SlideShare a Scribd company logo
Architecture, Security and
Scalability in the Cloud
Andrey Kolesnikov
VP, TechOps
Pritesh Parekh
Chief Security Officer
Agenda
Industry Trends
Compliance Strategy
Securing SaaS
Product Security
Look Inside the platform
Scale and Resiliency
Ops Approach
Security and Trust
Industry Data Security
Breaches
Courtesy: www.informationisbeautiful.net
Courtesy: Symantec 2015 Internet Security Threat Report
Industry Data Security
Breaches 2014
Courtesy: Symantec 2015 Internet Security Threat Report
Industry Data Security
Breaches 2014
Courtesy: Symantec 2015 Internet Security Threat Report
Industry Data Security
Breaches 2014
Subscribed 2015: Architecture, Security, Scalability
Courtesy: Symantec 2015 Internet Security Threat Report
Industry Data Security
Breaches 2014
• Top 3 entry point used for hacking
• Weak Authentication (Employee or Third Party Vendors)
• Malware infected using Phishing
• Application or Server Weakness
• Top motives are CC data and PII with email address
• Average Cost per data breach is $3.5 million or $145 per compromised record (does
not include loss of reputation)
• Hackers targeting CFOs to gain monetary advantage on market moving information
Industry Leading
Compliance Strategy
• Required for all service providers storing or processing credit cards
• PCI DSS Level 1 since 2008
• 200+ Security Controls required
• Supports Customer SOX compliance
• SSAE 16 SOC 1 Type II since 2009
• SOC 2 Type II based on Trust Services Principles
• HHS HIPAA audit program as a Business Associate
• Compliance with Security, Privacy and Breach Notification requirements
• Provides a method for U.S. companies to transfer personal data from the
EU to US
• Protection of consumer personal data
Enterprise-grade Data Security
• TLS Encryption
• Network Firewall and Web Application Firewall
• Host Intrusion Detection Systems
• Sensitive Data Encryption using FIPS certified
Hardware Encryption
• Multiple layers of authentication
• Continuous Application Pen Testing
• Daily Network Scans & Third Party Security
testing
• Centralized Logging and Real-time Alerting
• Secure SSAE16 Compliant Data Centers
Load Balancers Load Balancers
Log ServersDB Servers
Firewall
IDS
Firewall
IDS
Zuora UI Customer Apps APIs
TLS
Storage
Encryption
ApplianceApp Servers
Enterprise-grade Data Security
Strong authentication features support
enterprise ecosystem integration
• Strong Security
Policies
• 2-factor
Authentication
• Single Sign-on
support
• IP-address
filtering
Granular data access features supports SOX
compliance requirements
65 distinct permissions for standard and admin user roles
Data Access Control
WORLDWIDE
NORTH
AMERICA
US CANADA
EUROPE
ITALY FRANCE
• Greater Control with the hierarchy
based data access feature
• Access can be granted on a need-
to-know basis (department, geo-
location, product etc.)
Data Access Control
Ops
Private Cloud
Commercial Software
Quarterly Releases
SQL
VMs
MTBF
DIY
Stack Trends
Public Cloud
OSS
Continuous Delivery
NoSQL
Containers
MTTR
SaaS
SaaS v1.0 SaaS v2.Current
SLIDE HEADER
Across Zuora
Platform
Transactions a month Rows of data
synchronized and
exported
Average Monthly Volume Snapshot:
Average platform
compute utilization
1.3B 22B 40%
3
Team Pillars
Customer,
Technology,
Business
50/50
Developer/Sy
sEng Ratio
2
Public Cloud
Regions
2
Operation
Centers
900+
Nodes
2
Geo Distributed
datacenters
Look Inside
Tiers
Ephemeral
Persistent
Infrastructure
Fault Domains
Vertical
Horizontal
Scale
Horizontal
Vertical
Partition
Approach to Infrastructure
Embed Ops into Dev
Durability > Availability
API > Scripts
Metrics, Metrics, Metrics
Ops Approach
GRIDGRIDSummary
GRID
• Compliance Certifications – PCI, SOC1, SOC2 and HIPPA
• Data Security – Web Application Firewall, Host Based
Intrusion Detection System and Continuous Security
Testing
• Product Security – 2FA, SSO, Data Access Controls and
Strong Security Policies
• Infrastructure – Public/Private Cloud, OSS
• Architecture – Right size/approach for the problem
• Operators – Mix of Developers and Systems Engineers
HEADING
Section break slide
Q&A
Ad

More Related Content

What's hot (19)

Fabrizio Biscotti Gartner - SMAU Milano 2017
Fabrizio Biscotti Gartner - SMAU Milano 2017Fabrizio Biscotti Gartner - SMAU Milano 2017
Fabrizio Biscotti Gartner - SMAU Milano 2017
SMAU
 
SD-WAN iFLX-Brochure
SD-WAN iFLX-BrochureSD-WAN iFLX-Brochure
SD-WAN iFLX-Brochure
Tata Tele Business Services
 
Webinar - IoT - Business Transformation Launchpad
Webinar - IoT - Business Transformation LaunchpadWebinar - IoT - Business Transformation Launchpad
Webinar - IoT - Business Transformation Launchpad
JK Tech
 
25 6-2013 - abecon inspiratiedag - breinwave bi solutions
25 6-2013 - abecon inspiratiedag - breinwave bi solutions25 6-2013 - abecon inspiratiedag - breinwave bi solutions
25 6-2013 - abecon inspiratiedag - breinwave bi solutions
Peter de Haas
 
The API Economy
The API EconomyThe API Economy
The API Economy
Catalyst Investors
 
IBM Systems of Interaction
IBM Systems of InteractionIBM Systems of Interaction
IBM Systems of Interaction
IBM Sverige
 
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
JK Tech
 
Going digital in a hurry
Going digital in a hurryGoing digital in a hurry
Going digital in a hurry
MATRIXX Software
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020
Pete Nieminen
 
Cloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Cloud Computing: Delivering Public, Private and Hybrid Cloud SolutionsCloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Cloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Cygnet Infotech
 
Making iot deliver business value v4
Making iot deliver business value v4Making iot deliver business value v4
Making iot deliver business value v4
Kellton Tech Solutions Ltd
 
Best Practices for Managing and Sharing Data in a Connected World
Best Practices for Managing and Sharing Data in a Connected WorldBest Practices for Managing and Sharing Data in a Connected World
Best Practices for Managing and Sharing Data in a Connected World
DataWorks Summit
 
Twitter and ibm form strategic relationship
Twitter and ibm form strategic relationshipTwitter and ibm form strategic relationship
Twitter and ibm form strategic relationship
Pietro Leo
 
Blockchain on AWS for Businesses
Blockchain on AWS for BusinessesBlockchain on AWS for Businesses
Blockchain on AWS for Businesses
JK Tech
 
[Webinar] - Intelligent Automation: Enabling Bots with Brain
[Webinar] - Intelligent Automation: Enabling Bots with Brain[Webinar] - Intelligent Automation: Enabling Bots with Brain
[Webinar] - Intelligent Automation: Enabling Bots with Brain
JK Tech
 
Enterprise Service Management: Taking a Paradign Shift in the Digital Era
Enterprise Service Management: Taking a Paradign Shift in the Digital EraEnterprise Service Management: Taking a Paradign Shift in the Digital Era
Enterprise Service Management: Taking a Paradign Shift in the Digital Era
JK Tech
 
IoT with Progress – Let’s Simplify
IoT with Progress – Let’s SimplifyIoT with Progress – Let’s Simplify
IoT with Progress – Let’s Simplify
JK Tech
 
PTC Corporate Overview 2018
PTC Corporate Overview 2018PTC Corporate Overview 2018
PTC Corporate Overview 2018
PTC
 
Establishing sustainable GDPR compliance
Establishing sustainable GDPR complianceEstablishing sustainable GDPR compliance
Establishing sustainable GDPR compliance
Cloudera, Inc.
 
Fabrizio Biscotti Gartner - SMAU Milano 2017
Fabrizio Biscotti Gartner - SMAU Milano 2017Fabrizio Biscotti Gartner - SMAU Milano 2017
Fabrizio Biscotti Gartner - SMAU Milano 2017
SMAU
 
Webinar - IoT - Business Transformation Launchpad
Webinar - IoT - Business Transformation LaunchpadWebinar - IoT - Business Transformation Launchpad
Webinar - IoT - Business Transformation Launchpad
JK Tech
 
25 6-2013 - abecon inspiratiedag - breinwave bi solutions
25 6-2013 - abecon inspiratiedag - breinwave bi solutions25 6-2013 - abecon inspiratiedag - breinwave bi solutions
25 6-2013 - abecon inspiratiedag - breinwave bi solutions
Peter de Haas
 
IBM Systems of Interaction
IBM Systems of InteractionIBM Systems of Interaction
IBM Systems of Interaction
IBM Sverige
 
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
JK Tech
 
Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020Tivi - Tunnistautuminen - 2020
Tivi - Tunnistautuminen - 2020
Pete Nieminen
 
Cloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Cloud Computing: Delivering Public, Private and Hybrid Cloud SolutionsCloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Cloud Computing: Delivering Public, Private and Hybrid Cloud Solutions
Cygnet Infotech
 
Best Practices for Managing and Sharing Data in a Connected World
Best Practices for Managing and Sharing Data in a Connected WorldBest Practices for Managing and Sharing Data in a Connected World
Best Practices for Managing and Sharing Data in a Connected World
DataWorks Summit
 
Twitter and ibm form strategic relationship
Twitter and ibm form strategic relationshipTwitter and ibm form strategic relationship
Twitter and ibm form strategic relationship
Pietro Leo
 
Blockchain on AWS for Businesses
Blockchain on AWS for BusinessesBlockchain on AWS for Businesses
Blockchain on AWS for Businesses
JK Tech
 
[Webinar] - Intelligent Automation: Enabling Bots with Brain
[Webinar] - Intelligent Automation: Enabling Bots with Brain[Webinar] - Intelligent Automation: Enabling Bots with Brain
[Webinar] - Intelligent Automation: Enabling Bots with Brain
JK Tech
 
Enterprise Service Management: Taking a Paradign Shift in the Digital Era
Enterprise Service Management: Taking a Paradign Shift in the Digital EraEnterprise Service Management: Taking a Paradign Shift in the Digital Era
Enterprise Service Management: Taking a Paradign Shift in the Digital Era
JK Tech
 
IoT with Progress – Let’s Simplify
IoT with Progress – Let’s SimplifyIoT with Progress – Let’s Simplify
IoT with Progress – Let’s Simplify
JK Tech
 
PTC Corporate Overview 2018
PTC Corporate Overview 2018PTC Corporate Overview 2018
PTC Corporate Overview 2018
PTC
 
Establishing sustainable GDPR compliance
Establishing sustainable GDPR complianceEstablishing sustainable GDPR compliance
Establishing sustainable GDPR compliance
Cloudera, Inc.
 

Similar to Subscribed 2015: Architecture, Security, Scalability (20)

Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
Microsoft Österreich
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)
Shahar Geiger Maor
 
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
NetworkCollaborators
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
GenericName6
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
PlatformSecurityManagement
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Micro Focus
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Decisions
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
MSAdvAnalytics
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
kanimozhin
 
Cybersecurity for Board.pptx
Cybersecurity for Board.pptxCybersecurity for Board.pptx
Cybersecurity for Board.pptx
SandeepAgrawal98
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
Techcello
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
Jim Kaplan CIA CFE
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
TrongMinhHoang1
 
SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
Advanced Technology Consulting (ATC)
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
dhanywahyudi17
 
Database Security Threats - MariaDB Security Best Practices
Database Security Threats - MariaDB Security Best PracticesDatabase Security Threats - MariaDB Security Best Practices
Database Security Threats - MariaDB Security Best Practices
MariaDB plc
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
Karina Matos
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
Microsoft Österreich
 
Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)Cloud Security for Startups - From A to E(xit)
Cloud Security for Startups - From A to E(xit)
Shahar Geiger Maor
 
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
Cisco Connect 2018 Thailand - Secure data center building a secure zero trust...
NetworkCollaborators
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
GenericName6
 
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...ASMC 2017 - Martin Vliem -  Security < productivity < security: syntax ...
ASMC 2017 - Martin Vliem - Security < productivity < security: syntax ...
PlatformSecurityManagement
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Micro Focus
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Decisions
 
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & ComplianceCortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
Cortana Analytics Workshop: Cortana Analytics -- Security, Privacy & Compliance
MSAdvAnalytics
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
kanimozhin
 
Cybersecurity for Board.pptx
Cybersecurity for Board.pptxCybersecurity for Board.pptx
Cybersecurity for Board.pptx
SandeepAgrawal98
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
Techcello
 
talk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptxtalk6securingcloudamarprusty-191030091632.pptx
talk6securingcloudamarprusty-191030091632.pptx
TrongMinhHoang1
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
Sumana Mehta
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
dhanywahyudi17
 
Database Security Threats - MariaDB Security Best Practices
Database Security Threats - MariaDB Security Best PracticesDatabase Security Threats - MariaDB Security Best Practices
Database Security Threats - MariaDB Security Best Practices
MariaDB plc
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
Karina Matos
 
Ad

More from Zuora, Inc. (20)

SSP Your New Strategic Growth Weapon
SSP  Your New Strategic Growth Weapon SSP  Your New Strategic Growth Weapon
SSP Your New Strategic Growth Weapon
Zuora, Inc.
 
Subscribed 2019 - CPQ X: The Future of CPQ
Subscribed 2019 - CPQ X: The Future of CPQSubscribed 2019 - CPQ X: The Future of CPQ
Subscribed 2019 - CPQ X: The Future of CPQ
Zuora, Inc.
 
Subscribed 2019 - Going Global: Demystifying International Payments
Subscribed 2019 - Going Global: Demystifying International PaymentsSubscribed 2019 - Going Global: Demystifying International Payments
Subscribed 2019 - Going Global: Demystifying International Payments
Zuora, Inc.
 
Subscribed 2019 - Fraud Management Strategies: Reducing Collection Friction t...
Subscribed 2019 - Fraud Management Strategies: Reducing Collection Friction t...Subscribed 2019 - Fraud Management Strategies: Reducing Collection Friction t...
Subscribed 2019 - Fraud Management Strategies: Reducing Collection Friction t...
Zuora, Inc.
 
Subscribed 2019 - Optimizing Recurring Collections at Scale
Subscribed 2019 - Optimizing Recurring Collections at ScaleSubscribed 2019 - Optimizing Recurring Collections at Scale
Subscribed 2019 - Optimizing Recurring Collections at Scale
Zuora, Inc.
 
Subscribed 2019 - Regulations and What Lies Ahead with Zuora Payments and Col...
Subscribed 2019 - Regulations and What Lies Ahead with Zuora Payments and Col...Subscribed 2019 - Regulations and What Lies Ahead with Zuora Payments and Col...
Subscribed 2019 - Regulations and What Lies Ahead with Zuora Payments and Col...
Zuora, Inc.
 
Subscribed 2019 - Collection Strategies: Recovering Critical Revenue to Drive...
Subscribed 2019 - Collection Strategies: Recovering Critical Revenue to Drive...Subscribed 2019 - Collection Strategies: Recovering Critical Revenue to Drive...
Subscribed 2019 - Collection Strategies: Recovering Critical Revenue to Drive...
Zuora, Inc.
 
Subscribed 2019 - Why Digital Transformation Should Drive Business Model Tran...
Subscribed 2019 - Why Digital Transformation Should Drive Business Model Tran...Subscribed 2019 - Why Digital Transformation Should Drive Business Model Tran...
Subscribed 2019 - Why Digital Transformation Should Drive Business Model Tran...
Zuora, Inc.
 
Subscribed 2019 - Business Transformation: Architecting the Launch for Success
Subscribed 2019 - Business Transformation: Architecting the Launch for SuccessSubscribed 2019 - Business Transformation: Architecting the Launch for Success
Subscribed 2019 - Business Transformation: Architecting the Launch for Success
Zuora, Inc.
 
Subscribed 2019 - Deliver Growth Without Breaking Your Back Office
Subscribed 2019 - Deliver Growth Without Breaking Your Back OfficeSubscribed 2019 - Deliver Growth Without Breaking Your Back Office
Subscribed 2019 - Deliver Growth Without Breaking Your Back Office
Zuora, Inc.
 
Subscribed 2019 - Customer First Approach to Pricing
Subscribed 2019  - Customer First Approach to Pricing Subscribed 2019  - Customer First Approach to Pricing
Subscribed 2019 - Customer First Approach to Pricing
Zuora, Inc.
 
Subscribed 2019 - Empower Sales Operations
Subscribed 2019 -  Empower Sales Operations Subscribed 2019 -  Empower Sales Operations
Subscribed 2019 - Empower Sales Operations
Zuora, Inc.
 
Subscribed 2019 - Best Practices for Realizing Optimal Value from Zuora
Subscribed 2019 -  Best Practices for Realizing Optimal Value from ZuoraSubscribed 2019 -  Best Practices for Realizing Optimal Value from Zuora
Subscribed 2019 - Best Practices for Realizing Optimal Value from Zuora
Zuora, Inc.
 
Subscribed 2019 - Omni-Channel Customer Acquisition and Retention
Subscribed 2019 - Omni-Channel Customer Acquisition and RetentionSubscribed 2019 - Omni-Channel Customer Acquisition and Retention
Subscribed 2019 - Omni-Channel Customer Acquisition and Retention
Zuora, Inc.
 
Subscribed 2019 - Quote Smarter, Faster and Get Products to Market Quicker wi...
Subscribed 2019 - Quote Smarter, Faster and Get Products to Market Quicker wi...Subscribed 2019 - Quote Smarter, Faster and Get Products to Market Quicker wi...
Subscribed 2019 - Quote Smarter, Faster and Get Products to Market Quicker wi...
Zuora, Inc.
 
Subscribed 2019 - Empower Sales Operations with Zuora CPQ
Subscribed 2019 - Empower Sales Operations with Zuora CPQSubscribed 2019 - Empower Sales Operations with Zuora CPQ
Subscribed 2019 - Empower Sales Operations with Zuora CPQ
Zuora, Inc.
 
Subscribed 2019 - Implementing a Consumption-Based Pricing Strategy
Subscribed 2019 - Implementing a Consumption-Based Pricing StrategySubscribed 2019 - Implementing a Consumption-Based Pricing Strategy
Subscribed 2019 - Implementing a Consumption-Based Pricing Strategy
Zuora, Inc.
 
Subscribed 2019 - Proration: Why Getting it Right Matters
Subscribed 2019 - 	Proration: Why Getting it Right MattersSubscribed 2019 - 	Proration: Why Getting it Right Matters
Subscribed 2019 - Proration: Why Getting it Right Matters
Zuora, Inc.
 
Subscribed 2019 - Beyond reporting analytics for growth
Subscribed 2019 - Beyond reporting analytics for growthSubscribed 2019 - Beyond reporting analytics for growth
Subscribed 2019 - Beyond reporting analytics for growth
Zuora, Inc.
 
Subscribed 2019 - The Future of Orders
Subscribed 2019 - The Future of Orders Subscribed 2019 - The Future of Orders
Subscribed 2019 - The Future of Orders
Zuora, Inc.
 
SSP Your New Strategic Growth Weapon
SSP  Your New Strategic Growth Weapon SSP  Your New Strategic Growth Weapon
SSP Your New Strategic Growth Weapon
Zuora, Inc.
 
Subscribed 2019 - CPQ X: The Future of CPQ
Subscribed 2019 - CPQ X: The Future of CPQSubscribed 2019 - CPQ X: The Future of CPQ
Subscribed 2019 - CPQ X: The Future of CPQ
Zuora, Inc.
 
Subscribed 2019 - Going Global: Demystifying International Payments
Subscribed 2019 - Going Global: Demystifying International PaymentsSubscribed 2019 - Going Global: Demystifying International Payments
Subscribed 2019 - Going Global: Demystifying International Payments
Zuora, Inc.
 
Subscribed 2019 - Fraud Management Strategies: Reducing Collection Friction t...
Subscribed 2019 - Fraud Management Strategies: Reducing Collection Friction t...Subscribed 2019 - Fraud Management Strategies: Reducing Collection Friction t...
Subscribed 2019 - Fraud Management Strategies: Reducing Collection Friction t...
Zuora, Inc.
 
Subscribed 2019 - Optimizing Recurring Collections at Scale
Subscribed 2019 - Optimizing Recurring Collections at ScaleSubscribed 2019 - Optimizing Recurring Collections at Scale
Subscribed 2019 - Optimizing Recurring Collections at Scale
Zuora, Inc.
 
Subscribed 2019 - Regulations and What Lies Ahead with Zuora Payments and Col...
Subscribed 2019 - Regulations and What Lies Ahead with Zuora Payments and Col...Subscribed 2019 - Regulations and What Lies Ahead with Zuora Payments and Col...
Subscribed 2019 - Regulations and What Lies Ahead with Zuora Payments and Col...
Zuora, Inc.
 
Subscribed 2019 - Collection Strategies: Recovering Critical Revenue to Drive...
Subscribed 2019 - Collection Strategies: Recovering Critical Revenue to Drive...Subscribed 2019 - Collection Strategies: Recovering Critical Revenue to Drive...
Subscribed 2019 - Collection Strategies: Recovering Critical Revenue to Drive...
Zuora, Inc.
 
Subscribed 2019 - Why Digital Transformation Should Drive Business Model Tran...
Subscribed 2019 - Why Digital Transformation Should Drive Business Model Tran...Subscribed 2019 - Why Digital Transformation Should Drive Business Model Tran...
Subscribed 2019 - Why Digital Transformation Should Drive Business Model Tran...
Zuora, Inc.
 
Subscribed 2019 - Business Transformation: Architecting the Launch for Success
Subscribed 2019 - Business Transformation: Architecting the Launch for SuccessSubscribed 2019 - Business Transformation: Architecting the Launch for Success
Subscribed 2019 - Business Transformation: Architecting the Launch for Success
Zuora, Inc.
 
Subscribed 2019 - Deliver Growth Without Breaking Your Back Office
Subscribed 2019 - Deliver Growth Without Breaking Your Back OfficeSubscribed 2019 - Deliver Growth Without Breaking Your Back Office
Subscribed 2019 - Deliver Growth Without Breaking Your Back Office
Zuora, Inc.
 
Subscribed 2019 - Customer First Approach to Pricing
Subscribed 2019  - Customer First Approach to Pricing Subscribed 2019  - Customer First Approach to Pricing
Subscribed 2019 - Customer First Approach to Pricing
Zuora, Inc.
 
Subscribed 2019 - Empower Sales Operations
Subscribed 2019 -  Empower Sales Operations Subscribed 2019 -  Empower Sales Operations
Subscribed 2019 - Empower Sales Operations
Zuora, Inc.
 
Subscribed 2019 - Best Practices for Realizing Optimal Value from Zuora
Subscribed 2019 -  Best Practices for Realizing Optimal Value from ZuoraSubscribed 2019 -  Best Practices for Realizing Optimal Value from Zuora
Subscribed 2019 - Best Practices for Realizing Optimal Value from Zuora
Zuora, Inc.
 
Subscribed 2019 - Omni-Channel Customer Acquisition and Retention
Subscribed 2019 - Omni-Channel Customer Acquisition and RetentionSubscribed 2019 - Omni-Channel Customer Acquisition and Retention
Subscribed 2019 - Omni-Channel Customer Acquisition and Retention
Zuora, Inc.
 
Subscribed 2019 - Quote Smarter, Faster and Get Products to Market Quicker wi...
Subscribed 2019 - Quote Smarter, Faster and Get Products to Market Quicker wi...Subscribed 2019 - Quote Smarter, Faster and Get Products to Market Quicker wi...
Subscribed 2019 - Quote Smarter, Faster and Get Products to Market Quicker wi...
Zuora, Inc.
 
Subscribed 2019 - Empower Sales Operations with Zuora CPQ
Subscribed 2019 - Empower Sales Operations with Zuora CPQSubscribed 2019 - Empower Sales Operations with Zuora CPQ
Subscribed 2019 - Empower Sales Operations with Zuora CPQ
Zuora, Inc.
 
Subscribed 2019 - Implementing a Consumption-Based Pricing Strategy
Subscribed 2019 - Implementing a Consumption-Based Pricing StrategySubscribed 2019 - Implementing a Consumption-Based Pricing Strategy
Subscribed 2019 - Implementing a Consumption-Based Pricing Strategy
Zuora, Inc.
 
Subscribed 2019 - Proration: Why Getting it Right Matters
Subscribed 2019 - 	Proration: Why Getting it Right MattersSubscribed 2019 - 	Proration: Why Getting it Right Matters
Subscribed 2019 - Proration: Why Getting it Right Matters
Zuora, Inc.
 
Subscribed 2019 - Beyond reporting analytics for growth
Subscribed 2019 - Beyond reporting analytics for growthSubscribed 2019 - Beyond reporting analytics for growth
Subscribed 2019 - Beyond reporting analytics for growth
Zuora, Inc.
 
Subscribed 2019 - The Future of Orders
Subscribed 2019 - The Future of Orders Subscribed 2019 - The Future of Orders
Subscribed 2019 - The Future of Orders
Zuora, Inc.
 
Ad

Recently uploaded (20)

Network Detection and Response (NDR): The Future of Intelligent Cybersecurity
Network Detection and Response (NDR): The Future of Intelligent CybersecurityNetwork Detection and Response (NDR): The Future of Intelligent Cybersecurity
Network Detection and Response (NDR): The Future of Intelligent Cybersecurity
GauriKale30
 
Level Up Your Launch: Utilizing AI for Start-up Success
Level Up Your Launch: Utilizing AI for Start-up SuccessLevel Up Your Launch: Utilizing AI for Start-up Success
Level Up Your Launch: Utilizing AI for Start-up Success
Best Virtual Specialist
 
Comments on Cloud Stream Part II Mobile Hub V1 Hub Agency.pdf
Comments on Cloud Stream Part II Mobile Hub V1 Hub Agency.pdfComments on Cloud Stream Part II Mobile Hub V1 Hub Agency.pdf
Comments on Cloud Stream Part II Mobile Hub V1 Hub Agency.pdf
Brij Consulting, LLC
 
www.visualmedia.com digital markiting (1).pptx
www.visualmedia.com digital markiting (1).pptxwww.visualmedia.com digital markiting (1).pptx
www.visualmedia.com digital markiting (1).pptx
Davinder Singh
 
From Sunlight to Savings The Rise of Homegrown Solar Power.pdf
From Sunlight to Savings The Rise of Homegrown Solar Power.pdfFrom Sunlight to Savings The Rise of Homegrown Solar Power.pdf
From Sunlight to Savings The Rise of Homegrown Solar Power.pdf
Insolation Energy
 
NewBase 28 April 2025 Energy News issue - 1783 by Khaled Al Awadi_compressed...
NewBase 28 April 2025  Energy News issue - 1783 by Khaled Al Awadi_compressed...NewBase 28 April 2025  Energy News issue - 1783 by Khaled Al Awadi_compressed...
NewBase 28 April 2025 Energy News issue - 1783 by Khaled Al Awadi_compressed...
Khaled Al Awadi
 
Disinformation in Society Report 2025 Key Findings
Disinformation in Society Report 2025 Key FindingsDisinformation in Society Report 2025 Key Findings
Disinformation in Society Report 2025 Key Findings
MariumAbdulhussein
 
Cloud Stream Part II Mobile Hub V1 Hub Agency.pdf
Cloud Stream Part II Mobile Hub V1 Hub Agency.pdfCloud Stream Part II Mobile Hub V1 Hub Agency.pdf
Cloud Stream Part II Mobile Hub V1 Hub Agency.pdf
Brij Consulting, LLC
 
Influence of Career Development on Retention of Employees in Private Univers...
Influence of Career Development on Retention of  Employees in Private Univers...Influence of Career Development on Retention of  Employees in Private Univers...
Influence of Career Development on Retention of Employees in Private Univers...
publication11
 
Top 5 Mistakes to Avoid When Writing a Job Application
Top 5 Mistakes to Avoid When Writing a Job ApplicationTop 5 Mistakes to Avoid When Writing a Job Application
Top 5 Mistakes to Avoid When Writing a Job Application
Red Tape Busters
 
Region Research (Hiring Trends) Vietnam 2025.pdf
Region Research (Hiring Trends) Vietnam 2025.pdfRegion Research (Hiring Trends) Vietnam 2025.pdf
Region Research (Hiring Trends) Vietnam 2025.pdf
Consultonmic
 
AlaskaSilver Corporate Presentation Apr 28 2025.pdf
AlaskaSilver Corporate Presentation Apr 28 2025.pdfAlaskaSilver Corporate Presentation Apr 28 2025.pdf
AlaskaSilver Corporate Presentation Apr 28 2025.pdf
Western Alaska Minerals Corp.
 
20250428 CDB Investor Deck_Apr25_vFF.pdf
20250428 CDB Investor Deck_Apr25_vFF.pdf20250428 CDB Investor Deck_Apr25_vFF.pdf
20250428 CDB Investor Deck_Apr25_vFF.pdf
yihong30
 
Freeze-Dried Fruit Powder Market Trends & Growth
Freeze-Dried Fruit Powder Market Trends & GrowthFreeze-Dried Fruit Powder Market Trends & Growth
Freeze-Dried Fruit Powder Market Trends & Growth
chanderdeepseoexpert
 
Kiran Flemish - A Dynamic Musician
Kiran  Flemish  -  A   Dynamic  MusicianKiran  Flemish  -  A   Dynamic  Musician
Kiran Flemish - A Dynamic Musician
Kiran Flemish
 
INTRODUCTION OF MANAGEMENT.pdf CA SUVIDHA CHAPLOT
INTRODUCTION OF MANAGEMENT.pdf CA SUVIDHA CHAPLOTINTRODUCTION OF MANAGEMENT.pdf CA SUVIDHA CHAPLOT
INTRODUCTION OF MANAGEMENT.pdf CA SUVIDHA CHAPLOT
CA Suvidha Chaplot
 
Web Design Creating User-Friendly and Visually Engaging Websites - April 2025...
Web Design Creating User-Friendly and Visually Engaging Websites - April 2025...Web Design Creating User-Friendly and Visually Engaging Websites - April 2025...
Web Design Creating User-Friendly and Visually Engaging Websites - April 2025...
TheoRuby
 
TNR Gold Investor Summary - Building The Green Energy Metals Royalty and Gold...
TNR Gold Investor Summary - Building The Green Energy Metals Royalty and Gold...TNR Gold Investor Summary - Building The Green Energy Metals Royalty and Gold...
TNR Gold Investor Summary - Building The Green Energy Metals Royalty and Gold...
Kirill Klip
 
BeMetals_Presentation_May_2025 .pdf
BeMetals_Presentation_May_2025      .pdfBeMetals_Presentation_May_2025      .pdf
BeMetals_Presentation_May_2025 .pdf
DerekIwanaka2
 
Harnessing Hyper-Localisation: A New Era in Retail Strategy
Harnessing Hyper-Localisation: A New Era in Retail StrategyHarnessing Hyper-Localisation: A New Era in Retail Strategy
Harnessing Hyper-Localisation: A New Era in Retail Strategy
RUPAL AGARWAL
 
Network Detection and Response (NDR): The Future of Intelligent Cybersecurity
Network Detection and Response (NDR): The Future of Intelligent CybersecurityNetwork Detection and Response (NDR): The Future of Intelligent Cybersecurity
Network Detection and Response (NDR): The Future of Intelligent Cybersecurity
GauriKale30
 
Level Up Your Launch: Utilizing AI for Start-up Success
Level Up Your Launch: Utilizing AI for Start-up SuccessLevel Up Your Launch: Utilizing AI for Start-up Success
Level Up Your Launch: Utilizing AI for Start-up Success
Best Virtual Specialist
 
Comments on Cloud Stream Part II Mobile Hub V1 Hub Agency.pdf
Comments on Cloud Stream Part II Mobile Hub V1 Hub Agency.pdfComments on Cloud Stream Part II Mobile Hub V1 Hub Agency.pdf
Comments on Cloud Stream Part II Mobile Hub V1 Hub Agency.pdf
Brij Consulting, LLC
 
www.visualmedia.com digital markiting (1).pptx
www.visualmedia.com digital markiting (1).pptxwww.visualmedia.com digital markiting (1).pptx
www.visualmedia.com digital markiting (1).pptx
Davinder Singh
 
From Sunlight to Savings The Rise of Homegrown Solar Power.pdf
From Sunlight to Savings The Rise of Homegrown Solar Power.pdfFrom Sunlight to Savings The Rise of Homegrown Solar Power.pdf
From Sunlight to Savings The Rise of Homegrown Solar Power.pdf
Insolation Energy
 
NewBase 28 April 2025 Energy News issue - 1783 by Khaled Al Awadi_compressed...
NewBase 28 April 2025  Energy News issue - 1783 by Khaled Al Awadi_compressed...NewBase 28 April 2025  Energy News issue - 1783 by Khaled Al Awadi_compressed...
NewBase 28 April 2025 Energy News issue - 1783 by Khaled Al Awadi_compressed...
Khaled Al Awadi
 
Disinformation in Society Report 2025 Key Findings
Disinformation in Society Report 2025 Key FindingsDisinformation in Society Report 2025 Key Findings
Disinformation in Society Report 2025 Key Findings
MariumAbdulhussein
 
Cloud Stream Part II Mobile Hub V1 Hub Agency.pdf
Cloud Stream Part II Mobile Hub V1 Hub Agency.pdfCloud Stream Part II Mobile Hub V1 Hub Agency.pdf
Cloud Stream Part II Mobile Hub V1 Hub Agency.pdf
Brij Consulting, LLC
 
Influence of Career Development on Retention of Employees in Private Univers...
Influence of Career Development on Retention of  Employees in Private Univers...Influence of Career Development on Retention of  Employees in Private Univers...
Influence of Career Development on Retention of Employees in Private Univers...
publication11
 
Top 5 Mistakes to Avoid When Writing a Job Application
Top 5 Mistakes to Avoid When Writing a Job ApplicationTop 5 Mistakes to Avoid When Writing a Job Application
Top 5 Mistakes to Avoid When Writing a Job Application
Red Tape Busters
 
Region Research (Hiring Trends) Vietnam 2025.pdf
Region Research (Hiring Trends) Vietnam 2025.pdfRegion Research (Hiring Trends) Vietnam 2025.pdf
Region Research (Hiring Trends) Vietnam 2025.pdf
Consultonmic
 
20250428 CDB Investor Deck_Apr25_vFF.pdf
20250428 CDB Investor Deck_Apr25_vFF.pdf20250428 CDB Investor Deck_Apr25_vFF.pdf
20250428 CDB Investor Deck_Apr25_vFF.pdf
yihong30
 
Freeze-Dried Fruit Powder Market Trends & Growth
Freeze-Dried Fruit Powder Market Trends & GrowthFreeze-Dried Fruit Powder Market Trends & Growth
Freeze-Dried Fruit Powder Market Trends & Growth
chanderdeepseoexpert
 
Kiran Flemish - A Dynamic Musician
Kiran  Flemish  -  A   Dynamic  MusicianKiran  Flemish  -  A   Dynamic  Musician
Kiran Flemish - A Dynamic Musician
Kiran Flemish
 
INTRODUCTION OF MANAGEMENT.pdf CA SUVIDHA CHAPLOT
INTRODUCTION OF MANAGEMENT.pdf CA SUVIDHA CHAPLOTINTRODUCTION OF MANAGEMENT.pdf CA SUVIDHA CHAPLOT
INTRODUCTION OF MANAGEMENT.pdf CA SUVIDHA CHAPLOT
CA Suvidha Chaplot
 
Web Design Creating User-Friendly and Visually Engaging Websites - April 2025...
Web Design Creating User-Friendly and Visually Engaging Websites - April 2025...Web Design Creating User-Friendly and Visually Engaging Websites - April 2025...
Web Design Creating User-Friendly and Visually Engaging Websites - April 2025...
TheoRuby
 
TNR Gold Investor Summary - Building The Green Energy Metals Royalty and Gold...
TNR Gold Investor Summary - Building The Green Energy Metals Royalty and Gold...TNR Gold Investor Summary - Building The Green Energy Metals Royalty and Gold...
TNR Gold Investor Summary - Building The Green Energy Metals Royalty and Gold...
Kirill Klip
 
BeMetals_Presentation_May_2025 .pdf
BeMetals_Presentation_May_2025      .pdfBeMetals_Presentation_May_2025      .pdf
BeMetals_Presentation_May_2025 .pdf
DerekIwanaka2
 
Harnessing Hyper-Localisation: A New Era in Retail Strategy
Harnessing Hyper-Localisation: A New Era in Retail StrategyHarnessing Hyper-Localisation: A New Era in Retail Strategy
Harnessing Hyper-Localisation: A New Era in Retail Strategy
RUPAL AGARWAL
 

Subscribed 2015: Architecture, Security, Scalability

  • 1. Architecture, Security and Scalability in the Cloud Andrey Kolesnikov VP, TechOps Pritesh Parekh Chief Security Officer
  • 2. Agenda Industry Trends Compliance Strategy Securing SaaS Product Security Look Inside the platform Scale and Resiliency Ops Approach
  • 4. Industry Data Security Breaches Courtesy: www.informationisbeautiful.net
  • 5. Courtesy: Symantec 2015 Internet Security Threat Report Industry Data Security Breaches 2014
  • 6. Courtesy: Symantec 2015 Internet Security Threat Report Industry Data Security Breaches 2014
  • 7. Courtesy: Symantec 2015 Internet Security Threat Report Industry Data Security Breaches 2014
  • 9. Courtesy: Symantec 2015 Internet Security Threat Report Industry Data Security Breaches 2014 • Top 3 entry point used for hacking • Weak Authentication (Employee or Third Party Vendors) • Malware infected using Phishing • Application or Server Weakness • Top motives are CC data and PII with email address • Average Cost per data breach is $3.5 million or $145 per compromised record (does not include loss of reputation) • Hackers targeting CFOs to gain monetary advantage on market moving information
  • 10. Industry Leading Compliance Strategy • Required for all service providers storing or processing credit cards • PCI DSS Level 1 since 2008 • 200+ Security Controls required • Supports Customer SOX compliance • SSAE 16 SOC 1 Type II since 2009 • SOC 2 Type II based on Trust Services Principles • HHS HIPAA audit program as a Business Associate • Compliance with Security, Privacy and Breach Notification requirements • Provides a method for U.S. companies to transfer personal data from the EU to US • Protection of consumer personal data
  • 11. Enterprise-grade Data Security • TLS Encryption • Network Firewall and Web Application Firewall • Host Intrusion Detection Systems • Sensitive Data Encryption using FIPS certified Hardware Encryption • Multiple layers of authentication • Continuous Application Pen Testing • Daily Network Scans & Third Party Security testing • Centralized Logging and Real-time Alerting • Secure SSAE16 Compliant Data Centers Load Balancers Load Balancers Log ServersDB Servers Firewall IDS Firewall IDS Zuora UI Customer Apps APIs TLS Storage Encryption ApplianceApp Servers Enterprise-grade Data Security
  • 12. Strong authentication features support enterprise ecosystem integration • Strong Security Policies • 2-factor Authentication • Single Sign-on support • IP-address filtering
  • 13. Granular data access features supports SOX compliance requirements 65 distinct permissions for standard and admin user roles
  • 15. • Greater Control with the hierarchy based data access feature • Access can be granted on a need- to-know basis (department, geo- location, product etc.) Data Access Control
  • 16. Ops
  • 17. Private Cloud Commercial Software Quarterly Releases SQL VMs MTBF DIY Stack Trends Public Cloud OSS Continuous Delivery NoSQL Containers MTTR SaaS SaaS v1.0 SaaS v2.Current SLIDE HEADER
  • 18. Across Zuora Platform Transactions a month Rows of data synchronized and exported Average Monthly Volume Snapshot: Average platform compute utilization 1.3B 22B 40%
  • 19. 3 Team Pillars Customer, Technology, Business 50/50 Developer/Sy sEng Ratio 2 Public Cloud Regions 2 Operation Centers 900+ Nodes 2 Geo Distributed datacenters Look Inside
  • 21. Embed Ops into Dev Durability > Availability API > Scripts Metrics, Metrics, Metrics Ops Approach
  • 22. GRIDGRIDSummary GRID • Compliance Certifications – PCI, SOC1, SOC2 and HIPPA • Data Security – Web Application Firewall, Host Based Intrusion Detection System and Continuous Security Testing • Product Security – 2FA, SSO, Data Access Controls and Strong Security Policies • Infrastructure – Public/Private Cloud, OSS • Architecture – Right size/approach for the problem • Operators – Mix of Developers and Systems Engineers

Editor's Notes

  • #3: From a Security standpoint, I want to focus 3 key areas where we made significant investment in security First. Compliance  We’ve accomplished several certifications and attestations to meet and exceed industry security requirements. We will walk thru the list of certifications. Next. Implemented several layers of Security as part of our cloud infrastructure stack Finally. Security Features  We have built security features for our customers the ability to have strong authentication, authorization and access control
  • #5: 2014 was a year of data breaches Healthcare providers like Anthem, PF Chang to retailers like Michaels, Home Depot, Neiman Marcus Industry lost billions of dollars as a result of data breaches
  • #6: In 2014, Number of Data breaches increased by 23% and the identities stolen decreased by almost 200M. In 2014, less large data breaches. Most of these breaches are from attackers. What kind of information were exposed? – Names, SSN, Financial Information, Birth dates
  • #7: Retail and Financial industry remain on the top for number of records stolen Healthcare and Retail are the top choice for the hacker for number of breaches Although Financial industry has less number of incident but they had large data breaches that made them on top for the number of records stolen
  • #8: Why would someone sell email addresses?
  • #10: Whats the most common password?
  • #11: As a Service Provider storing and processing credit card information, Zuora is required to go through the Payment Card Industry Data Security Standard, that is PCI DSS. Zuora has been Certified with highest level – Level 1 since 2008. Recently completed our PCI certification last month with the latest version of PCI 3.0. Since Zuora is PCI compliant, as a customer of Zuora, your PCI obligations may tremendously be reduced in scope We also annually do SSAE16 (previously known as SAS70) attestation, we completed one in Nov and last year and we are targeting renewal this year around the same timeframe. When our customer goes thru financial audit (SOX audit), auditors need assurance on security/integrity of RBM systems. Zuora can provide that you with the SSAE16 certification Last 2 are privacy certifications US-EU is required to transfer personal data from the EU to US TRUSTe certification is to make sure we safely collect customer data and it further supports Safe Harbor certification Statement on Standards for Attestation Engagements Payment Card Industry Data Security Standard
  • #12: At Zuora, we have a defense in depth approach to security. We have embedded security at every layer of the stack. What you see here is a high level simplified view of Zuora Infrastructure stack. Zuora customers can connect to Zuora application via the application/UI (zuora.com) or call SOAP/REST APIs from their application All connection is over SSL and the first layer of defense is our Firewall and Network Intrusion Detection Systems. If there is any malicious traffic or unusual behavior, it gets blocked at this layer. All traffic from there gets terminated at our load balancer and load balancer initiates the connection to the application server. Each application server runs a Host based IDS that detects and alerts any unusual or malicious traffic. If there is Pci data that the customer sends to us, we use a Hardware based Security appliance to encrypt the data Data gets encrypted on the device, the keys never leave the device All the activity in our production infrastructure is logged in a centralized logging system All systems and applications are scanned on a daily basis Our data center where we host the data are PCI compliant and have strong security in place
  • #13: What we have covered so far is Compliance and Infrastructure Security. Now are talking about the Security Feature that we provide to our customer to have strong authentication. 1/3rd of the breaches happened last year were as a result of weak authentication Zuora has made significant investment to provide strong authentication features
  • #14: 65 distinct permissions for standard and admin user roles Access can be granted on a need-to-know basis (department, geo-location, product etc.)
  • #17: 1/3rd view
  • #18: Full screen view
  • #19: 1/3rd view
  • #21: 1/3rd view
  • #24: 1/3rd view