FileMaker Security Theory and Application

TBD
100.00

In this fast-paced, two hour presentation we delve into specific FileMaker technologies to fulfill general security requirements, including access, encryption, and deployment, and how to apply those in the real world.

Whether large enterprise, small business, or non-profit, every organization has a vested interest in protecting its data. FileMaker is an excellent platform for quickly building and easily managing solutions, but still requires careful attention to protect that information.

In this fast-paced, two hour presentation we will briefly ask why we want to secure our solutions and define what is security. Then we will delve into specific FileMaker technologies to fulfill general security requirements, including access, encryption, and deployment, and how to apply those in the real world. Each module will feature practical demonstrations, including setting up Amazon oAuth, using Comodo to issue a custom SSL certificate, and best practices for configuring FileMaker Pro and FileMaker Server to help your solutions pass regulatory audits. In addition, we will touch on defense-in-depth concepts at the OS, hardware, and network levels, and mention some tools and resources to help manage your servers.

There will be plenty of time throughout to clarify understanding, and at the end to answer remaining questions.

Updated Outline:

WHY SECURITY

WHAT IS SECURITY

  • Confidentiality
  • Integrity
  • Availability

ACCESS

  • Identification *
  • Authentication *
  • Authorization *
  • Auditing *

ENCRYPTION

  • In Transit *
  • At Rest *
  • By Field *

DEPLOYMENT

  • FileMaker Pro Settings *
  • UI / UX vs Security *
  • FileMaker Server Settings *

DEFENSE IN DEPTH

TOOLS

QUESTIONS

* Includes Live Demonstration