

There is no option for delaying or scheduling maintenance on the hosted service.
#ADOBE CAPTIVATE 8 FIREWALL FIX WINDOWS#
Adobe Connect maintenance windows that include downtime are scheduled on an as-needed basis and are typically used for more involved maintenance (major releases) that will require the part of the system to be unavailable for a period of time. While most maintenance does not require downtime, when it does, a typical downtime maintenance window will fall on a Friday evening from 8 pm -midnight Pacific Time. The Adobe Connect release schedule is typically one major release every 12 to 18 months, with a minor release following the major release by six months and patches as needed. The CAB process focuses upon enforcing stability and availability while permitting an agile response to emerging issues, and providing internal process transparency and accountability. Change ManagementĪdobe Connect follows a Change Approval Board (CAB) process for any and all changes that could impact customer experience. Adobe works with our cloud infrastructure providers to enforce the most up-to-date ACLs. ACLs, or traffic flow policies, exist on each managed interface to manage and enforce the flow of traffic. These boundary devices employ rule sets, access control lists (ACL), and configurations to enforce the flow of information to specific information system services. Secure Network ArchitectureĪdobe requires all certified cloud infrastructure providers to employ network devices, including firewall and other boundary devices, to monitor and control communications at the external boundary of the network and at key internal boundaries within the network. Unless the connection originates from a list of trusted IP addresses, Adobe does not allow management access from the Internet. All management connections to the servers occur over encrypted Secure Shell (SSH), Secure Sockets Layer (SSL), or Virtual Private Network (VPN) channels, and remote access always requires two-factor authentication. Secure ManagementĪdobe deploys dedicated network connections in order to enable secure management of the Adobe Connect.
#ADOBE CAPTIVATE 8 FIREWALL FIX SOFTWARE#
Systems generating logs are hardened and access to logs and logging software is restricted to authorized Adobe Digital Marketing Information Security Team personnel. Sufficient storage capacity for logs is identified, periodically reviewed, and, as needed, expanded to help ensure that log storage is not exceeded. In order to protect against unauthorized access and modification, Adobe captures network logs, OS-related logs, and intrusion detections. In addition, Adobe logs all server connections for auditing. Only authorized users within the Adobe intranet or remote users who have completed the multi-factor authentication process to create a VPN connection can access administrative tools. In addition, providers calculate checksums on all network traffic to detect corruption of data packets when storing or retrieving data. To help provide durability, PUT and COPY operations synchronously store customer data across multiple facilities and redundantly store objects on multiple devices across multiple facilities in a provider region.

The combination of backup procedures provides quick recovery from short-term backup as well as off-site protection of data.īy default, Adobe stores all Adobe Connect data using high-durability storage services provided by its cloud infrastructure partners. These backups are also replicated to a hot failover site that is geographically removed from the primary data center. Data Storage and BackupĬustomer content and data are backed up for Adobe Connect on a weekly basis, with daily differentials for disaster recovery purposes. All other access to the application and data servers is made only by authorized Adobe personnel and is conducted via encrypted channels over secure management connections.Īdobe also separates its corporate testing environments from its production environments to avoid the use of customer data in testing environments.

The only access to these servers and databases is via secure access using the Adobe Connect application. Adobe takes the security at all its data centers very seriously and maintains standards for security best practices as well as security compliance requirements.ĭata Protection, Monitoring, and Availability Segregating Client DataĪdobe Connect Hosted Multi-Tenant relies on application permissions to isolate one customer from another.
