Jonathan van Driessen
- Total activity 140
- Last activity
- Member since
- Following 0 users
- Followed by 0 users
- Votes 0
- Subscriptions 3
Articles
Recent activity by Jonathan van Driessen-
What are the audit and reporting capabilities of the solution related to user management?
In DESelect, administrators can see a real-time overview of which users are active and with which roles. DESelect can also provide an export of changes to users (role, (in)active) over time. In Mar...
-
Do you test the changes in a test environment before putting them in production?
Yes, all developments go through extensive testing on a staging environment. Test exist of both manual test and thousands of automated tests.
-
How does DESelect keep client specific data and infrastructure apart from other clients? Is DESelect single-tenant/multi-tenant?
DESelect is a multi-tenant SaaS application. Content boundaries are managed by DESelect’s business logic tier within the hosted cloud. As a result, data is carefully managed so as not to be exposed...
-
Is sensitive data encrypted (eg. user access tokens)?
Yes, sensitive data, like user access tokens are categorized as sensitive customer information according to our Information Classification Policy, and is encrypted both at-rest (using AES 192 bit) ...
-
Describe the release management process you use?
Release Processes and Management DESelect maintains a formal Change Management process that outlines the requirements for making application and infrastructure changes and is planned by respective ...
-
What does the Salesforce Security Review entail?
Before accepting applications on the AppExchange, Salesforce does a thorough security review of each application. During this review, they scan the app for security vulnerabilities. Besides the ini...
-
Do you support role-based access control (RBAC) for end-users / administrators?
There are two types of users in DESelect: Administrators and Users. Administrators can decide which Salesforce Marketing Cloud users can have access to DESelect.
-
Are upgrades or system changes installed during off-peak hours or in a manner that does not impact the customer?
Though customers typically don't notice when updates occur, for safety reasons releases are always done 7-8 AM Brussels time and on weekends.
-
Do you use an automated source code analysis tool to detect security defects in code prior to production?
Yes, we use several tools to analyse security defects before releasing to production.
-
Do you review your applications for security vulnerabilities and address any issues prior to deployment to production?
Yes, all code changes are reviewed by 3 other developers and a product manager before deployment to production.