- Resources
- Security & Compliance
Security & Compliance
Implementing security and compliance measures helps reduce the risk of data breaches, protect against cyber attacks, and maintain the trust of users and customers. The resources below can help organizations using Atlassian apps ensure the safe and responsible handling of sensitive information while mitigating the risk of penalties and damage.
Details
A
Atlassian
Updated
February 13, 2023
0
Resource
Select topics that best match this listing. Limited to 6.
Limited to four options.
Guide / Report
Duration in Minutes
Total time in minutes that it will take to consume this content
18
Free with registration
Security and compliance leaders need assurance that their tools have built-in compliance, security, user management, and controls; this guide helps understand what's at stake and how to do better.
Compare
Read more
A
Atlassian
Updated
February 13, 2023
0
Resource
Select topics that best match this listing. Limited to 6.
Limited to four options.
Interview / Opinion
Duration in Minutes
Total time in minutes that it will take to consume this content
5
Free with registration
Atlassian experts have been speaking with customers about security, governance, and compliance and understand the pressure to balance business needs with data security and compliance. Here are some answers to questions customers are asking.
Compare
Read more
A
Atlassian
Updated
February 20, 2023
0
Resource
Select topics that best match this listing. Limited to 6.
Select all that apply. If the resource is platform agnostic, ignore this selection.
Limited to four options.
- White Paper / Book
- Guide / Report
Duration in Minutes
Total time in minutes that it will take to consume this content
15
Free
Adopting Jira or Confluence often begins at the team level, but scaling across the organization can pose challenges such as autonomy, security, and custom workflows. This guide shows how Atlassian's Enterprise offerings for Jira and Confluence address these challenges, allowing for unified and extended collaboration across the organization.
Compare
Read more
RN
Rodney Nissen
Updated
February 20, 2023
0
Resource
Select topics that best match this listing. Limited to 6.
Select all that apply. If the resource is platform agnostic, ignore this selection.
Limited to four options.
- Review
- Article
Duration in Minutes
Total time in minutes that it will take to consume this content
4
Free
One of the key features of this app by Resolution is the ability to generate and manage API keys, which provides a higher level of security than using a password for API calls. However, in this review, you'll learn about the app's capabilities that cannot be performed by Jira's built-in features, which is a considerable amount.
Compare
Read more
RN
Rodney Nissen
Updated
February 20, 2023
0
Resource
Select topics that best match this listing. Limited to 6.
Select all that apply. If the resource is platform agnostic, ignore this selection.
Limited to four options.
- Review
- Article
Duration in Minutes
Total time in minutes that it will take to consume this content
4
Free
In this review, you'll learn how users of this app by Resolution can secure their Jira instance by using API keys while still allowing access to specific services. This lets you replace your password with a one-time use token.
Compare
Read more
A
Atlassian
Updated
March 10, 2023
0
Resource
Select topics that best match this listing. Limited to 6.
Select all that apply. If the resource is platform agnostic, ignore this selection.
Limited to four options.
- White Paper / Book
- How-tos & Tips
Duration in Minutes
Total time in minutes that it will take to consume this content
8
Free with registration
94% of organizations rely on cloud and set company-wide auth policies to prevent data theft. However, strict policies reduce employee productivity. The solution is to have multiple auth policies for data security without hindering teams.
Compare
Read more