Is Data Secure on 3DEXPERIENCE?

Data security is an ever-increasing concern, so it’s no surprise that it often comes up when people talk about keeping their data in cloud storage. Whether you’re talking about keeping data secure from internal server failure or leaks to external parties, it’s essential to be confident in your solution. 3DEXPERIENCE has several security mechanisms put into place to ensure your data is protected.



Security Protocol Emphasis

Security threats have become increasingly advanced. This is why Dassault Systèmes has implemented the concept of “Security in Depth” in which there are numerous independent security practices that are in place for any single threat. Given a threat is able to surpass one level of security, it will be blocked by the next layer.

There is a focus on industry standards and best practices, including:

  • Implementation Guide ISO 27002

  • NIST 800 Series

  • Open Web Application Security Project (OWASP) Methodologies

  • CobIT Framework


Layers of Security

When it comes to 3DEXPERIENCE, data security is an encompassing term. There are numerous layers behind the scenes to ensure a safe experience, which include:

  • Internet Security

  • Cloud Security

  • Application Security

  • Virtual System Security

  • Physical Security

 
 

The security starts by filtering internet traffic to confirm there is only intended traffic. Next, each organization is provided with their own cloud instance, keeping the data partitioned from other organizations and potential threats. That’s followed by implementing double peer-reviewed application code that is aligned with industry best practices and recommendations. The fourth layer provides maintenance such as system patching and carries out attack-like scenarios and continuous scans to monitor and confirm the security. Last but not least, the data is stored in undistinguished data centers that are strictly limited to authorized personnel. The data is further secured with redundant disks, disaster recovery, and backup and restore procedures.


OWASP and Application Security

At the core of the application security lie many OWASP best practices, including:

  • Authentication

  • Confidentiality and Integrity

  • Encryption

  • Injection, Scripting, and Hardening

  • Monitoring and Audit

With single sign-on (SSO) a user is fully authenticated, and specific permissions and licenses are assigned before accessing data. Access to data can be controlled by role, organization, and database on the platform. While data is being transferred on the cloud, HTTPS/TLS encryptions with a strong key cypher are used. The platform was designed to resist injection flaws and attacks and XML parsers are hardened using best practices. To top it all off, the network is monitored 24/7/365, with events, actions, and activities being logged and retained for potential investigative actions.


 

Summary

The security of your data is essential. The 3DEXPERIENCE Platform brings you secure cloud storage that follows industry standards and best practices. This also brings high-level security to smaller organizations who may not have the resources to implement it on-premise. With the various layers of security provided, you can be sure your data is safe and secure from threats!

Interested in getting started with 3DEXPERIENCE? Contact us today to learn more!

 
 
 
Matthew FontanaComment