Letzte Gelegenheit! Inspire 2024, 13.–16. Mai 2024 im Venetian, Las Vegas. Jetzt noch anmelden!

 

Cybersecurity Month Spotlight: Empowering Your Trust with Alteryx’s Information Security Program

What's New   |   Lucas Moody   |   Oct 24, 2023

In an era where data fuels innovation and shapes decisions, preserving the integrity and safety of this invaluable resource is my primary mission as CISO at Alteryx. The responsibility to safeguard data is paramount, and we take this obligation seriously. As we celebrate Cybersecurity Month, I would like to offer an exclusive peek into our Information Security Program, revealing the strong measures we have put in place to secure our systems and protect information.

Understanding Our Security Approach

A Defense-in-Depth Strategy: Security at Alteryx isn’t merely a feature; it’s woven into the very fabric of our solutions. Our Information Security Program embraces a defense-in-depth approach. This encompasses state-of-the-art technology, rigorous processes, and a team of skilled professionals serving as the first line of defense. These professionals ensure the confidentiality, integrity, and availability of data and our operations.

Compliance and Certification: Your Assurance of Quality

Adherence to Industry Standards: Alteryx proudly holds certifications like ISO 27001 and SOC2 Type II, affirming our commitment to the highest levels of information security. We align ourselves with globally respected frameworks, including ISO 27001, NIST Cybersecurity Framework, and CIS Controls. Our specialized desktop analytics solution, Alteryx Designer – FIPS, is meticulously crafted to meet the Federal Information Processing Standards (FIPS) thresholds established by the National Institute of Standards and Technology (NIST) and in accordance with the Federal Information Security Management Act (FISMA). This commitment ensures a secure analytics environment, allowing users to blend diverse data securely and efficiently. With Alteryx Designer – FIPS, users not only experience cutting-edge analytics but also the peace of mind that comes with meeting the highest industry standards for data security.

Visibility and Adaptability: Keeping Up with the Dynamic Landscape

As the digital ecosystem continues to shift and change, having visibility is key. We proactively stay abreast of the evolving threat landscape, industry standards, and regulations. For instance, in response to the growing demand for Software Bill of Materials (SBOM) adoption, we are actively engaged in understanding and implementing these regulations, ensuring we adhere to the latest industry standards.

Our Security in Action

Securing Every Facet: Our Information Security Program spans a wide spectrum, from rigorous personnel security checks and ongoing training to robust encryption techniques. Security is seamlessly integrated into every step of our software development lifecycle. We diligently manage our assets and rigorously control identity and access.

Incident Response and Beyond

Swift, Proactive Responses: Facing potential threats head-on, our Security Operations at Alteryx remain vigilant. We leverage cutting-edge machine learning technologies for threat detection and incident management. Our Cybersecurity Incident Response Plan (CIRP) ensures our Security Operations Center (SOC) is well-prepared, enabling us to respond promptly and effectively to any security incidents.

Partnering for a Secure Future

A Pledge of Collaboration: Our Information Security Program means more than just safeguarding our systems; it’s about building a trust-based partnership. We consistently invest in technologies, training, and processes to guarantee data is in secure hands.

As we observe Cybersecurity Month, we invite you to delve deeper into the details of our Information Security Program by exploring our InfoSec Program Whitepaper. Here, you’ll discover insights into our security practices, providing a comprehensive view of our unwavering commitment to security.

Thank you for entrusting Alteryx as your ally in intelligent decision-making. We eagerly anticipate continuing this journey, ensuring a future where data remains secure, decisions are empowered, and trust remains unshakable.

Tags
  • Business Leader