Jonathan van Driessen
- Total activity 140
- Last activity
- Member since
- Following 0 users
- Followed by 0 users
- Votes 0
- Subscriptions 3
Articles
Votes on activity by Jonathan van Driessen-
Do you have agreements with subprocessors about data breach notifications?
Yes, we do.
-
Do you monitor logs?
We use DataDog as a tool for the purpose of gathering and monitoring logs. Automatic emails are sent out to system administrators in case certain thresholds are hit that could impact performance or...
-
Do you have controls in place ensuring timely removal of systems access that is no longer required for business purposes?
Yes, we do.
-
What technology languages / platforms / stacks / components are utilised in the scope of the application?
ReactJS, Node, MongoDB, Salesforce Marketing Cloud API
-
What are the audit and reporting capabilities of the solution related to user management?
In DESelect, administrators can see a real-time overview of which users are active and with which roles. DESelect can also provide an export of changes to users (role, (in)active) over time. In Mar...
-
Do you test the changes in a test environment before putting them in production?
Yes, all developments go through extensive testing on a staging environment. Test exist of both manual test and thousands of automated tests.
-
How does DESelect keep client specific data and infrastructure apart from other clients? Is DESelect single-tenant/multi-tenant?
DESelect is a multi-tenant SaaS application. Content boundaries are managed by DESelect’s business logic tier within the hosted cloud. As a result, data is carefully managed so as not to be exposed...
-
Is sensitive data encrypted (eg. user access tokens)?
Yes, sensitive data, like user access tokens are categorized as sensitive customer information according to our Information Classification Policy, and is encrypted both at-rest (using AES 192 bit) ...
-
Describe the release management process you use?
Release Processes and Management DESelect maintains a formal Change Management process that outlines the requirements for making application and infrastructure changes and is planned by respective ...
-
What does the Salesforce Security Review entail?
Before accepting applications on the AppExchange, Salesforce does a thorough security review of each application. During this review, they scan the app for security vulnerabilities. Besides the ini...