Welcome to Your Interests.
You can choose interests in the categories below. Also, within our site, when you click a we will add an Interest.
All interests you select during this session can be submitted together on our contact form. This is a way of letting us know that these are topics you’d like to discuss with us.
was were added to Your Interests Panel.
Within our site, when you click a that item is added as an Interest.
You can open "Your Interests Panel" with below. Also, from the gray panel on the right (“Your Interests Panel”) you can select interests from drop-down lists, among several categories.
All interests you select can be submitted together on our contact form. This lets us know these are topics you’d like to discuss with us.
In this fast-paced, two hour presentation we delve into specific FileMaker technologies to fulfill general security requirements, including access, encryption, and deployment, and how to apply those in the real world.
Having worked with computers since the days of the Apple ][, CPM, and cassette file storage, Simon has seen technology come and go. But ever since FileMaker was first released in 1985, he knew that one of his second homes would be working with FileMaker, and has been using it nearly continuously since.
Christopher is a FileMaker Certified Developer in versions 11 through 18 and a Certified Information Systems Security Professional (CISSP).
Whether large enterprise, small business, or non-profit, every organization has a vested interest in protecting its data. FileMaker is an excellent platform for quickly building and easily managing solutions, but still requires careful attention to protect that information.
In this fast-paced, two hour presentation we will briefly ask why we want to secure our solutions and define what is security. Then we will delve into specific FileMaker technologies to fulfill general security requirements, including access, encryption, and deployment, and how to apply those in the real world. Each module will feature practical demonstrations, including setting up Amazon oAuth, using Comodo to issue a custom SSL certificate, and best practices for configuring FileMaker Pro and FileMaker Server to help your solutions pass regulatory audits. In addition, we will touch on defense-in-depth concepts at the OS, hardware, and network levels, and mention some tools and resources to help manage your servers.
There will be plenty of time throughout to clarify understanding, and at the end to answer remaining questions.
* Includes Live Demonstration