Whether large enterprise, small business, or non-profit, every organization has a vested interest in protecting its data. FileMaker is an excellent platform for quickly building and easily managing data, but still requires careful attention to protect that information.
In this half-day presentation we will cover reasons for securing data, define what exactly is security, and talk about when and how to implement it. We will delve into specific FileMaker technologies to fulfill general security requirements, walk through security-related settings in both FileMaker Pro and FileMaker Server, and provide end-to-end demonstrations of several important techniques available in the FileMaker environment. In addition, we will discuss relevant advanced concepts at the OS, hardware, and network levels.
Presentation will take place online, Zoom link will be provided upon registration.
We will leave plenty of time at the end to clarify understanding of the covered material and answer questions from live participants.
REASONS FOR SECURITY
- Maintain Control of Data
- Enhance Business Value
- Pass Regulatory Audits
WHAT IS SECURITY
WHEN AND WHERE TO CONSIDER SECURITY
- Secure By Design
- Secure By Default
- Secure In Deployment
HOW TO IMPLEMENT SECURITY: ACCESS
HOW TO IMPLEMENT SECURITY: ENCRYPTION
- In Transit
- At Rest
- By Field
- FileMaker Pro Settings
- FileMaker Server Settings
- Request and Install SSL / TLS Certificate
- Configure OAuth (Amazon)
- Implement Record (Row) and Field (Column) Security
- OS Protections
- Firewall Configuration
- Network Considerations
- Third-Party Tools