SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
CONFIDENTIAL | 1
Security and Operations
Trusting Your Financials to the Cloud
2
Early Decisions…
 Who is our customer?
– Design for accounting and finance professionals
– Enable a community of partners
 Product Strategy
– Best-in-class—stay focused on accounting and finance apps
– Multi-ledger—build a reusable framework is always the approach
– Double-entry
– Approach to the close
 Technology
– Multi-tenancy
– Web Services in the first version
– Php / linux / apache on top of oracle
– Commodity hardware, open source systems, premium
networking, premium hosting
3
The Intacct API
 Accessible via Web Services or custom business logic (triggers)
 Access to all standard and custom objects and fields
 Standard Create, Read, Update, Delete plus readByQuery(), readView()
 Specialty objects designed for external use like GL Total, GL Detail
Roughly 50% of Intacct transactions post via Web Services
4
The Commercial Packaging
Included
Customization
Services
Optional
Web Services
Optional
Platform
 Extensions to standard objects, including
 Custom Fields, Smart Rules, Smart Links, and Smart Events
 Access to Intacct’s API
 Used when integrating an application that is external to the Intacct Service
 Also use to automate Intacct processes via external scripts
 Includes all Customization Services +
 Access to Intacct’s custom application development environment
 Hosting of your custom application within Intacct production operations
5
Intacct Operations
6
Primary Data Center
 World class Savvis Hosting Center
– Access to premium services and network connectivity
– Multi-layer power generation
– State-of-the-art fire suppression
– Redundant HVAC
– Other customers include Salesforce.com, UBS, Adobe, Workday, Merrill Lynch,
Goldman Sachs, Rueters, etc
 Network
– Connections to multiple backbones
– Ample bandwidth burst capacity
– Redundant paths and equipment
 Hardware
– Standard “commodity” servers and other hardware
– All 100% owned by Intacct
– Access controlled cages; managed only by Intacct personnel
7
Backup and Monitoring
 Backups
– Full nightly backups
– Nightly logical exports
– 96 hours of transaction “roll-back” capability–to the minute
– Backups kept on local disk, tape and off-site
– Backups and Redo logs pushed to Disaster Recovery site
– Quarterly database restore testing
– Annual Disaster Recovery testing
 Monitoring
– Redundant external monitoring from multiple Internet locations
– Daily posting of performance on the Intacct website
– Internal system monitors if fine detail (~900 service points)24x7 monitoring and
response coverage
– Detailed performance and usage information allows us to spot issues
– before they become problems
8
Disaster Recovery Center
 Applications are guaranteed to be back up and available within 24 hours even if Savvis
data center is completely destroyed
– Never lose more than two hours of work
– Regularly exercised by Intacct
 No charge to Intacct clients
Recovery
Inventory
Data Center
Sacramento, CA
Disaster
Servers
Collected
Data
Internet
Intacct - Savvis Data Center
San Jose, CA Hot standby
Separate geography
9
Data Security
 All Intacct employees undergo background checks before hire
 Secured networks and production assets:
– Intacct corporate networks are secure
– Production networks are segregated with further access restrictions
– Very limited and controlled access (both physical and logical) to all production
assets
– Continuous internal threat monitoring and periodic 3rd party testing
 Secure application:
– Access to customer data controlled by the customer; must be granted, even to
Intacct support
– Browser sessions all secure
– Partners have an important part to play
10
Buy With Confidence—Why It is Your Friend
 Intacct’s guarantee to your customers
 Covers all Intacct users
 We pay, you don’t
 Industry 1st
 Industry most comprehensive
11
What Does the BWC Cover
Uptime
Response Time
Fix Times
Futures
PS Quality
(Direct)
12
Transparency Operations
https://us.intacct.com/status
13
SSAE 16 SOC 1 Type II AuditType II
• Report is for a period of
time as opposed to a
single point in time
• Includes ongoing
observations and testing
SOC 1
• Service Organization
Control report
• SOC 1 = restricted to
controls relevant to audit
of a user entity’s financial
statements (like SAS 70)
• SOC 2 & SOC 3 = reports
on non-financial controls
at a service organization
Audit
• Examination,
documentation and
testing of an array of
internal controls
• Control “objectives”
specific to Intacct
SSAE 16
• Replaces SAS 70
• Statement on Standards
for Attestation
Engagements No. 16
• To assure safety and
integrity of data while in
the hands of a third party
service organization
14
Intacct’s Control Objectives are Broad
Control Objective No. 1 – Management and Organization: Control activities provide reasonable assurance
that discipline and structure are an integral part of the organization and influence the control consciousness of its personnel.
Control Objective No. 2 – Physical Access and Environmental Security: Control activities provide
reasonable assurance that access to and movement within the corporate facility is properly controlled and monitored. Additionally,
access to server rooms, storage media, and other critical infrastructure is limited based on job responsibilities
Control Objective No. 3 – Data Backup and Restore: Control activities provide reasonable assurance that timely
and periodic data backups are preformed and the associated restore process is tested, access to backup data is limited, and offsite
backups are maintained.
Control Objective No. 4 – System Availability: Control activities provide reasonable assurance that primary runtime
systems are maintained in a manner that helps ensure system availability.
Control Objective No. 5 – Service Level Agreement: Controls provide reasonable assurance that policies and
procedures are in place and appropriately followed such that Intacct can meet the systems availability objectives of its Buy-with-
Confidence service level agreement.
Control Objective No. 6 – Logical Access Security: Control activities provide reasonable assurance that system
information, once entered into the system, is protected from unauthorized or unintentional use, modification, addition or deletion.
Procedures are also in place to keep authentication and access mechanisms effective.
Control Objective No. 7 – Change Management: Control activities provide reasonable assurance that changes to
Intacct’s on-demand financial management and accounting applications and supporting systems are properly authorized, tested,
approved, implemented and documented.
Control Objective No. 8 – Network Security: Control activities provide reasonable assurance that the security
infrastructure limits unauthorized access to internal networks and external threats are appropriately limited.
15
Other Certifications and Compliance
Privacy Policy
16
Governance & Compliance
 GAAP / SOX Compliant
 Complete Audit Trails
 SAS 70 Type II Certified
 PCI DSS Compliant
 Granular Access Control
 Smart Rules / Alerts
 Automated Sales Tax

Weitere ähnliche Inhalte

Was ist angesagt?

Managed Resilience: Unparalleled Protection for Your IBM i System Availabilit...
Managed Resilience: Unparalleled Protection for Your IBM i System Availabilit...Managed Resilience: Unparalleled Protection for Your IBM i System Availabilit...
Managed Resilience: Unparalleled Protection for Your IBM i System Availabilit...Precisely
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringKimberly Simon MBA
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as UsualControlCase
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS ComplianceControlCase
 
Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014learPriority
 
Data Discovery and PCI DSS
Data Discovery and PCI DSSData Discovery and PCI DSS
Data Discovery and PCI DSSControlCase
 
PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0ControlCase
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECKimberly Simon MBA
 
Log monitoring and file integrity monitoring
Log monitoring and file integrity monitoringLog monitoring and file integrity monitoring
Log monitoring and file integrity monitoringControlCase
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)Kimberly Simon MBA
 
Making Compliance Business as Usual
Making Compliance Business as UsualMaking Compliance Business as Usual
Making Compliance Business as UsualControlCase
 
PowerTech - Part-Time Privileges: Accountability for Powerful Users
PowerTech - Part-Time Privileges: Accountability for Powerful UsersPowerTech - Part-Time Privileges: Accountability for Powerful Users
PowerTech - Part-Time Privileges: Accountability for Powerful UsersHelpSystems
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the CloudControlCase
 
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001ControlCase
 
Rest Solution : NOC-as-a-service
Rest Solution : NOC-as-a-serviceRest Solution : NOC-as-a-service
Rest Solution : NOC-as-a-serviceChristian Torres
 
ControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSSControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSSControlCase
 

Was ist angesagt? (20)

Managed Resilience: Unparalleled Protection for Your IBM i System Availabilit...
Managed Resilience: Unparalleled Protection for Your IBM i System Availabilit...Managed Resilience: Unparalleled Protection for Your IBM i System Availabilit...
Managed Resilience: Unparalleled Protection for Your IBM i System Availabilit...
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
Flip IT Data Sheet 2015
Flip IT Data Sheet 2015Flip IT Data Sheet 2015
Flip IT Data Sheet 2015
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014Clear priority analyst presentation jan 2014
Clear priority analyst presentation jan 2014
 
Data Discovery and PCI DSS
Data Discovery and PCI DSSData Discovery and PCI DSS
Data Discovery and PCI DSS
 
DTS Services
DTS ServicesDTS Services
DTS Services
 
PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
 
Log monitoring and file integrity monitoring
Log monitoring and file integrity monitoringLog monitoring and file integrity monitoring
Log monitoring and file integrity monitoring
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
 
Making Compliance Business as Usual
Making Compliance Business as UsualMaking Compliance Business as Usual
Making Compliance Business as Usual
 
PowerTech - Part-Time Privileges: Accountability for Powerful Users
PowerTech - Part-Time Privileges: Accountability for Powerful UsersPowerTech - Part-Time Privileges: Accountability for Powerful Users
PowerTech - Part-Time Privileges: Accountability for Powerful Users
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
 
Rest Solution : NOC-as-a-service
Rest Solution : NOC-as-a-serviceRest Solution : NOC-as-a-service
Rest Solution : NOC-as-a-service
 
ControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSSControlCase Data Discovery and PCI DSS
ControlCase Data Discovery and PCI DSS
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 

Ähnlich wie Intacct Security and Operations

PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)ControlCase
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as UsualControlCase
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Software India
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Glen Roberts, CISSP
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentationArt Morrison
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentationArt Morrison
 
Mi intellithink c
Mi intellithink cMi intellithink c
Mi intellithink cethirajk1
 
Monitoring As a Service
Monitoring As a ServiceMonitoring As a Service
Monitoring As a ServiceAmit Panchal
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?mbmobile
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualKimberly Simon MBA
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereGiovanni Zanasca
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5Lisa Niles
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyKevin Lloyd
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.Imperva
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technologynerdsonsite
 
PCI Compliance White Paper
PCI Compliance White PaperPCI Compliance White Paper
PCI Compliance White PaperRaz-Lee Security
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliancesAhmadi Madi
 

Ähnlich wie Intacct Security and Operations (20)

PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
 
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 
Text-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docxText-DISA_Review_Questions.docx
Text-DISA_Review_Questions.docx
 
Mi intellithink c
Mi intellithink cMi intellithink c
Mi intellithink c
 
Monitoring As a Service
Monitoring As a ServiceMonitoring As a Service
Monitoring As a Service
 
How much does it cost to be Secure?
How much does it cost to be Secure?How much does it cost to be Secure?
How much does it cost to be Secure?
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as Usual
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
 
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5SynerComm's Tech TV  series CIS Top 20 Critical Security Controls #5
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #5
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
PCI Compliance White Paper
PCI Compliance White PaperPCI Compliance White Paper
PCI Compliance White Paper
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
 

Mehr von Dean Dorton Software Team

Mehr von Dean Dorton Software Team (11)

Angus Barn 2023 Nonprofit Event
Angus Barn 2023 Nonprofit EventAngus Barn 2023 Nonprofit Event
Angus Barn 2023 Nonprofit Event
 
Massey Consulting Sage Intacct Naming Convention Best Practices
Massey Consulting Sage Intacct Naming Convention Best PracticesMassey Consulting Sage Intacct Naming Convention Best Practices
Massey Consulting Sage Intacct Naming Convention Best Practices
 
Tech-Savvy CFOs Ensure Growth Through Compliance
Tech-Savvy CFOs Ensure Growth Through ComplianceTech-Savvy CFOs Ensure Growth Through Compliance
Tech-Savvy CFOs Ensure Growth Through Compliance
 
Raleigh CFO Forum 2017 Budgeting Software Review
Raleigh CFO Forum 2017 Budgeting Software ReviewRaleigh CFO Forum 2017 Budgeting Software Review
Raleigh CFO Forum 2017 Budgeting Software Review
 
Dynamics GP Year end close 2015
Dynamics GP Year end close 2015Dynamics GP Year end close 2015
Dynamics GP Year end close 2015
 
11 Reasons Companies Will Move Their Accounting To The Cloud in 2016
11 Reasons Companies Will Move Their Accounting To The Cloud in 201611 Reasons Companies Will Move Their Accounting To The Cloud in 2016
11 Reasons Companies Will Move Their Accounting To The Cloud in 2016
 
Dynamics GP 2014 Year End Slides
Dynamics GP 2014 Year End SlidesDynamics GP 2014 Year End Slides
Dynamics GP 2014 Year End Slides
 
Life After QuickBooks
Life After QuickBooksLife After QuickBooks
Life After QuickBooks
 
Library presentation 2012 01-28
Library presentation 2012 01-28Library presentation 2012 01-28
Library presentation 2012 01-28
 
6 Things To Look For In A Technology Partner
6 Things To Look For In A Technology Partner6 Things To Look For In A Technology Partner
6 Things To Look For In A Technology Partner
 
CPAs And Social Media
CPAs And Social MediaCPAs And Social Media
CPAs And Social Media
 

Kürzlich hochgeladen

trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansNugget Global
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Aggregage
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Careerr98588472
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHelp Desk Migration
 
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfDarshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfShashank Mehta
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfDanny Diep To
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverseSiemens
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdfChris Skinner
 
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...PRnews2
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
71368-80-4.pdf Fast delivery good quality
71368-80-4.pdf Fast delivery  good quality71368-80-4.pdf Fast delivery  good quality
71368-80-4.pdf Fast delivery good qualitycathy664059
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 

Kürzlich hochgeladen (20)

WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Simplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business LoansSimplify Your Funding: Quick and Easy Business Loans
Simplify Your Funding: Quick and Easy Business Loans
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 
Neha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and CareerNeha Jhalani Hiranandani: A Guide to Her Life and Career
Neha Jhalani Hiranandani: A Guide to Her Life and Career
 
How to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your BusinessHow to Conduct a Service Gap Analysis for Your Business
How to Conduct a Service Gap Analysis for Your Business
 
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdfDarshan Hiranandani (Son of Niranjan Hiranandani).pdf
Darshan Hiranandani (Son of Niranjan Hiranandani).pdf
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdfGUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
GUIDELINES ON USEFUL FORMS IN FREIGHT FORWARDING (F) Danny Diep Toh MBA.pdf
 
Interoperability and ecosystems: Assembling the industrial metaverse
Interoperability and ecosystems:  Assembling the industrial metaverseInteroperability and ecosystems:  Assembling the industrial metaverse
Interoperability and ecosystems: Assembling the industrial metaverse
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
20220816-EthicsGrade_Scorecard-JP_Morgan_Chase-Q2-63_57.pdf
 
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
Introducing the AI ShillText Generator A New Era for Cryptocurrency Marketing...
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
71368-80-4.pdf Fast delivery good quality
71368-80-4.pdf Fast delivery  good quality71368-80-4.pdf Fast delivery  good quality
71368-80-4.pdf Fast delivery good quality
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 

Intacct Security and Operations

  • 1. CONFIDENTIAL | 1 Security and Operations Trusting Your Financials to the Cloud
  • 2. 2 Early Decisions…  Who is our customer? – Design for accounting and finance professionals – Enable a community of partners  Product Strategy – Best-in-class—stay focused on accounting and finance apps – Multi-ledger—build a reusable framework is always the approach – Double-entry – Approach to the close  Technology – Multi-tenancy – Web Services in the first version – Php / linux / apache on top of oracle – Commodity hardware, open source systems, premium networking, premium hosting
  • 3. 3 The Intacct API  Accessible via Web Services or custom business logic (triggers)  Access to all standard and custom objects and fields  Standard Create, Read, Update, Delete plus readByQuery(), readView()  Specialty objects designed for external use like GL Total, GL Detail Roughly 50% of Intacct transactions post via Web Services
  • 4. 4 The Commercial Packaging Included Customization Services Optional Web Services Optional Platform  Extensions to standard objects, including  Custom Fields, Smart Rules, Smart Links, and Smart Events  Access to Intacct’s API  Used when integrating an application that is external to the Intacct Service  Also use to automate Intacct processes via external scripts  Includes all Customization Services +  Access to Intacct’s custom application development environment  Hosting of your custom application within Intacct production operations
  • 6. 6 Primary Data Center  World class Savvis Hosting Center – Access to premium services and network connectivity – Multi-layer power generation – State-of-the-art fire suppression – Redundant HVAC – Other customers include Salesforce.com, UBS, Adobe, Workday, Merrill Lynch, Goldman Sachs, Rueters, etc  Network – Connections to multiple backbones – Ample bandwidth burst capacity – Redundant paths and equipment  Hardware – Standard “commodity” servers and other hardware – All 100% owned by Intacct – Access controlled cages; managed only by Intacct personnel
  • 7. 7 Backup and Monitoring  Backups – Full nightly backups – Nightly logical exports – 96 hours of transaction “roll-back” capability–to the minute – Backups kept on local disk, tape and off-site – Backups and Redo logs pushed to Disaster Recovery site – Quarterly database restore testing – Annual Disaster Recovery testing  Monitoring – Redundant external monitoring from multiple Internet locations – Daily posting of performance on the Intacct website – Internal system monitors if fine detail (~900 service points)24x7 monitoring and response coverage – Detailed performance and usage information allows us to spot issues – before they become problems
  • 8. 8 Disaster Recovery Center  Applications are guaranteed to be back up and available within 24 hours even if Savvis data center is completely destroyed – Never lose more than two hours of work – Regularly exercised by Intacct  No charge to Intacct clients Recovery Inventory Data Center Sacramento, CA Disaster Servers Collected Data Internet Intacct - Savvis Data Center San Jose, CA Hot standby Separate geography
  • 9. 9 Data Security  All Intacct employees undergo background checks before hire  Secured networks and production assets: – Intacct corporate networks are secure – Production networks are segregated with further access restrictions – Very limited and controlled access (both physical and logical) to all production assets – Continuous internal threat monitoring and periodic 3rd party testing  Secure application: – Access to customer data controlled by the customer; must be granted, even to Intacct support – Browser sessions all secure – Partners have an important part to play
  • 10. 10 Buy With Confidence—Why It is Your Friend  Intacct’s guarantee to your customers  Covers all Intacct users  We pay, you don’t  Industry 1st  Industry most comprehensive
  • 11. 11 What Does the BWC Cover Uptime Response Time Fix Times Futures PS Quality (Direct)
  • 13. 13 SSAE 16 SOC 1 Type II AuditType II • Report is for a period of time as opposed to a single point in time • Includes ongoing observations and testing SOC 1 • Service Organization Control report • SOC 1 = restricted to controls relevant to audit of a user entity’s financial statements (like SAS 70) • SOC 2 & SOC 3 = reports on non-financial controls at a service organization Audit • Examination, documentation and testing of an array of internal controls • Control “objectives” specific to Intacct SSAE 16 • Replaces SAS 70 • Statement on Standards for Attestation Engagements No. 16 • To assure safety and integrity of data while in the hands of a third party service organization
  • 14. 14 Intacct’s Control Objectives are Broad Control Objective No. 1 – Management and Organization: Control activities provide reasonable assurance that discipline and structure are an integral part of the organization and influence the control consciousness of its personnel. Control Objective No. 2 – Physical Access and Environmental Security: Control activities provide reasonable assurance that access to and movement within the corporate facility is properly controlled and monitored. Additionally, access to server rooms, storage media, and other critical infrastructure is limited based on job responsibilities Control Objective No. 3 – Data Backup and Restore: Control activities provide reasonable assurance that timely and periodic data backups are preformed and the associated restore process is tested, access to backup data is limited, and offsite backups are maintained. Control Objective No. 4 – System Availability: Control activities provide reasonable assurance that primary runtime systems are maintained in a manner that helps ensure system availability. Control Objective No. 5 – Service Level Agreement: Controls provide reasonable assurance that policies and procedures are in place and appropriately followed such that Intacct can meet the systems availability objectives of its Buy-with- Confidence service level agreement. Control Objective No. 6 – Logical Access Security: Control activities provide reasonable assurance that system information, once entered into the system, is protected from unauthorized or unintentional use, modification, addition or deletion. Procedures are also in place to keep authentication and access mechanisms effective. Control Objective No. 7 – Change Management: Control activities provide reasonable assurance that changes to Intacct’s on-demand financial management and accounting applications and supporting systems are properly authorized, tested, approved, implemented and documented. Control Objective No. 8 – Network Security: Control activities provide reasonable assurance that the security infrastructure limits unauthorized access to internal networks and external threats are appropriately limited.
  • 15. 15 Other Certifications and Compliance Privacy Policy
  • 16. 16 Governance & Compliance  GAAP / SOX Compliant  Complete Audit Trails  SAS 70 Type II Certified  PCI DSS Compliant  Granular Access Control  Smart Rules / Alerts  Automated Sales Tax