
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
This is the second part of a two-part series dedicated to courses that cover how ServiceNow keeps your data secure and best practices you can implement to ensure you are doing your part. Last week’s blog focused on how ServiceNow keeps your data secure. This week’s blog will focus on your responsibilities as a customer for keeping your data secure.
Data security is becoming more important every day. This is especially true in industries that are highly regulated like the financial services, healthcare, and public sector industries. In addition, highly publicized breaches, like those at Facebook and Equifax, increase general concerns over the security of our data. ServiceNow is committed to our customers’ data security and has taken steps to engineer our cloud services to be secure at all times. We also monitor for threats 24 hours a day, 7 days a week, 365 days a year. However, security is a shared responsibility and customers must do their part to secure their instance. ServiceNow has provided a training course that covers all the security topics that anyone who is getting started with ServiceNow must consider.
Secure Instance Best Practices Guide is a free, 30-minute on demand training intended for anyone who needs to set up security on a ServiceNow instance, whether you are a ServiceNow customer, partner, or implementer. The ServiceNow infrastructure and platform are built and operated with high levels of baseline security, but customers must also make informed decisions around the configuration of their instances. This course offers a summary of the comprehensive set of secure configuration guidelines and recommendations provided in the ServiceNow Best Practices Guide available on HI.
When you are finished with this course you will understand the importance of implementing ServiceNow Security Best practices and the configuration recommendations for a secure ServiceNow Instance. You will also be directed to the full Instance Security Best Practices guide on HI.
Please use Google Chrome or Firefox browsers to view this training.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.