Information Security Management (Single Tenant)

Last modified: September 30, 2022

Network and Application Penetration Tests

Do you conduct network/application penetration tests of your cloud service infrastructure regularly? 

Yes.

Tenant Data Encryption and Segmentation

Is Alteryx Machine Learning able to logically segment/encrypt customer data in such a way that data accessed by a single tenant isn't inadvertently provided to other tenants?

We store all tenant data in logically discrete AWS storage segments.

Data Storage Location

Are you able to restrict the storage of customer data to specific countries or geographic locations? Do you provide tenants with geographically-resilient hosting options? 

Alteryx Machine Learning stores data in the country of the AWS region in which Alteryx Machine Learning is deployed. Currently, we have deployed Alteryx Machine Learning on AWS in the United States, Ireland, and Australia. We don't currently support geographically-resilient deployment.

Information Security System Management

Do you restrict, log, and monitor access to your information security management systems (for example, hypervisors, firewalls, vulnerability scanners, network sniffers, APIs, etc.)?

We restrict access to information security management to qualified personnel and log all access.

Firewalls

Are system and network environments protected by a firewall or virtual firewall to ensure compliance with legislative, regulatory, and contractual requirements?

Yes.

Was This Page Helpful?

Running into problems or issues with your Alteryx product? Visit the Alteryx Community or contact support. Can't submit this form? Email us.