Security is always an important consideration when
This category covers everything from how a company protects your data in the face of a natural disaster to what kind of swipe cards they issue employees. Here’s a look at some of the ways Microsoft keeps its data centers (and your CRM data) secure.
- Secure Access: Access is restricted by job function so that only essential personnel receive authorization to manage customers’ applications and service.
- Redundant power supplies: Two separate power feeds into each data center, battery backup, and diesel generators (with alternative fuel delivery contracts in place).
- Natural disaster control: Including seismically braced racks where required and fire prevention and extinguishing systems.
- Worldwide Microsoft data center locations: The Microsoft Dynamics CRM Online service is deployed in Microsoft data centers that are located around the world, and offer geographically local hosting with global availability.
- Secure network design and operations: The networks within the Microsoft data centers are designed to create multiple separate network segments within each data center. This segmentation helps to provide physical separation of critical, back-end servers and storage devices from the public-facing interfaces.
Network security involves features related to providing a highly secured connection over the Internet.
- Connections established between customers and Microsoft data centers are encrypted using industry-standard Transport Layer Security (TLS) /Secure Sockets Layer (SSL), which effectively establishes a highly secure browser-to-server connection to help provide data confidentiality and integrity between the desktop and data center.
- A redundant network provides full failover capability and helps ensure 99.9 percent network availability.
- All remote connections by Microsoft operations personnel must be made via Remote Desktop Service and two-factor authentication.
The next layer of security is built by Microsoft but managed and implemented by whoever deploys your CRM. This layer pertains to who can see what within your CRM and may be the most important, as many data breaches originate from within an organization.
- Customizable security roles: Govern user access and the actions they can perform.
- Business data auditing: Allow organizations to maintain an audit trail that demonstrates accountability from beginning to end.
- Field-level security: Control the permission of users and teams to read, create, or write in a data field.
- Role-based forms: Control the visibility of data for a specific record type.
All of this adds up to comprehensive security for every customer using Dynamics CRM Online. Microsoft has a great security track record when it comes to Dynamics CRM Online and they’re invested in keeping that way. In short, if you can’t trust Microsoft, who can you trust?
- Cody Pierson, Marketing Manager & CRM Project Manager -