Security is high on everyone’s agenda when considering cloud solutions. ManageEngine provides IT management solutions to millions of users worldwide. Therefore, security is a key component in all their offerings, and is reflected in their people, processes, and products. But just how is the ManageEngine cloud solutions security managed?
Physical and operational security involves a number of security practises, policies and infrastructure considerations. The security strategy is organised in to the following components:
- Organisational security
- Physical Security
- Infrastructure Security
- Data Security
- Identity and access control
- Operational Security
- Incident management
- Responsible disclosures
- Vendor Management
- Customer controls for security
Full details of how each of these components is addressed please see here.
Datacenters and Resilience
The location and availability of a vendor’s datacenter is an important consideration for choosing a cloud solution. ManageEngine cloud solutions are available on a global infrastructure which uses multiple datacenter locations to meet the needs of local country and regional security considerations.
To locate your nearest datacenter is located please see here.
Real-time ManageEngine Cloud service availability is available here.
Meeting industry standards and compliance lends confidence to a vendor’s capabilities. ManageEngine have a dedicated compliance team to ensure compliance with a range of industry standards and certifications.
For further details please see here.
Being entrusted with customer data is never to be taken lightly. Along with other elements of security, policy and procedure, encryption plays a pivotal role in securing that data.
See how data encryption is employed here.
Malware could be targeted either against or spread via the ManageEngine ecosystem. As a result, ManageEngine actively monitors their environment to prevent the spread of unwanted or malicious content.
View details of the anti-spam policy here.
ManageEngine actively engages with the wider IT security community and IT security researchers. For that reason they are committed to resolving any verified security vulnerabilities in their solutions.
If you need any more information or have any additional questions please feel free to contact us here.
This article is relevant to:CompanyIT SecurityManageEngine
Other recent articles in the same category
You may be interested in these other recent articles
5 May 2020
How to customise the layout of a request in ServiceDesk Plus As of ServiceDesk Plus version 11005 it is possible to customise the layout of…Read more