WEAVEonline: Technical FAQs

Size: px
Start display at page:

Download "WEAVEonline: Technical FAQs"

Transcription

1 WEAVEonline: Technical FAQs 1. What is WEAVEonline? WEAVEonline is our core product, a powerful software application that addresses the need to develop and maintain continuous improvement processes for both the academic and administrative structures within an institution. It guides and provides for the alignment of multiple processes, such as assessment, planning, accreditation, budgeting and institutional priorities. Using a classic model of assessment, WEAVEonline allows users to follow a step-by-step process for completing the assessment cycle. This process begins with creating a mission/purpose and establishing goals for achieving that mission. The process takes the user through objective/outcome development, establishing appropriate measures, setting achievement targets for each measure, reviewing applicable data, writing findings of the assessment results, and establishing needs based on current data through planning before repeating the steps in the next assessment cycle. One of the many strengths of WEAVEonline is the way the application helps users to utilize their results to close the loop by developing and implementing action plans. Action plans can be developed based on need as determined by the data the user collects. Once created, action plans are tracked within WEAVEonline and categorized according to level of completion. This method creates a living history of the institution s assessment work and allows the institution to have a clear longitudinal view of how it has closed the loop. Action Plans can also be developed that are not findings-based but are, instead, intended for strategic planning and quality enhancement purposes. 2. Does the system exist or does it have to be designed and built? The entire structure of WEAVEonline exists already and does not need to be designed. Many institutions begin in academic assessment and expand to administrative assessment, mapping, strategic planning, etc., over time. WEAVEonline is an externally-hosted application. No institutional IT resources (neither hardwarearchitectural, configuration, or otherwise software, nor person hours) are required to employ the WEAVEonline application. It is accessed through web browsers and runs entirely as an online application. Since WEAVEonline is a hosted application, there is no application software download or installation for the institution or for individual client PCs. Recommended browsers are Firefox 5; Internet Explorer 8/9 with JavaScript enabled; Chrome 11.x. Supported browsers are Firefox 3.x/5; Internet Explorer 7/8/9; Chrome 11.x. 3. Where will the data be hosted, locally or on a remote server? WEAVEonline is a 100% hosted solution, and all appropriate commercially reasonable disaster recovery procedures are followed. A centralized automated data protection system is used for the backup and recovery of data and applications. Centrieva makes commercially reasonable efforts to

2 ensure that all modified data is backed-up every night. Encrypted backup data is stored off-site for disaster recovery purposes. No less than two independent Internet connections are maintained at all times. Reliability - WEAVEonline is Secure and Dependable, with: Geo-diverse data-centers: Denver, CO and Louisville, KY Continuously sync d databases and file systems with fully automatic fail-over 99.5% up-time: Down-time over last year has been only for scheduled software upgrades and routine patch maintenance. With triple redundant backups, WEAVEonline has an uptime of 99.5% with 24/7/365 availability. 4. Can we import data on users, courses, and entities to facilitate getting started? Absolutely. We would be happy to send you a brief recorded video of how this is accomplished if it would be helpful. WEAVEonline s Data Import/Export functionality is based on the ability of WEAVEonline to both produce and consume delimited files and XML documents. The Data Import/Export functionality includes the ability to add/edit/remove data in bulk and to exchange and maintain primary keys from external systems (e.g. PeopleSoft) such that the add/edit/remove import/export operations are deterministic and repeatable. Currently, this import/export capability is available for users, entities and courses. 5. Is there a separate charge for this bulk import? No. This is included in our annual membership fee. 6. Please detail the physical location of hosting site, number of years in business, number of clientele housed in the location, emergency preparedness/disaster recovery methodology and plan, detailed schematic of hosting infrastructure and fail-over sites. The location of WEAVE s primary data center is located in Denver, CO with a disaster recovery/automatic-fail-over/replica site in Louisville, KY. WEAVEonline is a 100% hosted solution, and all appropriate commercially reasonable disaster recovery procedures are followed. A centralized automated data protection system is used for the backup and recovery of data and applications. Centrieva makes commercially reasonable efforts to ensure that all modified data is backed-up every night. Encrypted backup data is stored off-site for disaster recovery purposes. No less than two independent Internet connections are maintained at all times. Security: Internal - Fine-grained compartmentalization of data via Entity-level Role assignment. External Internet Facing Dual hardware firewalls: Only HTTP(S) and VPN. Thawte Extended Validation Certificate Security best-practices: Continuous & timely application of system and security patches.

3 Database - All stored-procedures; no dynamic SQL; use of down-level accounts (no system access via database nor web application.) Salted, double-hashed user passwords (WeaveDB only) Extensive server logging and monitoring Filtering and sanitizing of user inputs Use of built-in ASP.NET protections against XSS and other vectors Successfully passed penetration/security audit via IBM AppScan 7. Please detail the scalability of WEAVEonline. SaaS: Subscribers have no limits on the numbers of users, entities nor supporting documents they can incorporate into their work. System can be scaled to multiple web servers (web farm) and multiple database backends with very little change to the application code. Existing system is estimated to support 3x-5x current member count prior to distributing the load across a web farm. 8. Please provide a specific description of on-going technical support beyond initial implementation. WEAVEonline provides maintenance and support for the life of your subscription and it is included in the annual membership fee. We find that our members need for support ebbs and flows and is usually focused more on assessment and planning questions rather than the software itself. Our support is provided by professionals who have first-hand knowledge of assessment and planning and have implemented WEAVEonline on their former campuses. With over 160 members, we have the depth of experience to help ensure your successful implementation and use of WEAVEonline. Support by one of our assessment specialists is provided 8:30 a.m.- 5:00 p.m. (Eastern), Monday- Friday. Because we are committed to your ongoing success, there is no charge to train additional members of your staff should you experience turnover in your WEAVEonline administrative staff. On-going training with regard to system upgrades: Features and functionality that expand the range of possible uses for the software are released on an ongoing basis, with advance notice to campus WEAVEonline Administrators. All on-going training is included in the WEAVEonline membership fee. WEAVEonline user guides/manuals: WEAVEonline has an internally available and integrated help system as well as an online tutorial. The help system includes page-specific help, assessment 101 documents, as well as technical FAQs. Many webinars, including a Faculty Training webinar, exist within our members-only Online Learning Community. The entirety of the integrated help system is also available within the Online Learning Community.

4 The following materials are available electronically: Implementation Guide Glossary* Tutorial* Page Specific Help* Quick Start Guide* Assessment Worksheet** Faculty Training PowerPoint** Introductory Faculty Training Webinar** Mapping Quick Start Guide* Mapping - The Nuts and Bolts of Building a Map Webinar ** Mapping - Many Uses, Great Value Webinar** *available within application **available within the Online Learning Community WEAVEonline acts as a teaching tool for faculty and administrators who are unfamiliar with assessment. The logical step-by-step process promotes successful assessment practice, even from those faculty and staff who are untrained in assessment and planning. For instance, the WEAVEonline data entry screen for adding a measure helps to teach assessment to those without an assessment background by providing sources of evidence lists (Academic Direct Measures, Academic Indirect Indicators, and Administrative Measures) from which to choose. A cursor hovering over each evidence source causes a brief definition to appear so that users can learn more about assessment methods with which they may not be familiar. The simplicity of the software, in tandem with the excellent page-specific help, which defines and explains assessment terms, facilitates the creation of a culture of assessment on campus. We also support this with on-going professional development via free monthly webinars and a quarterly newsletter to share best practices. 9. Please describe ownership of all data generated by the system. Should your institution choose WEAVEonline and, at a later date, elect not to continue as a member, you will retain unconditional rights of ownership of all data generated by WEAVEonline and all data will be submitted to you within thirty days after the contract period ends. 10. Does WEAVEonline support alternative authentication methods? At present, WEAVEonline supports four authentication methods: 1) its own internal database; 2) Central Authentication Service (CAS) v2 and v3; 3) LDAP v2 and v3; and, 4) Active Directory. The security architecture of WEAVEonline is modular and designed to support an unlimited number of authentication methods and variants. If the WEAVEonline internal database is utilized, then passwords are stored as salted/double-hashed one-way bits. If one of the aforementioned institutional single sign-on solutions is used, then no passwords are stored in the WEAVEonline database. If single sign-on has been configured, then users will be automatically redirected to the institution s login portal for CAS. In the case of LDAP, the WEAVEonline system will collect the user ID and password and send them to the institutions LDAP server for authentication. There is a one-time $3,000 fee to implement, configure, and test any of the alternate authentication methods.

5 11. Can WEAVEonline be accessed from behind a firewall? Yes. Browser access is unaffected by the presence of an institutional firewall. 12. Does the product write any data to the user s local hard drive? WEAVEonline does not write any data to the user s local machine. However, users do have the option to export and save reports to their local hard drive. 13. Does WEAVEonline store sensitive or confidential data? How is responsibility for sensitive data handled by the system? Users enter data related to academic or administrative assessments rather than student-level assessments. Most institutions do not classify this information as sensitive or confidential. Access to data is protected by WEAVEonline ID and password login. Institutions assign users to selected entities and also define each user s permissions/security access. WEAVEonline security roles permit selective viewing and modification of data depending on the user s area(s) of responsibility. 14. Is WEAVEonline in full compliance with the Americans with Disabilities Act Section 508? WEAVEonline is designed to meet the regulations governing the accessibility of Federal electronic information products (Section 508). This design also conforms to the access guidelines developed by the Web Accessibility Initiative of the World Wide Web Consortium, in that provisions are made to assure access for those individuals with vision impairments. To ensure this capability, WEAVEonline does not incorporate frames, multimedia presentations, user applets, or plug-ins, bypassing many of the issues outlined in Section 508. Where graphic images apply, the HTML "Alt Text" tag is utilized as a text descriptor to facilitate those individuals who may be using screen readers or other assisting devices.

Assessment, Planning & Accreditation Software. Consulting Services WWW.WEAVEONLINE.COM 877-932-8340

Assessment, Planning & Accreditation Software. Consulting Services WWW.WEAVEONLINE.COM 877-932-8340 Assessment, Planning & Accreditation Software Consulting Services WWW.WEAVEONLINE.COM 877-932-8340 Almost a decade ago, WEAVEonline Assessment and Planning Management Software was born of higher education

More information

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several

More information

RESPONSE TO RFP COMMITTEE MANAGEMENT SOFTWARE SOLUTION. Prepared for Brigham Young University. April 21, 2015

RESPONSE TO RFP COMMITTEE MANAGEMENT SOFTWARE SOLUTION. Prepared for Brigham Young University. April 21, 2015 RESPONSE TO RFP COMMITTEE MANAGEMENT SOFTWARE SOLUTION Prepared for Brigham Young University April 21, 2015 Submitted by StreamLink Software, Lauren Nieberding, Sales Manager Company, Product and Service

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Page 1 Instsanda FAQs v1.2 Instanda FAQs Contents Hosting, Security, Monitoring and Management... 3 Where is Instanda hosted?... 3 What is the hosting datacentre compliance?...

More information

Technical specifications

Technical specifications Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.

More information

Version: 1.5 2014 Page 1 of 5

Version: 1.5 2014 Page 1 of 5 Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

Troux Hosting Options

Troux Hosting Options Troux Hosting Options Introducing Troux Hosting Options Benefits of a Hosted Troux Environment...3 Convenience...3 Time-to-Value...3 Reduced Cost of Ownership...3 Scalability and Flexibility...3 Security...4

More information

WEAVE Overview. IE planning and assessment. Strategic plan goals. General education goals. Curriculum mapping. Affirm module - accreditation reports

WEAVE Overview. IE planning and assessment. Strategic plan goals. General education goals. Curriculum mapping. Affirm module - accreditation reports WEAVE Overview IE planning and assessment Strategic plan goals General education goals Curriculum mapping Affirm module - accreditation reports Objectives Become familiar with the WEAVE cycle Understand

More information

Secure Data Hosting. Your data is our top priority.

Secure Data Hosting. Your data is our top priority. Secure Data Hosting Your data is our top priority. ESO s world-class security infrastructure is designed to provide data redundancy, security and availability while keeping sensitive HIPAA and PHI information

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

Qvidian Proposal Automation (QPA) 10 Quick Facts

Qvidian Proposal Automation (QPA) 10 Quick Facts Qvidian Proposal Automation (QPA) 10 Quick Facts Last Updated: 5/14/2013 Topic List This white paper lists Qvidian Proposal Automation (QPA) quick facts that address questions commonly asked by Qvidian

More information

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems

More information

Hosted Solutions FAQ. Introduction

Hosted Solutions FAQ. Introduction Introduction Q. What are Hosted Solutions? A. FileTrail s Hosted Solutions help our clients manage hardcopy records without the capital expense of a traditional software project. Instead of installing

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

SaaS Service Level Agreement (SLA)

SaaS Service Level Agreement (SLA) SaaS Service Level Agreement (SLA) The purpose of this document is to define the Service Level Agreement (SLA) for the maintenance and support of the Hosting Service ( Service ). Service Level Agreements

More information

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS Technical audits in accordance with Regulation 211/2011 of the European Union and according to Executional Regulation 1179/2011 of the

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

ClockWork Enterprise 5

ClockWork Enterprise 5 ClockWork Enterprise 5 Technical Overview rev 5.1 Table of Contents Overview... 3 Database Requirements... 4 Database Storage Requirements... 4 Sql Server Authentication and Permissions... 5 ClockWork

More information

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Topics What is SaaS? How does SaaS differ from managed hosting? Advantages of SaaS

More information

Service Definition Easysite Web CMS

Service Definition Easysite Web CMS Service Definition Easysite Web CMS Easysite Web Content Management System G-Cloud III Service Definition Easysite Web Content Management System Contents 1 Service Easysite Web Content Management System...

More information

SaaS Security for the Confirmit CustomerSat Software

SaaS Security for the Confirmit CustomerSat Software SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

WALKME WHITEPAPER. WalkMe Architecture

WALKME WHITEPAPER. WalkMe Architecture WALKME WHITEPAPER WalkMe Architecture Introduction WalkMe - the Enterprise Class Guidance and Engagement Platform - drives users to action as they use software or websites. WalkMe is used by Enterprises

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data

More information

Hosting Features, Terms & Policies

Hosting Features, Terms & Policies Hosting Features, Terms & Policies Portalogiks SharePoint Hosting Table of Contents Data Center Introduction... 2 Connectivity... 3 Power... 3 Security... 3 Environment... 3 Hosting Hardware & Software...

More information

Backup Exec System Recovery Management Solution 2010 FAQ

Backup Exec System Recovery Management Solution 2010 FAQ Backup Exec System Recovery Management Solution 2010 FAQ Contents Overview... 1 Supported Backup Exec System Recovery Versions and Configurations... 6 Backup Exec System Recovery Management Solution Installation

More information

Entrust IdentityGuard Comprehensive

Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust

More information

Managed Services PKI 60-day Trial Quick Start Guide

Managed Services PKI 60-day Trial Quick Start Guide Entrust Managed Services PKI Managed Services PKI 60-day Trial Quick Start Guide Document issue: 3.0 Date of issue: Nov 2011 Copyright 2011 Entrust. All rights reserved. Entrust is a trademark or a registered

More information

Pentaho Enterprise and Community Editions Feature Comparison

Pentaho Enterprise and Community Editions Feature Comparison Pentaho Enterprise and Community Editions Feature Comparison Copyright 2008 Pentaho Corporation. Redistribution permitted. All trademarks are the property of their respective owners. For the latest information,

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

Active Directory Sync (AD) How to Setup

Active Directory Sync (AD) How to Setup Active Directory Sync (AD) How to Setup 1 P a g e Contents How to Setup Active Directory Sync... 3 Download your AD Script... 3 Configuration... 5 Active Directory Sync F.A.Q... 6 2 P a g e How to Setup

More information

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our ENDNOTE ONLINE SECURITY OVERVIEW FOR MY.ENDNOTE.COM In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our servers from attacks and other attempts

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information

Active Directory Sync (AD) How it Works in WhosOnLocation

Active Directory Sync (AD) How it Works in WhosOnLocation Active Directory Sync (AD) How it Works in WhosOnLocation 1 P a g e Contents Overview... 3 About AD in WhosOnLocation... 3 The Way It Works... 3 Requirements... 3 How to Setup Active Directory Sync...

More information

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008

Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Course 50400A: Designing, Optimizing and Maintaining a Database Administrative Solution for Microsoft SQL Server 2008 Length: 5 Days Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

When Your Networkʼs Down, Call Crown

When Your Networkʼs Down, Call Crown When Your Networkʼs Down, Call Crown 521 W. Broad Avenue Albany, GA 31701 Phone: 229.317.7940 Fax: 229.317.7941 HelpDesk@CrownNetworking.com MANAGED SERVICES & FLAT RATE I.T. SUPPORT Our Managed Services,

More information

Gladinet Cloud Enterprise

Gladinet Cloud Enterprise GLADINET, INC Gladinet Cloud Enterprise Multi-Site Deployment Guide Gladinet, Inc. 9/27/2013 This document discusses the technologies behind Gladinet Cloud Enterprise Copyright 2013 Gladinet, Inc. Table

More information

Attachment D System Hardware & Software Overview & Recommendations For IRP System

Attachment D System Hardware & Software Overview & Recommendations For IRP System Attachment D System Hardware & Software Overview & Recommendations For IRP System Submitted by Explore Information Services, LLC Table of Contents Table of Contents...2 Explore IRP Configuration Recommendations...3

More information

IT SERVICE MANAGEMENT FAQ

IT SERVICE MANAGEMENT FAQ IT SERVICE MANAGEMENT FAQ Version: 1.3 Date: February 2011 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Data Stewardship... 4 2.1 Where is the data stored?... 4 2.2 Who controls the data?... 4 2.2

More information

Security Specifications

Security Specifications Security Specifications Overview Password Manager Pro deals with administrative passwords that offer secure access to enterprise credentials and devices. Any compromise on the security of these passwords

More information

Private vs. Public Cloud Solutions

Private vs. Public Cloud Solutions Private vs. Public Cloud Solutions Selecting the right cloud technology to fit your organization Introduction As cloud storage evolves, different cloud solutions have emerged. Our first cloud whitepaper

More information

ProjectManager.com Security White Paper

ProjectManager.com Security White Paper ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for

More information

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Course 20533: Implementing Microsoft Azure Infrastructure Solutions Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions

Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions Sage Nonprofit Online and Sage Virtual Services Frequently Asked Questions General What is Sage Nonprofit Online? Sage Nonprofit Online provides access to Sage 100 Fund Accounting, Sage Grant Management,

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

Product Comparison List

Product Comparison List Product Comparison List Data Center Size Site Solution / Feature

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008

MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 MS-50400 - Design, Optimize and Maintain Database for Microsoft SQL Server 2008 Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials

More information

10231B: Designing a Microsoft SharePoint 2010 Infrastructure

10231B: Designing a Microsoft SharePoint 2010 Infrastructure 10231B: Designing a Microsoft SharePoint 2010 Infrastructure Course Number: 10231B Course Length: 5 Days Course Overview This 5 day course teaches IT Professionals to design and deploy Microsoft SharePoint

More information

6231A - Maintaining a Microsoft SQL Server 2008 Database

6231A - Maintaining a Microsoft SQL Server 2008 Database 6231A - Maintaining a Microsoft SQL Server 2008 Database Course Number: 6231A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft Certified Professional

More information

Spektrix Service Definition

Spektrix Service Definition Spektrix Service Definition An overview of the G-Cloud Service Spektrix is a cloud-based ticketing and marketing software package provided as Software as a Service. It is designed for arts and entertainment

More information

OPEN FOR EDUCATION. CampusNet - Managed Hosting services for Higher Education

OPEN FOR EDUCATION. CampusNet - Managed Hosting services for Higher Education OPEN FOR EDUCATION CampusNet - Managed services for Higher Education The partnership with CampusNet provides ForeFront Education with a fullservice hosting environment complete with staff who have product

More information

FAQ. Hosted Data Disaster Protection

FAQ. Hosted Data Disaster Protection Hosted Data Disaster Protection Flexiion is based in the UK and delivers Infrastructure as a Service (IaaS) solutions, making the advantages of the Cloud and IaaS more accessible to mid-size, professional

More information

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM Policy Compliancy Checklist September 2014 The server management responsibilities described within are required to be performed per University, Agency or State

More information

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011

Creating Stronger, Safer, Web Facing Code. JPL IT Security Mary Rivera June 17, 2011 Creating Stronger, Safer, Web Facing Code JPL IT Security Mary Rivera June 17, 2011 Agenda Evolving Threats Operating System Application User Generated Content JPL s Application Security Program Securing

More information

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER OVERVIEW OF OPEN VIRTUAL DESKTOP Mathieu SCHIRES Version: 1.0.2 Published April 9, 2015 http://www.inuvika.com Contents 1 Introduction 2 2 Terminology and

More information

Edwin Analytics Getting Started Guide

Edwin Analytics Getting Started Guide Edwin Analytics Getting Started Guide This guide provides assistance for accessing and using Edwin Analytics, the Department of Elementary and Secondary Education s (ESE) online tool for expanding data

More information

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc. Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component

More information

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course

More information

Adobe Systems Incorporated

Adobe Systems Incorporated Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...

More information

Enterprise Governance and Planning

Enterprise Governance and Planning GEORGIA TECHNOLOGY AUTHORITY Title: Enterprise Operational Environment PSG Number: SO-10-003.02 Topical Area: Operations / Performance and Capacity Document Type: Standard Pages: 5 Issue Date: July 15,

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443

More information

Preparation Guide Content. EXIN Cloud. 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13. Computing Foundation

Preparation Guide Content. EXIN Cloud. 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13. Computing Foundation Preparation Guide Content EXIN Cloud 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13 Computing Foundation Edition December 2015 Copyright 2015 EXIN All rights reserved.

More information

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724

Appendix C Pricing Index DIR Contract Number DIR-TSO-2724 Appendix C Pricing Index DIR Contract Number DIR-TSO-2724 Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) Amazon Web Services (AWS) is a comprehensive cloud services platform that offers

More information

Upgrading to Websense Web Security v7.6

Upgrading to Websense Web Security v7.6 Upgrading to Websense Web Security v7.6 Webinar April 2011 web security data security email security 2009 Websense, Inc. All rights reserved. Webinar Presenter Greg Didier Title: Support Specialist Accomplishments:

More information

SaaS-Based Employee Benefits Enrollment System

SaaS-Based Employee Benefits Enrollment System Situation A US based industry leader in Employee benefits catering to large and diverse client base, wanted to build a high performance enterprise application that supports sizeable concurrent user load

More information

Security, Reliability & Control with Hosted Exchange

Security, Reliability & Control with Hosted Exchange Hosted Applications Commonly referred to a Cloud Computing and/or Software-as-a-Service (SaaS), web-hosted software applications service provides you with a new way to get business software and applications

More information

Cherwell Software Hosted Environment. www.creekpointe.com info@creekpointe.com 864.297.4959 +1 800.613.1426

Cherwell Software Hosted Environment. www.creekpointe.com info@creekpointe.com 864.297.4959 +1 800.613.1426 Cherwell Software Hosted Environment Cherwell Software, LLC ( Cherwell ) provides an efficient, expedient, and secure hosted environment so that customers are guaranteed exceptional performance and reliability.

More information

Installing Version 7.6 The Latest Tips

Installing Version 7.6 The Latest Tips Installing Version 7.6 The Latest Tips Webinar June 2011 web security data security email security 2009 Websense, Inc. All rights reserved. Webinar Presenter Greg Didier Title: Support Specialist Accomplishments:

More information

REQUEST FOR PROPOSAL Website Design and Development. DUE DATE: FEBRUARY 19, 2016-12:00 p.m.

REQUEST FOR PROPOSAL Website Design and Development. DUE DATE: FEBRUARY 19, 2016-12:00 p.m. REQUEST FOR PROPOSAL Website Design and Development DUE DATE: FEBRUARY 19, 2016-12:00 p.m. City of Willow Park 516 Ranch House Rd. Willow Park, Texas 76087 (817) 441 7108 www.willowpark.org Inquiries Inquiries

More information

Before taking this course, Citrix recommends that learners have the following:

Before taking this course, Citrix recommends that learners have the following: Course CXA-206 Citrix XenApp 6.5 Administration Overview Citrix XenApp 6.5 Administration training course provides the foundation necessary for administrators to effectively centralize and manage applications

More information

Media Shuttle s Defense-in- Depth Security Strategy

Media Shuttle s Defense-in- Depth Security Strategy Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among

More information

System Overview. Security

System Overview. Security System Overview System includes embedded MSDE/SQL Server Express database server and full support for Microsoft SQL Server Users can organize, upload, scan and add new documents or view search results

More information

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s Network Security Please describe the preferred connection method(s) between the PierianDx network and a healthcare organization s

More information

Preparation Guide. EXIN Cloud Computing Foundation

Preparation Guide. EXIN Cloud Computing Foundation Preparation Guide EXIN Cloud Computing Foundation Edition June 2012 Copyright 2012 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing

More information

Bigfoot CMMS. Cloud-Based Maintenance Software

Bigfoot CMMS. Cloud-Based Maintenance Software Bigfoot CMMS Cloud-Based Maintenance Software Q U I C K TO L E A R N Q U I C K R E S U LT S w w w. b i g f o o t c m m s. c o m Bigfoot and the Bigfoot logo are registered trademarks of the U.S. Patent

More information

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001 Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance

More information

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

Table of Contents. Page 1 of 6 (Last updated 30 July 2015) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

EmpLive Technical Overview

EmpLive Technical Overview Version 1.6 Updated 27/08/2015 Support: +61 2 8399 1688 Email: support@wfsaustralia.com Website: wfsaustralia.com Legal Notice Copyright WFS: A WorkForce Software Company. All Rights Reserved. By receiving

More information

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING

Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Web Drive Limited TERMS AND CONDITIONS FOR THE SUPPLY OF SERVER HOSTING Application of Terms Agreement to these terms requires agreement to Web Drive s Standard Terms & Conditions located online at the

More information

TARRANT COUNTY PURCHASING DEPARTMENT

TARRANT COUNTY PURCHASING DEPARTMENT JACK BEACHAM, C.P.M., A.P.P. PURCHASING AGENT TARRANT COUNTY PURCHASING DEPARTMENT AUGUST 4, 2010 RFP NO. 2010-103 ROB COX, C.P.M., A.P.P. ASSISTANT PURCHASING AGENT RFP FOR DIGITAL ASSET MANAGEMENT SYSTEM

More information

Basic Administration for Citrix XenApp 6.5 Course CXA206; 5 Days, Instructor-led

Basic Administration for Citrix XenApp 6.5 Course CXA206; 5 Days, Instructor-led Basic Administration for Citrix XenApp 6.5 Course CXA206; 5 Days, Instructor-led Course Description Basic Administration for Citrix XenApp 6.5 training course provides the foundation necessary for administrators

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

Migrating your custom settings to version 7.6

Migrating your custom settings to version 7.6 Migrating your custom settings to version 7.6 Webinar July 2011 web security data security email security 2009, Inc. All rights reserved. Webinar Presenter Greg Didier Title: Support Specialist Accomplishments:

More information

BeBanjo Infrastructure and Security Overview

BeBanjo Infrastructure and Security Overview BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits

More information

White Paper BMC Remedy Action Request System Security

White Paper BMC Remedy Action Request System Security White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information

More information

For <Project> Version 1.0

For <Project> Version 1.0 Oklahoma Department of Human Services Data Services Division Enterprise Single Sign-On System Implementation Plan For Version 1.0 Enterprise Single Sign-On System Implementation

More information

CITRIX 1Y0-A16 EXAM QUESTIONS & ANSWERS

CITRIX 1Y0-A16 EXAM QUESTIONS & ANSWERS CITRIX 1Y0-A16 EXAM QUESTIONS & ANSWERS Number: 1Y0-A16 Passing Score: 550 Time Limit: 165 min File Version: 37.5 http://www.gratisexam.com/ CITRIX 1Y0-A16 EXAM QUESTIONS & ANSWERS Exam Name: Architecting

More information

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R

More information

Architecture Guidelines Application Security

Architecture Guidelines Application Security Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation

More information

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016

Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016 Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission

More information

Microsoft SharePoint Architectural Models

Microsoft SharePoint Architectural Models Microsoft SharePoint This topic is 1 of 5 in a series Introduction to Fundamental SharePoint This series is intended to raise awareness of the different fundamental architectural models through which SharePoint

More information

Agilisys G-Cloud Service V

Agilisys G-Cloud Service V Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform

More information