a47b8b45d2/html5/thumbnails/6.jpg)
Data SecurityRestricted Access to Customer Data
Incident and Response
Logging and Audit
Training
![Page 7: Security](https://reader036.vdocuments.mx/reader036/viewer/2022070303/54b6aed44a7959a47b8b45d2/html5/thumbnails/7.jpg)
Certification of ComplianceJive Hosting is SOC2 Certified
!
Safe Harbor and Truste Certified !
Data Center Facilities are SSAE 16 SOC1/ISO27001 Certified
![Page 8: Security](https://reader036.vdocuments.mx/reader036/viewer/2022070303/54b6aed44a7959a47b8b45d2/html5/thumbnails/8.jpg)
Certified Security Personnel
Jive’s security team includes
Information Security professionals
with expertise in application, network, and architecture security.
![Page 9: Security](https://reader036.vdocuments.mx/reader036/viewer/2022070303/54b6aed44a7959a47b8b45d2/html5/thumbnails/9.jpg)
Security is continuously improved and tested throughout the Jive
product lifecycle.
Software Engineering Security Process
![Page 10: Security](https://reader036.vdocuments.mx/reader036/viewer/2022070303/54b6aed44a7959a47b8b45d2/html5/thumbnails/10.jpg)
Jive maintains secure programming
best practice documents based on OWASP requirements, which are mandatory reading
for all our developers.
Best Practices
![Page 11: Security](https://reader036.vdocuments.mx/reader036/viewer/2022070303/54b6aed44a7959a47b8b45d2/html5/thumbnails/11.jpg)
Release readiness workflow includes continuous security tests and assessments.
!Jive fixes critical vulnerabilities within one business week,
and customers are always notified. !
Built-in features for configuring security.
QA Security Process
![Page 12: Security](https://reader036.vdocuments.mx/reader036/viewer/2022070303/54b6aed44a7959a47b8b45d2/html5/thumbnails/12.jpg)
ToolsIntrusion Detection Systems
Distributed Denial of Service Detection
Security and Event Management
Regular Application Security Scans
![Page 13: Security](https://reader036.vdocuments.mx/reader036/viewer/2022070303/54b6aed44a7959a47b8b45d2/html5/thumbnails/13.jpg)
Use Jive to connect people, applications, and systems, and deliver a unified collaboration
experience across your infrastructure - one that people will actually use to
work better together.
![Page 14: Security](https://reader036.vdocuments.mx/reader036/viewer/2022070303/54b6aed44a7959a47b8b45d2/html5/thumbnails/14.jpg)
For more information, view the full eBook by clicking here.