Thanks for your feedback.
Want to tell us more? Send us an email to leave your feedback.
To view a PDF version of only this page, click here.
MicroStrategy has a comprehensive security program focused on protecting your data, regardless of whether our product is deployed via our Cloud Managed Service offering or on premises. From engineering through vulnerability remediation, we are committed to ensuring that our products continually meet your business and security needs.
The use of third-party components is closely controlled. A formal process is enforced for the introduction of new components into the products. Independent confirmation of third-party components incorporated into the products is conducted via the Synopsys Black Duck tool. Components possessing security vulnerabilities are aggressively scheduled for upgrade or replacement.
Throughout the development cycle, MicroStrategy conducts internal penetration tests to validate the security of new or modified features and to re-validate the security of the existing product suite to new threats. Such testing includes the risks identified in the OWASP-10 and other known weaknesses. Threat models developed during the product design provide additional guidance for this testing.
We engage multiple security firms to conduct annual, penetration tests. Tests are comprehensive in scope and utilizes both black-box testing techniques as well as white-box testing which includes full access to the product source code. Issues identified during this testing are immediately scheduled for resolution in the product on a risk-prioritized basis. Subsequent re-testing is then conducted by the security firm(s) to verify that the issues have been successfully resolved.
A centralized code repository (GitHub Enterprise) is maintained for development. Repository check-ins undergo area-specific code review procedures. The building process is controlled by the DevOps team. All machines developing the product employ an enterprise-grade virus scanner updated with the latest signatures.
Security is of the utmost importance at MicroStrategy. Vulnerabilities are treated as top priority issues and fixed in the next release. Therefore, keeping your software up to date is one of the simplest, but most important security precautions you can take to maintain your MicroStrategy product’s security. In the event of a critical security issue outside of the regular update cycle, MicroStrategy may issue an interim patch or workaround, but upgrading will still be required to keep your deployments as secure as possible.
Current MicroStrategy customers may report potential security issues and queries via MicroStrategy Technical Support. Researchers may submit issues via our reporting page.
For more information, please contact your account representative.
Thanks for taking the time to give us some feedback.
Sorry about that
Why wasn't this helpful? (check all that apply)
Vielen Dank, das Sie sich die Zeit genommen haben, uns Ihr Feedback mitzuteilen.
Das tut uns leid!
Warum waren diese Informationen nicht hilfreich? (Zutreffendes bitte auswählen)
Merci de nous avoir accordé un peu de votre temps.
Nous en sommes désolés
Pourquoi ne vous ont-elles pas été utiles ? (cochez tous les choix applicables)
Grazie per avere dedicato del tempo per fornirci un tuo commento.
Perché non è stato utile? (selezionare tutte le risposte adeguate)
Gracias por dedicar su tiempo a proporcionarnos sus comentarios.
¿Por qué no ha sido útil? (Marque todos los que correspondan)
Obrigado por aproveitar o tempo para nos dar alguns comentários.
Desculpe por isso
Por que isso não foi útil? (marque todas as que se aplicam)
피드백을 위해 시간 내 주셔서 감사합니다.
도움이 되지 않은 이유는 무엇입니까? (해당되는 모든 사항 선택)