Information Security Management (Single Tenant)
Network and Application Penetration Tests
Do you conduct network/application penetration tests of your cloud service infrastructure regularly?
Tenant Data Encryption and Segmentation
Is Alteryx Machine Learning able to logically segment/encrypt customer data in such a way that data accessed by a single tenant isn't inadvertently provided to other tenants?
We store all tenant data in logically discrete AWS storage segments.
Data Storage Location
Are you able to restrict the storage of customer data to specific countries or geographic locations? Do you provide tenants with geographically-resilient hosting options?
Alteryx Machine Learning stores data in the country of the AWS region in which Alteryx Machine Learning is deployed. Currently, we have deployed Alteryx Machine Learning on AWS in the United States, Ireland, and Australia. We don't currently support geographically-resilient deployment.
Information Security System Management
Do you restrict, log, and monitor access to your information security management systems (for example, hypervisors, firewalls, vulnerability scanners, network sniffers, APIs, etc.)?
We restrict access to information security management to qualified personnel and log all access.
Are system and network environments protected by a firewall or virtual firewall to ensure compliance with legislative, regulatory, and contractual requirements?