WHITE PAPER SPON. Protecting Mobile Devices from Malware Attack. Published March An Osterman Research White Paper. sponsored by.
|
|
- Sharyl Robinson
- 8 years ago
- Views:
Transcription
1 WHITE PAPER N Prtecting Mbile Devices frm An Osterman Research White Paper Published March 2015 spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn USA Tel: Fax: inf@stermanresearch.cm twitter.cm/msterman
2 Prtecting Mbile Devices frm EXECUTIVE SUMMARY An emplyee is traveling n cmpany business and needs t access crprate frm her laptp thrugh a Wi-Fi access pint in a Starbucks between meetings. A develper wrking frm hme needs t uplad cde t a crprate develpment system. An engineer wrking frm a custmer site needs t initiate a Skype call with managers at anther cmpany lcatin. All f these scenaris are increasingly cmmn and represent a significant risk f malware incursin because sensitive and/r cnfidential infrmatin is being accessed frm the Internet r anther netwrk nt under the direct cntrl f the crprate IT department. Even a single incursin f malware r a single data breach can have disastrus cnsequences and can cst an rganizatin millins f dllars in remediatin csts, damage t their crprate reputatin, and ther prblems. T mitigate sme f the risks f malware incursin and data breaches that can result frm accessing a crprate netwrk using the Web and Web-enabled tls, lcally deplyed anti-malware sftware can be deplyed n each laptp. Hwever, by far the best apprach is t rerute Web traffic thrugh a prxy r Web gateway. While there are several appraches that can be used t d s use f a virtual private netwrk, use f a clud-based prxy, r use f a prxy aut-cnfiguratin file the best apprach is t use a client prxy agent. KEY TAKEAWAYS The advantages f using a client prxy agent include: It is lcatin-aware and will activate autmatically nce the user leaves the cnfines f the crprate firewall. It cannt be evaded by nn-brwser applicatins like Skype, nr can it be disabled by end users thrugh switching t anther brwser r changing their brwser settings. It wrks with any Web brwser and requires n brwser settings in rder t wrk. It prvides significant flexibility by lcating the nearest prxy r the prxy that ffers the lwest latency. It autmatically manages authenticatin. ABOUT THIS WHITE PAPER This white paper was spnsred by McAfee/Intel Security; infrmatin abut the cmpany and its fferings is prvided at the end f this paper. THE GROWING USE OF MOBILE DEVICES GREATER EMPHASIS ON EMPLOYEE MOBILITY Enabled by pwerful laptps and ther mbile devices, reliable and widely available bradband services, and a grwing number f clud-based services, the wrkfrce is becming mre mbile. Fr example, the United States Census Bureau fund that US-based emplyees wh telewrk increased t 4.4% f ttal emplyees in 2012, up frm 2.3% in 1980 i. Hwever, there are tens f millins mre infrmatin wrkers wh wrk frm hme albeit nt fficially as telewrkers t check their wrk r t perfrm ther wrk-related tasks after hurs, n weekends, and when n vacatin. Mrever, use f cntractrs and temprary staff is increasing at a significant rate, many f whm are cntract infrmatin wrkers wh wrk frm hme, custmer sites and the like. Fr example, ne surce fund that 42% f 2015 Osterman Research, Inc. 1
3 Prtecting Mbile Devices frm emplyers intended t hire cntractrs r ther temprary wrkers fr staffing purpses during 2014 ii, a 14% increase frm 2009 t The implicatins f mbility n the cmputing landscape are prfund in tw imprtant ways: Laptps have eclipsed desktp cmputers as the primary cmputing platfrm. Fr example, the laptp/desktp split in 2010 was 56%/44%, grew in favr f laptps t 59%/41% in 2014, and will increase t 61%/39% by 2017 iii. Remte wrkers are mre apt t use unauthrized clud-based apps and ther tls because they are nt under the direct cntrl r supervisin f their IT department. While these tls are generally helpful fr individual emplyees, they represent increased risk by pening anther unmanaged pint thrugh which malware can enter a crprate netwrk r frm which data can be exfiltrated. While a mbile device is ften cnsidered t be a smartphne r tablet, a 2014 Osterman Research survey fund that the majrity f mbile devices emplyed as the primary cmputing device by emplyees is a laptp cmputer, as shwn in Figure 1. Figure 1 Primary Mbile Cmputing Platfrm in Use Surce: Osterman Research, Inc. MOBILE PLATFORMS CONNECT TO CRITICAL SYSTEMS Laptps and ther mbile platfrms are used increasingly t cnnect t critical cludand SaaS-based systems. Fr example, as shwn in Figure 2, the grwth f Office 365 amng rganizatins that are at least cnsidering deplying the platfrm is expected t mre than duble by early Osterman Research, Inc. 2
4 Prtecting Mbile Devices frm Figure 2 Penetratin f Varius Business-Grade Systems, Surce: Osterman Research, Inc. Mrever, mbile platfrms are cmmnly used t access a wide range f ther clud-based systems, including: File sync and share tls like Drpbx, Micrsft OneDrive, Bx, Ggle Drive, Apple iclud and many thers that allw synchrnizatin f user files acrss many platfrms, including in the clud. Custmer Relatinship Management (CRM) systems, which increasingly are clud-based, nt n-premises. Fr example, Gartner fund that 41% f CRM systems in 2013 were SaaS-based iv and this share cntinues t grw. Enterprise Resurce Planning (ERP) systems, which are primarily n-premises tday, but will increasingly be clud-based. Desktp prductivity applicatins are increasingly being delivered using cludbased capabilities, including thse frm Micrsft, Ggle, Amazn, Apple and thers. Wrkgrup cllabratin tls like SharePint and its grwing array f cmpetitrs like Evernte and Basecamp. Web cnferencing and nline meeting tls, such as WebEx and Citrix GTMeeting. Scial media tls, including bth cnsumer-fcused tls and true enterprisegrade alternatives. Nn- cmmunicatin tls like Skype and instant messaging systems. Clud-based file transfer tls are ften used t circumvent IT limits n the size f messages that can be sent r received thrugh the crprate system. While IT des this t maintain acceptable levels f server perfrmance, it can prevent users frm sending large files as part f their wrk, 2015 Osterman Research, Inc. 3
5 Prtecting Mbile Devices frm and s users will deply their wn tls t bypass crprate gvernance activities. Users are heavily influencing the tls that are used in the enterprise. While emplyees must still meet the security and infrmatin gvernance requirements that IT is bligated t impse, they will be much mre satisfied, and in turn mre prductive at their wrk, when they have at least sme invlvement in the types f tls and applicatins that shuld be used. GREATER MOBILITY = INCREASED RISK Greater mbility results in increased prductivity because it allws users t have access t all f their cmputing resurces, files and ther cntent regardless f their lcatin. This makes them mre prductive because they can wrk frm anywhere enabling wrk-at-hme and ther telewrk prgrams and it makes it easier fr emplyees t wrk after hurs withut the need t g back t the ffice t access , files r ther resurces. Hwever, greater mbility substantially increases the risk f malware incursin, data breaches and ther serius prblems because increased mbility means that mre laptps and ther devices are used utside f the crprate firewall. This als means that there is less direct IT cntrl ver the platfrms that are cnnecting t critical crprate systems like , SharePint, CRM systems, etc., and less IT cntrl ver what gets installed n mbile devices and the sites that they access. Mrever, there is less IT cntrl ver hw users access critical systems a traveling emplyee may access his r her crprate frm the unprtected Wi-Fi netwrk at an airprt r a cffee shp, fr example. The bttm line f greater mbility is this: there is greater risk f malware incursin fr the mbile devices themselves and in the crprate netwrk, a greater likelihd f emplyees accessing inapprpriate Web sites r clud-based tls, and a greater risk f data breaches. OPTIONS FOR MOBILE USERS OPTIONS FOR PROTECTING MOBILE USERS FROM MALWARE There are three basic ptins that IT decisin makers have with regard t prtecting mbile users frm malware incursins frm varius surces: D nthing Sme decisin makers will pt t d nthing with regard t slving the ptential incursin f malware thrugh unmanaged and unprtected mbile devices. While this is the easiest and, initially, the least expensive ptin, the benefits will quickly disappear with the first malware infiltratin, r wrse, the first data exfiltratin. Use security installed n lcal devices A better ptin than ding nthing is t install anti-malware sftware n mbile devices in rder t scan Web cntent fr malicius cntent. Hwever, while gd anti-malware capabilities will catch sme f this cntent, much f it will still get thrugh because f a) the inherent limitatins in signature-based slutins that are unable t detect zer-day and ther threats fr which n signature is available, and b) the fact that at least 390,000 new malicius prgrams are detected n a typical day v, and there is simply n way that lcally installed antimalware slutins can keep up with this level f malicius activity. Rerute all Web traffic thrugh a prxy/web gateway The best ptin t prtect mbile users frm malware is t rerute all Web traffic thrugh a prxy/web gateway that will scan all traffic, filter ut blacklisted r unsuitable sites (prn sites, gambling sites, etc.) befre users can access their cntent, and filter ut malware that wuld therwise infiltrate users mbile 2015 Osterman Research, Inc. 4
6 Prtecting Mbile Devices frm devices. The primary advantages f reruting all Web traffic thrugh a prxy/web gateway cmpared t lcally deplyed anti-malware slutins is their much higher detectin rate fr malware, their ability t use real time blacklists, and their use f a real-time threat intelligence capability that lcally deplyed slutins cannt ffer. FOUR METHODS FOR REROUTING TRAFFIC There are fur primary methds fr reruting traffic that can be used t prtect remte r mbile users Web experience: Cnnect using a VPN A mre traditinal methd fr reruting Web traffic is the use f a virtual private netwrk (VPN) that will emply encryptin and varius security capabilities t ensure that access t a private netwrk frm a public ne is limited nly t authrized users. The advantages f using a VPN are that they are based n industry-standard sftware fferings, they cntrl all netwrk traffic between the private netwrk and mbile users, traffic cannt evade the VPN nce it has been activated, and it is brwser-independent. The dwnside f the VPN apprach t reruting traffic frm a mbile device is that it requires deplying an agent n each user s laptp, users must manually activate the VPN in rder fr it t be used, and brwser settings must be cnfigured in advance t use the prxy. Other disadvantages f the VPN apprach is that separate authenticatin must be established when users lg int the crprate netwrk, and the backhauling f traffic culd significantly increase bth netwrk traffic and latency. User brwser settings t redirect Web traffic t a clud-based prxy Easily the mst widely adpted ptin is t mdify the brwser settings n the mbile device s that all Web traffic is redirected t a clud-based prxy. This industry-standard apprach is supprted by all majr brwsers and requires n prgramming skills t implement. Hwever, there are a number f disadvantages t this apprach: It requires directly mdifying the brwser settings n each mbile device that will be used t cnnect t the netwrk. The change t the brwser settings is static, and s cannt accmmdate alternative r failver scenaris. Users r applicatins can easily evade these settings, such as using anther brwser that has nt been apprpriately cnfigured, r the prxy settings can be easily edited r remved. The prxy settings are dependent n the particular perating system and brwser in use. Fr example, Internet Explrer and Chrme will enfrce Windws prxy settings, but Firefx will nt. Further, there is nt an easy way t lck settings in OS X. Mdifying prxy settings wrks fr brwser-based traffic (with exceptins), but it des nt manage nn-brwser applicatins like Skype. This apprach requires separate authenticatin t be perfrmed. Use a prxy aut-cnfiguratin (PAC) file A better apprach is t use a PAC file because it is based n industry-standard technlgy and because it prvides flexibility that is nt inherent when mdifying prxy settings, such as in failver situatins. Hwever, the use f a PAC file requires deplyment f the PAC file t each laptp in cnjunctin with updates f brwser settings, it requires sme level f prgramming skill t execute, and it 2015 Osterman Research, Inc. 5
7 Prtecting Mbile Devices frm suffers frm the same perating system and brwser limitatins as the apprach discussed abve. Mrever, if nt lcked dwn, the use f a PAC file can be evaded by using anther brwser, editing r remving the brwser settings, r simply deleting the PAC file itself. Plus, as with the apprach discussed abve, the use f a PAC file will nt manage traffic thrugh nn-brwser applicatins like Skype, and it als requires separate authenticatin. Use a client prxy agent A furth apprach, use f a client prxy agent, ffers the best apprach t reruting Web traffic fr mbile users. There are several advantages f this apprach relative t the thers discussed abve: A client prxy agent is lcatin-aware and s will activate autmatically if the user is utside the crprate firewall. It wrks with any Web brwser and requires n pre-cnfiguratin f the brwser r any specific settings as with ther appraches. Plus, users cannt disable r delete settings t get arund it. It cannt be evaded by nn-brwser applicatins, but will instead rute all traffic. The use f a client prxy agent ffers mre flexibility than ther appraches because it accmmdates failver situatins and pr netwrk quality issues nicely by lcating the nearest prxy r the prxy with the lwest latency. It des nt require any prgramming skills t implement. It autmatically manages authenticatin withut requiring a separate authenticatin capability. While the use f a client prxy agent is the best apprach fr reruting Web traffic, there are sme minr dwnsides t its use, including the fact that this is nt an industry-standard apprach and s is dependent n prprietary prtcls. Mrever, this apprach will nt always supprt nn-pc devices, such as iosbased smartphnes, ipads, r Andrid smartphnes and tablets, a ptentially serius issue fr sme cmpanies whse users rely heavily n these devices fr Web access. RECOMMENDATIONS Osterman Research recmmends that decisin makers cnsider fur key issues t prtect mbile users frm the grwing variety f Web-based threats: Use a client prxy agent Laptp users shuld have their Web traffic reruted using a client prxy agent because this apprach ffers the greatest upside f the varius appraches that can be used, and its dwnsides are generally minimal. Cnsider prtectin fr ios and Andrid devices While the use f a client prxy agent wrks well fr laptps, it des nt generally wrk as well fr ios r Andrid phnes r tablets. Fr users that are reliant upn these devices fr accessing the Web, a different apprach, such as explicit prxy settings, may be required. Cnsult netwrk security prviders Netwrk security prviders shuld be cnsulted t determine which slutins they ffer and what slutins they plan t ffer t prtect their custmers Web users Osterman Research, Inc. 6
8 Prtecting Mbile Devices frm Implement the slutin that delivers maximum prtectin Finally, decisin makers shuld implement the traffic reruting slutin that will deliver the maximum level f prtectin fr mbile users especially laptp users because they represent the largest prprtin f mbile users with the lwest acquisitin and peratinal csts. SUMMARY A grwing prprtin f crprate users are accessing sensitive crprate data assets and systems via the Web and a variety f Web-enabled applicatins frm laptps that are cnnected t public and ther netwrks utside the cntrl f crprate IT departments and utside the crprate firewall. The increasing level f mbility raises crprate risk substantially by making it mre likely that malware will infiltrate the netwrk thrugh these mbile devices, and that sensitive data will be exfiltrated by cybercriminals. T prtect against these threats, decisin makers shuld mandate the use f a client prxy agent fr all laptp users that will rerute Web traffic and scan it fr malware. A client prxy agent ffers a number f imprtant advantages ver ther Web trafficreruting appraches. ABOUT McAFEE/INTEL SECURITY McAfee Web Prtectin can prvide the additinal threat prtectin businesses need t prevent targeted attacks and advanced malware infiltratin: McAfee Client Prxy, which is included at n extra cst with McAfee Web Prtectin, enfrces plicy-based redirectin f all web traffic fr mbile r remte users vi. The cmbinatin f McAfee Glbal Threat Intelligence, which cllects real-time data frm ver 100 millin sensrs acrss file, web, , and netwrk vectrs, and multiple antivirus engines blcks knwn viruses, while the McAfee Gateway Anti-malware engine, with its unique web page emulatin, prevents the vast majrity f zer-day webbrne malware dwnlads vii Integrated reprting expses all web applicatins being accessed by end-users, while included applicatin cntrls prvide IT and security peratins with the tls t restrict access based n numerus criteria, such as User ID, grup, IP address, etc. Built-in DLP technlgy scans all utbund web traffic fr DLP rules vilatins, preventing leakage f sensitive cntent, while integrated file encryptin prtects files upladed t cllabratin sites. Fr the mst advanced web threats, McAfee Advanced Threat Defense integrated with McAfee Web Prtectin can detect stealthy r delayed malware using static and dynamic analysis. Suspicius files fund in web pages are sent t McAfee Advanced Threat Defense and bserved in a sandbx envirnment while simultaneusly disassembled fr thrugh analysis Osterman Research, Inc. 7
9 Prtecting Mbile Devices frm 2015 Osterman Research, Inc. All rights reserved. N part f this dcument may be reprduced in any frm by any means, nr may it be distributed withut the permissin f Osterman Research, Inc., nr may it be resld r distributed by any entity ther than Osterman Research, Inc., withut prir written authrizatin f Osterman Research, Inc. Osterman Research, Inc. des nt prvide legal advice. Nthing in this dcument cnstitutes legal advice, nr shall this dcument r any sftware prduct r ther ffering referenced herein serve as a substitute fr the reader s cmpliance with any laws (including but nt limited t any act, statute, regulatin, rule, directive, administrative rder, executive rder, etc. (cllectively, Laws )) referenced in this dcument. If necessary, the reader shuld cnsult with cmpetent legal cunsel regarding any Laws referenced herein. Osterman Research, Inc. makes n representatin r warranty regarding the cmpleteness r accuracy f the infrmatin cntained in this dcument. THIS DOCUMENT IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL. REFERENCES i ii iii iv v vi vii 961b3f9f350cecfde38d403e04c7a709&cid=WB521&aName=EMWBW&src=web&aType= reprt®in=us 2015 Osterman Research, Inc. 8
The Cost Benefits of the Cloud are More About Real Estate Than IT
y The Cst Benefits f the Clud are Mre Abut Real Estate Than IT #$#%&'()*( An Osterman Research Executive Brief Published December 2010 "#$#%&'()*( Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn
More informationFile Sharing And Swimming Sprawl
WHITE PAPER N The Need fr Enterprise-Grade Synchrnizatin An Osterman Research White Paper Published August 2012 spnsred by spnsred by SPONSORED BY SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black
More informationWHITE PAPER SPON. The Need for Enterprise-Grade File Sharing and Synchronization. Published August 2012 SPONSORED BY. An Osterman Research White Paper
WHITE PAPER N The Need fr Enterprise-Grade Synchrnizatin An Osterman Research White Paper Published August 2012 spnsred by spnsred by SPONSORED BY SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black
More informationMobile Workforce. Improving Productivity, Improving Profitability
Mbile Wrkfrce Imprving Prductivity, Imprving Prfitability White Paper The Business Challenge Between increasing peratinal cst, staff turnver, budget cnstraints and pressure t deliver prducts and services
More informationWHITE PAPER SPON. The Need for Enterprise-Grade File Sync and Share. Published February 2015 SPONSORED BY. An Osterman Research White Paper
WHITE PAPER N The Need fr Enterprise-Grade An Osterman Research White Paper Published February 2015 SPONSORED BY spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn
More informationWHITE PAPER SPON. The Need for Enterprise-Grade File Sharing and Synchronization. Published July 2012 SPONSORED BY. An Osterman Research White Paper
WHITE PAPER N The Need fr Enterprise-Grade Synchrnizatin An Osterman Research White Paper Published July 2012 spnsred by spnsred by SPONSORED BY spnsred by SPON spnsred by spnsred by Osterman Research,
More informationWhite Paper. SharePoint and the Consumerization of IT: Considerations for BYOD Success. Authors: Aseem Pandit and Prateek Bhargava
White Paper SharePint and the Cnsumerizatin f IT: Cnsideratins fr BYOD Success Authrs: Aseem Pandit and Prateek Bhargava The Evlutin f IT Cnsumerizatin & BYOD BYOD refers t the plicy f permitting emplyees
More informationServ-U Distributed Architecture Guide
Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U
More informationLicensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite
Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This
More informationWHITE PAPER SPON. The Critical Need for Enterprise-Grade File Sync and Share Solutions. Published August 2015. An Osterman Research White Paper
WHITE PAPER Grade File Sync and Share An Osterman Research White Paper Published August 2015 spnsred by spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn 98010-1058
More informationWHITE PAPER SPON. Important Issues to Consider Before Migrating to a New Version of Exchange. Published August 2011 SPONSORED BY
WHITE PAPER N Imprtant Issues t Cnsider Befre Migrating t a New Versin f Exchange An Osterman Research White Paper Published August 2011 SPONSORED BY SPON spnsred by spnsred by Osterman Research, Inc.
More informationTable of Contents. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
Table f Cntents Tp Pricing and Licensing Questins... 2 Why shuld custmers be excited abut Micrsft SQL Server 2012?... 2 What are the mst significant changes t the pricing and licensing fr SQL Server?...
More informationCompleting the CMDB Circle: Asset Management with Barcode Scanning
Cmpleting the CMDB Circle: Asset Management with Barcde Scanning WHITE PAPER The Value f Barcding Tday, barcdes are n just abut everything manufactured and are used fr asset tracking and identificatin
More informationLicensing Windows Server 2012 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This
More informationUniversity of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments
University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department
More informationLicensing Windows Server 2012 R2 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents
More informationWhite Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com
White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm 2
More informationIntegrating With incontact dbprovider & Screen Pops
Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint
More informationWHITE PAPER SPON. Archiving 2.0: What Can You Do Next? Published February 2015 SPONSORED BY. An Osterman Research White Paper.
WHITE PAPER N Archiving 2.0: What Can Yu D An Osterman Research White Paper Published February 2015 SPONSORED BY SPON spnsred by spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn
More informationexpertise hp services valupack consulting description security review service for Linux
expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS
More informationJunos Pulse Instructions for Windows and Mac OS X
Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.
More informationLaunchPad is your personal cloud desktop giving access to school from anywhere.
LaunchPad Persnal Clud Desktp Persnal Clud Desktp fr educatin ClassLink LaunchPad is the first K-12 persnal clud desktp that gives teachers and students access t all their applicatins and files fr anywhere,
More informationWHITE PAPER SPON. Best Practices for File Sharing. Published September 2014 SPONSORED BY. An Osterman Research White Paper. sponsored by.
WHITE PAPER N Best Practices fr File Sharing An Osterman Research White Paper Published September 2014 spnsred by SPONSORED BY π spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd,
More informationCustomers FAQs for Webroot SecureAnywhere Identity Shield
Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt
More informationHow Does Cloud Computing Work?
Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?
More informationWelcome to Remote Access Services (RAS)
Welcme t Remte Access Services (RAS) Our gal is t prvide yu with seamless access t the TD netwrk, including the TD intranet site, yur applicatins and files, and ther imprtant wrk resurces -- whether yu
More informationBasic concept of Cloud computing
Basic cncept f Clud cmputing Abstract:- Mnica R Kabra (Vivekanand Arts Sardar Dalipsingh Cmmerce and science cllege Aurangabad) Clud cmputing is becming a pwerful netwrk architecture t perfrm large-scale
More informationHow To Write A Byod
Limitatins f the Walled Garden This is the secnd part in a series designed t help rganizatins develp their BYOD (bring-yur-wn-device) strategies fr persnally-wned smartphnes and tablets in the enterprise.
More informationFAQs for Webroot SecureAnywhere Identity Shield
FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere Identity Shield?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is the Webrt
More informationViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation
ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is
More informationWHITE PAPER SPON. The Critical Need for Enterprise-Grade File Sync and Share Solutions. Published August 2015. An Osterman Research White Paper
WHITE PAPER Grade File Sync and Share An Osterman Research White Paper Published August 2015 spnsred by spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn 98010-1058
More informationInstallation Guide Marshal Reporting Console
Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling
More informationCOPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
More informationData Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
More informationIn addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
More informationIT Help Desk Service Level Expectations Revised: 01/09/2012
IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+
More informationCloud Services Frequently Asked Questions FAQ
Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like
More informationSolution Brief. Aerohive and Impulse. Powerful Network Security for Education and Enterprise
Slutin Brief Aerhive and Impulse Pwerful Netwrk Security fr Educatin and Enterprise Aerhive and Impulse Intrductin In tday s highly cnnected rganizatins, end users expect secure Wi-Fi access acrss the
More informationACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.
Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it
More informationImproved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
More informationBYOD and Cloud Computing
BYOD and Clud Cmputing AIIM First Canadian Chapter May 22, 2014 Susan Nickle, Lndn Health Sciences Centre Chuck Rthman, Wrtzmans Sheila Taylr, Erg Infrmatin Management Cnsulting Clud cmputing Agenda What
More informationMobile Deployment Guide For Apple ios
Fr Apple ios Cpyright This dcument is prtected by the United States cpyright laws, and is prprietary t Zscaler Inc. Cpying, reprducing, integrating, translating, mdifying, enhancing, recrding by any infrmatin
More informationThe 3Dnet Cloud - are you connected yet?
The 3Dnet Clud - are yu cnnected yet? 3DnetMedical is a clud-based service that prvides easy, timely access t studies nline. Fllwing IHE standards, any imaging setup can easily be cupled t the clud. Image
More informationPassword Reset for Remote Users
1 Passwrd Reset fr Remte Users Curin prvides a cmpnent fr the PasswrdCurier Passwrd Prvisining System that manages the lcal passwrd cache in cnjunctin with self-service passwrd reset activities. The slutin
More informationMigrating to SharePoint 2010 Don t Upgrade Your Mess
Migrating t SharePint 2010 Dn t Upgrade Yur Mess by David Cleman Micrsft SharePint Server MVP April 2011 Phne: (610)-717-0413 Email: inf@metavistech.cm Website: www.metavistech.cm Intrductin May 12 th
More informationSPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010
OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity
More informationHow To Use Citrix Xendesktp 4 With Flexcast
Citrix XenDesktp 4: The clear chice fr desktp virtualizatin Citrix pineered desktp and applicatin delivery ver 20 years ag, and in recent years, we have been rapidly innvating with ur industry leading
More informationCorporate Account Takeover & Information Security Awareness
Crprate Accunt Takever & Infrmatin Security Awareness What is Crprate Accunt Takever? A fast grwing electrnic crime where thieves typically use sme frm f malware t btain lgin credentials t Crprate Online
More informationDisk Redundancy (RAID)
A Primer fr Business Dvana s Primers fr Business series are a set f shrt papers r guides intended fr business decisin makers, wh feel they are being bmbarded with terms and want t understand a cmplex tpic.
More informationLevel 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents
Level 1 Technical RealPresence Web Suite and Web Suite Pr Cntents 1 - Glssary... 2 2 Features... 3 RealPresence Platfrm integratin... 3 RealPresence Web Suite Sftware... 3 Sftware Keys... 3 3 - Web Client
More informationUsing PayPal Website Payments Pro UK with ProductCart
Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...
More informationManaging Access and Help Protect Corporate Email Data on Mobile Devices with Enterprise Mobile Suite
Managing Access and Help Prtect Crprate Email Data n Mbile Devices with Enterprise Mbile Suite Last updated: 7/15/15 Balancing prductivity and security Emplyees want t be able t use their wn devices t
More informationWeb Development the Next Steps
Web Develpment the Next Steps Significant prgress has been made n the redesign f the Western Washingtn University hme page. The ATUS Web Services team has wrked hard in cllabratin with the University Cmmunicatins
More informationACTIVITY MONITOR Real Time Monitor Employee Activity Monitor
ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library
More informationThe ADVANTAGE of Cloud Based Computing:
The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has
More informationWHITE PAPER SPON. Evaluating Managed File Transfer in the Cloud: What You Need to Know. Published October 2012 SPONSORED BY
WHITE PAPER N Transfer in the Clud: What Yu Need t Knw An Osterman Research White Paper Published Octber 2012 SPONSORED BY SPON spnsred by spnsred by! Osterman Research, Inc. P.O. Bx 1058 Black Diamnd,
More informationTreasury Gateway Getting Started Guide
Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access
More informationWEB APPLICATION SECURITY TESTING
WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are
More informationIntegrate Marketing Automation, Lead Management and CRM
Clsing the Lp: Integrate Marketing Autmatin, Lead Management and CRM Circular thinking fr marketers 1 (866) 372-9431 www.clickpintsftware.cm Clsing the Lp: Integrate Marketing Autmatin, Lead Management
More informationHIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
More informationThe Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future
The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents
More informationThe Law Office of the Future: Remote Access and Virtual Law Firms Jeffrey S. Krause, Esq.
The Law Office f the Future: Remte Access and Virtual Law Firms Jeffrey S. Krause, Esq. Presentatin Outline Intrductin Wrking Remte vs. Virtual Office Wrking Remte Temprary way t wrk Access yur ffice cmputer
More informationSystem Business Continuity Classification
Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required
More informationXenApp and XenDesktop: Application Virtualization and Desktop Virtualization are Better Together
XenApp and XenDesktp July 2008 XenApp and XenDesktp: Applicatin Virtualizatin and Desktp Virtualizatin are Better Tgether This dcument is designed t help Citrix XenApp custmers understand hw and when Citrix
More informationServ-U Distributed Architecture Guide
Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U
More informationWHITE PAPER. How Encrypting Content in Transit and at Rest Reduces Liabilities and Costs for any Organization SPON. Published August 2011 SPONSORED BY
WHITE PAPER Hw Encrypting Cntent in Transit and at Rest Reduces Liabilities and Csts fr any Organizatin An Osterman Research White Paper Published August 2011 SPONSORED BY!! SPON spnsred by spnsred Osterman
More informationStrategies for Embracing Consumerization
Strategies fr Embracing Cnsumerizatin Micrsft Crpratin Published: April 2011 Abstract Increasingly, wrkers want t use their wn devices, such as slates, smartphnes, and prtable cmputers, fr wrk. Fr IT t
More informationIntroduction to Mindjet MindManager Server
Intrductin t Mindjet MindManager Server Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 mindjet.cm 2013 Mindjet. All Rights
More informationCMS Eligibility Requirements Checklist for MSSP ACO Participation
ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.
More informationRetirement Planning Options Annuities
Retirement Planning Optins Annuities Everyne wants a glden retirement. But saving fr retirement is n easy task. The baby bmer generatin is graying. Mre and mre peple are appraching retirement age. With
More informationGartner Magic Quadrant Salesforce Automation 2009
Gartner Magic Quadrant Salesfrce Autmatin 2009 Sage CRM Slutins Opinin Brief Released July 24, 2009 Q. What is the Gartner Magic Quadrant (GMQ) fr SFA? A. The Gartner Magic Quadrant fr SFA is an analyst
More informationInfor EAM Mobility Initiative
Infr EAM Mbility Initiative Overview Charles Cunty utilizes the Infr Enterprise Asset Management (EAM) system t prvide a pwerful, integrated tl t fully manage all aspects f the equipment and wrk rders
More informationWHITEPAPER Reference Architectures for Portal-based Rich Internet Applications
Authr: Sven Rieger Created n: 2015-04-10 Versin: 1.0 Rich Internet (RIAs) are HTML5-based applicatins with a desktp-like lk&feel which run inside a web brwser. The Micrsft Office applicatins Wrd, Excel,
More informationRSA-Pivotal Security Big Data Reference Architecture RSA & Pivotal combine to help security teams detect threats quicker and speed up response
RSA-Pivtal Security Big Data Reference Architecture RSA & Pivtal cmbine t help security teams detect threats quicker and speed up respnse ESSENTIALS RSA and Pivtal are cmbining t help custmers get: Better
More informationResearch Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013
Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,
More informationVCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
More informationUSF Remote Desktop Gateway
USF Remte Desktp Gateway Fr Hme Cmputers and Laptps Running Windws XP The Remte Desktp Gateway (RDG) allws access t yur USF campus cmputer frm remte lcatins while adding an additinal layer f security t
More informationIN-HOUSE OR OUTSOURCED BILLING
IN-HOUSE OR OUTSOURCED BILLING Medical billing is ne f the mst cmplicated aspects f running a medical practice. With thusands f pssible cdes fr diagnses and prcedures, and multiple payers, the ability
More informationWHITE PAPER SPON. Messaging and Web Security Best Practices for 2011 and Beyond. Published March 2011 SPONSORED BY. An Osterman Research White Paper
WHITE PAPER N Messaging and Web Security Best Practices fr 2011 and Beynd An Osterman Research White Paper Published March 2011 spnsred by SPONSORED BY SPON spnsred by Osterman Research, Inc. P.O. Bx 1058
More informationGUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
More informationOnline Learning Portal best practices guide
Online Learning Prtal Best Practices Guide best practices guide This dcument prvides Micrsft Sftware Assurance Benefit Administratrs with best practices fr implementing e-learning thrugh the Micrsft Online
More information2010 AT&T Business Continuity Study CENTRAL REGION (Missouri) Results
2010 Business Cntinuity Study: Missuri 2010 AT&T Business Cntinuity Study CENTRAL REGION (Missuri) Results Key Findings IT Plans fr 2010 IT budgets fr 2010 are abut the same r higher than thse f the previus
More informationThe AccuSpeechMobile solution is a fully mobile voice-enabling software solution, that noninvasively. existing mobile enterprise wide applications.
1. Questin: Yu say that yu have an innvative mbile apprach t deplying vice prductivity t enterprise applicatins. Hw is AccuSpeechMbile different frm existing vice architectures? Answer: When ne lks at
More informationWHITE PAPER SPON. Best Practices for Dealing with Phishing and Next-Generation Malware. Published April 2015. An Osterman Research White Paper
WHITE PAPER N Best Practices fr Dealing with Phishing and Next-Generatin An Osterman Research White Paper Published April 2015 spnsred by spnsred by SPON spnsred by Osterman Research, Inc. P.O. Bx 1058
More informationAML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email:
AML Internet Manr Curt, Manr Farm Huse, Lndn Rad, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: Backup@AmlInternet.c.uk Cntents Page Situatin Analysis 3 AML Internet - The Slutin
More informationNetwork Security Trends in the Era of Cloud and Mobile Computing
Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager
More informationMonthly All IFS files, all Libraries, security and configuration data
Server Backup Plicy Intrductin Data is ne f Banks DIH Limited s mst imprtant assets. In rder t prtect this asset frm lss r destructin, it is imperative that it be safely and securely captured, cpied, and
More informationIn-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future
In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt
More informationThis guide is intended for administrators, who want to install, configure, and manage SAP Lumira, server for BI Platform
Hw T install SAP Lumira, server n SAP BusinessObjects BI platfrm Distributed Install Applies t: SAP Lumira, server versin fr the SAP BusinessObjects BI platfrm Summary This guide is intended fr administratrs,
More informationSupersedes: DPS Policy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 of 5
Plicy: 13.01 SUBJECT: INTERNET USAGE Supersedes: DPS Plicy 10.09 - Internet and Use Of The DPSnet, July 14, 2000 Effective: February 15, 2005 Pages: 1 f 5 1.0 POLICY PURPOSE Detrit Public Schls (DPS) Internet
More informationTrustED Briefing Series:
TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers
More informationOakland County Department of Information Technology Project Scope and Approach
Oakland Cunty Department f Infrmatin Technlgy Prject Scpe and Apprach Prject Name: Web-Based Permanency Database Prject ID: DB1314PD Leadership Grup: Curts Department: Circuit Curt Divisin: Family Prject
More informationFlash Padlock. Self-Secured and Host-Independent USB Flash Drive White Paper. April 2007 Prepared by ClevX, LLC for Corsair Memory
Flash Padlck - White Paper Flash Padlck Self-Secured and Hst-Independent USB Flash Drive White Paper April 2007 Prepared by ClevX, LLC fr Crsair Memry 1 INTRODUCTION Millins f USB Flash Drives (UFDs) are
More informationHP Point of Sale FAQ Warranty, Care Pack Service & Support. Limited warranty... 2 HP Care Pack Services... 3 Support... 3
HP Pint f Sale FAQ Warranty, Care Pack Service & Supprt Limited warranty... 2 HP Care Pack Services... 3 Supprt... 3 Limited warranty Q: What des a 3/3/3 limited warranty mean? A: HP Retail Pint f Sale
More informationFirewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)
Firewall/Prxy Server Settings t Access Hsted Envirnment Client firewall settings in mst cases depend n whether the firewall slutin uses a Stateful Inspectin prcess r ne that is cmmnly referred t as an
More informationService Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S
Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...
More informationMigrationWiz HIPAA Compliant Migration. Focus on data migration, not regulation. BitTitan Global Headquarters: 3933 Lake Washington Blvd NE Suite 200
MigratinWiz HIPAA Cmpliant Migratin Fcus n data migratin, nt regulatin. BitTitan Glbal Headquarters: 3933 Lake Washingtn Blvd NE Suite 200 Table f Cntents Kirkland, WA 98033 www.bittitan.cm sales@bittitan.cm
More informationInternet and E-Mail Policy User s Guide
Internet and E-Mail Plicy User s Guide Versin 2.2 supprting partnership in mental health Internet and E-Mail Plicy User s Guide Ver. 2.2-1/5 Intrductin Health and Scial Care requires a great deal f cmmunicatin
More informationWatchDox Server. Administrator's Guide. Version 3.8.5
WatchDx Server Administratr's Guide Versin 3.8.5 Cnfidentiality This dcument cntains cnfidential material that is prprietary WatchDx. The infrmatin and ideas herein may nt be disclsed t any unauthrized
More information