Introducing G2.ai, the future of software buying.Try now

Network & Infrastructure Security

Can you explain to me your Network & Infrastructure Security?
1 comment
Looks like you’re not logged in.
Users need to be logged in to answer questions
Log In
Qlik AutoML
Official Response
Qlik AutoML
David C.
DC
Director of Product Marketing
0
Hosting: Kraken is hosted on Amazon Web Service (AWS) in the North Virginia region. Full details on the AWS security measures can be found here: https://d1.awsstatic.com/whitepapers/Security/AWS_Security_Whitepaper.pdf Physical Security: For full details of AWS physical security see: https://aws.amazon.com/compliance/data-center/data-centers/ Encryption: All data is encrypted in transit both within the Kraken network and between you and the application using TLS/SSL. The encryption is based on RSA 256 bit keys. Infrastructure Scans: Threat detection scans are running constantly and any identified issues are addressed based on the risk rating produced by the scans. Firewalls: Firewalls exist at both the network layer via virtual private cloud (“VPC”) and on each host. The VPC serves to isolate Kraken servers from the rest of the AWS network. AWS Security Groups (“AWS SG”) and VPC Access Control Lists (“VPC ALC”) provide both inbound, outbound and internal content policies. Audit Log: Infrastructure actions and performance is logged and available for audit, security and compliance purposes. Various alerts are set up on the logging in order to provide early response to incidents.
Looks like you’re not logged in.
Users need to be logged in to write comments
Log In
Reply