SlideShare une entreprise Scribd logo
1  sur  44
Télécharger pour lire hors ligne
A Safer’s Guide to
Protecting Your Data with
the FME Platform
Merline
George
Technical Support Specialist
Safe Software
Natalie
Clouthier
Technical Support Specialist
Safe Software
Richard
Mosley
Technical Support Specialist
Safe Software
Welcome to Livestorm.
A few ways to engage with us during the webinar:
Audio issues? Click this for 4 simple
troubleshooting steps.
How to download slides
1. Hover over the
slide deck in the
webinar room
2. Click this button
Agenda
1 Introduction & Importance of Security
2 Introducing Safe & FME
3 FME Form Security features
4 FME Flow Security features
5 FME Flow Implementation Considerations
6 Trust Centre
7 Resources
8 Q&A
Agenda
1
Introduction &
Importance of
Security
Authorization
Authentication
Unsecured Wi-Fi
networks
Cloud
Security
Deployment
Malware
Viruses
Third-Party
Vulnerabilities
Data breaches
Temporary
Storage
Encryption
Phishing
scams
Common Data Security Concerns
Safely free up your data
FME can seamlessly fit into your organizations security practices
allowing you to use your data without worrying about it.
How does FME make
your data safe?
How can we make sure
FME is as secure as it
can be?
2
Introducing
Safe & FME
29+
27K+
128
190
20K+
years of solving data
challenges
FME Community
members
countries with
FME customers
organizations worldwide
global partners with
FME services
29+
29K+
128
140+
25K+
years of solving data
challenges
FME Community
members
countries with
FME customers
organizations worldwide
global partners with
FME services
FME Form
(was FME Desktop)
FME Flow
(was FME Server)
FME Flow Hosted
(was FME Cloud)
FME Enterprise Integration Platform
3
FME Form
security features
To provide a high-level
overview of features in
FME Form which
enhance data security
Goal Block Key
Data Security and FME Form - the why
Result
An understanding of your
organizational information
security policies and best
practices
Consider the data security
options offered in FME
Form in context the of
your local policies
Enhanced data security
while performing tasks
with FME Form
Data Security and FME Form - an overview
● Authentication Methods
● Workspace Password Protection
● Working Offline
● Sharing Resources
● Proxy Server Settings
● Verify SSL (HTTPS) Certificates option
Authentication Methods
● (HTTP)Basic
● (HTTP)Digest
● NTLM
● Kerberos
● Embedded
● System
● SAS
● API Keys
● Tokens
● Database Connections
● Web Connections
Demo
● FME Options
● Password protect sensitive workspaces
● Positive control via shared resources
● Web & Database connections for
improved user experience
● FME can work with your proxy!
● Enable certificate verification: secure,
encrypted data transit
Data Security and FME Form - key takeaways
4
FME Flow
security features
● User Authentication
● User Authorization
● System passwords and session management
● System encryption
● Token management
● Monitoring via System Events
● Web Connections
● Forward/Reverse proxy
Configuration on Flow Web User Interface
Demo
5
FME Flow
Implementation
Considerations
Installation Considerations for FME Flow
● Deploy Anywhere
● Service Accounts
● Temp File
● Upgrades
● Web Application Security
○ Configuring for HTTPS
○ Web Application optional updates
○ Using your own Web Application
Deploy Anywhere
FME Flow supports a range of installations.
● On Premise
● In the Cloud (our cloud or yours)
● Windows
● Linux
● Docker
● Kubernetes
● Azure Marketplace
● Hybrid Model
Deploy Anywhere
FME Flow supports range of
install configurations.
Bring your own:
● Database
● Web Application Server
● File Share
Separate your Tiers
● Presentation Tier
● Application Tier
● Data Tier
Service Accounts
● Service accounts do not need
administrative permissions.
● Service accounts can be
GMSA accounts.
● Service accounts used by engines
to reach network resources.
Temporary Files during
translation
● FME stored temporary files during the
translation process.
● Setting a FME_TEMP variable location
● Scheduling regular clean ups
Upgrades
● Upgrades only, no patches
● Full uninstall and reinstall required
● Engine only option
● If you host your own tomcat you can
upgrade just the Web Server.
Web Application Security
● HTTPS Configuration
● X-Frame Options
● HSTS and X-Content-Type-Options
● TLS disabling
● Ciphers disabling
6
Introducing the
Trust Center
Slide Title
Trust Center
● Compliance certifications and
regulations
● Vulnerability Disclosure Program
● Security White Paper (late
spring)
Slide Title
Trust Center
● Security Updates
● Sign-up to receive
security updates
Chat Storm
The sign up form will be available in the Trust Center soon.
Type “Opt in” in the chat if you wish to get signed up now for
FME Security Updates via email.
7
Resources &
Conclusion
● FME has default security features built in.
● You can configure FME for your
organizations security practices.
FME: Transform and move your
data with peace of mind
Free 90-min Workshop
on FME
safe.com/accelerator
Get our Ebook
Spatial Data for the
Enterprise
fme.ly/gzc
More Webinars
Upcoming & on-demand
webinars
safe.com/webinars
FME Accelerator
Resources
● FME Flow Security
● Getting Started with FME Flow
Administration
● FME Flow Documentation
● FME Form:
○ FME Options
○ Workspace Passwords
○ Web Connections and FME
○ Making Database and Web
Connections Public
○ FME Form and your Proxy
FME Flow Resources
● Creating an Authentication Service Connection
● Configuring FME Server for SAML Authentication
● Role-Based and User-Based Access Control
● Roles
● Configuring Authentication for the FME Server Web Services
● Security
● System Encryption
● Managing Security Tokens
● System Events
● Web Connections
● Proxy
● Use a Reverse Proxy with FME Server
ClaimYour Community Badge
● Get community badges for watching
webinars!
● fme.ly/WebinarBadge
● Today’s code: FLCGW
Our largest
FME user
conference
yet.
Sept 5-7 | 100+ sessions
safe.com/events
8
Q&A
ThankYou
Please Fill out our webinar survey

Contenu connexe

Similaire à A Safer’s Guide to Protecting Your Data with the FME Platform

FTP Client Buildup1. IntroductionThe project is related to bui
FTP Client Buildup1. IntroductionThe project is related to buiFTP Client Buildup1. IntroductionThe project is related to bui
FTP Client Buildup1. IntroductionThe project is related to bui
JeanmarieColbert3
 
Blogpost_Subservient Chicken
Blogpost_Subservient ChickenBlogpost_Subservient Chicken
Blogpost_Subservient Chicken
Louis Gordon
 
Linoma Go Anywhere
Linoma Go AnywhereLinoma Go Anywhere
Linoma Go Anywhere
Stuart Marsh
 

Similaire à A Safer’s Guide to Protecting Your Data with the FME Platform (20)

FTP Client Buildup1. IntroductionThe project is related to bui
FTP Client Buildup1. IntroductionThe project is related to buiFTP Client Buildup1. IntroductionThe project is related to bui
FTP Client Buildup1. IntroductionThe project is related to bui
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
Intro to Puppet Enterprise 05.18.2017
Intro to Puppet Enterprise 05.18.2017Intro to Puppet Enterprise 05.18.2017
Intro to Puppet Enterprise 05.18.2017
 
Mule soft Meetup #3
 Mule soft Meetup #3 Mule soft Meetup #3
Mule soft Meetup #3
 
Life without FTP would be cool
Life without FTP would be coolLife without FTP would be cool
Life without FTP would be cool
 
4 Tips to Mastering IT Documentation
4 Tips to Mastering IT Documentation4 Tips to Mastering IT Documentation
4 Tips to Mastering IT Documentation
 
FME 2020 Unleashed: Automating
FME 2020 Unleashed: AutomatingFME 2020 Unleashed: Automating
FME 2020 Unleashed: Automating
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
 
FME:23 for the Enterprise - A Deep Dive into Key New Features
FME:23 for the Enterprise - A Deep Dive into Key New FeaturesFME:23 for the Enterprise - A Deep Dive into Key New Features
FME:23 for the Enterprise - A Deep Dive into Key New Features
 
The CIO Circle Executive Briefing featuring Zoom and 8x8
The CIO Circle Executive Briefing featuring Zoom and 8x8The CIO Circle Executive Briefing featuring Zoom and 8x8
The CIO Circle Executive Briefing featuring Zoom and 8x8
 
Sydney mule soft meetup 30 april 2020
Sydney mule soft meetup   30 april 2020Sydney mule soft meetup   30 april 2020
Sydney mule soft meetup 30 april 2020
 
Blogpost_Subservient Chicken
Blogpost_Subservient ChickenBlogpost_Subservient Chicken
Blogpost_Subservient Chicken
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMG
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
Web Hosting Pricing for 2010 2013
Web Hosting Pricing for 2010 2013Web Hosting Pricing for 2010 2013
Web Hosting Pricing for 2010 2013
 
Five years of Persistent Threats
Five years of Persistent ThreatsFive years of Persistent Threats
Five years of Persistent Threats
 
Five Reasons Why You Should Be Thinking About FME Cloud If You Are Deploying ...
Five Reasons Why You Should Be Thinking About FME Cloud If You Are Deploying ...Five Reasons Why You Should Be Thinking About FME Cloud If You Are Deploying ...
Five Reasons Why You Should Be Thinking About FME Cloud If You Are Deploying ...
 
Elevate Your Enterprise with FME 23.1
Elevate Your Enterprise with FME 23.1Elevate Your Enterprise with FME 23.1
Elevate Your Enterprise with FME 23.1
 
Linoma Go Anywhere
Linoma Go AnywhereLinoma Go Anywhere
Linoma Go Anywhere
 
Meetup bangalore-sept5th 2020 (1)
Meetup bangalore-sept5th 2020 (1)Meetup bangalore-sept5th 2020 (1)
Meetup bangalore-sept5th 2020 (1)
 

Plus de Safe Software

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Safe Software
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software
 
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdfIntroducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
Safe Software
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Safe Software
 
Taking Off with FME: Elevating Airport Operations to New Heights
Taking Off with FME: Elevating Airport Operations to New HeightsTaking Off with FME: Elevating Airport Operations to New Heights
Taking Off with FME: Elevating Airport Operations to New Heights
Safe Software
 
Initiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software
 

Plus de Safe Software (20)

The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action:  Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action:  Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
The Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data EcosystemThe Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data Ecosystem
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Mastering MicroStation DGN: How to Integrate CAD and GIS
Mastering MicroStation DGN: How to Integrate CAD and GISMastering MicroStation DGN: How to Integrate CAD and GIS
Mastering MicroStation DGN: How to Integrate CAD and GIS
 
Geospatial Synergy: Amplifying Efficiency with FME & Esri
Geospatial Synergy: Amplifying Efficiency with FME & EsriGeospatial Synergy: Amplifying Efficiency with FME & Esri
Geospatial Synergy: Amplifying Efficiency with FME & Esri
 
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdfIntroducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
 
Breaking Barriers & Leveraging the Latest Developments in AI Technology
Breaking Barriers & Leveraging the Latest Developments in AI TechnologyBreaking Barriers & Leveraging the Latest Developments in AI Technology
Breaking Barriers & Leveraging the Latest Developments in AI Technology
 
Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
New Year's Fireside Chat with Safe Software’s Founders
New Year's Fireside Chat with Safe Software’s FoundersNew Year's Fireside Chat with Safe Software’s Founders
New Year's Fireside Chat with Safe Software’s Founders
 
Taking Off with FME: Elevating Airport Operations to New Heights
Taking Off with FME: Elevating Airport Operations to New HeightsTaking Off with FME: Elevating Airport Operations to New Heights
Taking Off with FME: Elevating Airport Operations to New Heights
 
Initiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
 

Dernier

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Dernier (20)

TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 

A Safer’s Guide to Protecting Your Data with the FME Platform

  • 1. A Safer’s Guide to Protecting Your Data with the FME Platform
  • 2. Merline George Technical Support Specialist Safe Software Natalie Clouthier Technical Support Specialist Safe Software Richard Mosley Technical Support Specialist Safe Software
  • 3. Welcome to Livestorm. A few ways to engage with us during the webinar: Audio issues? Click this for 4 simple troubleshooting steps.
  • 4. How to download slides 1. Hover over the slide deck in the webinar room 2. Click this button
  • 5. Agenda 1 Introduction & Importance of Security 2 Introducing Safe & FME 3 FME Form Security features 4 FME Flow Security features 5 FME Flow Implementation Considerations 6 Trust Centre 7 Resources 8 Q&A Agenda
  • 8. Safely free up your data FME can seamlessly fit into your organizations security practices allowing you to use your data without worrying about it.
  • 9. How does FME make your data safe?
  • 10. How can we make sure FME is as secure as it can be?
  • 12. 29+ 27K+ 128 190 20K+ years of solving data challenges FME Community members countries with FME customers organizations worldwide global partners with FME services 29+ 29K+ 128 140+ 25K+ years of solving data challenges FME Community members countries with FME customers organizations worldwide global partners with FME services
  • 13. FME Form (was FME Desktop) FME Flow (was FME Server) FME Flow Hosted (was FME Cloud) FME Enterprise Integration Platform
  • 14.
  • 16. To provide a high-level overview of features in FME Form which enhance data security Goal Block Key Data Security and FME Form - the why Result An understanding of your organizational information security policies and best practices Consider the data security options offered in FME Form in context the of your local policies Enhanced data security while performing tasks with FME Form
  • 17. Data Security and FME Form - an overview ● Authentication Methods ● Workspace Password Protection ● Working Offline ● Sharing Resources ● Proxy Server Settings ● Verify SSL (HTTPS) Certificates option
  • 18. Authentication Methods ● (HTTP)Basic ● (HTTP)Digest ● NTLM ● Kerberos ● Embedded ● System ● SAS ● API Keys ● Tokens ● Database Connections ● Web Connections
  • 19. Demo
  • 20. ● FME Options ● Password protect sensitive workspaces ● Positive control via shared resources ● Web & Database connections for improved user experience ● FME can work with your proxy! ● Enable certificate verification: secure, encrypted data transit Data Security and FME Form - key takeaways
  • 22. ● User Authentication ● User Authorization ● System passwords and session management ● System encryption ● Token management ● Monitoring via System Events ● Web Connections ● Forward/Reverse proxy Configuration on Flow Web User Interface
  • 23. Demo
  • 25. Installation Considerations for FME Flow ● Deploy Anywhere ● Service Accounts ● Temp File ● Upgrades ● Web Application Security ○ Configuring for HTTPS ○ Web Application optional updates ○ Using your own Web Application
  • 26. Deploy Anywhere FME Flow supports a range of installations. ● On Premise ● In the Cloud (our cloud or yours) ● Windows ● Linux ● Docker ● Kubernetes ● Azure Marketplace ● Hybrid Model
  • 27. Deploy Anywhere FME Flow supports range of install configurations. Bring your own: ● Database ● Web Application Server ● File Share Separate your Tiers ● Presentation Tier ● Application Tier ● Data Tier
  • 28. Service Accounts ● Service accounts do not need administrative permissions. ● Service accounts can be GMSA accounts. ● Service accounts used by engines to reach network resources.
  • 29. Temporary Files during translation ● FME stored temporary files during the translation process. ● Setting a FME_TEMP variable location ● Scheduling regular clean ups
  • 30. Upgrades ● Upgrades only, no patches ● Full uninstall and reinstall required ● Engine only option ● If you host your own tomcat you can upgrade just the Web Server.
  • 31. Web Application Security ● HTTPS Configuration ● X-Frame Options ● HSTS and X-Content-Type-Options ● TLS disabling ● Ciphers disabling
  • 33. Slide Title Trust Center ● Compliance certifications and regulations ● Vulnerability Disclosure Program ● Security White Paper (late spring)
  • 34. Slide Title Trust Center ● Security Updates ● Sign-up to receive security updates
  • 35. Chat Storm The sign up form will be available in the Trust Center soon. Type “Opt in” in the chat if you wish to get signed up now for FME Security Updates via email.
  • 37. ● FME has default security features built in. ● You can configure FME for your organizations security practices. FME: Transform and move your data with peace of mind
  • 38. Free 90-min Workshop on FME safe.com/accelerator Get our Ebook Spatial Data for the Enterprise fme.ly/gzc More Webinars Upcoming & on-demand webinars safe.com/webinars FME Accelerator
  • 39. Resources ● FME Flow Security ● Getting Started with FME Flow Administration ● FME Flow Documentation ● FME Form: ○ FME Options ○ Workspace Passwords ○ Web Connections and FME ○ Making Database and Web Connections Public ○ FME Form and your Proxy
  • 40. FME Flow Resources ● Creating an Authentication Service Connection ● Configuring FME Server for SAML Authentication ● Role-Based and User-Based Access Control ● Roles ● Configuring Authentication for the FME Server Web Services ● Security ● System Encryption ● Managing Security Tokens ● System Events ● Web Connections ● Proxy ● Use a Reverse Proxy with FME Server
  • 41. ClaimYour Community Badge ● Get community badges for watching webinars! ● fme.ly/WebinarBadge ● Today’s code: FLCGW
  • 42. Our largest FME user conference yet. Sept 5-7 | 100+ sessions safe.com/events
  • 43. 8 Q&A
  • 44. ThankYou Please Fill out our webinar survey