Security & Compliance

Implementing security and compliance measures helps reduce the risk of data breaches, protect against cyber attacks, and maintain the trust of users and customers. The resources below can help organizations using Atlassian apps ensure the safe and responsible handling of sensitive information while mitigating the risk of penalties and damage.
18 results - showing 13 - 18
1 2
Ordering
Details
The enterprise security and compliance handbook for self-managed environments
A Atlassian Updated February 13, 2023 0

Resource

Select topics that best match this listing. Limited to 6.
Limited to four options.
Guide / Report
Duration in Minutes
Total time in minutes that it will take to consume this content
18
Free with registration
Security and compliance leaders need assurance that their tools have built-in compliance, security, user management, and controls; this guide helps understand what's at stake and how to do better. 
Compare
Read more
Ask an Atlassian: Your top security, governance & compliance questions answered
A Atlassian Updated February 13, 2023 0

Resource

Select topics that best match this listing. Limited to 6.
Limited to four options.
Interview / Opinion
Duration in Minutes
Total time in minutes that it will take to consume this content
5
Free with registration
Atlassian experts have been speaking with customers about security, governance, and compliance and understand the pressure to balance business needs with data security and compliance. Here are some answers to questions customers are asking.  
Compare
Read more
Guide to multi-instance scale in Atlassian cloud
A Atlassian Updated February 20, 2023 0

Resource

Select topics that best match this listing. Limited to 6.
Select all that apply. If the resource is platform agnostic, ignore this selection.
Limited to four options.
  • White Paper / Book
  • Guide / Report
Duration in Minutes
Total time in minutes that it will take to consume this content
15
Free
Adopting Jira or Confluence often begins at the team level, but scaling across the organization can pose challenges such as autonomy, security, and custom workflows. This guide shows how Atlassian's Enterprise offerings for Jira and Confluence address these challenges, allowing for unified and extended collaboration across the organization.
Compare
Read more
SAML SSO for Jira by Resolution: Review by Rodney Nissen
RN Rodney Nissen Updated February 20, 2023 0

Resource

Select topics that best match this listing. Limited to 6.
Select all that apply. If the resource is platform agnostic, ignore this selection.
Limited to four options.
  • Review
  • Article
Duration in Minutes
Total time in minutes that it will take to consume this content
4
Free
One of the key features of this app by Resolution is the ability to generate and manage API keys, which provides a higher level of security than using a password for API calls. However, in this review, you'll learn about the app's capabilities that cannot be performed by Jira's built-in features, which is a considerable amount. 
Compare
Read more
API Token Authentication: Review by Rodney Nissen
RN Rodney Nissen Updated February 20, 2023 0

Resource

Select topics that best match this listing. Limited to 6.
Select all that apply. If the resource is platform agnostic, ignore this selection.
Limited to four options.
  • Review
  • Article
Duration in Minutes
Total time in minutes that it will take to consume this content
4
Free
In this review, you'll learn how users of this app by Resolution can secure their Jira instance by using API keys while still allowing access to specific services. This lets you replace your password with a one-time use token. 
Compare
Read more
Why organizations are embracing multiple authentication policies
A Atlassian Updated March 10, 2023 0

Resource

Select topics that best match this listing. Limited to 6.
Select all that apply. If the resource is platform agnostic, ignore this selection.
Limited to four options.
  • White Paper / Book
  • How-tos & Tips
Duration in Minutes
Total time in minutes that it will take to consume this content
8
Free with registration
94% of organizations rely on cloud and set company-wide auth policies to prevent data theft. However, strict policies reduce employee productivity. The solution is to have multiple auth policies for data security without hindering teams.
Compare
Read more
18 results - showing 13 - 18
1 2