SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Teamwork.com
SECURITY OVERVIEW
www.teamwork.com/security
More info at www.teamwork.com/security Page 2/12
Secure collaboration on your projects
with Teamwork.com
Over 250,000 companies worldwide in 147 countries trust Teamwork.com to manage their
projects in the cloud - and we take this trust very seriously. Our top priority is to ensure that
your project-related data remains secure and confidential, and we adhere to the highest
professional security standards to do so. Our goal is to provide you with an easy-to-use,
flexible, and scalable project management application with dependable service and
comprehensive security at all levels. And we succeed at this - we've never had a security
breach or lost customer files. To keep our environment secure, we constantly focus on
maintaining the reliability of our product, infrastructure, technologies, and procedures. Our
security model consists of three elements: physical, network, and content. Here's how we deal
with each of them..
More info at www.teamwork.com/security Page 3/12
Physical security
We host Teamwork.com within the Amazon's Web Services (AWS) environment. These are
world-class data centers and we make use of their web/application servers, file servers, and
databases. The Teamwork.com system spans several layers of the AWS in that we utilize the
Elastic Computing (EC2) for our application and web servers, and additionally for other file
servers. The file servers are connected to the AWS Storage facility (S3), while the application is
connected to the Relational Database System (RDS).
Key to all of our security measures is the physical security of the AWS data centers. The
buildings that house the centers have significant physical access control, and incorporate
extensive seismic bracing as well as the latest smoke and fire early-detection systems. The
sites are monitored constantly, 24x7x365, by digital surveillance systems.
More info at www.teamwork.com/security Page 4/12
The digital security of our system and your information resides behind the AWS firewall, Spam
and DOS protections, and is only visible to specifically monitored IP addresses. In effect, you
connect to Teamwork.com through an AWS load-balancer via the AWS network, so it shouldn't
matter where the computers are. But for reference, Teamwork.com straddles multiple 'zones'
in the Virginia AWS Data Center (a short walk away from the AWS U.S. government servers).
The third element of the physical security of your data is backups. At the AWS data
centers, all the databases are backed up twice a day by one of the file servers and then backed
up to the S3 storage. The RDS Databases are configured to point-in-time recovery, up to the
last 5 minutes, within the previous 3 day period, and snapshots of the Database servers are
taken every morning (GMT). All primary database servers have fully replicated slaves and are
always in sync. The application and file servers are snapshot on a regular schedule.
More info at www.teamwork.com/security Page 5/12
Along with the backups comes the ability to restore the data if needed, and our customer care
team can help you with this.
So, the physical location is secure, your data is safe behind firewalls and spam protections, and
you can retrieve anything from the data backups. But what of uptime, the security of being
able to access your projects on Teamwork.com whenever you want to?
Since launching our first product in 2007, Teamwork.com’s uptime has consistently exceeded
99%. Running Teamwork.com in the AWS environment, compared to a more traditional ISP
hosting provider, means that all services are essentially virtual, and so are not vulnerable to
physical hardware failures. Yes, we are sharing the AWS environment with many other
companies, but sharing resources is what is contributing to our outstanding uptime
percentage.
More info at www.teamwork.com/security Page 6/12
Network security
Network security consists of two elements that both need to be considered: the security of the
infrastructure itself and then of the data within it.
Industry standard protection procedures for our network infrastructure are an integral part of
Teamwork.com's engineering culture. Between us, we have many years of experience with
protection mechanisms such as firewalled servers and alert mechanisms. But these specifics
are based on years of experience, and a deep understanding of the entire picture of network
security: operations, back-end, front-end, and social engineering. Appreciating the whole
scope gives us the edge in our security measures.
More info at www.teamwork.com/security Page 7/12
The other side of network security is data protection. At Teamwork.com we encrypt all your
data with
256-bit Secure Socket Layer (SSL) with the AES algorithm and 2048-bit key length. You're secure
on two fronts as, when you access Teamwork.com, SSL technology protects your information
using both server authentication and data encryption. This is equivalent to the data security
methods used in banking and leading e-commerce sites. And we don't play favorites with our
data encryption - it's the same across the board, whatever your subscription type.
With the network secure and your data encrypted, we now turn to the security of the content
of your files.
More info at www.teamwork.com/security Page 8/12
Content security
Content security revolves around who has access to your data, whether it's our staff running
the data center infrastructure or your project team members who you give access rights to.
We'll start with us.
The Teamwork.com team members have years of experience in designing and operating data
centers, as well as in continually improving the processes that aren't working so well or that
can be adjusted to work more efficiently and effectively. Based on all our experience, we've
developed world class practices for managing security and data protection risk. We strongly
believe that designing and running a data center infrastructure requires not just technology,
but a disciplined approach to the processes involved - escalation, management, knowledge
sharing, risk, as well as the day-to-day operations.
More info at www.teamwork.com/security Page 9/12
It's not just our wealth of experience that sets us apart from other companies in this area, it's
also our
philosophy of teamwork. We have team members, not employees. An employee is a pawn to
be sacrificed, a team member will have your back. We know all members of our team
personally, and they have the highest clearance to access the data center data. That said, we
also strictly regulate access and passwords to those few team members who need to access
the customer data for troubleshooting or to provide support, and we keep a log of all such
access. And even then, we won't go into your data without your permission (perhaps as part of
a support incident), and into the data center data only on the go-ahead from senior security
management for support and maintenance.
And now about you. You control access to your data on Teamwork.com through user
authentication and user rights.
More info at www.teamwork.com/security Page 10/12
User authentication ensures that only valid users can get into your project management
system. Each
user in Teamwork.com has a unique account protected with a password. This account is tied to
a verified email address that must be entered when a user logs in. For additional security, you
have the option to require that passwords be high-security alphanumeric passwords.
Once in Teamwork.com, each user is limited in actions to those assigned to her by the
Teamwork.com Project Administrator through user-level granular, rights and permissions,
settings. Permissions allow a user to perform certain actions and activities within
Teamwork.com, such as adding and editing tasks, or deleting files. The Administrator and
Project Administrator have the power to determine who can do what in which project.
Content security is also about who can see what kinds of data are in your Teamwork.com
projects. Your projects and tasks are accessible only to you unless you explicitly share the data
with someone else in your account, or place the information in a shared notebook.
More info at www.teamwork.com/security Page 11/12
And the security of your data content itself should be of concern to you. What happens if you
accidentally delete something, or later decide that you do need data that you've gotten rid of?
We've covered this too. You can safely recover the accidentally deleted items from
Teamwork.com’s recycle bin at any time. And, just in case you've tidied up and emptied your
recycle bin, we keep a backup of the removed data for approximately two weeks. Contact our
customer support team in this period to restore it for you. And, if you delete a user who you
later want to reinstate, we can do that too, along with all her tasks, as long as you contact us
within a month.
phone: +353 86 047 0620 | e-mail: emmet.florish@teamwork.com Page 12/12
Want to know
more?
For further details on how Teamwork.com collects and processes your
information, please refer to our Privacy Policy. To learn more about how
Teamwork.com’s service is delivered, please read our Terms of Service. If you
have any questions about the security of Teamwork.com, contact us anytime at
support@teamwork.com and we’ll get back to you quickly.

Weitere ähnliche Inhalte

Was ist angesagt?

Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Bloombase
 

Was ist angesagt? (20)

Protect customer's personal information eng 191018
Protect customer's personal information eng 191018Protect customer's personal information eng 191018
Protect customer's personal information eng 191018
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Office 365 data loss prevention
Office 365 data loss preventionOffice 365 data loss prevention
Office 365 data loss prevention
 
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...Practical advice for cloud data protection   ulf mattsson - oracle nyoug sep ...
Practical advice for cloud data protection ulf mattsson - oracle nyoug sep ...
 
Cloud computinghuthcebula
Cloud computinghuthcebulaCloud computinghuthcebula
Cloud computinghuthcebula
 
Data breaach mitigation
Data breaach mitigationData breaach mitigation
Data breaach mitigation
 
The Basics of Cloud Computing
The Basics of Cloud ComputingThe Basics of Cloud Computing
The Basics of Cloud Computing
 
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
From Brainstorm to Build: How leading law firm, Minter Ellison, built a highl...
 
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
Blbs prod-bloombase-store safe-product-brochure-uslet-en-r3
 
DirectShare by Cloudtenna
DirectShare by CloudtennaDirectShare by Cloudtenna
DirectShare by Cloudtenna
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm
 
Security Problem With Cloud Computing
Security Problem With Cloud ComputingSecurity Problem With Cloud Computing
Security Problem With Cloud Computing
 
CaelumOne Based Enterprise Content Management Solution
CaelumOne Based Enterprise Content Management SolutionCaelumOne Based Enterprise Content Management Solution
CaelumOne Based Enterprise Content Management Solution
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
 
Cloud
CloudCloud
Cloud
 
Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...Office365 in today's digital threats landscape: attacks & remedies from a hac...
Office365 in today's digital threats landscape: attacks & remedies from a hac...
 
Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018 Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
 
Inforouterproducttour V7
Inforouterproducttour V7Inforouterproducttour V7
Inforouterproducttour V7
 
Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
 

Ähnlich wie Teamwork.com Security Overvew

Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docx
edgar6wallace88877
 
How to implement cloud computing security
How to implement cloud computing securityHow to implement cloud computing security
How to implement cloud computing security
Randall Spence
 
Infrastructure and security (2)
Infrastructure and security (2)Infrastructure and security (2)
Infrastructure and security (2)
revathipqr
 

Ähnlich wie Teamwork.com Security Overvew (20)

Data Security
Data SecurityData Security
Data Security
 
10 server security hacks to secure your web servers
10 server security hacks to secure your web servers10 server security hacks to secure your web servers
10 server security hacks to secure your web servers
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
Presentation1
Presentation1Presentation1
Presentation1
 
What is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptxWhat is the significance of cybersecurity in cloud.pptx
What is the significance of cybersecurity in cloud.pptx
 
Service now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docxService now is a software platform that supports IT service manag.docx
Service now is a software platform that supports IT service manag.docx
 
Pros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptxPros And Cons Of Cloud-Based Security Solutions.pptx
Pros And Cons Of Cloud-Based Security Solutions.pptx
 
How to implement cloud computing security
How to implement cloud computing securityHow to implement cloud computing security
How to implement cloud computing security
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloud
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Infrastructure and security (2)
Infrastructure and security (2)Infrastructure and security (2)
Infrastructure and security (2)
 

Kürzlich hochgeladen

%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 

Kürzlich hochgeladen (20)

%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 

Teamwork.com Security Overvew

  • 2. More info at www.teamwork.com/security Page 2/12 Secure collaboration on your projects with Teamwork.com Over 250,000 companies worldwide in 147 countries trust Teamwork.com to manage their projects in the cloud - and we take this trust very seriously. Our top priority is to ensure that your project-related data remains secure and confidential, and we adhere to the highest professional security standards to do so. Our goal is to provide you with an easy-to-use, flexible, and scalable project management application with dependable service and comprehensive security at all levels. And we succeed at this - we've never had a security breach or lost customer files. To keep our environment secure, we constantly focus on maintaining the reliability of our product, infrastructure, technologies, and procedures. Our security model consists of three elements: physical, network, and content. Here's how we deal with each of them..
  • 3. More info at www.teamwork.com/security Page 3/12 Physical security We host Teamwork.com within the Amazon's Web Services (AWS) environment. These are world-class data centers and we make use of their web/application servers, file servers, and databases. The Teamwork.com system spans several layers of the AWS in that we utilize the Elastic Computing (EC2) for our application and web servers, and additionally for other file servers. The file servers are connected to the AWS Storage facility (S3), while the application is connected to the Relational Database System (RDS). Key to all of our security measures is the physical security of the AWS data centers. The buildings that house the centers have significant physical access control, and incorporate extensive seismic bracing as well as the latest smoke and fire early-detection systems. The sites are monitored constantly, 24x7x365, by digital surveillance systems.
  • 4. More info at www.teamwork.com/security Page 4/12 The digital security of our system and your information resides behind the AWS firewall, Spam and DOS protections, and is only visible to specifically monitored IP addresses. In effect, you connect to Teamwork.com through an AWS load-balancer via the AWS network, so it shouldn't matter where the computers are. But for reference, Teamwork.com straddles multiple 'zones' in the Virginia AWS Data Center (a short walk away from the AWS U.S. government servers). The third element of the physical security of your data is backups. At the AWS data centers, all the databases are backed up twice a day by one of the file servers and then backed up to the S3 storage. The RDS Databases are configured to point-in-time recovery, up to the last 5 minutes, within the previous 3 day period, and snapshots of the Database servers are taken every morning (GMT). All primary database servers have fully replicated slaves and are always in sync. The application and file servers are snapshot on a regular schedule.
  • 5. More info at www.teamwork.com/security Page 5/12 Along with the backups comes the ability to restore the data if needed, and our customer care team can help you with this. So, the physical location is secure, your data is safe behind firewalls and spam protections, and you can retrieve anything from the data backups. But what of uptime, the security of being able to access your projects on Teamwork.com whenever you want to? Since launching our first product in 2007, Teamwork.com’s uptime has consistently exceeded 99%. Running Teamwork.com in the AWS environment, compared to a more traditional ISP hosting provider, means that all services are essentially virtual, and so are not vulnerable to physical hardware failures. Yes, we are sharing the AWS environment with many other companies, but sharing resources is what is contributing to our outstanding uptime percentage.
  • 6. More info at www.teamwork.com/security Page 6/12 Network security Network security consists of two elements that both need to be considered: the security of the infrastructure itself and then of the data within it. Industry standard protection procedures for our network infrastructure are an integral part of Teamwork.com's engineering culture. Between us, we have many years of experience with protection mechanisms such as firewalled servers and alert mechanisms. But these specifics are based on years of experience, and a deep understanding of the entire picture of network security: operations, back-end, front-end, and social engineering. Appreciating the whole scope gives us the edge in our security measures.
  • 7. More info at www.teamwork.com/security Page 7/12 The other side of network security is data protection. At Teamwork.com we encrypt all your data with 256-bit Secure Socket Layer (SSL) with the AES algorithm and 2048-bit key length. You're secure on two fronts as, when you access Teamwork.com, SSL technology protects your information using both server authentication and data encryption. This is equivalent to the data security methods used in banking and leading e-commerce sites. And we don't play favorites with our data encryption - it's the same across the board, whatever your subscription type. With the network secure and your data encrypted, we now turn to the security of the content of your files.
  • 8. More info at www.teamwork.com/security Page 8/12 Content security Content security revolves around who has access to your data, whether it's our staff running the data center infrastructure or your project team members who you give access rights to. We'll start with us. The Teamwork.com team members have years of experience in designing and operating data centers, as well as in continually improving the processes that aren't working so well or that can be adjusted to work more efficiently and effectively. Based on all our experience, we've developed world class practices for managing security and data protection risk. We strongly believe that designing and running a data center infrastructure requires not just technology, but a disciplined approach to the processes involved - escalation, management, knowledge sharing, risk, as well as the day-to-day operations.
  • 9. More info at www.teamwork.com/security Page 9/12 It's not just our wealth of experience that sets us apart from other companies in this area, it's also our philosophy of teamwork. We have team members, not employees. An employee is a pawn to be sacrificed, a team member will have your back. We know all members of our team personally, and they have the highest clearance to access the data center data. That said, we also strictly regulate access and passwords to those few team members who need to access the customer data for troubleshooting or to provide support, and we keep a log of all such access. And even then, we won't go into your data without your permission (perhaps as part of a support incident), and into the data center data only on the go-ahead from senior security management for support and maintenance. And now about you. You control access to your data on Teamwork.com through user authentication and user rights.
  • 10. More info at www.teamwork.com/security Page 10/12 User authentication ensures that only valid users can get into your project management system. Each user in Teamwork.com has a unique account protected with a password. This account is tied to a verified email address that must be entered when a user logs in. For additional security, you have the option to require that passwords be high-security alphanumeric passwords. Once in Teamwork.com, each user is limited in actions to those assigned to her by the Teamwork.com Project Administrator through user-level granular, rights and permissions, settings. Permissions allow a user to perform certain actions and activities within Teamwork.com, such as adding and editing tasks, or deleting files. The Administrator and Project Administrator have the power to determine who can do what in which project. Content security is also about who can see what kinds of data are in your Teamwork.com projects. Your projects and tasks are accessible only to you unless you explicitly share the data with someone else in your account, or place the information in a shared notebook.
  • 11. More info at www.teamwork.com/security Page 11/12 And the security of your data content itself should be of concern to you. What happens if you accidentally delete something, or later decide that you do need data that you've gotten rid of? We've covered this too. You can safely recover the accidentally deleted items from Teamwork.com’s recycle bin at any time. And, just in case you've tidied up and emptied your recycle bin, we keep a backup of the removed data for approximately two weeks. Contact our customer support team in this period to restore it for you. And, if you delete a user who you later want to reinstate, we can do that too, along with all her tasks, as long as you contact us within a month.
  • 12. phone: +353 86 047 0620 | e-mail: emmet.florish@teamwork.com Page 12/12 Want to know more? For further details on how Teamwork.com collects and processes your information, please refer to our Privacy Policy. To learn more about how Teamwork.com’s service is delivered, please read our Terms of Service. If you have any questions about the security of Teamwork.com, contact us anytime at support@teamwork.com and we’ll get back to you quickly.