SlideShare a Scribd company logo
Mailjet Security
Speaker
Speaker
01
02
03
Agenda
Application Security And
Architecture
Security Policy
Incident Supervision And Management
Premium SLA
04
Application
Security And
Architecture
01
Data Security Is Key For Email Sending01
Data Location
All Mailjet’s customer data is stored in Data Centers based within Europe (OVH in France, Google Cloud
Platform in Belgium), under European Directive 95/46/CE.
Data Storage
All data is copied in three nodes and backups are stored in separated Data Centers.
Data Encryption
• Data is natively encrypted in Google Cloud Platform.
• TLS connexion is used to send emails.
• Passwords are hashed and salted.
Data Privacy
Mailjet considers the privacy of its customers’ personal data with the utmost importance. For more
information, Public Privacy Policy: https://www.mailjet.com/privacy-policy.
4
Mailjet Access And Account Management01
User Authentication
Mailjet Web Interface:
• Authentication by login and password.
• Connections for the same IP or the same email locked after 5 attempts.
Mailjet API:
Authentication with an API key (username) and a API secret key (password).
API Key Management
• Possibility to create sub-API keys under a master API key.
• Allow to separate mailings across different API keys.
• Managed by administrators.
User Right Management
• Possibility to share access to an account.
• Access sharing can be limited to specific API keys and specific pages.
• Autonomy in the creation and deletion of shared accounts (managed by administrators).
5
Example of use:
Sub-API Key 1
Team 1
…
Team …
Sub-API Key n
Team n
Master API Key
A Safe Development Process01
Security Oriented Development Methods
Development Team awareness on typical vulnerabilities (SQL or JavaScript injection…).
Security Oriented Quality Procedures
• Systematised code review including security checks.
• Quality assurance tests in pre-production environment for all developments.
• Non-regression tests after each production release.
Developer Access
• Developers can only access development environments.
• No customer data is stored on development environments.
Release Management
• Documented release management process.
• Record and validation of all production releases before their deployment.
• Dedicated release slots.
6
Technical Production Infrastructure01
High Availability Infrastructure
• Data Centers with redundant power systems and environmental controls to prevent failures.
• Redundant infrastructure (services are distributed in several Data Centers).
Backup
• Daily backups with a retention of 7 days.
• Weekly backups with a retention of 4 weeks.
Hosting
• OVH - France - Certified ISO 27001, SOC 1 type II / SOC 2 type II & PCI DSS Level 1.
• Google Cloud Platform - Belgium - Certified ISO 27001, ISO 27017, ISO 27018, and annual audits for
SSAE16 / ISAE 3402 Type II (SOC 2 et SOC 3), and PCI DSS V3.0.
7
Environment Security01
8
Security
Policy
02
Security Policy - Global Overview (1/2)02
Scope
Security Policy applies to Mailjet Information Systems hosted in:
• Google Cloud Platform.
• OVH Platform.
All resources needed to create, process, store, disseminate or destroy information are in the scope.
Lifecycle
• Design - definition of security procedures and standards.
• Implementation - deployment of security procedures and standards.
• Monitoring and Control - control panels for IS security, security audits, and management reviews.
• Evolution - improvement of security procedures and standards when needed.
10
Security Policy - Global Overview (2/2)02
Fundamental Principles
• Compliance with legal obligations.
• Assessment and treatment of security risks which may impact IT application resources.
• Protected, nominative and minimum access to Mailjet Information Systems.
• Professional use of Mailjet Information Systems.
• Monitoring and treatment of security incidents.
11
Human Resources And Organization02
Contracts And Charters
• Confidentiality and non-concurrence clauses in employees contracts.
• IT charter and rules of procedures.
Roles And Responsibilities
Clearly defined and identified roles and responsibilities for information security (ops team,
development teams, users, managers…).
A Secure Selection Of Third-Parties Contractors
• Mutual NDA between Mailjet and third-parties companies.
• Full background check and review of security practices before contracting with a new vendor.
12
Security Procedures And Standards02
Security Procedures
• Access management.
• Incident management.
• Security risk assessment and treatment.
• Security management of subcontractors.
Security Standards
Definition of security standards related to:
• Operating systems (access through SSH network protocol using PGP smartcards…).
• Workstations (sessions protected by an individual and confidential password, disks encrypted…).
• Databases (data copied in three nodes, daily and weekly backups…).
• Network (firewalls on all the machines that filter incoming network traffic…).
• Hosting (Data Centers secured using barbed-wire fencing, cameras, security staff…).
Note: Some of these procedures and standards are currently being formalized
13
Business Continuity02
Architecture Reliability
• All Mailjet services are distributed in several Data Centers.
• Automatic switchover in case of Data Center failure.
• Data Centers have:
1. Redundant power systems and generators to provide enough emergency electrical power.
2. Cooling systems to maintain constant operating temperature.
3. Fire detection systems.
Backup Strategy
• Daily and weekly backups to prevent loss of data.
• Retention of 7 days for daily backups and 4 weeks for weekly backups.
Disaster Recovery Plan
All employees can remotely access Mailjet applications and their documents (as Mailjet is using SaaS
Office Applications). All employees can work remotely to ensure the continuity of operations.
14
Incident
Supervision And
Management
03
Supervision And Alerting03
Supervision
• Monitoring of logs, statistics and alerts.
• Real-time collection in a centralized console.
• Use of dedicated tools:
- Zabbix for events.
- PagerDuty for alerts.
- Kibana/Logstash for logs.
Alerting
• Run of daily security audits related to platform’s configurations (accesses...).
• Alerts are sent when security threats are detected.
• Common Vulnerabilities Exposure (CVE) alerts are also followed.
16
Security Alert And Incident Management03
Security Incident Treatment
Security Alerts and Security Incidents are managed by our IT team:
• Analysis and diagnosis of the alert/incident.
• Identification of the corrective actions.
• Treatment of the alert/incident.
• Tests to confirm the resolution.
Customer Communication
• Mailjet Status Page - mailjet.statuspage.io
• Email or phone if needed.
17
Premium 

SLA
04
Premium SLA04
* This table should be read as follows: No penalties as long as at least 99.9% of the transactional emails processed within the past month have been
processed in less than 1 minute.
** Please note that the opening hours for the English language Technical Support are 24/7.
19
Indicator Measurement Period Target Values
Tolerance or reliability
index*
Maximum handling time
for transactional emails
Monthly 1 minute 99.9 %
Availability of the platform Monthly
Admin Access 99.9 %
API 99.9 %
SMTP in 99.9 %
Response time for a
Critical Fault
Monthly 2 hours** 98 %
Response time for a

Semi-Critical Fault
Monthly 4 hours** 98 %
Response time for a

Non-Critical Fault
Monthly 8 hours** 98 %
Thank You
<< Contact Name >>
<<contact>>@mailjet.com
+x xxx xxx xxx
@mailjet

More Related Content

What's hot

Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
Adetula Bunmi
 
z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code Scanner
Luigi Perrone
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
MLG College of Learning, Inc
 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security Professional
Helen Njuguna
 
Lesson 1- Intrusion Detection
Lesson 1- Intrusion DetectionLesson 1- Intrusion Detection
Lesson 1- Intrusion Detection
MLG College of Learning, Inc
 
Data Consult - Managed Security Services
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security Services
Jad Bejjani
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
Amy McMullin
 
Computer security design principles
Computer security design principlesComputer security design principles
Computer security design principles
Shaishav Dahal
 
Chapter 6 network security
Chapter 6   network securityChapter 6   network security
Chapter 6 network security
Syaiful Ahdan
 
Operations Security
Operations SecurityOperations Security
Operations Security
Mauro Alberto
 
Lesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPSLesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPS
MLG College of Learning, Inc
 
MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2
Abi Reddy
 
Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3
MLG College of Learning, Inc
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
ShivamSharma909
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
Karthikeyan Dhayalan
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios
 
Lesson 1
Lesson 1Lesson 1
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08
Amy McMullin
 
CISSP Week 9
CISSP Week 9CISSP Week 9
CISSP Week 9
jemtallon
 
Secure Email Communications from Symantec
Secure Email Communications from SymantecSecure Email Communications from Symantec
Secure Email Communications from Symantec
Arrow ECS UK
 

What's hot (20)

Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
z/OS Authorized Code Scanner
z/OS Authorized Code Scannerz/OS Authorized Code Scanner
z/OS Authorized Code Scanner
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
 
Certified Information Systems Security Professional
Certified Information Systems Security ProfessionalCertified Information Systems Security Professional
Certified Information Systems Security Professional
 
Lesson 1- Intrusion Detection
Lesson 1- Intrusion DetectionLesson 1- Intrusion Detection
Lesson 1- Intrusion Detection
 
Data Consult - Managed Security Services
Data Consult - Managed Security ServicesData Consult - Managed Security Services
Data Consult - Managed Security Services
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Computer security design principles
Computer security design principlesComputer security design principles
Computer security design principles
 
Chapter 6 network security
Chapter 6   network securityChapter 6   network security
Chapter 6 network security
 
Operations Security
Operations SecurityOperations Security
Operations Security
 
Lesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPSLesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPS
 
MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2
 
Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 1 - Lesson 3
 
Comp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementationComp tia security sy0 601 domain 3 implementation
Comp tia security sy0 601 domain 3 implementation
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
9781305094352 ppt ch08
9781305094352 ppt ch089781305094352 ppt ch08
9781305094352 ppt ch08
 
CISSP Week 9
CISSP Week 9CISSP Week 9
CISSP Week 9
 
Secure Email Communications from Symantec
Secure Email Communications from SymantecSecure Email Communications from Symantec
Secure Email Communications from Symantec
 

Similar to Mailjet Security Presentation 2017

Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaper
run_frictionless
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
Precisely
 
C days2015
C days2015C days2015
C days2015
Nuno Loureiro
 
Cybersecurity for Board.pptx
Cybersecurity for Board.pptxCybersecurity for Board.pptx
Cybersecurity for Board.pptx
SandeepAgrawal98
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
Sophos Benelux
 
EventLog Analyzer - Product overview
EventLog Analyzer - Product overviewEventLog Analyzer - Product overview
EventLog Analyzer - Product overview
ManageEngine EventLog Analyzer
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Robert Crane
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1)  ​Decrypting the security mystery with SIEM (Part 1)  ​
Decrypting the security mystery with SIEM (Part 1) ​
Zoho Corporation
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
Revital Lapidot
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
Revital Lapidot
 
HIPAA 101 Compliance Threat Landscape & Best Practices
HIPAA 101 Compliance Threat Landscape & Best PracticesHIPAA 101 Compliance Threat Landscape & Best Practices
HIPAA 101 Compliance Threat Landscape & Best Practices
Hostway|HOSTING
 
NetExplorer security leaflet
NetExplorer security leafletNetExplorer security leaflet
NetExplorer security leaflet
NetExplorer
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Brent Bernard, CISSP & PCI-QSA
 
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_OverviewPraetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
Brent Bernard, CISSP & PCI-QSA
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
Austin Ross
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
Brent Bernard, CISSP & PCI-QSA
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
Tryzens
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition System
Inductive Automation
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Micro Focus
 

Similar to Mailjet Security Presentation 2017 (20)

Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaper
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
C days2015
C days2015C days2015
C days2015
 
Cybersecurity for Board.pptx
Cybersecurity for Board.pptxCybersecurity for Board.pptx
Cybersecurity for Board.pptx
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
EventLog Analyzer - Product overview
EventLog Analyzer - Product overviewEventLog Analyzer - Product overview
EventLog Analyzer - Product overview
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Decrypting the security mystery with SIEM (Part 1) ​
Decrypting the security mystery with SIEM (Part 1)  ​Decrypting the security mystery with SIEM (Part 1)  ​
Decrypting the security mystery with SIEM (Part 1) ​
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
 
10 tips for hardening your system
10 tips for hardening your system10 tips for hardening your system
10 tips for hardening your system
 
HIPAA 101 Compliance Threat Landscape & Best Practices
HIPAA 101 Compliance Threat Landscape & Best PracticesHIPAA 101 Compliance Threat Landscape & Best Practices
HIPAA 101 Compliance Threat Landscape & Best Practices
 
NetExplorer security leaflet
NetExplorer security leafletNetExplorer security leaflet
NetExplorer security leaflet
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Praetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_OverviewPraetorian_Secure_EncryptionServices_Overview
Praetorian_Secure_EncryptionServices_Overview
 
Preatorian Secure partners with Cipher loc - New Encryption Technology
Preatorian Secure partners with Cipher loc -  New Encryption Technology Preatorian Secure partners with Cipher loc -  New Encryption Technology
Preatorian Secure partners with Cipher loc - New Encryption Technology
 
Praetorian secure encryption_services_overview
Praetorian secure encryption_services_overviewPraetorian secure encryption_services_overview
Praetorian secure encryption_services_overview
 
Cyber security event
Cyber security eventCyber security event
Cyber security event
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition System
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 

More from Mailjet

Deliverability Mistakes to Avoid During the Holiday Season
Deliverability Mistakes to Avoid During the Holiday SeasonDeliverability Mistakes to Avoid During the Holiday Season
Deliverability Mistakes to Avoid During the Holiday Season
Mailjet
 
Calendario de Adviento de Email Marketing - Mailjet
Calendario de Adviento de Email Marketing - MailjetCalendario de Adviento de Email Marketing - Mailjet
Calendario de Adviento de Email Marketing - Mailjet
Mailjet
 
Cómo impulsar tus ventas navideñas con el email: El caso de Shoppiday + Mailje
Cómo impulsar tus ventas navideñas con el email: El caso de Shoppiday + MailjeCómo impulsar tus ventas navideñas con el email: El caso de Shoppiday + Mailje
Cómo impulsar tus ventas navideñas con el email: El caso de Shoppiday + Mailje
Mailjet
 
Estrategias de email marketing para la temporada navideña
Estrategias de email marketing para la temporada navideñaEstrategias de email marketing para la temporada navideña
Estrategias de email marketing para la temporada navideña
Mailjet
 
E-Mail Marketing in der Finanz- und Versicherungsbranche: Die Erfolgsfaktoren
E-Mail Marketing in der Finanz- und Versicherungsbranche: Die ErfolgsfaktorenE-Mail Marketing in der Finanz- und Versicherungsbranche: Die Erfolgsfaktoren
E-Mail Marketing in der Finanz- und Versicherungsbranche: Die Erfolgsfaktoren
Mailjet
 
Webinario: Las oportunidades de marketing que estás perdiendo en tus emails ...
Webinario: Las oportunidades de marketing que estás perdiendo en tus emails ...Webinario: Las oportunidades de marketing que estás perdiendo en tus emails ...
Webinario: Las oportunidades de marketing que estás perdiendo en tus emails ...
Mailjet
 
Webinario: Cómo Trabajar Con Proveedores Externos En Conformidad Con El RGPD
Webinario: Cómo Trabajar Con Proveedores Externos En Conformidad Con El RGPDWebinario: Cómo Trabajar Con Proveedores Externos En Conformidad Con El RGPD
Webinario: Cómo Trabajar Con Proveedores Externos En Conformidad Con El RGPD
Mailjet
 
Webinar : Comment la certification peut-elle vous permettre de démontrer votr...
Webinar : Comment la certification peut-elle vous permettre de démontrer votr...Webinar : Comment la certification peut-elle vous permettre de démontrer votr...
Webinar : Comment la certification peut-elle vous permettre de démontrer votr...
Mailjet
 
Mailjet BigData - RGPD : les actions IT pour assurer la protection des données
Mailjet BigData - RGPD : les actions IT pour assurer la protection des donnéesMailjet BigData - RGPD : les actions IT pour assurer la protection des données
Mailjet BigData - RGPD : les actions IT pour assurer la protection des données
Mailjet
 
Webinar Mailjet - RGPD & IT - Quelles actions pour assurer la protection des ...
Webinar Mailjet - RGPD & IT - Quelles actions pour assurer la protection des ...Webinar Mailjet - RGPD & IT - Quelles actions pour assurer la protection des ...
Webinar Mailjet - RGPD & IT - Quelles actions pour assurer la protection des ...
Mailjet
 
El Consentimiento En El Mundo RGPD (GDPR)
El Consentimiento En El Mundo RGPD (GDPR)El Consentimiento En El Mundo RGPD (GDPR)
El Consentimiento En El Mundo RGPD (GDPR)
Mailjet
 
5 Fórmulas Mágicas Para Diseñar Emails Atractivos
5 Fórmulas Mágicas Para Diseñar Emails Atractivos5 Fórmulas Mágicas Para Diseñar Emails Atractivos
5 Fórmulas Mágicas Para Diseñar Emails Atractivos
Mailjet
 
Introducción al Reglamento General de Protección de Datos (GDPR)
Introducción al Reglamento General de Protección de Datos (GDPR)Introducción al Reglamento General de Protección de Datos (GDPR)
Introducción al Reglamento General de Protección de Datos (GDPR)
Mailjet
 
Erfolgreiche Kundenbefragung per E-Mail: So klappt’s
Erfolgreiche Kundenbefragung per E-Mail: So klappt’sErfolgreiche Kundenbefragung per E-Mail: So klappt’s
Erfolgreiche Kundenbefragung per E-Mail: So klappt’s
Mailjet
 
Wie E-Mail Personalisierug erfolgreich gelingt
Wie E-Mail Personalisierug erfolgreich gelingt Wie E-Mail Personalisierug erfolgreich gelingt
Wie E-Mail Personalisierug erfolgreich gelingt
Mailjet
 
Newsletter erstellen: der Schritt-für-Schritt Anleitung
Newsletter erstellen: der Schritt-für-Schritt AnleitungNewsletter erstellen: der Schritt-für-Schritt Anleitung
Newsletter erstellen: der Schritt-für-Schritt Anleitung
Mailjet
 
Der optimale Versandzeitpunkt für Ihre E-Mail Kampagnen
Der optimale Versandzeitpunkt für Ihre E-Mail KampagnenDer optimale Versandzeitpunkt für Ihre E-Mail Kampagnen
Der optimale Versandzeitpunkt für Ihre E-Mail Kampagnen
Mailjet
 
DSGVO - So bereiten Sie sich richtig vor. Teil 1: Grundlegende Informationen
DSGVO - So bereiten Sie sich richtig vor. Teil 1: Grundlegende InformationenDSGVO - So bereiten Sie sich richtig vor. Teil 1: Grundlegende Informationen
DSGVO - So bereiten Sie sich richtig vor. Teil 1: Grundlegende Informationen
Mailjet
 
Wie effiziente E-Mail Automatisierung erfolgreich gelingt
Wie effiziente E-Mail Automatisierung erfolgreich gelingtWie effiziente E-Mail Automatisierung erfolgreich gelingt
Wie effiziente E-Mail Automatisierung erfolgreich gelingt
Mailjet
 
How to get email right in 2018
How to get email right in 2018How to get email right in 2018
How to get email right in 2018
Mailjet
 

More from Mailjet (20)

Deliverability Mistakes to Avoid During the Holiday Season
Deliverability Mistakes to Avoid During the Holiday SeasonDeliverability Mistakes to Avoid During the Holiday Season
Deliverability Mistakes to Avoid During the Holiday Season
 
Calendario de Adviento de Email Marketing - Mailjet
Calendario de Adviento de Email Marketing - MailjetCalendario de Adviento de Email Marketing - Mailjet
Calendario de Adviento de Email Marketing - Mailjet
 
Cómo impulsar tus ventas navideñas con el email: El caso de Shoppiday + Mailje
Cómo impulsar tus ventas navideñas con el email: El caso de Shoppiday + MailjeCómo impulsar tus ventas navideñas con el email: El caso de Shoppiday + Mailje
Cómo impulsar tus ventas navideñas con el email: El caso de Shoppiday + Mailje
 
Estrategias de email marketing para la temporada navideña
Estrategias de email marketing para la temporada navideñaEstrategias de email marketing para la temporada navideña
Estrategias de email marketing para la temporada navideña
 
E-Mail Marketing in der Finanz- und Versicherungsbranche: Die Erfolgsfaktoren
E-Mail Marketing in der Finanz- und Versicherungsbranche: Die ErfolgsfaktorenE-Mail Marketing in der Finanz- und Versicherungsbranche: Die Erfolgsfaktoren
E-Mail Marketing in der Finanz- und Versicherungsbranche: Die Erfolgsfaktoren
 
Webinario: Las oportunidades de marketing que estás perdiendo en tus emails ...
Webinario: Las oportunidades de marketing que estás perdiendo en tus emails ...Webinario: Las oportunidades de marketing que estás perdiendo en tus emails ...
Webinario: Las oportunidades de marketing que estás perdiendo en tus emails ...
 
Webinario: Cómo Trabajar Con Proveedores Externos En Conformidad Con El RGPD
Webinario: Cómo Trabajar Con Proveedores Externos En Conformidad Con El RGPDWebinario: Cómo Trabajar Con Proveedores Externos En Conformidad Con El RGPD
Webinario: Cómo Trabajar Con Proveedores Externos En Conformidad Con El RGPD
 
Webinar : Comment la certification peut-elle vous permettre de démontrer votr...
Webinar : Comment la certification peut-elle vous permettre de démontrer votr...Webinar : Comment la certification peut-elle vous permettre de démontrer votr...
Webinar : Comment la certification peut-elle vous permettre de démontrer votr...
 
Mailjet BigData - RGPD : les actions IT pour assurer la protection des données
Mailjet BigData - RGPD : les actions IT pour assurer la protection des donnéesMailjet BigData - RGPD : les actions IT pour assurer la protection des données
Mailjet BigData - RGPD : les actions IT pour assurer la protection des données
 
Webinar Mailjet - RGPD & IT - Quelles actions pour assurer la protection des ...
Webinar Mailjet - RGPD & IT - Quelles actions pour assurer la protection des ...Webinar Mailjet - RGPD & IT - Quelles actions pour assurer la protection des ...
Webinar Mailjet - RGPD & IT - Quelles actions pour assurer la protection des ...
 
El Consentimiento En El Mundo RGPD (GDPR)
El Consentimiento En El Mundo RGPD (GDPR)El Consentimiento En El Mundo RGPD (GDPR)
El Consentimiento En El Mundo RGPD (GDPR)
 
5 Fórmulas Mágicas Para Diseñar Emails Atractivos
5 Fórmulas Mágicas Para Diseñar Emails Atractivos5 Fórmulas Mágicas Para Diseñar Emails Atractivos
5 Fórmulas Mágicas Para Diseñar Emails Atractivos
 
Introducción al Reglamento General de Protección de Datos (GDPR)
Introducción al Reglamento General de Protección de Datos (GDPR)Introducción al Reglamento General de Protección de Datos (GDPR)
Introducción al Reglamento General de Protección de Datos (GDPR)
 
Erfolgreiche Kundenbefragung per E-Mail: So klappt’s
Erfolgreiche Kundenbefragung per E-Mail: So klappt’sErfolgreiche Kundenbefragung per E-Mail: So klappt’s
Erfolgreiche Kundenbefragung per E-Mail: So klappt’s
 
Wie E-Mail Personalisierug erfolgreich gelingt
Wie E-Mail Personalisierug erfolgreich gelingt Wie E-Mail Personalisierug erfolgreich gelingt
Wie E-Mail Personalisierug erfolgreich gelingt
 
Newsletter erstellen: der Schritt-für-Schritt Anleitung
Newsletter erstellen: der Schritt-für-Schritt AnleitungNewsletter erstellen: der Schritt-für-Schritt Anleitung
Newsletter erstellen: der Schritt-für-Schritt Anleitung
 
Der optimale Versandzeitpunkt für Ihre E-Mail Kampagnen
Der optimale Versandzeitpunkt für Ihre E-Mail KampagnenDer optimale Versandzeitpunkt für Ihre E-Mail Kampagnen
Der optimale Versandzeitpunkt für Ihre E-Mail Kampagnen
 
DSGVO - So bereiten Sie sich richtig vor. Teil 1: Grundlegende Informationen
DSGVO - So bereiten Sie sich richtig vor. Teil 1: Grundlegende InformationenDSGVO - So bereiten Sie sich richtig vor. Teil 1: Grundlegende Informationen
DSGVO - So bereiten Sie sich richtig vor. Teil 1: Grundlegende Informationen
 
Wie effiziente E-Mail Automatisierung erfolgreich gelingt
Wie effiziente E-Mail Automatisierung erfolgreich gelingtWie effiziente E-Mail Automatisierung erfolgreich gelingt
Wie effiziente E-Mail Automatisierung erfolgreich gelingt
 
How to get email right in 2018
How to get email right in 2018How to get email right in 2018
How to get email right in 2018
 

Recently uploaded

Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
BibashShahi
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 

Recently uploaded (20)

Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Principle of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptxPrinciple of conventional tomography-Bibash Shahi ppt..pptx
Principle of conventional tomography-Bibash Shahi ppt..pptx
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 

Mailjet Security Presentation 2017

  • 2. 01 02 03 Agenda Application Security And Architecture Security Policy Incident Supervision And Management Premium SLA 04
  • 4. Data Security Is Key For Email Sending01 Data Location All Mailjet’s customer data is stored in Data Centers based within Europe (OVH in France, Google Cloud Platform in Belgium), under European Directive 95/46/CE. Data Storage All data is copied in three nodes and backups are stored in separated Data Centers. Data Encryption • Data is natively encrypted in Google Cloud Platform. • TLS connexion is used to send emails. • Passwords are hashed and salted. Data Privacy Mailjet considers the privacy of its customers’ personal data with the utmost importance. For more information, Public Privacy Policy: https://www.mailjet.com/privacy-policy. 4
  • 5. Mailjet Access And Account Management01 User Authentication Mailjet Web Interface: • Authentication by login and password. • Connections for the same IP or the same email locked after 5 attempts. Mailjet API: Authentication with an API key (username) and a API secret key (password). API Key Management • Possibility to create sub-API keys under a master API key. • Allow to separate mailings across different API keys. • Managed by administrators. User Right Management • Possibility to share access to an account. • Access sharing can be limited to specific API keys and specific pages. • Autonomy in the creation and deletion of shared accounts (managed by administrators). 5 Example of use: Sub-API Key 1 Team 1 … Team … Sub-API Key n Team n Master API Key
  • 6. A Safe Development Process01 Security Oriented Development Methods Development Team awareness on typical vulnerabilities (SQL or JavaScript injection…). Security Oriented Quality Procedures • Systematised code review including security checks. • Quality assurance tests in pre-production environment for all developments. • Non-regression tests after each production release. Developer Access • Developers can only access development environments. • No customer data is stored on development environments. Release Management • Documented release management process. • Record and validation of all production releases before their deployment. • Dedicated release slots. 6
  • 7. Technical Production Infrastructure01 High Availability Infrastructure • Data Centers with redundant power systems and environmental controls to prevent failures. • Redundant infrastructure (services are distributed in several Data Centers). Backup • Daily backups with a retention of 7 days. • Weekly backups with a retention of 4 weeks. Hosting • OVH - France - Certified ISO 27001, SOC 1 type II / SOC 2 type II & PCI DSS Level 1. • Google Cloud Platform - Belgium - Certified ISO 27001, ISO 27017, ISO 27018, and annual audits for SSAE16 / ISAE 3402 Type II (SOC 2 et SOC 3), and PCI DSS V3.0. 7
  • 10. Security Policy - Global Overview (1/2)02 Scope Security Policy applies to Mailjet Information Systems hosted in: • Google Cloud Platform. • OVH Platform. All resources needed to create, process, store, disseminate or destroy information are in the scope. Lifecycle • Design - definition of security procedures and standards. • Implementation - deployment of security procedures and standards. • Monitoring and Control - control panels for IS security, security audits, and management reviews. • Evolution - improvement of security procedures and standards when needed. 10
  • 11. Security Policy - Global Overview (2/2)02 Fundamental Principles • Compliance with legal obligations. • Assessment and treatment of security risks which may impact IT application resources. • Protected, nominative and minimum access to Mailjet Information Systems. • Professional use of Mailjet Information Systems. • Monitoring and treatment of security incidents. 11
  • 12. Human Resources And Organization02 Contracts And Charters • Confidentiality and non-concurrence clauses in employees contracts. • IT charter and rules of procedures. Roles And Responsibilities Clearly defined and identified roles and responsibilities for information security (ops team, development teams, users, managers…). A Secure Selection Of Third-Parties Contractors • Mutual NDA between Mailjet and third-parties companies. • Full background check and review of security practices before contracting with a new vendor. 12
  • 13. Security Procedures And Standards02 Security Procedures • Access management. • Incident management. • Security risk assessment and treatment. • Security management of subcontractors. Security Standards Definition of security standards related to: • Operating systems (access through SSH network protocol using PGP smartcards…). • Workstations (sessions protected by an individual and confidential password, disks encrypted…). • Databases (data copied in three nodes, daily and weekly backups…). • Network (firewalls on all the machines that filter incoming network traffic…). • Hosting (Data Centers secured using barbed-wire fencing, cameras, security staff…). Note: Some of these procedures and standards are currently being formalized 13
  • 14. Business Continuity02 Architecture Reliability • All Mailjet services are distributed in several Data Centers. • Automatic switchover in case of Data Center failure. • Data Centers have: 1. Redundant power systems and generators to provide enough emergency electrical power. 2. Cooling systems to maintain constant operating temperature. 3. Fire detection systems. Backup Strategy • Daily and weekly backups to prevent loss of data. • Retention of 7 days for daily backups and 4 weeks for weekly backups. Disaster Recovery Plan All employees can remotely access Mailjet applications and their documents (as Mailjet is using SaaS Office Applications). All employees can work remotely to ensure the continuity of operations. 14
  • 16. Supervision And Alerting03 Supervision • Monitoring of logs, statistics and alerts. • Real-time collection in a centralized console. • Use of dedicated tools: - Zabbix for events. - PagerDuty for alerts. - Kibana/Logstash for logs. Alerting • Run of daily security audits related to platform’s configurations (accesses...). • Alerts are sent when security threats are detected. • Common Vulnerabilities Exposure (CVE) alerts are also followed. 16
  • 17. Security Alert And Incident Management03 Security Incident Treatment Security Alerts and Security Incidents are managed by our IT team: • Analysis and diagnosis of the alert/incident. • Identification of the corrective actions. • Treatment of the alert/incident. • Tests to confirm the resolution. Customer Communication • Mailjet Status Page - mailjet.statuspage.io • Email or phone if needed. 17
  • 19. Premium SLA04 * This table should be read as follows: No penalties as long as at least 99.9% of the transactional emails processed within the past month have been processed in less than 1 minute. ** Please note that the opening hours for the English language Technical Support are 24/7. 19 Indicator Measurement Period Target Values Tolerance or reliability index* Maximum handling time for transactional emails Monthly 1 minute 99.9 % Availability of the platform Monthly Admin Access 99.9 % API 99.9 % SMTP in 99.9 % Response time for a Critical Fault Monthly 2 hours** 98 % Response time for a
 Semi-Critical Fault Monthly 4 hours** 98 % Response time for a
 Non-Critical Fault Monthly 8 hours** 98 %
  • 20. Thank You << Contact Name >> <<contact>>@mailjet.com +x xxx xxx xxx @mailjet