In this fast-paced, two hour presentation we delve into specific FileMaker technologies to fulfill general security requirements, including access, encryption, and deployment, and how to apply those in the real world.
Presented by
Whether large enterprise, small business, or non-profit, every organization has a vested interest in protecting its data. FileMaker is an excellent platform for quickly building and easily managing solutions, but still requires careful attention to protect that information.
In this fast-paced, two hour presentation we will briefly ask why we want to secure our solutions and define what is security. Then we will delve into specific FileMaker technologies to fulfill general security requirements, including access, encryption, and deployment, and how to apply those in the real world. Each module will feature practical demonstrations, including setting up Amazon oAuth, using Comodo to issue a custom SSL certificate, and best practices for configuring FileMaker Pro and FileMaker Server to help your solutions pass regulatory audits. In addition, we will touch on defense-in-depth concepts at the OS, hardware, and network levels, and mention some tools and resources to help manage your servers.
There will be plenty of time throughout to clarify understanding, and at the end to answer remaining questions.
Updated Outline:
WHY SECURITY
WHAT IS SECURITY
- Confidentiality
- Integrity
- Availability
ACCESS
- Identification *
- Authentication *
- Authorization *
- Auditing *
ENCRYPTION
- In Transit *
- At Rest *
- By Field *
DEPLOYMENT
- FileMaker Pro Settings *
- UI / UX vs Security *
- FileMaker Server Settings *
DEFENSE IN DEPTH
TOOLS
QUESTIONS
* Includes Live Demonstration