Information Security Management
General information security questions for Machine Learning.
Network and Application Penetration Tests
Do you conduct network/application penetration tests of your cloud service infrastructure regularly?
Yes.
Tenant Data Encryption and Segmentation
Is Machine Learning able to logically segment/encrypt customer data in such a way that data accessed by a single tenant isn't inadvertently provided to other tenants?
We store all tenant data in logically discrete storage segments.
Data Storage Location
Are you able to restrict the storage of customer data to specific countries or geographic locations? Do you provide tenants with geographically-resilient hosting options?
Currently, Alteryx deploys Machine Learning data within cloud regions within the United States.
Information Security System Management
Do you restrict, log, and monitor access to your information security management systems (for example, hypervisors, firewalls, vulnerability scanners, network sniffers, APIs, etc.)?
We restrict access to information security management to qualified personnel and log all access.
Firewalls
Are system and network environments protected by a firewall or virtual firewall?
Yes.