Security Support in Mobile Platforms (part I) Vincent Naessens - MSEC

Size: px
Start display at page:

Download "Security Support in Mobile Platforms (part I) Vincent Naessens - MSEC"

Transcription

1 Security Supprt in Mbile Platfrms (part I) Vincent Naessens - MSEC

2 Security Mechanisms in Mbile Platfrms 1. Platfrm Supprt fr Data and Credential Prtectin 2. App Distributin 3. App Islatin 4. Mbile Device Management

3 Mbile Device Encryptin Systems 1. Different appraches t encrypt assets File encryptin vs file system encryptin Key derivatin mechanisms 2. Different cnfiguratin strategies Develper cnfiguratin End user r MDM cnfiguratin 3. Different strategies applied by app develpers Rely n platfrm security functins Develpment f prprietary slutins

4 Key Derivatin Mdule user input secure element KDF Encryptin Mdule Carse grained encryptin Fine grained encryptin file system keystre

5 Assumptins and attack scenaris Assumptins 1. Cryptgraphic algrithms are crrectly implemented 2. Stlen device is nt jailbreaked/rted yet 3. Attacker steals with gal t retrieve data, and is security expert Attack scenaris 1. Attacks n the encryptin system 2. Attacks n the key derivatin mechanism 3. Attacks n unfeasible cnfiguratin r weak develpment Key Derivatin Mdule user input secure element KDF Carse grained encryptin Encryptin Mdule Fine grained encryptin file system keystre

6

7 The Andrid encryptin system Key Derivatin Mdule user input KDF Encryptin Mdule Carse grained encryptin file system keystre

8 The Andrid encryptin system Encryptin system file system encryptin based n dm-crypt in Linux kernel keychain encrypted with AES key sme vendrs have extended Andrid functinality t supprt encryptin f external strage media Key derivatin PIN/passcde cmbined with salt PBKDF2 (i.e. repeating SHA1 many times) 128 bit AES key used t decrypt master key Offline attacks are pssible!!!

9 The Andrid encryptin system Cnfiguratin ptins and develper decisins User (BYOD) r administratr (MDM) file system encryptin is nt enabled by default Length f passwrd r PIN impact n security MDM can enfrce minimum passwrd lenghts Applicatin develpers Needs t decide where t stre cnfidential data May nt assume that users cnfigure device well

10 The ios encryptin system Key Derivatin Mdule secure element KDF Key Derivatin Mdule user input secure element KDF Encryptin Mdule Carse grained encryptin Encryptin Mdule Fine grained encryptin file system keystre file system keystre

11 The ios encryptin system ios Hardware Security Features Every ios device has AES256 crypt engine in DMA path between flash strage and RAM UID en GID are 256 bit AES keys fused in applicatin prcessr N direct access by SW r firmware Keys cannt be tampered All ther keys are generated by RNG based n Yarrw

12 The ios encryptin system Encryptin system File system encryptin system (since ios 3.x) File system encryptin with EMF key EMF key is encrypted by UID that is stred in secure element Offline attacks are very hard!!! Decryptin pssible by jailbreaking/rting device!!! Data Prtectin API (since ios 4) Encryptin based n prtectin classes defined by develpers Prtectin class defines when encryptin keys are available - File prtectin NSFilePrtectin - KeyChain prtectin ksecattaccessible

13 The ios encryptin system NSFilePrtectin ksecattraccessible Nne Always N file prtectin Cmplete WhenUnlcked Keys available until device is lcked UntilFirstUserAuth AfterFirstUnlck Keys available until shutdwn CmpleteUnlessOpen --- Keys available as lng as files are pen Secure element and passcde required except fr Nne and Always Remark: KeyChain prtectin classes DeviceOnly versin: keys cannt be transferred t backups

14 The ios encryptin system Key derivatin File system encryptin system Attack by jailbreaking, key derivatin nt relevant Data Prtectin system PBKDF2 with input based n passwrd, UID key and salt time SHA (90 msec per trial) - 6 character alphanumeric passcde 5,5 years t try all cmbinatins - 9 digit passcde 2,5 years t try all cmbinatins Brute frce attack is slwed dwn Brute frce attack cannt be perfrmed ffline

15 The ios encryptin system Key derivatin different security level fr backups PBKDF2 functin is used but n UID invlved Hence, ffline attacks are pssible Hw t attack backup n itunes device? Unencrypted backup cpy whle backup Encrypted backup brute frce attack (ffline)

16 The ios encryptin system Cnfiguratin/develper File system based encryptin system enabled by default Data prtectin system is activated if: 1. Device passcde is set 2. Develper has chsen crrect prtectin classes fr app files Rule 1: select high cmplexity class f passcde pwd length, screen lck, time-uts, Rule 2: cnfigure gd backup ptins Encrypted versus plain backups n itunes Activating/deactivating itunes/iclud backups Strength f passcde is imprtant!

17 The ios encryptin system Cnfiguratin/develper Develpers influences vital aspects f encryptin system security 1. Specifies prtectin classes fr files and KeyChain entries NSFilePrtectin ksecattraccessible Nne Always N file prtectin Cmplete WhenUnlcked Keys available until device is lcked UntilFirstUserAuth AfterFirstUnlck Keys available until shutdwn CmpleteUnlessOpen --- Keys available as lng as files are pen 2. Decides whether a file is included in itunes/iclud backup - Backup flags (kcfurlisexcludedfrmbackupkey)

18 Prtectin f keychain items defined by ios

19 ios passcde and lck cnfiguratin

20 Lessns learnt Decrypting files and credentials in the Andrid Platfrm Master secret is encrypted with key based n passcde Offline brute-frce attack t reveal passcde pssible N file system encryptin by default Decrypting files and credentials in the ios Platfrm Security based n passcde and secure element Offline brute-frce attacks are hard feasible develper and cnfiguratin ptins are crucial

21 Lessns learnt ios platfrm ffers a better level f prtectin KDF based n passcde & secure element High security level can be achieved if right decisins are taken Develper: prtectin classes + backup flags User/administratr: passcde cmplexity + backup ptins Prblem: user/administratr d nt knw if right develpment ptins are taken

22 Security Mechanisms in Mbile Platfrms 1. Platfrm Supprt fr Data and Credential Prtectin 2. App Distributin 3. App Islatin 4. Mbile Device Management

23 2. App Distributin Andrid Marketplace Little applicatin vetting Pssible t install apps utside Ggle Play Apps are asking t much privileges Apple App Stre Strng identificatin f app develpers Static analysis f binaries Little app permissins shwn t users

24 3. App Islatin Sandbxing Each app runs with a distinct system identity N peratins allwed that wuld impact ther apps Each app is installed in its wn cntainer Malicius app is limited t that cntainer Permissins/entitlements Little cntrl n permissins Permissins are displayed t user at install time Sharing data thrugh external strage Larger cntrl n permissins Very little app permissins shwn t users N SD cards allwed

25 4. Mbile Device Management Mbile Device Management 1. Remte wiping 2. Plicy enfrcement Ggle Apps Device Plicy (full MDM) FindMyPhne (remte wipe + find lst device)

26 references 1. Peter Teufl, Thmas Zefferer, Christf Strmberger - "Mbile Device Encryptin Systems" - 28th IFIP TC-11 SEC 2013 Internatinal Infrmatin Security and Privacy Cnference 2. Andrid vs. Apple ios Security Shwdwn Tm Estn 3. ios Security, May Apple ios 4 Security Evaluatin Din A. Dai Zvi 5. Lst iphne? Lst Passwrds! Practical Cnsideratin f ios Device Encryptin Security Jens Heider, Matthias Bll 6. Ggle Andrid: A Cmprehensive Security Assessment - Shabtai, A., Fledel, Y., Kannv, U., Elvici, Y., Dlev, S., Glezer, C.

Developing secure applications for Windows Phone. SecureApps user group meeting 12/11/2014

Developing secure applications for Windows Phone. SecureApps user group meeting 12/11/2014 Develping secure applicatins fr Windws Phne SecureApps user grup meeting 12/11/2014 2 Overview Intrductin Windws n mbile devices Windws (Phne) 8.1 architecture Silverlight-based vs. WinRT-based apps WP

More information

www.novell.com/documentation System Security ZENworks Mobile Management 2.6.x November 2012

www.novell.com/documentation System Security ZENworks Mobile Management 2.6.x November 2012 www.nvell.cm/dcumentatin System Security ZENwrks Mbile Management 2.6.x Nvember 2012 Legal Ntices Nvell, Inc., makes n representatins r warranties with respect t the cntents r use f this dcumentatin, and

More information

Flash Padlock. Self-Secured and Host-Independent USB Flash Drive White Paper. April 2007 Prepared by ClevX, LLC for Corsair Memory

Flash Padlock. Self-Secured and Host-Independent USB Flash Drive White Paper. April 2007 Prepared by ClevX, LLC for Corsair Memory Flash Padlck - White Paper Flash Padlck Self-Secured and Hst-Independent USB Flash Drive White Paper April 2007 Prepared by ClevX, LLC fr Crsair Memry 1 INTRODUCTION Millins f USB Flash Drives (UFDs) are

More information

Securely Managing Cryptographic Keys used within a Cloud Environment

Securely Managing Cryptographic Keys used within a Cloud Environment Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta sarbari@electrsft-inc.cm 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin

More information

Mobile Deployment Guide For Apple ios

Mobile Deployment Guide For Apple ios Fr Apple ios Cpyright This dcument is prtected by the United States cpyright laws, and is prprietary t Zscaler Inc. Cpying, reprducing, integrating, translating, mdifying, enhancing, recrding by any infrmatin

More information

www.novell.com/documentation System Security ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation System Security ZENworks Mobile Management 2.7.x August 2013 www.nvell.cm/dcumentatin System Security ZENwrks Mbile Management 2.7.x August 2013 Legal Ntices Nvell, Inc., makes n representatins r warranties with respect t the cntents r use f this dcumentatin, and

More information

The Secret Life of Data: Protecting Sensitive Information, Mobile to Cloud

The Secret Life of Data: Protecting Sensitive Information, Mobile to Cloud SESSION ID: CDS-R02 The Secret Life f Data: Prtecting Sensitive Infrmatin, Mbile t Clud Dan Griffin President JW Secure, Inc. @JWSdan WWNSAD? Intelligence agencies have been public abut: Inevitability

More information

Cloud Services MDM. Windows 8 User Guide

Cloud Services MDM. Windows 8 User Guide Clud Services MDM Windws 8 User Guide 10/24/2014 CONTENTS Overview... 2 Supprted Devices... 2 System Capabilities... 2 Enrllment and Activatin... 3 Prcess Overview... 3 Verify Prerequisites... 3 Dwnlad

More information

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm,

More information

Integrating With incontact dbprovider & Screen Pops

Integrating With incontact dbprovider & Screen Pops Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint

More information

iphone Mobile Application Guide Version 2.2.2

iphone Mobile Application Guide Version 2.2.2 iphne Mbile Applicatin Guide Versin 2.2.2 March 26, 2014 Fr the latest update, please visit ur website: www.frte.net/mbile Frte Payment Systems, Inc. 500 West Bethany, Suite 200 Allen, Texas 75013 (800)

More information

BYOD and Cloud Computing

BYOD and Cloud Computing BYOD and Clud Cmputing AIIM First Canadian Chapter May 22, 2014 Susan Nickle, Lndn Health Sciences Centre Chuck Rthman, Wrtzmans Sheila Taylr, Erg Infrmatin Management Cnsulting Clud cmputing Agenda What

More information

How To Write A Byod

How To Write A Byod Limitatins f the Walled Garden This is the secnd part in a series designed t help rganizatins develp their BYOD (bring-yur-wn-device) strategies fr persnally-wned smartphnes and tablets in the enterprise.

More information

Managing Access and Help Protect Corporate Email Data on Mobile Devices with Enterprise Mobile Suite

Managing Access and Help Protect Corporate Email Data on Mobile Devices with Enterprise Mobile Suite Managing Access and Help Prtect Crprate Email Data n Mbile Devices with Enterprise Mbile Suite Last updated: 7/15/15 Balancing prductivity and security Emplyees want t be able t use their wn devices t

More information

Addressing Mobile Device Security and Management Requirements in the Enterprise

Addressing Mobile Device Security and Management Requirements in the Enterprise White Paper Addressing Mbile Device Security and Management Requirements in the Enterprise By Jn Oltsik Octber, 2010 This ESG White Paper was cmmissined by Juniper Netwrks and is distributed under license

More information

WatchDox Server Administrator's Guide

WatchDox Server Administrator's Guide WatchDx Server Administratr's Guide Versin 4.0.0 Cnfidentiality This dcument cntains cnfidential material that is prprietary WatchDx. The infrmatin and ideas herein may nt be disclsed t any unauthrized

More information

Data Protection Policy & Procedure

Data Protection Policy & Procedure Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015

More information

RSA SecurID Software Token Security Best Practices Guide. Version 3

RSA SecurID Software Token Security Best Practices Guide. Version 3 RSA SecurID Sftware Tken Security Best Practices Guide Versin 3 Cntact Infrmatin G t the RSA crprate web site fr reginal Custmer Supprt telephne and fax numbers: www.rsa.cm. Trademarks RSA, the RSA Lg

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

MaaS360 for Mobile Devices

MaaS360 for Mobile Devices MaaS360.cm MaaS360 fr Mbile Devices Getting the Mst Guide MaaS360.cm Cpyright 2013 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The

More information

WatchDox Server. Administrator's Guide. Version 3.8.5

WatchDox Server. Administrator's Guide. Version 3.8.5 WatchDx Server Administratr's Guide Versin 3.8.5 Cnfidentiality This dcument cntains cnfidential material that is prprietary WatchDx. The infrmatin and ideas herein may nt be disclsed t any unauthrized

More information

Ensuring end-to-end protection of video integrity

Ensuring end-to-end protection of video integrity White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring

More information

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS Best practices IT security refers t the bdy f techniques and best practices t prtect yur cmputers and yur interests in the use f IT services, such as nline

More information

CryptoMate64. USB Cryptographic Token. Technical Specifications V1.03. Subject to change without prior notice. info@acs.com.hk www.acs.com.

CryptoMate64. USB Cryptographic Token. Technical Specifications V1.03. Subject to change without prior notice. info@acs.com.hk www.acs.com. CryptMate64 USB Cryptgraphic Tken Technical Specificatins V1.03 Subject t change withut prir ntice inf@acs.cm.hk www.acs.cm.hk Table f Cntents 1.0. Intrductin... 3 2.0. Features... 4 2.1. Cryptgraphic

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

Zimbra Professional Services Portfolio, Purchasing Guide & Price List

Zimbra Professional Services Portfolio, Purchasing Guide & Price List In- Tuitin Netwrks Ltd Zimbra Prfessinal Services Prtfli, Purchasing Guide & Price List This dcument prvides an verview f In- Tuitin Netwrks Limited s range f Zimbra Prfessinal Services available n the

More information

CareLink Connectivity Options Introduction and Comparison Updated June 2013

CareLink Connectivity Options Introduction and Comparison Updated June 2013 CareLink Cnnectivity Optins Intrductin and Cmparisn Updated June 2013 There are fur cnnectivity ptins available fr CareLink, each f which has certain advantages and disadvantages. It is imprtant t think

More information

1)What hardware is available for installing/configuring MOSS 2010?

1)What hardware is available for installing/configuring MOSS 2010? 1)What hardware is available fr installing/cnfiguring MOSS 2010? 2 Web Frnt End Servers HP Prliant DL 380 G7 2 quad cre Intel Xen Prcessr E5620, 2.4 Ghz, Memry 12 GB, 2 HP 146 GB drives RAID 5 2 Applicatin

More information

Why Can t Johnny Encrypt? A Usability Evaluation of PGP 5.0 Alma Whitten and J.D. Tygar

Why Can t Johnny Encrypt? A Usability Evaluation of PGP 5.0 Alma Whitten and J.D. Tygar Class Ntes: February 2, 2006 Tpic: User Testing II Lecturer: Jeremy Hyland Scribe: Rachel Shipman Why Can t Jhnny Encrypt? A Usability Evaluatin f PGP 5.0 Alma Whitten and J.D. Tygar This article has three

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

Evaluation Report. 29 May 2013. Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com

Evaluation Report. 29 May 2013. Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com Plycm RealPresence Access Directr 29 May 2013 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.cm Table f Cntents Executive Summary... 1 System Cmpnents... 3

More information

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8

McAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8 McAfee Enterprise Security Manager Data Surce Cnfiguratin Guide Data Surce: Infblx NIOS September 2, 2014 Infblx NIOS Page 1 f 8 Imprtant Nte: The infrmatin cntained in this dcument is cnfidential and

More information

Attunity RepliWeb SSL Guide

Attunity RepliWeb SSL Guide Attunity RepliWeb SSL Guide Sftware Versin 5.2 June 25, 2012 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm, Supprt: http://supprt.repliweb.cm

More information

Treasury Gateway Getting Started Guide

Treasury Gateway Getting Started Guide Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

NEC CLOUD STORAGE. User Guide. Version: R03.1

NEC CLOUD STORAGE. User Guide. Version: R03.1 NEC CLOUD STORAGE User Guide Versin: R03.1 2013 1 INTRODUCTION... 5 1.1 GOALS OF THIS DOCUMENT... 5 1.2 TERMS, ACRONYMS AND ABBREVIATIONS... 5 2 INTRODUCTION TO NEC CLOUD STORAGE... 6 2.1 WHAT IS NEEDED

More information

Configuring SSL and TLS Decryption in ngeniusone

Configuring SSL and TLS Decryption in ngeniusone Cnfiguring SSL and TLS Decryptin in ngeniusone The cnfigure SSL Decryptin feature supprts real-time capture f ASI and ASR traffic flws as well as decding f Secure Scket Link (SSL) and Transprt Layer Security

More information

EA-POL-015 Enterprise Architecture - Encryption Policy

EA-POL-015 Enterprise Architecture - Encryption Policy Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:

More information

5.2.1 Passwords. Information Technology Policy. Policy. Purpose. Policy Statement. Applicability of this Policy

5.2.1 Passwords. Information Technology Policy. Policy. Purpose. Policy Statement. Applicability of this Policy Infrmatin Technlgy Plicy 5.2.1 Passwrds Plicy Area: 5.2 Security Title: 5.2.1 Passwrds Issued by: Assistant Vice-President/CIO, ITS Date Issued: 2006 July 24 Last Revisin Date: 2011 Octber 19 Apprved by:

More information

Deployment Overview (Installation):

Deployment Overview (Installation): Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int

More information

FO and OTHER FOES - A Guide to Cmmerce

FO and OTHER FOES - A Guide to Cmmerce FO FED DEATED IDENTITY ELEASE NOTES ELEASE 3.2 April 18, 2012 FO FEDEATED IDENTITY ELEASE NOTES Cpyright Infrmatin The infrmatin cntained herein is the cnfidential and prprietary prperty f IP Cmmerce,

More information

Restricted Document. Pulsant Technical Specification

Restricted Document. Pulsant Technical Specification Pulsant Technical Specificatin Title Pulsant Dedicated Server Department Prduct Develpment Cntributrs RR Classificatin Restricted Versin 1.0 Overview Pulsant ffer a Dedicated Server service t underpin

More information

Comtrex Systems Corporation. CISP/PCI Implementation Guidance for Odyssey Suite

Comtrex Systems Corporation. CISP/PCI Implementation Guidance for Odyssey Suite CISP/PCI Implementatin Guidance fr Odyssey Suite Applicable Applicatin Versin This dcument supprts the fllwing applicatin versin: Odyssey Suite Versin 2.0 Intrductin Systems which prcess payment transactins

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Ten Steps for an Easy Install of the eg Enterprise Suite

Ten Steps for an Easy Install of the eg Enterprise Suite Ten Steps fr an Easy Install f the eg Enterprise Suite (Acquire, Evaluate, and be mre Efficient!) Step 1: Dwnlad the eg Sftware; verify hardware and perating system pre-requisites Step 2: Obtain a valid

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

This guide is intended for administrators, who want to install, configure, and manage SAP Lumira, server for BI Platform

This guide is intended for administrators, who want to install, configure, and manage SAP Lumira, server for BI Platform Hw T install SAP Lumira, server n SAP BusinessObjects BI platfrm Distributed Install Applies t: SAP Lumira, server versin fr the SAP BusinessObjects BI platfrm Summary This guide is intended fr administratrs,

More information

A. Early Case Assessment

A. Early Case Assessment Electrnic Discvery Reference Mdel Standards fr the identificatin f electrnically stred infrmatin in discvery http://www.edrm.net/resurces/standards/identificatin A. Early Case Assessment Once a triggering

More information

Using PayPal Website Payments Pro UK with ProductCart

Using PayPal Website Payments Pro UK with ProductCart Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...

More information

Online Network Administration Degree Programs

Online Network Administration Degree Programs Online Schls, Degrees & Prgrams Blg Abut Archives Cntact Online Netwrk Administratin Degree Prgrams A Netwrk Administratr is smene respnsible fr the maintenance and perfrmance f cmputer hardware and sftware

More information

Firewall Protection Profile

Firewall Protection Profile samhällsskydd ch beredskap 1 (10) ROS-ISÄK Rnny Janse 010-2404426 rnny.janse@msb.se Firewall Prtectin Prfile Extended Package: NAT samhällsskydd ch beredskap 2 (10) Innehållsförteckning 1. Intrductin...

More information

Tips & Tricks. Table of Contents. Browser Update - WebEx Plugin. Updated Global Access Numbers

Tips & Tricks. Table of Contents. Browser Update - WebEx Plugin. Updated Global Access Numbers Tips & Tricks Table f Cntents Brwser Update - WebEx Plugin... 1 Updated Glbal Access Numbers... 1 WebEx Prfile Settings (Time zne, Email )... 2 Hsting a successful WebEx call with Vide... 2 Using the WebEx

More information

Telelink 6. Installation Manual

Telelink 6. Installation Manual Telelink 6 Installatin Manual Table f cntents 1. SYSTEM REQUIREMENTS... 3 1.1. Hardware Requirements... 3 1.2. Sftware Requirements... 3 1.2.1. Platfrm... 3 1.2.1.1. Supprted Operating Systems... 3 1.2.1.2.

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

Magenta HR in partnership with breath ehr

Magenta HR in partnership with breath ehr BREATHEHR ONLINE HR SYSTEM AND PORTAL Magenta HR in partnership with breath ehr Magenta HR Cnsulting Ltd. 24 Canning Street, Edinburgh EH3 8EG Tel. 0131 2272769 www.magentahr.cm inf@magentahr.cm 6 December

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

Getting started with Android

Getting started with Android Getting started with Andrid Befre we begin, there is a prerequisite, which is t plug the Andrid device int yur cmputer, and lad the drivers fr the OS. In writing this article, I was using Windws XP, 7

More information

CSC IT practix Recommendations

CSC IT practix Recommendations CSC IT practix Recmmendatins CSC Healthcare 28th January 2014 Versin 3 www.csc.cm/glbalhealthcare Cntents 1 Imprtant infrmatin 3 2 IT Specificatins 4 2.1 Wrkstatins... 4 2.2 Minimum Server with 1-5 wrkstatins

More information

X7500 Series, X4500 Scanner Series MFPs: LDAP Address Book and Authentication Configuration and Basic Troubleshooting Tips

X7500 Series, X4500 Scanner Series MFPs: LDAP Address Book and Authentication Configuration and Basic Troubleshooting Tips X7500 Series, X4500 Scanner Series MFPs: LDAP Address Bk and Authenticatin Cnfiguratin and Basic Trubleshting Tips Lexmark Internatinal 1 Prerequisite Infrm atin In rder t cnfigure a Lexmark MFP fr LDAP

More information

2. When logging is used, which severity level indicates that a device is unusable?

2. When logging is used, which severity level indicates that a device is unusable? Last updated by Admin at March 3, 2015. 1. What are the mst cmmn syslg messages? thse that ccur when a packet matches a parameter cnditin in an access cntrl list link up and link dwn messages utput messages

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U

More information

Instant Chime for IBM Sametime Quick Start Guide

Instant Chime for IBM Sametime Quick Start Guide Instant Chime fr IBM Sametime Quick Start Guide Fall 2014 Cpyright 2014 Instant Technlgies. All rights reserved. Cpyright and Disclaimer This dcument, as well as the sftware described in it, is furnished

More information

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents

More information

RSA Authentication Manager 5.2 and 6.1 Security Best Practices Guide. Version5

RSA Authentication Manager 5.2 and 6.1 Security Best Practices Guide. Version5 RSA Authenticatin Manager 5.2 and 6.1 Security Best Practices Guide Versin5 Cntact Infrmatin G t the RSA crprate web site fr reginal Custmer Supprt telephne and fax numbers: www.rsa.cm. Trademarks RSA,

More information

Application Note: 202

Application Note: 202 Applicatin Nte: 202 MDK-ARM Cmpiler Optimizatins Getting the Best Optimized Cde fr yur Embedded Applicatin Abstract This dcument examines the ARM Cmpilatin Tls, as used inside the Keil MDK-ARM (Micrcntrller

More information

Junos Pulse Instructions for Windows and Mac OS X

Junos Pulse Instructions for Windows and Mac OS X Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.

More information

White Paper. SharePoint and the Consumerization of IT: Considerations for BYOD Success. Authors: Aseem Pandit and Prateek Bhargava

White Paper. SharePoint and the Consumerization of IT: Considerations for BYOD Success. Authors: Aseem Pandit and Prateek Bhargava White Paper SharePint and the Cnsumerizatin f IT: Cnsideratins fr BYOD Success Authrs: Aseem Pandit and Prateek Bhargava The Evlutin f IT Cnsumerizatin & BYOD BYOD refers t the plicy f permitting emplyees

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

Aladdin HASP SRM Key Problem Resolution

Aladdin HASP SRM Key Problem Resolution Aladdin HASP SRM Key Prblem Reslutin Installatin flwchart fr EmbrideryStudi and DecStudi e1.5 Discnnect frm the Internet and disable all anti-virus and firewall applicatins. Unplug all dngles. Insert nly

More information

For students to participate in BYOD please follow these two steps

For students to participate in BYOD please follow these two steps www.readingtn.k12.nj.us September 15, 2015 Dear Readingtn Middle Schl Families, We are excited t annunce that we are cntinuing with Bring Yur Own Device fr all middle schl students! We recgnize that many

More information

Bitrix Intranet. Product Requirements

Bitrix Intranet. Product Requirements Bitrix Intranet Prduct Requirements Bitrix Intranet: Prduct Requirements Bitrix Intranet is a highly secure, turnkey intranet slutin fr small and medium-sized businesses designed fr effective cllabratin,

More information

Valley Transcription Service I-Phone/I-Pod App User s Guide

Valley Transcription Service I-Phone/I-Pod App User s Guide 541-926-4194 Valley Transcriptin Service I-Phne/I-Pd App User s Guide (Fr use with iphne/ipad/i-pd Tuch) Page 0 Table f Cntents Table f Cntents... i Intrductin... 1 Requirements... 1 1. 2. 3. Installing

More information

Port Manager. Microsoft Dynamics CRM for Ports

Port Manager. Microsoft Dynamics CRM for Ports Prt Manager Micrsft Dynamics CRM fr Prts February 2015 Overview Celedn Partners Prt Manager encapsulates the functinality f many prt related prcesses int an easy t learn and easy t use tl. The slutin leverages

More information

Parallels Operations Automation 5.0: What s New

Parallels Operations Automation 5.0: What s New Prduct Update Parallels Operatins Autmatin 5.0: What s New Revisin 1.0 July 2010 Intrductin Parallels Operatins Autmatin is an peratins supprt system designed fr the unique needs f clud services prviders.

More information

PRIVACY ABOVE ALL W H I T E P A P E R

PRIVACY ABOVE ALL W H I T E P A P E R PRIVACY ABOVE ALL W H I T E P A P E R This dcument shall nt be cpied, reprduced r disclsed, in part r in full, withut the prir and express written cnsent f Sikur. SIKUR. Privacy abve all. The prduct Sikur

More information

Level 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents

Level 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents Level 1 Technical RealPresence Web Suite and Web Suite Pr Cntents 1 - Glssary... 2 2 Features... 3 RealPresence Platfrm integratin... 3 RealPresence Web Suite Sftware... 3 Sftware Keys... 3 3 - Web Client

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

Configuring and Monitoring Network Elements

Configuring and Monitoring Network Elements Cnfiguring and Mnitring Netwrk Elements eg Enterprise v5.6 Restricted Rights Legend The infrmatin cntained in this dcument is cnfidential and subject t change withut ntice. N part f this dcument may be

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

Configuring and Monitoring AS400 Servers. eg Enterprise v5.6

Configuring and Monitoring AS400 Servers. eg Enterprise v5.6 Cnfiguring and Mnitring AS400 Servers eg Enterprise v5.6 Restricted Rights Legend The infrmatin cntained in this dcument is cnfidential and subject t change withut ntice. N part f this dcument may be reprduced

More information

BackupAssist SQL Add-on

BackupAssist SQL Add-on WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system

More information

Strategies for Embracing Consumerization

Strategies for Embracing Consumerization Strategies fr Embracing Cnsumerizatin Micrsft Crpratin Published: April 2011 Abstract Increasingly, wrkers want t use their wn devices, such as slates, smartphnes, and prtable cmputers, fr wrk. Fr IT t

More information

Connecting to Email: Live@edu

Connecting to Email: Live@edu Cnnecting t Email: Live@edu Minimum Requirements fr Yur Cmputer We strngly recmmend yu upgrade t Office 2010 (Service Pack 1) befre the upgrade. This versin is knwn t prvide a better service and t eliminate

More information

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall Implementing iflder Server in the DMZ with iflder Data inside the Firewall Nvell Cl Slutins AppNte www.nvell.cm/clslutins JULY 2004 OBJECTIVES The bjectives f this dcumentatin are as fllws: T cnfigure

More information

Solution Brief. Aerohive and Impulse. Powerful Network Security for Education and Enterprise

Solution Brief. Aerohive and Impulse. Powerful Network Security for Education and Enterprise Slutin Brief Aerhive and Impulse Pwerful Netwrk Security fr Educatin and Enterprise Aerhive and Impulse Intrductin In tday s highly cnnected rganizatins, end users expect secure Wi-Fi access acrss the

More information

Mobile Workforce. Improving Productivity, Improving Profitability

Mobile Workforce. Improving Productivity, Improving Profitability Mbile Wrkfrce Imprving Prductivity, Imprving Prfitability White Paper The Business Challenge Between increasing peratinal cst, staff turnver, budget cnstraints and pressure t deliver prducts and services

More information

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)

Firewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers) Firewall/Prxy Server Settings t Access Hsted Envirnment Client firewall settings in mst cases depend n whether the firewall slutin uses a Stateful Inspectin prcess r ne that is cmmnly referred t as an

More information

FOTO Patient Inquiry Practice Administrator Training Guide Version 021414

FOTO Patient Inquiry Practice Administrator Training Guide Version 021414 FOTO Patient Inquiry Practice Administratr Training Guide Versin 021414 P.O. Bx 11444 Knxville, TN 37939 800-482-3686 www.ftinc.cm Table f Cntents Table f Cntents... 1 Input Cmpany Details... 3 Cmpany

More information

Using McAllister Payment Solutions and Updating to AVImark version 2009.0.0.7263

Using McAllister Payment Solutions and Updating to AVImark version 2009.0.0.7263 Using McAllister Payment Slutins and Updating t AVImark versin 2009.0.0.7263 Befre the cnfiguratin f McAllister Payment Slutins (MPS) and AVImark, the McAllister Payment Slutins PA-DSS Implementatin Guide

More information

Fermilab Time & Labor Desktop Computer Requirements

Fermilab Time & Labor Desktop Computer Requirements Fermilab Time & Labr Desktp Cmputer Requirements Fermilab s new electrnic time and labr reprting (FTL) system utilizes the Wrkfrce Central prduct frm Krns. This system is accessed using a web brwser utilizing

More information

Sault Ste. Marie Public Library. Request for Proposal. Website Redesign. 50 East Street Sault Ste. Marie, ON P6A 3C3

Sault Ste. Marie Public Library. Request for Proposal. Website Redesign. 50 East Street Sault Ste. Marie, ON P6A 3C3 Sault Ste. Marie Public Library Request fr Prpsal Website Redesign 50 East Street Sault Ste. Marie, ON P6A 3C3 SSMPL Website Redesign RFQ Intrductin The Sault Ste. Marie Public Library (SSMPL) has initiated

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

Click Studios. Passwordstate. RSA SecurID Configuration

Click Studios. Passwordstate. RSA SecurID Configuration Passwrdstate RSA SecurID Cnfiguratin This dcument and the infrmatin cntrlled therein is the prperty f Click Studis. It must nt be reprduced in whle/part, r therwise disclsed, withut prir cnsent in writing

More information

NC3A SOA Techwatch Day Call for Presentations

NC3A SOA Techwatch Day Call for Presentations NC3A SOA Techwatch Day Call fr Presentatins 1 February 2012 Hsted at NATO C3 Agency, The Hague, The Netherlands By NC3A Chief Technlgy Office (CTO) David Burtn Chief Technlgy fficer Versin 1, 1 December

More information

BASIC TECHNICAL FEATURE DESCRIPTION

BASIC TECHNICAL FEATURE DESCRIPTION BASIC TECHNICAL FEATURE DESCRIPTION AUDRIGA EMAIL AND GROUPWARE MIGRATION SERVICE Versin 1.3 Datum 20.09.2013 Kntakt Hans-Jörg Happel (happel@audriga.cm) TECHNICAL FEATURE DESCRIPTION This is a basic technical

More information

Exchanging Files Securely with Gerstco Using gpg4win Public Key Encryption

Exchanging Files Securely with Gerstco Using gpg4win Public Key Encryption Exchanging Files Securely with Gerstc Using gpg4win Public Key Encryptin Overview Visit the fllwing page n Gerstc s website t watch a vide verview f Public Key Encryptin: www.gerstc.cm/???? Initial Setup

More information

Cloud Services MDM. Device Management Admin Guide

Cloud Services MDM. Device Management Admin Guide Clud Services MDM Device Management Admin Guide 10/27/2014 CONTENTS Device Management... 2 Overview... 2 Dashbard Navigatin... 2 Dynamic Device List... 5 Device Cntrl Panel... 7 Device Infrmatin Menu...

More information

Sony Xperia Configurator User Instructions

Sony Xperia Configurator User Instructions Sny Xperia Cnfiguratr User Instructins This dcument is published by: Sny Mbile Cmmunicatins Inc., 1-8-15 Knan, Minat-ku, Tky 108-0075, Japan www.snymbile.cm Sny Mbile Cmmunicatins Inc., 2009-2014. All

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information