MCP Guru Seminar Series: Security. Mike Kain, Consulting Engineer and Security Architect Wednesday, September 10 th, :00 pm
|
|
- Derick Cole
- 8 years ago
- Views:
Transcription
1 MCP Guru Seminar Series: Security Mike Kain, Consulting Engineer and Security Architect Wednesday, September 10 th, :00 pm
2 Agenda A discussion about MCP Security Presentation of MCP 15.0 features Open discussion of issues driving MCP customers in the area of security What issues are you seeing? What is the most pressing problem at your site? These will be weaved together in this presentation 2013 Unisys Corporation. All rights reserved. 2
3 What s driving your MCP security? What s is your # 1 security concern? A. Audit / Assessment / Security Intelligence about the business B. Encryption / Preventing loss of PII (Personally Identifiable Information) C. Compliance & adherence to regulation(s) D. Whatever my boss tells me E. Whatever my auditor tells me F. All of the above different days are different answers What s # 2? 2013 Unisys Corporation. All rights reserved. 3
4 Network Security Logging MCP 15.0 new feature Applicable Network Security Events are now logged as security RELEVANT or security VIOLATION records in the sumlog Includes SSH, SSL, and IPsec security relevant and security violation records Previously logged as Diagnostics events in Security log TCP/IP Firewall entries already have been marked with these designations. This features makes events more accessible by a security administrator with standard LOGANALYZER queries Unisys Corporation. All rights reserved. 4
5 Network Security Logging Applicable Network Operations Interface (OI) messages (CMDs, RSPs, RPTs, and log-only RPTs) are now logged as security RELEVANT or security VIOLATION records in the sumlog. Tables showing which Networking OI messages are logged are included as appendices in: Security Administration Guide Networking Encoded Messages Programming Reference Manual 2013 Unisys Corporation. All rights reserved. 5
6 Network Security Logging Examples: LOG UC. RESULT RELEVANT Selects all records that are marked security RELEVANT LOG UC. RESULT VIOLATION Selects all records that are marked security VIOLATION LOG UC. RESULT RELEVANT VIOLATION Selects all records that are marked security RELEVANT or security VIOLATION. Requires SYSTEM/IGSDASUPPORT and that the SACM (formerly known as InfoGuard) keys are in the keys file Unisys Corporation. All rights reserved. 6
7 Locum Software MCP 15.0 enhancements SafeSurvey: User Privileges Report enhanced with COMS CFILE Privileges and RBAC permissions New RBAC report (if enabled in SecurityCenter and/or Workload Management) RealTime Monitor: New dashboard with moving timeline graph Allow customization of limit for stored alert messages (default is 1000 messages) Additional customization of alerts (specifying FROM, and multiple addresses) Updated version of Protecting Your Business Security with Locum RealTime Monitor white paper will be posted Unisys Corporation. All rights reserved. 7
8 Encryption / Cryptography What data do you encrypt? A. Any PII (Personally Identifiable Information) B. All data for backup C. All data across the network D. All data leaving the site E. All of the above What encryption solutions do you have to improvise? What about key management? 2013 Unisys Corporation. All rights reserved. 8
9 Tape / DVD Encryption - MCP 15.0 Enhancements Provides Enhanced Security for Encrypted Tapes/CDs/ DVDs AES-GCM encryption, the standard algorithm for tape encryption as specified by the IEEE ESSIV scheme is used with CBC-mode to generate a random Initialization Vector (IV) for each tape and each file on a tape. Additional data integrity checking added to encrypted data Enhancements are known as Version 2 Media Encryption Format of Version 2 encrypted media is different from the original, Version 1, tape encryption format 2013 Unisys Corporation. All rights reserved. 9
10 Tape / DVD Encryption Enhancements Examples COPY F/= TO BACKUPTAPE(SERIALNO= , ENCRYPT=AESGCM) Specifying ENCRYPT=AESGCM by definition creates a Version 2 Encrypted Tape COPY F/= TO BACKUPCD(CD, ENCRYPT=AES256, ENCRYPTVERSION=V2) Specifying ENCRYPTVERSION=V2 forces the use of ESSIV when doing AES with CBC-mode encryption 2013 Unisys Corporation. All rights reserved. 10
11 Tape / DVD Encryption Enhancements Migration and Compatibility Version 1 is used by default but Version 2 is recommended A tape/cd/dvd created using Version 2 Media Encryption cannot be read on a system that only supports Version 1 tape encryption Systems that support Version 2 Media Encryption can read and write both Version 1 and Version 2 tapes/cds/dvds Library Maintenance will not support encryption using Version 1 in software released after October 2015 but decryption of media created using Version 1 will continue to be supported Only Library Maintenance supports the new Media Encryption Version 2 enhancements TapeStack and DMUTILITY do not 2013 Unisys Corporation. All rights reserved. 11
12 Tape / DVD Encryption Enhancements Operator Controls The existing LMENCRYPT SYSOP can now be set to AESGCM Thus all tape/cd/dvd copies would be encrypted using AESGCM unless over-ridden in the COPY statement itself and would be in Media Encryption Version 2 format A new LMDEFENCRYPT SYSOP can be set to V1 or V2 LMDEFENCRYPT defaults to V1 LMDEFENCRYPT set to V2 and LMENCRYPT set to AES256 causes ESSIV to be used along with AES256 in CBC-mode and creates the encrypted media in Version 2 format LMDEFENCRYPT set to V1 and LMENCRYPT set to AES256 uses AES256 in CBC-mode and creates the media in Version 1 format 2013 Unisys Corporation. All rights reserved. 12
13 SecurityCenter MCP 15.0 enhancement Secure Erase of SecurityCenter Database Files The SENSITIVEDATA attribute is set on files associated with the Security Center database: Data set and set, control, audit and LOAD/DUMP files When removed or replaced, a SENSITIVEDATA file is overwritten by a pattern determined by SECOPT ERASE. Pattern options are ZEROS, TRIPLE, TRIPLEVERIFY. The overwrite is performed by a separate MCP task Not by the program accessing the database Unisys Corporation. All rights reserved. 13
14 Sending data off of the premises Are you allowed to send data off-site? A. Clear-text? B. Encrypted? C. Never? Separate process (including destruction of media)? Or only if could have customer data? Some data allowed (sumlog, etc.) Some not (MCP dumps, Wireshark, etc.)? 2013 Unisys Corporation. All rights reserved. 14
15 SFTP Enhancements MCP 15.0 enhancements Server support for Windows SFTP clients The ClearPath SFTP Server transfers files with the following Windows SFTP clients. WinSCP Attachmate Reflection FTP Client FileZilla FTP Client - We ll update the compatibility matrix on the support website. Server support to append to ClearPath files SFTP clients can append data to the end of existing ClearPath files. Example using WinSCP put -append TransactionHistory 2013 Unisys Corporation. All rights reserved. 15
16 SFTP Enhancements (cont.) Server support for dynamic Startup Files Allow SFTP clients to modify the current session values read from the FTP/STARTUP file. An FTP/STARTUP file can be stored on the client host as FTP STARTUP ONDEMAND. When this file is transferred to the ClearPath host, the default values in the Server Section of the file are used in the current session. Example FTP STARTUP ONDEMAND file. [SERVER SECTION] TYPE ASCII NONPRINT; DIRECTORY_FORMAT = STANDARD; FILESIZE = 8000 MB; DEFAULT MAPIN TEXT STYLE = TEXT; 2013 Unisys Corporation. All rights reserved. 16
17 FTPS Enhancements Server support for Custom Site Commands Allows the FTP Administrator to create Work Flow Language source code that can be processed by the WFL compiler. FTPS clients can run the WFL source using the Server SITE command. Example: [LIBRARY SECTION] CUSTOM_SITE_CMND = "MAKE_REPORT_PUBLIC = 'SECURITY NEW/REPORT PUBLIC',", "COPY_REPORT = 'BEGIN JOB COPY_REPORT;", "FAMILY DISK = REPORTS OTHERWISE DISK;", "REMOVE REPORT/FILE; COPY NEW/REPORT AS REPORT/FILE;", "END JOB'"; 2013 Unisys Corporation. All rights reserved. 17
18 Patch management / security relevance How much patch management / update do you do on your ClearPath MCP? A. Only what patches affect me B. Only what patches involve security C. A and B D. I don t take anything only until the next MCP release. E. I don t know, since I don t know what each patch does and how critical it is. Is the operation of your ClearPath MCP influenced by best practices of other environments? 2013 Unisys Corporation. All rights reserved. 18
19 Identity Management How do the users of your ClearPath MCP relate to your user base? A. Everyone has a separate account on the MCP system B. Only certain users use the MCP system C. It s only me who knows the difference (users don t know that they re using a ClearPath MCP) Do you use accesscodes? 2013 Unisys Corporation. All rights reserved. 19
20 Accesscode Violation Counting Violation counts can be attributed to an accesscode (instead of usercode) New User attributes ACSAVEVIOLCOUNT ACDEFVIOLLIMIT ACVIOLINFO group ACVIOLNAME, ACSUSPENDED, ACSUSPENDEDCODE, ACVIOLCOUNT, ACVIOLLIMIT, ACVIOLDATE Behaves like usercode violation counting and limiting ICs available in MCP 13.0 (54.1) & MCP 14.0 (55.1) including SecurityCenter Unisys Corporation. All rights reserved. 20
21 Future Deimplementations Security Monitoring Workstation (SMW) Migrate to Locum Realtime Monitor MINIMAL Security Class Use existing privileges and station attributes (see PRI ) Deimplementation scheduled for MCP 17.0 (58.1) 2013 Unisys Corporation. All rights reserved. 21
22 Questions? Further questions, comments, and suggestions to: Thank you! 2013 Unisys Corporation. All rights reserved. 22
23 MCP 15.0 Security Major Features Major Features in MCP 15.0 Tape / DVD Encryption Enhancements Network Security Logging Locum Software Enhancements Accesscode Violation Counting SecurityCenter Enhancements Secure Erase of SecurityCenterDB SFTP Enhancements Support for additional clients Other functional enhancements Future Deimplementations Secure Monitoring Workstation MINIMAL Security Class 2013 Unisys Corporation. All rights reserved. 23
ClearPath MCP Security Update and Overview. Mike Kain, Consulting Engineer and Security Architect MCP Session 3024 Monday, April 14 th, 2012 1:30pm
ClearPath MCP Security Update and Overview Mike Kain, Consulting Engineer and Security Architect MCP Session 3024 Monday, April 14 th, 2012 1:30pm Abstract Goal of presentation Provide an overview of current
More informationGetting Started. A Getting Started Guide for Locum RealTime Monitor. Manual Version 2.1 LOCUM SOFTWARE SERVICES LIMITED
Getting Started A Getting Started Guide for Locum RealTime Monitor Manual Version 2.1 LOCUM SOFTWARE SERVICES LIMITED Locum House, 84 Brown Street, Sheffield, S1 2BS, England Telephone: +44 (0) 114 252-1199
More informationLocum Software Services Limited
Locum Software Services Limited Security Solutions ALERT ASSURE ASSESS ADMINISTER AUDIT Products & Services Safe & Secure Security Administration & Reporting ADMINISTRATION Userdatafile and COMS Cfile
More informationHow Reflection Software Facilitates PCI DSS Compliance
Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit
More informationDiamondStream Data Security Policy Summary
DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers
More informationunisys ClearPath Enterprise Servers System Log Programming Reference Manual ClearPath MCP 17.0 April 2015 8600 1807 227
unisys ClearPath Enterprise Servers System Log Programming Reference Manual ClearPath MCP 17.0 April 2015 8600 1807 227 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product or related
More informationSecuring Ship-to-Shore Data Flow
Securing Ship-to-Shore Data Flow Background on Common File Transfer Methods Today corporations, government entities, and other organizations rely on Electronic File Transfers as an important part of their
More informationunisys Distributed Processing Middleware Enterprise Database SQL Query Processor for ClearPath MCP Installation and Operations Guide imagine it. done.
unisys imagine it. done. Distributed Processing Middleware Enterprise Database SQL Query Processor for ClearPath MCP Installation and Operations Guide ClearPath MCP 13.0 April 2010 3850 8206 003 NO WARRANTIES
More informationState of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents
More informationunisys ClearPath Enterprise Servers SQL Query Processor for ClearPath MCP Installation and Operations Guide ClearPath MCP 16.0
unisys ClearPath Enterprise Servers SQL Query Processor for ClearPath MCP Installation and Operations Guide ClearPath MCP 16.0 April 2014 3850 8206 005 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS
More informationClearPath MCP Security Supports the Payment Card Industry (PCI) Data Security Standard
ClearPath MCP Security Supports the Payment Card Industry (PCI) Data Security Standard By David Milligan White Paper The Payment Card Industry (PCI) Security Standards Council developed twelve high-level
More informationPENN. Social Sciences Computing a division of SAS Computing. SAS Computing SSC. File Security. John Marcotte Director of SSC.
Social Sciences Computing a division of File Security John Marcotte Director of February 2008 File Security Review security issues Overview of encryption Software Data Security Plan Questions Reasons for
More informationMethods available to GHP for out of band PUBLIC key distribution and verification.
GHP PGP and FTP Client Setup Document 1 of 7 10/14/2004 3:37 PM This document defines the components of PGP and FTP for encryption, authentication and FTP password changes. It covers the generation and
More informationSUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
More informationCross Platform Software Release Capabilities
Cross Platform Software Release Capabilities Larry Aube ClearPath Portfolio Management ClearPath Briefings 2015 Grove/UK Agenda Data Exchange ClearPath Integration Services ClearPath IDEs 2015 Unisys Corporation.
More informationHow Managed File Transfer Addresses HIPAA Requirements for ephi
How Managed File Transfer Addresses HIPAA Requirements for ephi 1 A White Paper by Linoma Software INTRODUCTION As the healthcare industry transitions from primarily using paper documents and patient charts
More informationSystem Management. What are my options for deploying System Management on remote computers?
Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What
More informationBANKING SECURITY and COMPLIANCE
BANKING SECURITY and COMPLIANCE Cashing In On Banking Security and Compliance With awareness of data breaches at an all-time high, banking institutions are working hard to implement policies and solutions
More informationPowerSC Tools for IBM i
PowerSC Tools for IBM i A service offering from IBM Systems Lab Services PowerSC Tools for IBM i PowerSC Tools for IBM i helps clients ensure a higher level of security and compliance Client Benefits Simplifies
More informationMCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
More informationPlain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
More informationService Level Agreement (SLA) Arcplace Backup Enterprise Service
(SLA) Arcplace Backup Enterprise Service 1. Introduction This Service Level Agreement ( SLA ) forms an integral part of the Agreement between Arcplace and Customer. This SLA describes the Backup Enterprise
More informationAPPENDIX I Basic Windows NT Server 4.0 Installation and Configuration
Basic Windows NT Server 4.0 Installation and Configuration Windows NT 4.0 (English version) Installation The first step of the installation is to install the English Windows NT Server 4.0 to the file server
More informationProtecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security Antonio.Mata.Gomez@oracle.com Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
More informationTeamQuest SMFII and TeamQuest Online for Unisys MCP Systems
TeamQuest SMFII and TeamQuest Online for Unisys MCP Systems ADMINISTRATION GUIDE Copyright 2012 TeamQuest Corporation. All Rights Reserved. April 2012 Levels 54.017 and 55.017 TQ 02211.16 The names, places
More informationensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
More information1B1 SECURITY RESPONSIBILITY
(ITSP-1) SECURITY MANAGEMENT 1A. Policy Statement District management and IT staff will plan, deploy and monitor IT security mechanisms, policies, procedures, and technologies necessary to prevent disclosure,
More informationSSL DOES NOT MEAN SOL What if you don t have the server keys?
SSL DOES NOT MEAN SOL What if you don t have the server keys? J. Scott Haugdahl Architect, Blue Cross Blue Shield MN Robert Bullen Systems Engineer, Blue Cross Blue Shield MN Setting Expectations This
More informationThreat Modelling for Web Application Deployment. Ivan Ristic ivanr@webkreator.com (Thinking Stone)
Threat Modelling for Web Application Deployment Ivan Ristic ivanr@webkreator.com (Thinking Stone) Talk Overview 1. Introducing Threat Modelling 2. Real-world Example 3. Questions Who Am I? Developer /
More informationCredit Card Security
Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary
More informationQuick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.
Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery
More informationSecuring and Managing Data Transmissions. 2010, Linoma Software. All rights reserved.
Beyond FTP Securing and Managing Data Transmissions i 2010, Linoma Software. All rights reserved. Company Background Founded in 1994 Based in Nebraska Private company with no Outside Funding Dedicated
More informationWWA FTP/SFTP CONNECTION GUIDE KNOW HOW TO CONNECT TO WWA USING FTP/SFTP
WWA FTP/SFTP CONNECTION GUIDE KNOW HOW TO CONNECT TO WWA USING FTP/SFTP Table OF Contents WWA FTP AND SFTP CONNECTION GUIDE... 3 What is FTP:... 3 What is SFTP:... 3 Connection to WWA VIA FTP:... 4 FTP
More informationRFG Secure FTP. Web Interface
RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken
More informationHUAWEI 9000 HD Video Endpoint V100R011. Security Maintenance. Issue 02. Date 2013-05-28 HUAWEI TECHNOLOGIES CO., LTD.
V100R011 Issue 02 Date 2013-05-28 HUAWEI TECHNOLOGIES CO., LTD. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent
More informationDELIVER Utility for MCP Systems
MGS, Inc. Computer Business Solutions DELIVER Utility for MCP Systems Reference Manual Version 1.09 September, 2012 Rev 1 DELIVER Utility for MCP Systems Reference Manual Version 1.09 Copyright 2009-2012
More informationSecure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3
Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 A Note About Ports 5 Connecting
More informationClearPath MCP Developer Studio
ClearPath MCP Developer Studio ClearPath MCP Releases 16.0 and 17.0 ClearPath Software Series The ClearPath Software Series is a new innovative collection of software-only solutions without a traditional
More informationBlaze Vault Online Backup. Whitepaper Data Security
Blaze Vault Online Backup Version 5.x Jun 2006 Table of Content 1 Introduction... 3 2 Blaze Vault Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 256-bit SSL communication... 4 2.2 Backup
More informationPolicy. London School of Economics & Political Science. Encrypted Authentication IMT. Jethro Perkins. Information Security Manager. Version 1.
London School of Economics & Political Science IMT Policy Encrypted Authentication Jethro Perkins Information Security Manager Version 1.1 Date 18/03/2015 Library reference ISM-PY-127 Document control
More informationWS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
More informationStratusphere. Architecture Overview
Stratusphere Architecture Overview Introduction This guide has been authored by experts at Liquidware Labs in order to provide an architecture overview of Liquidware Labs Stratusphere product, the leading
More informationConfigure your ewon using FTP
Configure your ewon using FTP When you need to configure several ewons at the same time or make a repeated action you can use the ewon web interface. But you can also make changes on your ewon using FTP.
More information<Insert Picture Here> Oracle Secure Backup 10.3 Secure Your Data, Protect Your Budget
Oracle Secure Backup 10.3 Secure Your Data, Protect Your Budget Program Agenda Oracle Secure Backup Overview What s New in Oracle Secure Backup 10.3 Ease of Management Data Protection:
More informationHIPAA Security Rule Compliance and Health Care Information Protection
HIPAA Security Rule Compliance and Health Care Information Protection How SEA s Solution Suite Ensures HIPAA Security Rule Compliance Legal Notice: This document reflects the understanding of Software
More informationA+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
More informationDFW Backup Software. Whitepaper Data Security
Version 6 Jan 2012 Table of Content 1 Introduction... 3 2 DFW Backup Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 128-bit SSL communication... 4 2.2 Backup data are securely encrypted...
More informationDAZZLE INTEGRATED DATA BACKUP FEATURE.
DAZZLE INTEGRATED DATA BACKUP FEATURE. To simplify the backup process and to make sure even the busiest (or laziest) shops have no excuse not to make data backups, we have created a simple on-screen backup
More informationQuick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
More informationSFTP (Secure Shell FTP using SSH2 protocol)
SFTP (Secure Shell FTP using SSH2 protocol) Technical Manual March 2014 1. Contents 1. 1. Table of contents 2. Introduction... 3 3. Criteria for SFTP... 5 4. Preparations for connecting to SFTP... 7 5.
More informationenicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
More informationnwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
More informationSECURE FTP CONFIGURATION SETUP GUIDE
SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients
More informationOFFICE OF THE STATE AUDITOR General Controls Review Questionnaire
OFFICE OF THE STATE AUDITOR Agency: * University Please answer all of the following questions. Where we ask for copies of policies and procedures and other documentation, we would prefer this in electronic
More informationFilesAnywhere Feature List
FilesAnywhere Feature List FilesAnywhere Page 1 of 9 3/31/2014 Contents Basic Features... 3 Advanced Features... 7 Enterprise Features... 9 FilesAnywhere Page 2 of 9 3/31/2014 Basic Features No File Size
More informationSAP BusinessObjects Business Intelligence Suite Document Version: 4.1 Support Package 3-2014-05-07. Patch 3.x Update Guide
SAP BusinessObjects Business Intelligence Suite Document Version: 4.1 Support Package 3-2014-05-07 Table of Contents 1 Document History....3 2 Introduction....4 2.1 About this Document....4 2.1.1 Constraints....4
More informationImproving PCI Compliance with Network Configuration Automation
Improving PCI Compliance with Network Configuration Automation technical WHITE PAPER Table of Contents Executive Summary...1 PCI Data Security Standard Requirements...2 BMC Improves PCI Compliance...2
More informationMCP Guru Series DMSII & dbatools. Kung Lin Unisys Corporation Jim Stewart Stewart Data Tech. Ltd.
MCP Guru Series DMSII & dbatools Kung Lin Unisys Corporation Jim Stewart Stewart Data Tech. Ltd. MCP Guru Series - DMSII Recap Persistent RSN NOFTLOCK 15.0 LOCKPROGRAM Enhancement Data Access Logging Configuration
More information2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
More informationfåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.
More informationProcedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
More informationz/os Security - FTP Logon Failures
Page 1 of 5 CLEVER Solutions Empowering Global Enterprise z/os Security: FTP Logon Failures Dear Cathy, Does your business have a laissez faire attitude toward z/os security? Most companies do because
More informationMOVEIT: SECURE BY DESIGN BY JONATHAN LAMPE, GCIA, GSNA
MOVEIT: SECURE BY DESIGN BY JONATHAN LAMPE, GCIA, GSNA The MOVEit DMZ server, MOVEit clients, and FIPS 140-2 validated MOVEit cryptographic software products by Ipswitch File Transfer have been designed
More informationby New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document
Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.
More informationInstalling and configuring Microsoft Reporting Services
Installing and configuring Microsoft Reporting Services Every company, big or small has to use various tools to retrieve data from their Databases. IT departments receive many different requests for data
More informationOverview... 2. Servers and Infrastructure... 2. Communication channels... 3. Peer-to-Peer connections... 3. Data Compression and Encryption...
Data security is a high priority at Brosix, enabling us to continue achieving the goal of providing efficient and secure online realtime communication services. Table of Contents Overview... 2 Servers
More informationIBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
More informationSecuring Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationQuestion Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
More informationunisys ClearPath Enterprise Servers Remote Database Backup Planning and Operations Guide ClearPath MCP 14.0 April 2012 8600 2052 309
unisys ClearPath Enterprise Servers Remote Database Backup Planning and Operations Guide ClearPath MCP 14.0 April 2012 8600 2052 309 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product
More informationTable of Contents. Introduction. Audience. At Course Completion
Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides
More informationDigiVault Online Backup Manager. User Guide
DigiVault Online Backup Manager User Guide Version 4.6.1.4 October 2005 DigiVault Backup Manager User Guide 2 Table of Contents 1 Using DigiVault Backup Manager... 3 1.1 System Tray Launcher... 3 1.2 Logon
More informationExperian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
More informationCLOUD SERVICES (INFRASTRUCTURE) SERVICE TERMS PART C - INFRASTRUCTURE CONTENTS
CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE... 2 4 TAILORED INFRASTRUCTURE... 3 5 COMPUTE... 3 6 SECURITY... 9 TELSTRA GLOBAL. Cloud Services (Infrastructure) Part C updated as
More informationAcano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
More informationBackup/Restore MySQL Server
This chapter will describe in details how to use Software to backup your MySQL server and how you can restore your MySQL server from the database backup files. Table of Content 1. Requirements 2. Overview
More informationHow To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,
More informationCLOUD SERVICES FOR EMS
CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery
More informationCLIENT DATABASE SECURITY
CLIENT DATABASE SECURITY 1502 RXR Plaza 15th Floor, West Tower Uniondale, NY 11556 Telephone: (516) 227-6600 Facsimile: (516) 227-1799 Website: http://www.openlink.com Revision History Document Name Date
More informationObtaining Value from Your Database Activity Monitoring (DAM) Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
More informationDataTrust Backup Software. Whitepaper Data Security. Version 6.8
Version 6.8 Table of Contents 1 Introduction... 3 2 DataTrust Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 128-bit SSL communication... 4 2.2 Backup data are securely encrypted...
More informationVeritas NetBackup Installation Guide
Veritas NetBackup Installation Guide Windows Release 6.5 12308334 NetBackup Installation Guide Copyright 1998-2007 Symantec Corporation. All rights reserved. NetBackup 6.5 Symantec, the Symantec logo,
More informationBest Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
More informationSafe Financials Limited. The CREST Simulator. File Transfer Overview and SFL Gateway
Safe Financials Limited Ascension House 2 nd Floor First Avenue Burton on Trent DE14 2WW Tel : 01283 500255 Web : www.safefinancials.co.uk Email : enquiries@safefinancials.co.uk The CREST Simulator File
More informationConfiguring Password Encryption
This chapter describes how to configure password encryption on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About Password Encryption,
More informationWhite Paper. Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1. Copyright 2014, ezdi, LLC.
White Paper ezcac: HIPAA Compliant Cloud Solution Prepared by: Neil Shah Director, Product Management March, 2014 Version: 1 Copyright 2014, ezdi, LLC. TECHNICAL SAFEGUARDS Access Control 164.312 (a) (1)
More informationIOD Incorporated. SOC 3 Report for IOD Incorporated
SOC 3 Report for IOD Incorporated For The Period From SOC 3 Report Table of Contents Section 1: Management of IOD Incorporated Service Organization s Assertion... 2 Section 2: Independent Accountant s
More informationDirectory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
More informationHELPDESK & SERVER MONITORING. Helpdesk HOURS OF COVER KEY FEATURES
HELPDESK & SERVER MONITORING Organisations are under pressure to implement efficient, reliable and cost effective helpdesk And server monitoring service solutions. Our Helpdesk & Server Monitoring services
More informationSubject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.
chair John Chiang member Jerome E. Horton member Ana J. Matosantos August 27, 2012 To: Potential Vendors Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event
More informationHIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
More informationOnline Banking for Business Secure FTP with SSL (Secure Socket Layer) USER GUIDE
Online Banking for Business Secure FTP with SSL (Secure Socket Layer) USER GUIDE Contents Secure FTP Setup... 1 Introduction...1 Secure FTP Setup Diagram...1 Before You Set Up S/FTP...2 Setting Up S/FTP...2
More informationWeb Security School Entrance Exam
Web Security School Entrance Exam By Michael Cobb 1) What is SSL used for? a. Encrypt data as it travels over a network b. Encrypt files located on a Web server c. Encrypt passwords for storage in a database
More informationOnline Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE
Online Banking for Business Secure FTP with SSH (Secure Shell) USER GUIDE Contents Secure FTP Setup... 1 Introduction... 1 Before You Set Up S/FTP... 1 Setting Up FTP with SSH... 2 Sending Files... 3 Address
More information<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager tammy.bednar@oracle.com Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
More informationScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
More informationDRAFT IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) Communications and Operations Management Policy #2450
DRAFT IDAHO STATE UNIVERSITY POLICIES AND PROCEDURES (ISUPP) Communications and Operations Management Policy #2450 POLICY INFORMATION Major Functional Area (MFA): Finance and Administration Policy Title:
More informationWhat s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team
What s New in MySQL 5.7 Security Georgi Joro Kodinov Team Lead MySQL Server General Team Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information
More informationBestSync Tutorial. Synchronize with a FTP Server. This tutorial demonstrates how to setup a task to synchronize with a folder in FTP server.
BestSync Tutorial Synchronize with a FTP Server This tutorial demonstrates how to setup a task to synchronize with a folder in FTP server. 1. On the main windows, press the Add task button ( ) to add a
More informationSTERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com
STERLING SECURE PROXY Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram
More information