Author: Dana Medhaug
Updated: July 2024
Audience: Everyone
Summary
Jama Connect®, delivered via the Cloud, is an attractive option for organizations wanting to get up and running in a scalable, highly secure Cloud environment. Cloud-based users receive more frequent enhancements and capabilities—several times per quarter. Version updates require little effort. By outsourcing to Jama's Cloud deployment, your organization avoids technical distractions. The results free you and your business to focus on your product development.
Below are the significant steps and critical considerations for migrating your local installation of Jama Software® to Jama Software's Cloud service.
Before Migration
Customer |
Jama Success Manager |
Jama Technical Resource |
|
X |
X |
|
|
X |
X |
|
Together with your Jama Success Manager, identify the following:
|
X |
|
|
|
X |
X |
|
|
X |
|
|
|
X |
X |
X |
|
Migration Production Run
Customer |
Jama Account Manager |
Jama Technical Resource |
|
X |
|
|
|
|
|
X |
|
X |
|
|
|
X |
|
|
|
Migration Production Run
Customer |
Jama Account Manager |
Jama Technical Resource |
|
X |
|
|
|
X |
|
X |
|
X |
|
|
|
Jama’s Data Center: Jama’s SaaS infrastructure uses Amazon’s AWS EC3 platform.
One of the core reasons we use Amazon’s AWS EC2 platform is the wealth of security experience Amazon has amassed over the years in building and growing AWS. Amazon’s AWS EC2 Platform is the gold standard for Cloud applications and application and data security. Amazon has completed many security audits and is certified for some of the strictest and most thorough standards.
Amazon provides resources to expand on its certifications and third-party audits. For details on AWS certifications and accreditation, please visit aws.amazon.com/security.
Availability
- Server uptime of 99.5%
-
Proactive notification of any scheduled maintenance
-
Scheduled upgrades, with advance customer notification (minimum 24 hours)
Data Storage and Security
-
Data-at-rest, in-motion, and leak protection
-
Security scans and firewall protection
-
Data transmission secured over HTTPS
-
Nightly full backups of the database
-
Nightly incremental and weekly full backups of file attachments
-
Backup rotation policy of sixty (60) days
Related to
Comments
0 comments
Please sign in to leave a comment.