customer care solutions

Size: px
Start display at page:

Download "customer care solutions"

Transcription

1 customer care solutions from Nuance enterprise white paper :: Nuance VocalPassword Security Overview Version 7.0

2 NUANCE :: customer care solutions Contents About this Document...3 Nuance VocalPassword Security Overview...3 Architecture & System Components...3 System Components...4 Product infrastructure...6 Authentication...7 Web Server Access...7 Database Access...7 LDAP Server Access...7 File System Access...7 Authorization...7 System Authorization...7 Audit...8 Audit levels...8 Audit Protection...9 Audited operations and entities...9 Log viewer...10 Administration...10 Web based administration applications...10 The Web-based Security Console Application Data Security...11 VPMCLI...13 SNMP...14 Data Security Data manipulation...14 Data Integrity & Encryption...14 Custom Encryption Plug-in...14 Multi-tenancy...14 Network Security...15 Interface protection...15 Inter-Process Communication security...15 Voice Biometrics Application Security...15 Mitigating recording threats...15 About Nuance

3 About this Document Nuance VocalPassword is an advanced biometric speaker verification system that verifies a speaker s identity based on voice samples acquired during interaction with voice, Web, or mobile applications. VocalPassword 7.0 delivers state of the art accuracy as well as exceptional ease of integration and deployment, enabling customers to utilize the biometric power of voice to protect personal self-service applications and provide secure, efficient, and convenient access to contact centers and remote applications. This document provides an overview of VocalPassword product security. As an authentication product, VocalPassword implements a wide range of security measures to protect its resources against diversified threats. This document is intended for sales engineers and for IT security personnel who evaluate the use VocalPassword in their protected IT environments. Nuance VocalPassword Security Overview Nuance VocalPassword is a voice biometrics system which is implemented in security-sensitive environments. As such, it must adhere to strict security requirements and comply with privacy and additional industryspecific regulations. VocalPassword is protected at both the application level and the infrastructure level using the standard Four A s of enterprise security: Administration, Authentication, Authorization, and Audit. VocalPassword s security design is based on the Common Criteria Protection Profile for biometric speaker verification systems and has successfully passed third-party security audits and penetration attacks performed by customers. VocalPassword supports integrated Windows security and role based authorization (RBA). Together with the security mechanisms provided by the system infrastructure, the system can be configured to meet the security requirement of financial services, government agencies, healthcare service providers and other securitysensitive organizations. The following diagram provides an overview of VocalPassword security architecture and mechanisms. Integrated Windows Security Voice Platform Web Service SSL Buffer Overflow & SQL Injection Check Admin Apps File System Hashed Audio File Names NTFS IIS VocalPassword TM Processing Server LDAP Authentication, Authorization, Audit Active Directory/ ADAM LDAP VocalPassword TM DB Oracle / SQL Server / Sybase / DB2 Full System Audit Authorization Manager Role-Based Authorization 3

4 NUANCE :: customer care solutions Architecture & System Components VocalPassword includes a set of applications, services and tools that work together in order to provide voice biometrics services. System Components VocalPassword system is comprised of two main logical components the Processing Server and the Data Repository Server. These components can reside on a single machine or distributed among multiple machines. A system can be comprised of multiple instances of each component. Processing Server The Processing Server is the main processing component of the VocalPassword system. Multiple Processing Servers can optionally be used in a redundancy scheme for high availability purposes, or in a load balancing scheme for scalability. The Processing Servers run the VocalPassword application that provides the following functions: Service control The Processing Server exposes a set of Web Services (SOAP/HTTP) which are used by calling applications as well as by the system s administration tools and Web-based GUI Applications. Algorithmic processing This is the core biometric functionality of VocalPassword. Each Processing Server includes two web applications that run under Microsoft IIS: VocalPassword Web Services Provides a set of API methods accessed through SOAP and HTTP. VocalPassword Web Applications These web applications are used by Administrators, IT managers, Security Officers and helpdesk agents. In addition, the VocalPassword system includes a set of utilities/desktop administration applications. These are typically installed with each Processing Server. Data Repository Server The Data Repository Server is the logical name of the component which is responsible for handling and storing persistent data. Each data repository server contains the following components: SQL Database The Database is used to store audit information, log messages and other information used for reports. VocalPassword supports most of the leading Databases. LDAP Directory LDAP directory is used to securely store sensitive persistent data related to speakers, groups, voiceprints, and configurations. VocalPassword supports multiple LDAP directories. Audio Files folder A shared folder used for storing audio files. Persistent Data Replicator (PDR) Nuance s replication service, responsible for duplicating database records and audio files between two data repository servers (Optional). Logger Service This service queues log messages and saves them in the background to the database. A VocalPassword system must include at least one Data Repository Server. Two Data Repository Servers can be used in an active-active configuration for redundancy. 4

5 The following diagram outlines VocalPassword components and architecture. VocalPassword Web Applications VocalPassword Native Web Service APIs Technical Management Platform Admin Voiceprint Helpdesk Security Console Processing Server (VocalPassword Application Pool) Algorithmic Engines Text Dependent Utterance Validation Processing Server (N+1) IIS VXML Gateway Algorithmic Engines Algorithmic Engines Text Prompted Liveness Detection Playback Detection VocalPassword Web Applications Algorithmic Engines Text Independent ASR (Optional) Tools and Services Logger Service SNMP Agent Custom Encryption Hooks Authorization Manager Bit (Quick Test) Calibration Wizard Management Command Line Interface (MCLI) Hashed Audio Files File system Data Repository Server (1+1) User Group Database LDAP Directory Audit, Reports,Logs (Oracle, SQL Server, DB2 Voiceprint, Speakers MySQL, Sybase,Informix) Configuration, Roles, Scopes (Microsoft, AD, IBM Tivoli TDS) Tools and Services PDR - Nuance Data Replicator DB/Audio Sync Logger Service SNMP Agent 5

6 NUANCE :: customer care solutions Product infrastructure Operation System VocalPassword is based on.net framework 4.0 and as such it can run only on Windows machines. Currently the product supports the following OS: Windows XP Windows 2003 Server Windows 2008 Server Windows7 Database A Database is used to store audit information and log messages. The database may be installed on the same machine as the Data Repository or on a remote machine. VocalPassword utilizes common ADO.NET infrastructure to access the database. VocalPassword supports the following databases: Microsoft SQL Server 2005 Microsoft SQL server 2000 Oracle 10g with RAC support Oracle 11g with RAC support DB2 MySQL 5.5 SQL Express LDAP Directory LDAP is an application protocol for reading and editing directories over an IP network. The LDAP Directory is used to securely store the application s persistent data entities such as speakers, voiceprints, and configuration. The supported LDAP Directories are: ADAM Active Directory Application Mode - This lightweight version of Microsoft Active Directory runs as a service on the data repository server - this is the default directory for installations on Windows XP and Win2003 Server operating systems. AD LDS Active Directory Lightweight Directory Services - This lightweight version of Microsoft Active Directory runs as a service on the data repository server - this is the default directory for installations on Windows 7 and Win2008 Server operating systems. Active Directory Microsoft s Directory Services product - The domain s active directory can be used as the LDAP directory. When used, an extension of the Active Directory Schema is required in order to support VocalPassword entities. TDS IBM Tivoli Directory Server. Web Server VocalPassword system uses IIS (Internet Information Services) as its web server and is based on the IIS ASP. NET 4.0 extension. VocalPassword 7.x offers an enhanced, open, and flexible Web service APIs, ensuring smooth, platform-independent integration using any programming environment. In addition, the VocalPassword 6

7 Web Applications enables easy access to tools and information needed for successful deployment. VocalPassword utilizes IIS web server security mechanisms (i.e. application session timeout, limiting access to specific IPs etc. are supported). Authentication Web Server Access VocalPassword authenticates users based on Windows Integrated Security. This ensures that system policies regarding passwords are handled according to the local domain policies (enforced by the Domain Controller). VocalPassword does not store passwords in its database or in any other application s data store. Users accessing the system, whether by programmatically calling the system s web service API, by using one of the administration applications, or by accessing a web page, are authenticated by the IIS using the Domain Controller. By setting a designated configuration parameter, the system can ensure exclusive log-in to the web applications. Note: Authentication policies supported by Microsoft IIS, such as certificates and passports are also supported by VocalPassword. The VocalPassword Web Applications can be configured to enable Single Sign On which eliminates the need to re-enter user-name and password when accessing the application. Database Access Credentials to the system s database are provided as part of the connection string used by VocalPassword. By default, VocalPassword uses Windows integrated security as the database authentication method. This means that the application s identity is used when accessing the database. Another alternative is to specify a username and a password in the connection string. When this is done, this identity is used by all components accessing the database and must be managed manually. When this option is used, the password is saved encrypted in the system s configuration file. LDAP Server Access The applications access the LDAP Server using Windows Integrated Security. Note that the applications identity is used when accessing the LDAP Server. File System Access File system access is controlled by the operating system. Every access to the file system by the VocalPassword application will be performed under the credentials of the application user. Authorization System Authorization Role-based Authorization (RBA) VocalPassword utilizes Microsoft Authorization Manager (AZMAN) for managing roles and operations. AZMAN is general-purpose role-based security architecture for Windows. Using roles, the operating system determines whether a process or a user is privileged to perform an operation. 7

8 NUANCE :: customer care solutions Roles are defined in the Authorization Store of VocalPassword s LDAP Directory. Each role can be granted permission to perform operations (a basic activity unit that the system performs). Every API method has a corresponding operation. Windows users and groups can be assigned a role, and be authorized to perform operations according to the role s definition. The system is installed with the following predefined roles. These roles can be customized and additional roles can be defined. ClientApplication HelpDesk PlatformAdmin MainScope Security Every access to the Database, the LDAP Server, or the file system by the VocalPassword application is performed using the credentials of the application user. Once the application validated that the network user is permitted to perform a certain operation, the application user serves as a delegate for the network user. This means that in order to allow an application user to perform an operation that will delete a file from the file system for example, it is not required to add write privileges to the network user. Audit VocalPassword Audit is composed of the following elements: Every API method is logged in the system s database. Other standard system infrastructure components (such as the OS, IIS, DB) have their own auditing tools and capabilities that needs to be enabled. Audio files used for Enrollment/Verification may be saved for Audit purposes. Audit levels VocalPassword allows the system administrator to control the level of audit info detail that will be saved by the system. There are three audit levels: Alg Debug Specifies whether to audit detailed algorithmic outputs (mainly used for algorithmic troubleshooting). Operational Specifies whether to save operation level audit information (such as Enroll/Verify/Identify/ Fraudsters detection etc.). There are three options of saving operational level audit information: Always the system saves all audit information. Conditional the system saves audit information only for delete operations and in case of an error in other operations. Never the system does not save operational-level audit information. System - Specifies whether to save system level audit information. There are three options of saving system level audit information: Always the system saves all system level audit information. Conditional the system saves audit information only for system level write operations and in case of an error in read operations. Never - the system does not save system-level audit information. 8

9 In addition, a configuration parameter named log level enables selecting the desired log level, enabling the system to keep different levels of log messages for different applications, services or scopes. Audit Protection VocalPassword audit information is stored securely in the system s database. Besides the system specific audit trail, VocalPassword system infrastructure (IIS, LDAP Directory, Database) logs are protected in diversified (standard) ways. Audited operations and entities Auditing Audio Files VocalPassword support auditing audio files used in the system using two configuration parameters: SaveEnrollAudio - Specifies whether to save enrollment audio. Always Enrollment audio is always saved UntilTrained Enrollment audio is saved temporarily and deleted as soon as the voiceprint is trained. Never Enrollment audio is never saved. SaveOperationalAudio Specifies whether to save operational audio (the audio associated with Verify, Identify, and Fraudsters Detection operations). LDAP Server Audit LDAP Server supports audit capabilities and enables flexible audit configuration. For more information turn to API Audit Every call to an API method is logged in the system s database. The API record includes the following details: Request ID A 64bit unique identifier assigned to each API call. This ID is unique across all the system s servers and can be used to reference other details stored in the database about the request such as verification score, or failure details. Method Name The API method name. Input Parameters The values of the API method parameters. Finish Status An error or success code. Timestamp The exact time of the request execution. Server name The name of the processing server that handled the request. Client ID The IP address of the client. User name The windows username of the client. Data repository server name The name of the data repository server on which the data was originally stored. Session ID A token which is received from the StartSession command that launched the current session. Scope The scope which is the context of the current API operation. 9

10 NUANCE :: customer care solutions Log viewer VocalPassword saves log messages in the database based on the LogLevel parameter in the system configuration. Log messages can be accessed using the Log Viewer which enables online or offline viewing of an application s log messages. The Log Viewer is available as a Windows application or as a web page in the Technical management application. Use the Log functionality to troubleshoot the system or analyze past system activity. The log section is divided into two views: History Log View which enables auditing past system activities. Log information retrieval can be controlled by dates and log level. Once retrieved, log information can be saved, sorted, filtered or saved to a file. Online Log View which is used to monitor system activities in real time. The Online Log View displays system-wide log messages as they are recorded in the VocalPassword data base, enabling isolating faults and communicating them with the vendor. Log messages can be saved to a file. Administration Web based administration applications VocalPassword provides a set of web-based administration applications allowing management of all system aspects. The following applications are provided out-of-the-box: Technical Management Platform Admin VocalPassword Platform Admin is a web based Application that provides a variety of tools for properly setting up the system and its biometric functionality as well as managing speakers, voiceprints and groups. Use this application to configure VocalPassword, perform queries and reports, and monitor the system usage. Voiceprint Helpdesk VocalPassword Voiceprint Helpdesk provides a set of tools enabling auditing and reviewing a speaker s interactions with the system. Use the Helpdesk functions to audit verification results and decisions, edit speaker information, delete a speaker, edit a voiceprint and more. Security Console The VocalPassword Security Console Application enables security personnel to audit VocalPassword operation and analyze specific verification and identification processes. The application provides tools for managing fraudsters voiceprints and groups. In addition, the security console collects and presents diversified security alerts. VocalPassword Technical Management Application enables technical personnel, who are in charge of the systems health, to monitor VocalPassword system s component status, audit system-wide logs, schedule administrative tasks such as audio purging, upload and view system licenses, and more. Access to these applications is controlled by Windows Integrated Security and VocalPassword s role based authorization. 10

11 The Web-based Security Console Application The VocalPassword Security Console Application enables security personnel to audit VocalPassword operation and analyze specific verification and identification processes. The application provides tools for managing voiceprints as well as all aspects of user authorization. The Security Console Application is divided into four functionalities: Authorization Manager, Voiceprint Helpdesk, Configuration, Log. The following screenshot presents these functionality. 1. Authorization Manager Functionality allows managing all aspects of User Authorization. Using roles, the system can make determinations, such as whether a process is privileged to perform an action. VocalPassword utilizes Microsoft s Authorization Manager Infrastructure to manage user authorization in the system. Authorization Manager functionality is divided into three sections: a. Scope management used adding scopes (tenancies) in a multi-tenant system b. User management used for assigning roles to users and groups c. Role management used for defining, creating and customizing roles The following screenshots depict the User Management page and the role customization functionality of the Security Console. 11

12 NUANCE :: customer care solutions 2. Voiceprint Helpdesk functionality provides a set of tools enabling auditing and reviewing a speaker s interactions with the system, editing voiceprint audio and adapting voiceprints with audio used for verification. Voiceprint Helpdesk is divided into two section: a. Audit Speaker Interactions used for reviewing a specific speaker s interactions with the system. Information available includes session info as well as information regarding each and every operation within the session (i.e. Enrolment, Verification etc.). Verification statistics and scores are displayed including decision reasons and extended scoring information. Speaker audit information can be filtered, sorted and grouped for better analysis. Audit information also includes the speaker s audio. This audio can be played back and / or downloaded assuming the system audit configuration is set to store it and the proper security privileges are set. b. Review Voiceprint enables reviewing of a speaker s voiceprint/s. Use this page to listen to audio used for enrollment, and edit it if necessary, removing unrelated or faulty audio. The Edit Voiceprint page enables removing and adding audio segments from / to a speaker s voiceprint and adapting 12

13 it with verification audio segments if available. Use the Edit Voiceprint page to fix problematic voiceprints that deliver high false rejection rate as well as to enhance the quality of existing voiceprints via manual adaptation. 3. Configuration Functionality - enables the system administrator to control and manipulate the system configuration and operation. VocalPassword system supports multiple concurrent configurations that are used to control the system s diversified functionality and multi-engine infrastructure. Use the configuration functionality to comply with diversified requirements (i.e. Security, Audit), optimize the system performance, and adjust its functionality to accommodate for a specific call / verification flow. Configuration is divided into two sections: a. Edit Configuration Sets enables creating, editing, uploading, downloading, and comparing Configuration Sets. A Configuration Set is a set of parameters and their corresponding values that controls the operation of VocalPassword in a specific context which can be an application or a specific operation. Configuration Sets inherit parameters values from the system s Default configuration set and enable the user to overwrite specific ones as necessary. b. Configuration Audit used to track all of the system s configuration changes. Use this page to review configuration changes and filter them by dates, parameter category, and more. Information retrieved includes parameters values, timestamp, change initiator, IP and host name. Configuration Audit page can be used by the system administrator as well as by Nuance support to isolate system problems caused by configuration errors. VPMCLI VocalPassword includes a command line utility that enables administrator to perform various administration tasks such as: retraining voiceprints or deleting history records from the database. A system administrator using the VPMCLI must have the proper credentials and authorization to use the various functionality provided by this utility. 13

14 NUANCE :: customer care solutions SNMP VocalPassword s SNMP agent receives SNMP requests and sends SNMP traps to standard network monitoring consoles complying with SNMPv2 standard. Each Processing Server has an SNMP agent service that handles SNMP Get/Set requests and sends SNMP traps when important system events occur. VocalPassword monitoring can be easily added to standard SNMP-based consoles. Data Security Data manipulation VocalPassword checks every input against data manipulations such as: SQL injection, LDAP injection, Buffer overflow and Cross-Site Scripting (XSS). Data Integrity & Encryption Voiceprints are stored in a proprietary format in the system s LDAP directory and cannot be reverse engineered. Voiceprints are signed with the speaker ID and the customer ID (system ID) which is a unique key assigned to each installation. This signing protects the system voiceprints from being manipulated by authorized users. Voiceprints cannot be used outside the specific system as well as in other VocalPassword systems. Customer related information (Speaker IDs, Group IDs), is encrypted by VocalPassword by default using 128 bit encryption mechanism (Rijndel). Customer-specific encryption mechanisms are supported. Audio Files stored in the files system can be encrypted using standard OS encryption mechanisms. The names of the saved audio files are hashed so that they cannot be associated directly with a specific speaker. LDAP Directory store The LDAP Directory stores used by VocalPassword (Provided by Microsoft/IBM) is encrypted by default using proprietary encryption mechanisms. Database The databases used by VocalPassword can be configured to encrypt stored information. Custom Encryption Plug-in Nuance supplies a built in encryption mechanism which uses Rijndael symmetric encryption (AES) 128bit. In case the customer wishes to control the system s encryption method, he may do so through the encryption plug-in. The encryption plug-in enables customized encryption, giving the customer full control over the encryption algorithm and key. A configuration parameter which points to the encryption software must be set to enable custom encryption. Multi-tenancy Multi-Tenancy enables logical partitioning of the entire system in an effortless manner through the use of scopes. This allows a clear cut separation of the system s data, configuration, audit, roles, etc. within an organization, enabling a single enterprise to use VocalPassword for multiple/distinct applications in different business units. Multi-Tenancy is ideal for a hosted solution, enabling a service provider to offer VocalPassword as a service to multiple enterprises. The benefits are both from a practical aspect and from a security aspect. 14

15 Regardless of what system tool is used or what API method is called, everything is performed in the context of a specific scope. Scopes are assigned to users by the system security administrator. Each session is associated with a certain scope, the configuration set specified when calling an API method is used to determine the desired scope. Network Security Interface protection VocalPassword web service interface acess is controlled using IIS6 or IIS7 security supporting SSL encryption. All authentication schemes are supported: Integrated, Basic, Digest, and Certificates. Inter-Process Communication security VocalPassword processes The different components which compose the VocalPassword system communicate with each other over TCP using WCF (Windows Communication Foundation. Windows Communication Foundation is the technology used for inter process communication between different components of VocalPassword. More information regarding WCF can be found at All ports used for inter-process communication are configurable. This allows System Administrators to specify which ports will be used in their specific site. The component used for inter-process communications is NET.TCP. This standard component secure TCP communications in various ways. Processing Server LDAP Directory communication security VocalPassword communicates with the LDAP directory via a.net component (Microsoft Directory Entry) which is part of Microsoft Directory Services which is part of.net Framework. The component supports LDAPS for secure LDAP communication. Processing Server SQL Database communication security VocalPassword communicates with the SQL Server using database-specific ADO.Net provider. The provider communication security is proprietary and database-specific. Voice Biometrics Application Security Mitigating recording threats Recording threats are the threat of fraudsters using voice recordings of legitimate speakers. Following are three methods in which VocalPassword enables diminishing these threats: Liveness detection (Intra-session voice variation) This unique and patented method significantly reduces recording threats. Following text-dependent verification, this method uses text-independent voice biometrics technology to compare the voice sample captured during the text-dependent verification process, with an additional sample captured by prompting the speaker to repeat a random or semi-random sentence. By combining the obtained biometric scores and validating that the speaker indeed repeated the requested utterance (using VocalPassword s Utterance Validation engine or ASR), a liveness detection score is extracted. 15

16 NUANCE :: customer care solutions Prompted passwords verification Prompted verification requires the user to repeat a random phrase that is a subset of speech atoms (digits/words) trained during enrollment. Prompted verification provides protection against interception and playback attacks, as each session uses a different subset of the trained speech atoms. Playback detection VocalPassword s patented playback detection algorithm runs as part of the verification process and identifies audio segments that unnaturally match audio segments that were previously used for verification/enrollment. About Nuance Communications, Inc. Nuance is a leading provider of speech and imaging solutions for businesses and consumers around the world. Its technologies, applications and services make the user experience more compelling by transforming the way people interact with information and how they create, share and use documents. Every day, millions of users and thousands of businesses experience Nuance s proven applications and professional services. For more information, please visit: Nuance Communications, Inc. All rights reserved. Nuance, the Nuance logo, The experience speaks for itself, SpeakFreely, and VocalPassword are trademarks and/or registered trademarks of Nuance Communications, Inc., and/or its subsidiaries in the United States and/or other countries. All other trademarks are the properties of their respective owners. WP NUCC1061 NUANCE COMMUNICATIONS, INC. one wayside road burlington ma nuance.com

How To Protect Freespeech From Attack From A Hacker Attack

How To Protect Freespeech From Attack From A Hacker Attack customer care solutions from Nuance enterprise white paper :: Nuance FreeSpeech Security Overview Version 7.0 NUANCE :: customer care solutions Contents About this Document...3 Nuance FreeSpeech Security

More information

Nuance VocalPassword 8.2 :: Product Description

Nuance VocalPassword 8.2 :: Product Description Nuance VocalPassword 8.2 :: Product Description About Nuance VocalPassword Nuance is proud to present VocalPassword 8.2, the most secure, accurate, flexible, and easily deployed biometric speaker verification

More information

VocalPassword : voice biometrics authentication.

VocalPassword : voice biometrics authentication. VocalPassword : authentication. Friendly voice authentication across web, IVR, call center, or mobile. 1 VocalPassword for easy and secure authentication. VocalPassword, the world s most widely deployed

More information

Nuance VocalPassword v9 :: Product Description

Nuance VocalPassword v9 :: Product Description Nuance VocalPassword v9 :: Product Description Solution Overview VocalPassword, the world s most widely deployed voice biometric solution, enables easy and secure authentication by analyzing a person s

More information

Nuance FreeSpeech 8.2 :: Product Description

Nuance FreeSpeech 8.2 :: Product Description Nuance FreeSpeech 8.2 :: Product Description 8.2 About Nuance FreeSpeech Nuance is proud to present FreeSpeech 8.2, a unique biometric speaker verification system that transparently verifies speakers in

More information

FreeSpeech : caller identity verification.

FreeSpeech : caller identity verification. FreeSpeech : caller identity verification. Real-time validation of caller identity and detection of known fraudsters. 1 FreeSpeech for passive caller authentication. 9 FreeSpeech enables fully transparent

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Tenable for CyberArk

Tenable for CyberArk HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments

More information

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft 5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft

More information

How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2

How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2 DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...

More information

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2 HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Netop Remote Control Security Server

Netop Remote Control Security Server A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

White Paper BMC Remedy Action Request System Security

White Paper BMC Remedy Action Request System Security White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information

More information

Integrating CoroSoft Datacenter Automation Suite with F5 Networks BIG-IP

Integrating CoroSoft Datacenter Automation Suite with F5 Networks BIG-IP Integrating CoroSoft Datacenter Automation Suite with F5 Networks BIG-IP Introducing the CoroSoft BIG-IP Solution Configuring the CoroSoft BIG-IP Solution Optimizing the BIG-IP configuration Introducing

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal (arindam.mandal@paladion.net) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

Configuring and Monitoring SiteMinder Policy Servers

Configuring and Monitoring SiteMinder Policy Servers Configuring and Monitoring SiteMinder Policy Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part

More information

Installation Guide ARGUS Symphony 1.6 and Business App Toolkit. 6/13/2014 2014 ARGUS Software, Inc.

Installation Guide ARGUS Symphony 1.6 and Business App Toolkit. 6/13/2014 2014 ARGUS Software, Inc. ARGUS Symphony 1.6 and Business App Toolkit 6/13/2014 2014 ARGUS Software, Inc. Installation Guide for ARGUS Symphony 1.600.0 6/13/2014 Published by: ARGUS Software, Inc. 3050 Post Oak Boulevard Suite

More information

Setting up an MS SQL Server for IGSS

Setting up an MS SQL Server for IGSS Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

WebEx Security Overview Security Documentation

WebEx Security Overview Security Documentation WebEx Security Overview Security Documentation 8/1/2003: WebEx Communications Inc. WebEx Security Overview WebEx Security Overview Introduction WebEx Communications, Inc. provides real-time communication

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo

More information

IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM

IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product

More information

Data Security and Governance with Enterprise Enabler

Data Security and Governance with Enterprise Enabler Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date

More information

Mediasite EX server deployment guide

Mediasite EX server deployment guide Mediasite EX server deployment guide 2008 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc. Additional copies

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

TrueSight Operations Management Monitoring Studio

TrueSight Operations Management Monitoring Studio USER DOCUMENTATION APPLICATIONS MONITORING TrueSight Operations Management Monitoring Studio Version 9.0.00 June 2015 Contacting BMC Software You can access the BMC Software Web site at http://www.bmc.com.

More information

Crestron Fusion Version 9.3 Enterprise Management Platform Installation Guide

Crestron Fusion Version 9.3 Enterprise Management Platform Installation Guide Crestron Fusion Version 9.3 Enterprise Management Platform Installation Guide The specific patents that cover Crestron products are listed at patents.crestron.com. Crestron, the Crestron logo, Capture

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

Security Features in Password Manager

Security Features in Password Manager Security Features in Written by Einar Mykletun, Ph.D. security and compliance architect for research and development at Dell Introduction Information system security is a priority for every organization,

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Use Enterprise SSO as the Credential Server for Protected Sites

Use Enterprise SSO as the Credential Server for Protected Sites Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured

More information

000-596. IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam. http://www.examskey.com/000-596.html

000-596. IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam. http://www.examskey.com/000-596.html IBM 000-596 IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam TYPE: DEMO http://www.examskey.com/000-596.html Examskey IBM 000-596 exam demo product is here for you to

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

StreamServe Persuasion SP5 StreamStudio

StreamServe Persuasion SP5 StreamStudio StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other

More information

Websense Support Webinar: Questions and Answers

Websense Support Webinar: Questions and Answers Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816. RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

OnCommand Unified Manager

OnCommand Unified Manager OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

Security Specifications

Security Specifications Security Specifications Overview Password Manager Pro deals with administrative passwords that offer secure access to enterprise credentials and devices. Any compromise on the security of these passwords

More information

Configuring and Monitoring Citrix Branch Repeater

Configuring and Monitoring Citrix Branch Repeater Configuring and Monitoring Citrix Branch Repeater eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

Requirement Priority Name Requirement Text Response Comment

Requirement Priority Name Requirement Text Response Comment N-Tiered Architecture Accessibility Application architecture shall consist of a minimum of four tiers: proxy, presentation, application, and data [base]. Each of the fours tiers shall be separated with

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

MBAM Self-Help Portals

MBAM Self-Help Portals MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa

More information

Installation and configuration guide

Installation and configuration guide Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for

More information

Last Updated: July 2011. STATISTICA Enterprise Server Security

Last Updated: July 2011. STATISTICA Enterprise Server Security Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Installation and Administration Guide

Installation and Administration Guide Installation and Administration Guide BlackBerry Enterprise Transporter for BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-11-06 SWD-20141106165936643 Contents What is BES12?... 6 Key features

More information

How To Secure Your Data Center From Hackers

How To Secure Your Data Center From Hackers Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

Web Plus Security Features and Recommendations

Web Plus Security Features and Recommendations Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of

More information

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not

More information

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

An Analysis of Propalms TSE and Microsoft Remote Desktop Services An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management

More information

NETWRIX USER ACTIVITY VIDEO REPORTER

NETWRIX USER ACTIVITY VIDEO REPORTER NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Connect for Dragon Medical 360 Network Edition. Administrator Guide

Connect for Dragon Medical 360 Network Edition. Administrator Guide Connect for Dragon Medical 360 Network Edition Administrator Guide Copyright 2013. Connect for Dragon Medical 360 Network Edition. Nuance Communications, Inc. has patents or pending patent applications

More information

PRIVACY, SECURITY AND THE VOLLY SERVICE

PRIVACY, SECURITY AND THE VOLLY SERVICE PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers

More information

Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...

Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings... Post Installation Guide for Primavera Contract Management 14.1 July 2014 Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...

More information

Unicenter Remote Control r11

Unicenter Remote Control r11 Data Sheet Unicenter Remote Control r11 Unicenter Remote Control TM is a highly reliable and secure application for controlling and supporting remote Windows and Linux systems. It delivers all of the features

More information

Monitoring DoubleTake Availability

Monitoring DoubleTake Availability Monitoring DoubleTake Availability eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may

More information

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

CrashPlan Security SECURITY CONTEXT TECHNOLOGY TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag

Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Application Firewall Overview Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents IAG Application Firewall: An Overview... 1 Features and Benefits... 2

More information

FileMaker Server 11. FileMaker Server Help

FileMaker Server 11. FileMaker Server Help FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered

More information

Overview. Edvantage Security

Overview. Edvantage Security Overview West Virginia Department of Education (WVDE) is required by law to collect and store student and educator records, and takes seriously its obligations to secure information systems and protect

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Users Guide. SelenioFlex File. Version 2.10.0

Users Guide. SelenioFlex File. Version 2.10.0 SelenioFlex File Version 2.10.0 August 2015 Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document and its contents to be

More information

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01 Oracle Enterprise Single Sign-on Provisioning Gateway Administrator Guide Release 10.1.4.1.0 E12613-01 March 2009 Oracle Enterprise Single Sign-on Provisioning Gateway, Administrator Guide, Release 10.1.4.1.0

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Uptime Infrastructure Monitor. Installation Guide

Uptime Infrastructure Monitor. Installation Guide Uptime Infrastructure Monitor Installation Guide This guide will walk through each step of installation for Uptime Infrastructure Monitor software on a Windows server. Uptime Infrastructure Monitor is

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information