A Safer’s Guide to
Protecting Your Data with
the FME Platform
Merline
George
Technical Support Specialist
Safe Software
Natalie
Clouthier
Technical Support Specialist
Safe Software
Richard
Mosley
Technical Support Specialist
Safe Software
Welcome to Livestorm.
A few ways to engage with us during the webinar:
Audio issues? Click this for 4 simple
troubleshooting steps.
How to download slides
1. Hover over the
slide deck in the
webinar room
2. Click this button
Agenda
1 Introduction & Importance of Security
2 Introducing Safe & FME
3 FME Form Security features
4 FME Flow Security features
5 FME Flow Implementation Considerations
6 Trust Centre
7 Resources
8 Q&A
Agenda
1
Introduction &
Importance of
Security
Authorization
Authentication
Unsecured Wi-Fi
networks
Cloud
Security
Deployment
Malware
Viruses
Third-Party
Vulnerabilities
Data breaches
Temporary
Storage
Encryption
Phishing
scams
Common Data Security Concerns
Safely free up your data
FME can seamlessly fit into your organizations security practices
allowing you to use your data without worrying about it.
How does FME make
your data safe?
How can we make sure
FME is as secure as it
can be?
2
Introducing
Safe & FME
29+
27K+
128
190
20K+
years of solving data
challenges
FME Community
members
countries with
FME customers
organizations worldwide
global partners with
FME services
29+
29K+
128
140+
25K+
years of solving data
challenges
FME Community
members
countries with
FME customers
organizations worldwide
global partners with
FME services
FME Form
(was FME Desktop)
FME Flow
(was FME Server)
FME Flow Hosted
(was FME Cloud)
FME Enterprise Integration Platform
3
FME Form
security features
To provide a high-level
overview of features in
FME Form which
enhance data security
Goal Block Key
Data Security and FME Form - the why
Result
An understanding of your
organizational information
security policies and best
practices
Consider the data security
options offered in FME
Form in context the of
your local policies
Enhanced data security
while performing tasks
with FME Form
Data Security and FME Form - an overview
● Authentication Methods
● Workspace Password Protection
● Working Offline
● Sharing Resources
● Proxy Server Settings
● Verify SSL (HTTPS) Certificates option
Authentication Methods
● (HTTP)Basic
● (HTTP)Digest
● NTLM
● Kerberos
● Embedded
● System
● SAS
● API Keys
● Tokens
● Database Connections
● Web Connections
Demo
● FME Options
● Password protect sensitive workspaces
● Positive control via shared resources
● Web & Database connections for
improved user experience
● FME can work with your proxy!
● Enable certificate verification: secure,
encrypted data transit
Data Security and FME Form - key takeaways
4
FME Flow
security features
● User Authentication
● User Authorization
● System passwords and session management
● System encryption
● Token management
● Monitoring via System Events
● Web Connections
● Forward/Reverse proxy
Configuration on Flow Web User Interface
Demo
5
FME Flow
Implementation
Considerations
Installation Considerations for FME Flow
● Deploy Anywhere
● Service Accounts
● Temp File
● Upgrades
● Web Application Security
○ Configuring for HTTPS
○ Web Application optional updates
○ Using your own Web Application
Deploy Anywhere
FME Flow supports a range of installations.
● On Premise
● In the Cloud (our cloud or yours)
● Windows
● Linux
● Docker
● Kubernetes
● Azure Marketplace
● Hybrid Model
Deploy Anywhere
FME Flow supports range of
install configurations.
Bring your own:
● Database
● Web Application Server
● File Share
Separate your Tiers
● Presentation Tier
● Application Tier
● Data Tier
Service Accounts
● Service accounts do not need
administrative permissions.
● Service accounts can be
GMSA accounts.
● Service accounts used by engines
to reach network resources.
Temporary Files during
translation
● FME stored temporary files during the
translation process.
● Setting a FME_TEMP variable location
● Scheduling regular clean ups
Upgrades
● Upgrades only, no patches
● Full uninstall and reinstall required
● Engine only option
● If you host your own tomcat you can
upgrade just the Web Server.
Web Application Security
● HTTPS Configuration
● X-Frame Options
● HSTS and X-Content-Type-Options
● TLS disabling
● Ciphers disabling
6
Introducing the
Trust Center
Slide Title
Trust Center
● Compliance certifications and
regulations
● Vulnerability Disclosure Program
● Security White Paper (late
spring)
Slide Title
Trust Center
● Security Updates
● Sign-up to receive
security updates
Chat Storm
Chat in “Opt in” in the chat if you wish to subscribe to FME
Security Updates via email and find out when the Trust
Center is open.
7
Resources &
Conclusion
● FME has default security features built in.
● You can configure FME for your
organizations security practices.
FME: Transform and move your
data with peace of mind
Free 90-min Workshop
on FME
safe.com/accelerator
Get our Ebook
Spatial Data for the
Enterprise
fme.ly/gzc
More Webinars
Upcoming & on-demand
webinars
safe.com/webinars
FME Accelerator
Resources
● FME Flow Security
● Getting Started with FME Flow
Administration
● FME Flow Documentation
● FME Form:
○ FME Options
○ Workspace Passwords
○ Web Connections and FME
○ Making Database and Web
Connections Public
○ FME Form and your Proxy
FME Flow Resources
● Creating an Authentication Service Connection
● Configuring FME Server for SAML Authentication
● Role-Based and User-Based Access Control
● Roles
● Configuring Authentication for the FME Server Web Services
● Security
● System Encryption
● Managing Security Tokens
● System Events
● Web Connections
● Proxy
● Use a Reverse Proxy with FME Server
ClaimYour Community Badge
● Get community badges for watching
webinars!
● fme.ly/WebinarBadge
● Today’s code: BWPFM
Our largest
FME user
conference
yet.
Sept 5-7 | 100+ sessions
safe.com/events
8
Q&A
ThankYou
Please Fill out our webinar survey

A Safer’s Guide to Protecting Your Data with the FME Platform

  • 1.
    A Safer’s Guideto Protecting Your Data with the FME Platform
  • 2.
    Merline George Technical Support Specialist SafeSoftware Natalie Clouthier Technical Support Specialist Safe Software Richard Mosley Technical Support Specialist Safe Software
  • 3.
    Welcome to Livestorm. Afew ways to engage with us during the webinar: Audio issues? Click this for 4 simple troubleshooting steps.
  • 4.
    How to downloadslides 1. Hover over the slide deck in the webinar room 2. Click this button
  • 5.
    Agenda 1 Introduction &Importance of Security 2 Introducing Safe & FME 3 FME Form Security features 4 FME Flow Security features 5 FME Flow Implementation Considerations 6 Trust Centre 7 Resources 8 Q&A Agenda
  • 6.
  • 7.
  • 8.
    Safely free upyour data FME can seamlessly fit into your organizations security practices allowing you to use your data without worrying about it.
  • 9.
    How does FMEmake your data safe?
  • 10.
    How can wemake sure FME is as secure as it can be?
  • 11.
  • 12.
    29+ 27K+ 128 190 20K+ years of solvingdata challenges FME Community members countries with FME customers organizations worldwide global partners with FME services 29+ 29K+ 128 140+ 25K+ years of solving data challenges FME Community members countries with FME customers organizations worldwide global partners with FME services
  • 13.
    FME Form (was FMEDesktop) FME Flow (was FME Server) FME Flow Hosted (was FME Cloud) FME Enterprise Integration Platform
  • 15.
  • 16.
    To provide ahigh-level overview of features in FME Form which enhance data security Goal Block Key Data Security and FME Form - the why Result An understanding of your organizational information security policies and best practices Consider the data security options offered in FME Form in context the of your local policies Enhanced data security while performing tasks with FME Form
  • 17.
    Data Security andFME Form - an overview ● Authentication Methods ● Workspace Password Protection ● Working Offline ● Sharing Resources ● Proxy Server Settings ● Verify SSL (HTTPS) Certificates option
  • 18.
    Authentication Methods ● (HTTP)Basic ●(HTTP)Digest ● NTLM ● Kerberos ● Embedded ● System ● SAS ● API Keys ● Tokens ● Database Connections ● Web Connections
  • 19.
  • 20.
    ● FME Options ●Password protect sensitive workspaces ● Positive control via shared resources ● Web & Database connections for improved user experience ● FME can work with your proxy! ● Enable certificate verification: secure, encrypted data transit Data Security and FME Form - key takeaways
  • 21.
  • 22.
    ● User Authentication ●User Authorization ● System passwords and session management ● System encryption ● Token management ● Monitoring via System Events ● Web Connections ● Forward/Reverse proxy Configuration on Flow Web User Interface
  • 23.
  • 24.
  • 25.
    Installation Considerations forFME Flow ● Deploy Anywhere ● Service Accounts ● Temp File ● Upgrades ● Web Application Security ○ Configuring for HTTPS ○ Web Application optional updates ○ Using your own Web Application
  • 26.
    Deploy Anywhere FME Flowsupports a range of installations. ● On Premise ● In the Cloud (our cloud or yours) ● Windows ● Linux ● Docker ● Kubernetes ● Azure Marketplace ● Hybrid Model
  • 27.
    Deploy Anywhere FME Flowsupports range of install configurations. Bring your own: ● Database ● Web Application Server ● File Share Separate your Tiers ● Presentation Tier ● Application Tier ● Data Tier
  • 28.
    Service Accounts ● Serviceaccounts do not need administrative permissions. ● Service accounts can be GMSA accounts. ● Service accounts used by engines to reach network resources.
  • 29.
    Temporary Files during translation ●FME stored temporary files during the translation process. ● Setting a FME_TEMP variable location ● Scheduling regular clean ups
  • 30.
    Upgrades ● Upgrades only,no patches ● Full uninstall and reinstall required ● Engine only option ● If you host your own tomcat you can upgrade just the Web Server.
  • 31.
    Web Application Security ●HTTPS Configuration ● X-Frame Options ● HSTS and X-Content-Type-Options ● TLS disabling ● Ciphers disabling
  • 32.
  • 33.
    Slide Title Trust Center ●Compliance certifications and regulations ● Vulnerability Disclosure Program ● Security White Paper (late spring)
  • 34.
    Slide Title Trust Center ●Security Updates ● Sign-up to receive security updates
  • 35.
    Chat Storm Chat in“Opt in” in the chat if you wish to subscribe to FME Security Updates via email and find out when the Trust Center is open.
  • 36.
  • 37.
    ● FME hasdefault security features built in. ● You can configure FME for your organizations security practices. FME: Transform and move your data with peace of mind
  • 38.
    Free 90-min Workshop onFME safe.com/accelerator Get our Ebook Spatial Data for the Enterprise fme.ly/gzc More Webinars Upcoming & on-demand webinars safe.com/webinars FME Accelerator
  • 39.
    Resources ● FME FlowSecurity ● Getting Started with FME Flow Administration ● FME Flow Documentation ● FME Form: ○ FME Options ○ Workspace Passwords ○ Web Connections and FME ○ Making Database and Web Connections Public ○ FME Form and your Proxy
  • 40.
    FME Flow Resources ●Creating an Authentication Service Connection ● Configuring FME Server for SAML Authentication ● Role-Based and User-Based Access Control ● Roles ● Configuring Authentication for the FME Server Web Services ● Security ● System Encryption ● Managing Security Tokens ● System Events ● Web Connections ● Proxy ● Use a Reverse Proxy with FME Server
  • 41.
    ClaimYour Community Badge ●Get community badges for watching webinars! ● fme.ly/WebinarBadge ● Today’s code: BWPFM
  • 42.
    Our largest FME user conference yet. Sept5-7 | 100+ sessions safe.com/events
  • 43.
  • 44.
    ThankYou Please Fill outour webinar survey