Standard to our third-party support, Spinnaker Support delivers a Seven-Point Security Solution based around the core concepts of Discover, Harden, and Protect for your data and critical system security.

We treat every reported incident with the seriousness it deserves, and we respond to every ticket within minutes. Our global security team actively advises on security concerns and monitors and reports on actionable vulnerabilities. 

That’s why, in a recent Satisfaction Survey, 98% of customers who cited security as an issue reported that their security level was the same or improved after moving to Spinnaker Support.

Our Security Philosophy

Nous proposons une approche de la sécurité fondée sur une défense en profondeur, avec plusieurs couches. 

Ainsi nous ciblons la catégorie de vulnérabilités (Common Weakness Enumeration, CWE) au lieu de rechercher d’anciennes menaces individuelles ou des failles et vulnérabilités communes (Common Vulnerabilities and Exposures, CVE), ou de tenter de prévoir les CVE à venir. La gestion des vulnérabilités individuelles est contreproductive. Nombre d‘entre elles sont actives mais n‘ont pas encore été découvertes et les autres sont encore là car les correctifs n‘ont pas fonctionné.

Notre approche proactive garantit l‘avenir de la sécurité de nos environnements. 

We use hardening techniques and compensating controls to ensure your systems can pass penetration testing and audits. This comes standard with our third-party support. Using CIS & STIG Benchmarks, we guarantee you a more secure environment.

Solution de sécurité en sept points de Spinnaker Support

Vulnerabilities and exposures now arise from a variety of external and internal sources, and effective security must address the full technology stackDownload the Security Services Solution Brief.

From Day 1, our team adheres to a Seven-Point Security Solution, shown below, an established framework that combines proven processes, security products, and a staff of industry experts. Using this, our experts resolve issues as they occur and put in place the tools and procedures you need to proactively maintain secure application environments. 

  • Discover & Harden
  • Security Incident Response
  • Threat Intelligence
  • 1. Évaluation des risques personnalisée

An audit and risk review for your systems, including reports with recommendations on configurations, encryptions, access management, and best practices and guidelines. This feeds into Attack Surface Reduction.

  • 2. Réduction de la surface d’attaque

We advise on how to properly configure and harden applications, operating systems, servers, databases, and networks.

  • 3. Compliance Audit Support

Consultative services designed to adjust your audit controls in order to be in compliance with attestations such as SOC2, HIPAA, GDPR, and PCI. 

    • 4. Vulnerability Support

    Submit a ticket at any time for security-related activities and to address vulnerabilities. We use compensating controls (external to application code) to mitigate security risk.

    • 5. Bibliothèque de ressources de sécurité

    Includes white papers and solution briefs on a wide range of topics related to security that we can share with any of our customers.

    • 6. Proactive Security Tooling

    A portfolio of security products designed to implement the Spinnaker Security Philosophy across a range of Oracle products.

    • 7. Risk Assessment Bulletin

    We monitor Oracle CVEs and publish periodic email bulletins for customers. These include CVE descriptions and offer best practice recommendations.

    Seven-Point Security vs. Software Publisher Patches

    We understand that some enterprises considering third-party support are concerned about the loss of quarterly software patches for critical vulnerabilities and exposures (CVEs). While SAP supplies its customers with most security patches even when not on SAP Support, Oracle does not offer customers access to security tools after they leave its support program. 

    While code patches do block vulnerabilities, the reality of the software patching process often does not meet its promise.

    Faites défiler vers la droite »

    The Reality of Software Patching

    Our Response on Patching

    CALENDRIERPatches are not timely (can be months or years late).Virtual patching tools and proactive monitoring provide near-immediate protection.
    SPECIFICITYLes correctifs sont de type universel et peuvent s’avérer problématiques pour les personnalisations.You should only have to receive the fixes you need.
    VERSIONSPatches may not be available for older versions and applications.By addressing issues at the infrastructure level, you protect the entire stack, regardless of app versions.
    TESTINGLes correctifs nécessitent un temps précieux pour les tests et l’installation.For CVEs, methods such as virtual patching save valuable time by cutting short testing and installation.
    APPLICATIONMany organizations do not patch or patch regularly due to operational constraints.Organizations must remain vigilant for CVEs and not rely on patches that may not actually solve the issue.

    Solution Brief

    Spinnaker Support Security Services

    Our Seven-Point Security Solution replaces a sole reliance on these patches with a stronger framework that covers a wider range of security issues. Through Security Incident Response, our global security professionals continue to work until the security issue is properly addressed. Spinnaker Support security services are responsive, on-demand, and multilayered.


    Proactive Security Tooling

    As a part of our Threat Intelligence, Spinnaker Support has partnered with commercial vendors to implement our security philosophy and offer protection to organizations that want or need these additional tools. We are responsible for all installation and training, some of which can take less than a day. 

    Our current selection of products includes middleware protection (Waratek), database protection (Spinnaker Support Database Defender, see below), and operating system protection (Trend Micro Deep Security). For additional details on, please contact us directly. 

    Spinnaker Support takes your data and application security seriously

    Security is standard to all our operations. This philosophy is embedded in how we support our customers, and we deliver security solutions designed for your unique set of applications and systems. We invest in your security and compliance measures with the same exacting standards we apply to our own operations.

    Spinnaker Support was the first third-party support provider to achieve both ISO/IEC 27001:2013 certification for managing sensitive company information and ISO 9001:2015 certification for quality management principles. Nous sommes certifiés pour le Bouclier de protection des données, conformes au GDPR, certifiés pour les Cadres du Bouclier de protection des données UE-États-Unis et Suisse-États-Unis Privacy Shield Frameworks, and Cyber Essentials certified.


    Demandez une consultation gratuite pour en savoir plus sur la façon dont nous pouvons fournir une assistance logicielle d’entreprise ultra personnalisé à un coût réduit.

    Powered by GlobalLink OneLink SoftwarePowered By OneLink