Information Security Management (Multi-Tenant)

Last modified: November 04, 2022

Network and Application Penetration Tests

Do you conduct network/application penetration tests of your cloud service infrastructure regularly? 

Yes.

Tenant Data Encryption and Segmentation

Is Alteryx Machine Learning able to logically segment/encrypt customer data in such a way that data accessed by a single tenant isn't inadvertently provided to other tenants?

We store all tenant data in logically discrete storage segments.

Data Storage Location

Are you able to restrict the storage of customer data to specific countries or geographic locations? Do you provide tenants with geographically-resilient hosting options? 

Currently, Alteryx deploys Machine Learning data within cloud regions within the United States.

Information Security System Management

Do you restrict, log, and monitor access to your information security management systems (for example, hypervisors, firewalls, vulnerability scanners, network sniffers, APIs, etc.)?

We restrict access to information security management to qualified personnel and log all access.

Firewalls

Are system and network environments protected by a firewall or virtual firewall?

Yes.

Was This Page Helpful?

Running into problems or issues with your Alteryx product? Visit the Alteryx Community or contact support. Can't submit this form? Email us.