SlideShare une entreprise Scribd logo
A Safer’s Guide to
Protecting Your Data with
the FME Platform
Merline
George
Technical Support Specialist
Safe Software
Natalie
Clouthier
Technical Support Specialist
Safe Software
Richard
Mosley
Technical Support Specialist
Safe Software
Welcome to Livestorm.
A few ways to engage with us during the webinar:
Audio issues? Click this for 4 simple
troubleshooting steps.
How to download slides
1. Hover over the
slide deck in the
webinar room
2. Click this button
Agenda
1 Introduction & Importance of Security
2 Introducing Safe & FME
3 FME Form Security features
4 FME Flow Security features
5 FME Flow Implementation Considerations
6 Trust Centre
7 Resources
8 Q&A
Agenda
1
Introduction &
Importance of
Security
Authorization
Authentication
Unsecured Wi-Fi
networks
Cloud
Security
Deployment
Malware
Viruses
Third-Party
Vulnerabilities
Data breaches
Temporary
Storage
Encryption
Phishing
scams
Common Data Security Concerns
Safely free up your data
FME can seamlessly fit into your organizations security practices
allowing you to use your data without worrying about it.
How does FME make
your data safe?
How can we make sure
FME is as secure as it
can be?
2
Introducing
Safe & FME
29+
27K+
128
190
20K+
years of solving data
challenges
FME Community
members
countries with
FME customers
organizations worldwide
global partners with
FME services
29+
29K+
128
140+
25K+
years of solving data
challenges
FME Community
members
countries with
FME customers
organizations worldwide
global partners with
FME services
FME Form
(was FME Desktop)
FME Flow
(was FME Server)
FME Flow Hosted
(was FME Cloud)
FME Enterprise Integration Platform
3
FME Form
security features
To provide a high-level
overview of features in
FME Form which
enhance data security
Goal Block Key
Data Security and FME Form - the why
Result
An understanding of your
organizational information
security policies and best
practices
Consider the data security
options offered in FME
Form in context the of
your local policies
Enhanced data security
while performing tasks
with FME Form
Data Security and FME Form - an overview
● Authentication Methods
● Workspace Password Protection
● Working Offline
● Sharing Resources
● Proxy Server Settings
● Verify SSL (HTTPS) Certificates option
Authentication Methods
● (HTTP)Basic
● (HTTP)Digest
● NTLM
● Kerberos
● Embedded
● System
● SAS
● API Keys
● Tokens
● Database Connections
● Web Connections
Demo
● FME Options
● Password protect sensitive workspaces
● Positive control via shared resources
● Web & Database connections for
improved user experience
● FME can work with your proxy!
● Enable certificate verification: secure,
encrypted data transit
Data Security and FME Form - key takeaways
4
FME Flow
security features
● User Authentication
● User Authorization
● System passwords and session management
● System encryption
● Token management
● Monitoring via System Events
● Web Connections
● Forward/Reverse proxy
Configuration on Flow Web User Interface
Demo
5
FME Flow
Implementation
Considerations
Installation Considerations for FME Flow
● Deploy Anywhere
● Service Accounts
● Temp File
● Upgrades
● Web Application Security
○ Configuring for HTTPS
○ Web Application optional updates
○ Using your own Web Application
Deploy Anywhere
FME Flow supports a range of installations.
● On Premise
● In the Cloud (our cloud or yours)
● Windows
● Linux
● Docker
● Kubernetes
● Azure Marketplace
● Hybrid Model
Deploy Anywhere
FME Flow supports range of
install configurations.
Bring your own:
● Database
● Web Application Server
● File Share
Separate your Tiers
● Presentation Tier
● Application Tier
● Data Tier
Service Accounts
● Service accounts do not need
administrative permissions.
● Service accounts can be
GMSA accounts.
● Service accounts used by engines
to reach network resources.
Temporary Files during
translation
● FME stored temporary files during the
translation process.
● Setting a FME_TEMP variable location
● Scheduling regular clean ups
Upgrades
● Upgrades only, no patches
● Full uninstall and reinstall required
● Engine only option
● If you host your own tomcat you can
upgrade just the Web Server.
Web Application Security
● HTTPS Configuration
● X-Frame Options
● HSTS and X-Content-Type-Options
● TLS disabling
● Ciphers disabling
6
Introducing the
Trust Center
Slide Title
Trust Center
● Compliance certifications and
regulations
● Vulnerability Disclosure Program
● Security White Paper (late
spring)
Slide Title
Trust Center
● Security Updates
● Sign-up to receive
security updates
Chat Storm
Chat in “Opt in” in the chat if you wish to subscribe to FME
Security Updates via email and find out when the Trust
Center is open.
7
Resources &
Conclusion
● FME has default security features built in.
● You can configure FME for your
organizations security practices.
FME: Transform and move your
data with peace of mind
Free 90-min Workshop
on FME
safe.com/accelerator
Get our Ebook
Spatial Data for the
Enterprise
fme.ly/gzc
More Webinars
Upcoming & on-demand
webinars
safe.com/webinars
FME Accelerator
Resources
● FME Flow Security
● Getting Started with FME Flow
Administration
● FME Flow Documentation
● FME Form:
○ FME Options
○ Workspace Passwords
○ Web Connections and FME
○ Making Database and Web
Connections Public
○ FME Form and your Proxy
FME Flow Resources
● Creating an Authentication Service Connection
● Configuring FME Server for SAML Authentication
● Role-Based and User-Based Access Control
● Roles
● Configuring Authentication for the FME Server Web Services
● Security
● System Encryption
● Managing Security Tokens
● System Events
● Web Connections
● Proxy
● Use a Reverse Proxy with FME Server
ClaimYour Community Badge
● Get community badges for watching
webinars!
● fme.ly/WebinarBadge
● Today’s code: BWPFM
Our largest
FME user
conference
yet.
Sept 5-7 | 100+ sessions
safe.com/events
8
Q&A
ThankYou
Please Fill out our webinar survey

Contenu connexe

Similaire à A Safer’s Guide to Protecting Your Data with the FME Platform

FME 2020 Unleashed: Automating
FME 2020 Unleashed: AutomatingFME 2020 Unleashed: Automating
FME 2020 Unleashed: Automating
Safe Software
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
BeyondTrust
 
Mule soft Meetup #3
 Mule soft Meetup #3 Mule soft Meetup #3
Mule soft Meetup #3
Gaurav Sethi
 
FTP Client Buildup1. IntroductionThe project is related to bui
FTP Client Buildup1. IntroductionThe project is related to buiFTP Client Buildup1. IntroductionThe project is related to bui
FTP Client Buildup1. IntroductionThe project is related to bui
JeanmarieColbert3
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
RightScale
 
Intro to Puppet Enterprise 05.18.2017
Intro to Puppet Enterprise 05.18.2017Intro to Puppet Enterprise 05.18.2017
Intro to Puppet Enterprise 05.18.2017
Claire Priester Papas
 
FME:23 for the Enterprise - A Deep Dive into Key New Features
FME:23 for the Enterprise - A Deep Dive into Key New FeaturesFME:23 for the Enterprise - A Deep Dive into Key New Features
FME:23 for the Enterprise - A Deep Dive into Key New Features
Safe Software
 
4 Tips to Mastering IT Documentation
4 Tips to Mastering IT Documentation4 Tips to Mastering IT Documentation
4 Tips to Mastering IT Documentation
Dan Goldstein
 
Sydney mule soft meetup 30 april 2020
Sydney mule soft meetup   30 april 2020Sydney mule soft meetup   30 april 2020
Sydney mule soft meetup 30 april 2020
Royston Lobo
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
John Rhoton
 
Life without FTP would be cool
Life without FTP would be coolLife without FTP would be cool
Life without FTP would be cool
jgatrell
 
The CIO Circle Executive Briefing featuring Zoom and 8x8
The CIO Circle Executive Briefing featuring Zoom and 8x8The CIO Circle Executive Briefing featuring Zoom and 8x8
The CIO Circle Executive Briefing featuring Zoom and 8x8
Advanced Technology Consulting (ATC)
 
Five Reasons Why You Should Be Thinking About FME Cloud If You Are Deploying ...
Five Reasons Why You Should Be Thinking About FME Cloud If You Are Deploying ...Five Reasons Why You Should Be Thinking About FME Cloud If You Are Deploying ...
Five Reasons Why You Should Be Thinking About FME Cloud If You Are Deploying ...
Safe Software
 
CSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoCSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami Laiho
NCCOMMS
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMG
Dmitry Tikhovich
 
Magento security best practices magento's approach to pci compliance
Magento security best practices  magento's approach to pci complianceMagento security best practices  magento's approach to pci compliance
Magento security best practices magento's approach to pci compliance
Ritwik Das
 
Elevate Your Enterprise with FME 23.1
Elevate Your Enterprise with FME 23.1Elevate Your Enterprise with FME 23.1
Elevate Your Enterprise with FME 23.1
Safe Software
 
Web Hosting Pricing for 2010 2013
Web Hosting Pricing for 2010 2013Web Hosting Pricing for 2010 2013
Web Hosting Pricing for 2010 2013
A.M. Ishtiaque Sarwar
 
Windows Azure Security & Compliance
Windows Azure Security & ComplianceWindows Azure Security & Compliance
Windows Azure Security & Compliance
Nuno Godinho
 
GO AnyWhere - MFT
GO AnyWhere - MFTGO AnyWhere - MFT
GO AnyWhere - MFT
Daniele Fittabile
 

Similaire à A Safer’s Guide to Protecting Your Data with the FME Platform (20)

FME 2020 Unleashed: Automating
FME 2020 Unleashed: AutomatingFME 2020 Unleashed: Automating
FME 2020 Unleashed: Automating
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
 
Mule soft Meetup #3
 Mule soft Meetup #3 Mule soft Meetup #3
Mule soft Meetup #3
 
FTP Client Buildup1. IntroductionThe project is related to bui
FTP Client Buildup1. IntroductionThe project is related to buiFTP Client Buildup1. IntroductionThe project is related to bui
FTP Client Buildup1. IntroductionThe project is related to bui
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
Intro to Puppet Enterprise 05.18.2017
Intro to Puppet Enterprise 05.18.2017Intro to Puppet Enterprise 05.18.2017
Intro to Puppet Enterprise 05.18.2017
 
FME:23 for the Enterprise - A Deep Dive into Key New Features
FME:23 for the Enterprise - A Deep Dive into Key New FeaturesFME:23 for the Enterprise - A Deep Dive into Key New Features
FME:23 for the Enterprise - A Deep Dive into Key New Features
 
4 Tips to Mastering IT Documentation
4 Tips to Mastering IT Documentation4 Tips to Mastering IT Documentation
4 Tips to Mastering IT Documentation
 
Sydney mule soft meetup 30 april 2020
Sydney mule soft meetup   30 april 2020Sydney mule soft meetup   30 april 2020
Sydney mule soft meetup 30 april 2020
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
Life without FTP would be cool
Life without FTP would be coolLife without FTP would be cool
Life without FTP would be cool
 
The CIO Circle Executive Briefing featuring Zoom and 8x8
The CIO Circle Executive Briefing featuring Zoom and 8x8The CIO Circle Executive Briefing featuring Zoom and 8x8
The CIO Circle Executive Briefing featuring Zoom and 8x8
 
Five Reasons Why You Should Be Thinking About FME Cloud If You Are Deploying ...
Five Reasons Why You Should Be Thinking About FME Cloud If You Are Deploying ...Five Reasons Why You Should Be Thinking About FME Cloud If You Are Deploying ...
Five Reasons Why You Should Be Thinking About FME Cloud If You Are Deploying ...
 
CSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami LaihoCSF18 - GDPR - Sami Laiho
CSF18 - GDPR - Sami Laiho
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMG
 
Magento security best practices magento's approach to pci compliance
Magento security best practices  magento's approach to pci complianceMagento security best practices  magento's approach to pci compliance
Magento security best practices magento's approach to pci compliance
 
Elevate Your Enterprise with FME 23.1
Elevate Your Enterprise with FME 23.1Elevate Your Enterprise with FME 23.1
Elevate Your Enterprise with FME 23.1
 
Web Hosting Pricing for 2010 2013
Web Hosting Pricing for 2010 2013Web Hosting Pricing for 2010 2013
Web Hosting Pricing for 2010 2013
 
Windows Azure Security & Compliance
Windows Azure Security & ComplianceWindows Azure Security & Compliance
Windows Azure Security & Compliance
 
GO AnyWhere - MFT
GO AnyWhere - MFTGO AnyWhere - MFT
GO AnyWhere - MFT
 

Plus de Safe Software

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action:  Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action:  Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
Safe Software
 
The Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data EcosystemThe Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data Ecosystem
Safe Software
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Safe Software
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
Safe Software
 
Mastering MicroStation DGN: How to Integrate CAD and GIS
Mastering MicroStation DGN: How to Integrate CAD and GISMastering MicroStation DGN: How to Integrate CAD and GIS
Mastering MicroStation DGN: How to Integrate CAD and GIS
Safe Software
 
Geospatial Synergy: Amplifying Efficiency with FME & Esri
Geospatial Synergy: Amplifying Efficiency with FME & EsriGeospatial Synergy: Amplifying Efficiency with FME & Esri
Geospatial Synergy: Amplifying Efficiency with FME & Esri
Safe Software
 
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdfIntroducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
Safe Software
 
Breaking Barriers & Leveraging the Latest Developments in AI Technology
Breaking Barriers & Leveraging the Latest Developments in AI TechnologyBreaking Barriers & Leveraging the Latest Developments in AI Technology
Breaking Barriers & Leveraging the Latest Developments in AI Technology
Safe Software
 
Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...
Safe Software
 

Plus de Safe Software (20)

Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action:  Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action:  Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
The Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data EcosystemThe Critical Role of Spatial Data in Today's Data Ecosystem
The Critical Role of Spatial Data in Today's Data Ecosystem
 
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial DataCloud Revolution: Exploring the New Wave of Serverless Spatial Data
Cloud Revolution: Exploring the New Wave of Serverless Spatial Data
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Mastering MicroStation DGN: How to Integrate CAD and GIS
Mastering MicroStation DGN: How to Integrate CAD and GISMastering MicroStation DGN: How to Integrate CAD and GIS
Mastering MicroStation DGN: How to Integrate CAD and GIS
 
Geospatial Synergy: Amplifying Efficiency with FME & Esri
Geospatial Synergy: Amplifying Efficiency with FME & EsriGeospatial Synergy: Amplifying Efficiency with FME & Esri
Geospatial Synergy: Amplifying Efficiency with FME & Esri
 
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdfIntroducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
Introducing the New FME Community Webinar - Feb 21, 2024 (2).pdf
 
Breaking Barriers & Leveraging the Latest Developments in AI Technology
Breaking Barriers & Leveraging the Latest Developments in AI TechnologyBreaking Barriers & Leveraging the Latest Developments in AI Technology
Breaking Barriers & Leveraging the Latest Developments in AI Technology
 
Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...Best Practices to Navigating Data and Application Integration for the Enterpr...
Best Practices to Navigating Data and Application Integration for the Enterpr...
 

Dernier

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 

Dernier (20)

How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 

A Safer’s Guide to Protecting Your Data with the FME Platform

  • 1. A Safer’s Guide to Protecting Your Data with the FME Platform
  • 2. Merline George Technical Support Specialist Safe Software Natalie Clouthier Technical Support Specialist Safe Software Richard Mosley Technical Support Specialist Safe Software
  • 3. Welcome to Livestorm. A few ways to engage with us during the webinar: Audio issues? Click this for 4 simple troubleshooting steps.
  • 4. How to download slides 1. Hover over the slide deck in the webinar room 2. Click this button
  • 5. Agenda 1 Introduction & Importance of Security 2 Introducing Safe & FME 3 FME Form Security features 4 FME Flow Security features 5 FME Flow Implementation Considerations 6 Trust Centre 7 Resources 8 Q&A Agenda
  • 8. Safely free up your data FME can seamlessly fit into your organizations security practices allowing you to use your data without worrying about it.
  • 9. How does FME make your data safe?
  • 10. How can we make sure FME is as secure as it can be?
  • 12. 29+ 27K+ 128 190 20K+ years of solving data challenges FME Community members countries with FME customers organizations worldwide global partners with FME services 29+ 29K+ 128 140+ 25K+ years of solving data challenges FME Community members countries with FME customers organizations worldwide global partners with FME services
  • 13. FME Form (was FME Desktop) FME Flow (was FME Server) FME Flow Hosted (was FME Cloud) FME Enterprise Integration Platform
  • 14.
  • 16. To provide a high-level overview of features in FME Form which enhance data security Goal Block Key Data Security and FME Form - the why Result An understanding of your organizational information security policies and best practices Consider the data security options offered in FME Form in context the of your local policies Enhanced data security while performing tasks with FME Form
  • 17. Data Security and FME Form - an overview ● Authentication Methods ● Workspace Password Protection ● Working Offline ● Sharing Resources ● Proxy Server Settings ● Verify SSL (HTTPS) Certificates option
  • 18. Authentication Methods ● (HTTP)Basic ● (HTTP)Digest ● NTLM ● Kerberos ● Embedded ● System ● SAS ● API Keys ● Tokens ● Database Connections ● Web Connections
  • 19. Demo
  • 20. ● FME Options ● Password protect sensitive workspaces ● Positive control via shared resources ● Web & Database connections for improved user experience ● FME can work with your proxy! ● Enable certificate verification: secure, encrypted data transit Data Security and FME Form - key takeaways
  • 22. ● User Authentication ● User Authorization ● System passwords and session management ● System encryption ● Token management ● Monitoring via System Events ● Web Connections ● Forward/Reverse proxy Configuration on Flow Web User Interface
  • 23. Demo
  • 25. Installation Considerations for FME Flow ● Deploy Anywhere ● Service Accounts ● Temp File ● Upgrades ● Web Application Security ○ Configuring for HTTPS ○ Web Application optional updates ○ Using your own Web Application
  • 26. Deploy Anywhere FME Flow supports a range of installations. ● On Premise ● In the Cloud (our cloud or yours) ● Windows ● Linux ● Docker ● Kubernetes ● Azure Marketplace ● Hybrid Model
  • 27. Deploy Anywhere FME Flow supports range of install configurations. Bring your own: ● Database ● Web Application Server ● File Share Separate your Tiers ● Presentation Tier ● Application Tier ● Data Tier
  • 28. Service Accounts ● Service accounts do not need administrative permissions. ● Service accounts can be GMSA accounts. ● Service accounts used by engines to reach network resources.
  • 29. Temporary Files during translation ● FME stored temporary files during the translation process. ● Setting a FME_TEMP variable location ● Scheduling regular clean ups
  • 30. Upgrades ● Upgrades only, no patches ● Full uninstall and reinstall required ● Engine only option ● If you host your own tomcat you can upgrade just the Web Server.
  • 31. Web Application Security ● HTTPS Configuration ● X-Frame Options ● HSTS and X-Content-Type-Options ● TLS disabling ● Ciphers disabling
  • 33. Slide Title Trust Center ● Compliance certifications and regulations ● Vulnerability Disclosure Program ● Security White Paper (late spring)
  • 34. Slide Title Trust Center ● Security Updates ● Sign-up to receive security updates
  • 35. Chat Storm Chat in “Opt in” in the chat if you wish to subscribe to FME Security Updates via email and find out when the Trust Center is open.
  • 37. ● FME has default security features built in. ● You can configure FME for your organizations security practices. FME: Transform and move your data with peace of mind
  • 38. Free 90-min Workshop on FME safe.com/accelerator Get our Ebook Spatial Data for the Enterprise fme.ly/gzc More Webinars Upcoming & on-demand webinars safe.com/webinars FME Accelerator
  • 39. Resources ● FME Flow Security ● Getting Started with FME Flow Administration ● FME Flow Documentation ● FME Form: ○ FME Options ○ Workspace Passwords ○ Web Connections and FME ○ Making Database and Web Connections Public ○ FME Form and your Proxy
  • 40. FME Flow Resources ● Creating an Authentication Service Connection ● Configuring FME Server for SAML Authentication ● Role-Based and User-Based Access Control ● Roles ● Configuring Authentication for the FME Server Web Services ● Security ● System Encryption ● Managing Security Tokens ● System Events ● Web Connections ● Proxy ● Use a Reverse Proxy with FME Server
  • 41. ClaimYour Community Badge ● Get community badges for watching webinars! ● fme.ly/WebinarBadge ● Today’s code: BWPFM
  • 42. Our largest FME user conference yet. Sept 5-7 | 100+ sessions safe.com/events
  • 43. 8 Q&A
  • 44. ThankYou Please Fill out our webinar survey