A Fresh Approach to Secure Data Exchange:

Size: px
Start display at page:

Download "A Fresh Approach to Secure Data Exchange:"

Transcription

1 June 2009 Egress White Paper A Fresh Approach to Secure Data Exchange: The Architecture of Egress Switch John Goodyear CTO

2 Copyright 2009 Egress Software Technologies Ltd. All rights reserved. The information contained in this document represents the current view of Egress on the issue discussed as of the date of publication. Because Egress must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Egress, and Egress cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for information purposes only. EGRESS MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Egress may have patents, patent applications, trademark, copyright or other intellectual property rights covering the subject matter of this document. Except as expressly provided in any written license agreement from Egress, the furnishing of this document does not give you any license to these patents, trademarks, copyrights or other intellectual property. Egress and Switch are either trademarks or registered trademarks of Egress Software Technologies Ltd in the United Kingdom, United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

3 Sharing Information Makes A Business Go We live in the Information Age; information is flowing between individuals and organizations every second of every day. This flow of information is essential to ensure businesses continue to perform and economies continue to grow. Procedures that allow information to flow outside of an organization vary from business to business. Some organizations have implemented formal methods for recurring secure data exchange transactions, but many more are informal. With the proliferation of connectivity and low-cost high-volume storage, individuals have a variety of means to share a lot of information using attachments, CD or DVD, USB, or FTP. Many times these transactions are undertaken with little consideration for the security of the information being exchanged. The important questions to consider when dealing with information exchange are Have users considered the security implications around these informal exchanges? and secondly Do the intended recipients treat the information with the same level of security expected by the information owner? The latter can be especially painful if investments have been made to protect information while it is still under the control of an organization, only to have it exposed through mishandling by third parties. What many organizations do not realize is that they have become dependent on these informal information exchanges; they are an essential factor for the pace and success of their business. These exchanges only become a serious problem when things go wrong and the organization becomes front page news because of a serious data loss incident. A typical reaction to this kind of problem is to implement Port Management or consider Data Loss Prevention (DLP) to lock down the operating environment of the user; DVD Writers are restricted to Reading, USB ports do not allow access to USB Flash drives, and gateways block attachments. What is the price of solving the data leakage problem in this way? Reconsider the premise that We live in the Information Age and it is clear that stopping the flow of information may not be the answer. Challenges with Existing Technology When a user performs a task they will typically follow a path of least resistance to get their job done. Many data security products on the market today add complexity into the daily workflow of the user by giving them extra steps to perform, rather than assisting them with the workflow while making it more secure. When a user starts to share information with this kind of technology they are required to understand many new concepts associated with data security: encryption, key exchange, digital signing. Should the user have to understand these concepts? Isn t this like insisting on an understanding of advanced electronics before watching TV? If users are not given the right tools to get their job done then the technology put in place to secure information exchange may be circumvented. But if the tool put in place actually makes their daily workflow easier, the users may prefer to use the system and be more secure in the process. Desirable Features A security platform designed to perform information exchange should address a number of problems: Ensure the security of the data being exchanged; Egress White Paper A Fresh Approach to Secure Data Exchange 1

4 Reduce the complexity associated with establishing identities and relationships; Maximize re-use of existing methods of transportation for secure data; Integrate into the user s existing workflow; Ensure the security of the data once it has left the owners physical control; Maintain control and audit of the data lifecycle outside of the perimeter. Secure Data Exchange Innovation To ensure that information remains secure no matter what journey it undertakes, we need to think about how users exchange information in a different way. By inspecting workflows and patterns of information sharing as a baseline, Egress has created a sharing solution with security built in instead of the old school approach of building security and forcing it into the workflow. Egress Switch is designed to meet a fundamental requirement to allow a data owner to stay in control of the information, no matter where that information may go, who the recipient is, or the method used to get it to its destination. With the end user workflow as the starting point, adoption of this technology is expected to proceed at a more rapid pace because it is a natural fit. By encapsulating the security details inside the sharing process, users of any knowledge level can exchange information securely. Users and Requirements In order to ensure that a secure data exchange solution meets the needs of the widest possible audience it s important to consider the users of such a solution and the typical use-case scenarios the product will encounter on a day-to-day basis. Users break down into the three broad demographics shown below. Consumer A user who has been empowered to install an application onto their own personal computer to achieve a specific goal. These users work without any supporting infrastructure. Prosumer An individual who uses a personal computer for work, but is still outside of a formal infrastructure. Typically this would be independent contractors or self-employed business users. Organizations Users will typically have less choice over the tools that are deployed to their workstation. These users work within a formalized infrastructure such as businesses or governments. Each of these user types could potentially interact with one of the other types. Consumers and Prosumers have a need to communicate with Businesses and vice versa. Any software solution used needs to be simple enough for a single user to pick up and install but flexible enough for an enterprise to deploy to thousands of seats. From a single user installation to a large scale deployment, the solution needs to be able to deliver on the problems described below. Security Some users understand and even demand encryption and authentication because they understand the implications of not using it. Other users don t understand it but should be using it. Usability The solution removes the pain points of user interaction and integration into the daily workflow, possibly even enhancing the work flow experience. 2 Egress White Paper A Fresh Approach to Secure Data Exchange

5 Data Exchange complexities exchanging data especially over the Internet and with large file sizes can be a challenge. Ensuring that large transfers resume when interrupted or use of more antiquated protocols such as FTP often raises the bar too high for average users. Ensuring that these key factors are delivered to the users will be essential for acceptance, thereby creating a safer sharing environment. Architecture The context of information sharing drives the overall architecture for Egress Switch. Figure 1 Information Sharing Context At the top level, the architecture has been broken into a client-server model for two key reasons: Local enforcement of security policies at the endpoint requires a client; Round the clock access to parameters about shared information requires a server in the cloud. During the process of designing the Egress Server Infrastructure (ESI) the concept of flexibility was essential to meet planned and anticipated use cases. By designing a server infrastructure that includes flexibility as a key concept, a whole range of possibilities became available. ESI is built upon Microsoft Windows Server and is currently deployed to Windows 2003 and 2008 servers. The Windows Communications Framework (WCF) is a keystone of the infrastructure. The concept of flexibility first became a factor when business requirements led to a hosted software service (SaaS) model for Egress Switch. The current economic climate means that cost implications of a new solution are considered more rigorously, and SaaS delivery ensures the cost of ownership is managed and spread out. Beyond the benefits of cost there are practical advantages to using a hosted service. When dealing with issues of information exchange, the need to manage identities becomes a challenge - if information is being exchanged outside of your perimeter you have to have knowledge of external users. A hosted solution makes the management of trust relationships much simpler. Another key element of the Egress Switch architecture is the notion that once information has been secured by its owner, there is no need to move that secured information through the ESI. This approach allows minimal change to existing user workflows. If a user is familiar with sending information as an attachment to an , they can continue to use that data exchange mechanism. If they are more comfortable with sending large data sets on CD or DVD, this mechanism can be used. Egress White Paper A Fresh Approach to Secure Data Exchange 3

6 Figure 2 - High level Architecture and Typical Transaction Flow A basic understanding of the architecture becomes clear by tracing a typical transaction flow through the various components. 1) An Information Owner has information to share, and signs in to Switch. The Switch client used by the Information Owner will authenticate that user locally or to the ESI. 2) The Information Owner creates a secure package, an encrypted file which contains the information being shared plus information about file and folder hierarchies. The client creates a unique package ID and an encryption key at this time. 3) The Information Owner assigns intended recipients and sets security parameters defining how their information can be used, e.g. an embargo date, date before which the secure package cannot be opened. 4) The Information Owner s Switch client uses a secure connection to transmit information about the new secure package, intended recipients and security settings to the ESI. The package ID is registered on the server and all associated information is encrypted prior to being stored. The encrypted package content does not move to the server. 5) The Information Owner sends the secure package to the intended recipients through familiar and convenient methods such as an attachment or burning to a CD which might be sent through regular mail. 6) When the Information Recipient receives the secure package, the recipient signs in to their Switch client which authenticates the user locally or to the ESI. 7) The Information Recipient s client receives information from the server that a new secure package, intended for that recipient, is available. The package ID and related security settings are transmitted over a secure connection to the client, including a key for the package. 8) The Information Recipient can now access the information according to the parameters that the owner set. The recipient s Switch client enforces those policies on behalf of the Information Owner. 9) The Information Recipient s client uses a secure connection to transmit audit information. This is a record of the recipient s activity with the secure package, which is encrypted and stored by the ESI. 10) By request from the Information Owner, the owner s client will receive audit information about any packages they share over a secure connection. 4 Egress White Paper A Fresh Approach to Secure Data Exchange

7 11) At the Information Owner s convenience, audit information can be viewed locally to see who, when, and how their shared information is being handled. Since security policies are not stored with the secure package, changes can be made at any time and updated at the ESI. This gives added control to the Information Owner to make decisions about revoking access if, for example, the secure package never reaches the intended recipient. Cloud Service To create a viable cloud service of the type that ESI needs to provide, considerations had to be made for availability and security requirements. Since Egress Switch is offered as a SaaS, these characteristics are of particular importance. Availability With the highly modular design of ESI, multiple instances of each sub-system can be deployed. By deploying instances across multiple physical nodes, two goals can be achieved; increased load capacity and additional redundancy. This flexible infrastructure also enables ESI to be distributed geographically to ensure optimal local response times for Switch users. To efficiently implement the cloud service, Egress chose to manage servers and storage with proven and reliable service providers. Additionally, due to the fact that ESI is built on a federated security model, multiple physical servers can complete client requests at any time in cases of high load or failover. For a service provider to qualify, they must meet rigorous service level requirements established by Egress. These include: 100% availability of network infrastructure; 24x7 reboot or power cycle guarantee; 15 minute response to escalated incidents; 1 hour hardware replacement from time of diagnosis; 24x7 emergency support. As the user base of Egress Switch expands in numbers and geographic spread, the network of hosted locations scale to match demand around the world. Security As a security service, the design of ESI has been hardened for suspected vulnerabilities. Many vectors have been closed with industry best practices. For example, best practice coding standards have been followed to prevent attacks such as SQL Injections. By using parameter enforcement and sanitization, the system has passed our internal suite of penetration testing. Additionally, security best practices are used throughout the ESI implementation and operation to safeguard the system including: All ESI communication is secured by SSL; Account passwords are secured using PBKDF1; All data stored in the SQL server is encrypted to AES 256 bit; All user identities are stored in an ADAM database leveraging Microsoft s trusted security infrastructure; Servers are hosted behind managed and monitored Cisco firewalls for industry standard DoS protection. Egress White Paper A Fresh Approach to Secure Data Exchange 5

8 ESI Modules The modular design of ESI can be represented by the following seven primary subsystems. These can be replicated to multiple physical nodes and geographical locations to deliver scalability, redundancy and optimal response times. Figure 3 Egress Server Architecture Components Connection Point The connection point is the external interface to the Egress Switch network. This web service is secured using SSL and provides the communication interface for the Switch client software. It is used by the Self Service Portal as well as direct traffic to and from Egress Switch clients. Self Service Portal This web-based interface allows Switch users to use a web browser for the following functions: 1. Enroll for a Switch account; 2. Manage their Switch account settings including password; 3. Pay for Switch services such as pay-as-you-go credits or monthly subscriptions; 4. Manage security and access policies for secure packages. In addition to the secure communication presented by SSL at the Connection Point, the Self Service Portal has incorporated a non-repudiation mechanism that provides confirmation on initial account creation. Beyond single user accounts, business accounts are supported where an individual acts as account manager and invites other accounts to join the business account. This is designed to offer a single billing process for each joint account. It also allows the account manager to control policy and manage data exchanges for the managed accounts. Bulk enrollment is possible by presenting a list of users in CSV format to create Switch identities, and allowing users to set their password on first system access. User Management By providing User Management in the cloud, Egress Switch has advanced beyond many of the earlier Rights Management solutions that require the Information Owner s organization to manage user accounts for any recipients outside their organization. Using Switch, each individual user or business account manager is responsible for their own identity management such that effort is distributed across the entire user base. User Management is handled by ESI as a cloud service. An address is required as the user identity. During the account creation process, an is sent to the supplied address as confirmation that the 6 Egress White Paper A Fresh Approach to Secure Data Exchange

9 correct user has enrolled an address that they control. This sequence fulfils a non-repudiation requirement. Internally, user management is implemented with Active Directory Application Mode (ADAM). It is operating in the same mode as an Active Directory server and holds the database of registered users and organizations. The Organization Unit (OU) capabilities of this directory service allows for segregation of users into groups (for example a business account) who might have a different set of policies from other users. Anticipating self-hosted instances of ESI in the future, use of AD will provide easier integration with existing ADs at large organizations. Package Management A relational database is used to keep track of secure packages by a unique package ID. The package ID is generated at the time the secure package is created. It is used to relate security and access policies to any package, to map key management to recipients, and to tag audit information to a specific package. Information stored about each package is limited to package and security parameters, the contents of the package (shared information) does not pass through or get stored on the server. Billing and Support The Billing and Customer support system manages user account levels of pay-as-you-go credits or subscriptions (either monthly or annual). Billing activity is routed through a third party credit card processing service with no credit card information held in ESI storage. The support aspects of this module are used by the Egress support organization to diagnose and correct any malfunctions with the Switch client, communication paths, or the ESI. This system communicates with components of the Switch client for diagnostic purposes. Audit Switch is designed to ensure that individuals can always maintain visibility of their shared information. Actions performed against a Switch data package from the point of creation to recipient access are audited into the Switch infrastructure. The encrypted audit trail is visible from the Information Owners desktop using the Switch client or from the web Self Service Portal. Users can review any Switch package created from their account, including policy changes plus anonymous and authorized access attempts against the package. For every access attempt ESI records the time and IP address allowing an information owner to gain an understanding of where their data has gone. An audit of the package content is also recorded at the time of package creation which allows an owner to review the package contents (file names and folder structures only) at any time. If, for example, a recipient makes an access request to view a package, the owner will be able to review the package file and folder content first. The owner can only review the data in the package if they have kept a copy since the package itself is not stored on the ESI. This feature is particularly important when a user operates as part of a business account, as the account manager may need to maintain visibility of activity on the account. Database Microsoft SQL server is used to store all Egress Switch data including registered secure packages, security policies, authorizations and audit information. All information is encrypted prior to storage. Communication Channel Additional functionality is available through the ESI to direct anonymous communication between a recipient and the Information Owner. A use case exists where a secure package becomes available to a recipient who is not authorized for access. This case may be the result of accidental or malicious activity. Egress White Paper A Fresh Approach to Secure Data Exchange 7

10 In this instance, it is desirable to allow the recipient to request access without divulging any identity information about the owner. Anonymity can block social engineering attacks. Figure 4 Transaction Flow for Access Request The communication channel is implemented as an access request presented to an unauthorized recipient. When processed, the ESI logs an audit event and notifies the Information Owner both as a pending request to their Switch Client, and by which can receive prompt action from the owner. At the owner s discretion, access can be granted or declined. Any resulting changes of access will be handled through the system as a normal access policy change and logged as an audit event. By creating a secure package with no recipient assigned, the Information Owner can force positive receipt confirmation from any Information Recipient that gets the package. Client Architecture The Egress Switch Client is designed as a compact set of components that sets or enforces security policies on shared information. The Client has two forms: Full-featured Switch Client that can create, read and manage secure packages; Lightweight Switch Browser that can read secure packages. The modular architecture of the client software allows flexibility in the same way as the ESI. As an example of this flexibility, the Switch Browser is simply a subset of the Switch Client components built as a single executable so no administrative privileges are required for installation. 8 Egress White Paper A Fresh Approach to Secure Data Exchange

11 Figure 5 Egress Switch Client Architecture Components Switch Client The client is an installed application made available as a single installer EXE or MSI. Once installed the Switch client allows a user to create and manage Switch packages. The Switch client can also open secure packages that have been sent to the user. Consistent with the architecture of Egress Switch, consideration has been given to user workflows as a way to simplify information sharing while adding protection and control. To meet this need, an integration API has been exposed to simplify the process of integration into various user application such as . Additionally, the concept of configurable data exchange mechanisms is built into the creation process to streamline multi-step sharing procedures to a single button operation. The client presents three components to the user: 1) Tray icon which provides easy links, account management settings, and other applications; 2) The Package Creator allows creation of secure packages, communicates package information to the ESI, and presents a variety of Data Exchange Mechanisms (DEMs) to streamline data sharing; 3) The Package Library which allows management of package security policies, inspection of package usage and audit information. All three of these components leverage Switch Services for functions such as authentication, encryption/ decryption, and communication to the ESI. Switch Browser The Switch browser is a no installation option which has minimal system dependencies delivered as single executable designed to make it incredibly easy to open Switch packages. This lightweight browser uses a subset of the Switch Services to maintain a small disk and memory footprint. The Switch browser can be placed onto a CD/DVD or USB storage device and transported to the recipient along with the secure package. The Browser can be easily downloaded from the Egress website. This option does not require the user to have administrator privileges. Both Switch clients communicate with the Egress Server Infrastructure using standard HTTP requests which are secured using SSL. This ensures the Switch clients can safely transverse most modern firewalls, proxies and routers with no intervention from the user or system administrator. Egress White Paper A Fresh Approach to Secure Data Exchange 9

12 Switch Client API The Switch Client API is a set of integration functions that can be used to tie package creation into other user applications that might have a need to create or open secure packages. In the current version of Egress Switch, this API set has been used for integration with Microsoft Windows Explorer for right-click package creation and with Microsoft Outlook to provide an add-in that creates a secure package from any attachments in an . The convenience factors have been well received by users because the sharing process has been simplified in spite of added security. Anticipating future needs, the Switch Client API will make it possible to integrate with other user applications, for example a document management tool could invoke Switch as part of its export process and ensure that the documents are secured for delivery. Data Exchange Mechanisms A key objective of Switch is to simplify the data sharing process. One effective means of doing this is through automation of a multi-step user procedure to a single step. This concept, called a Data Exchange Mechanism (DEM), is presented to the user during package creation. Using this concept provides flexibility and streamlines the operation of Switch. Consider the example of writing information to optical media such as a CD or DVD, which are widely used for low cost, high volume information exchange. Normally the user will have to use one or two tools to author and burn their content, more if the content is secured with encryption. With the DEM for optical media supplied with Switch, the user has one tool and one operation. An Information Owner will drag and drop selected files into the Package Creator, and on selection of the CD/DVD DEM, the content is encrypted, the package is registered with the ESI, and the media is written in a single operation. This same concept is available for attachments when the Outlook add-in described above is not used. An Information Owner will drag and drop files into the Package Creator, and on selection of the DEM, the contents are encrypted, the package is registered with the ESI, and attached to a new addressed to the package recipients in a single operation. Future expansion of DEMs for FTP and web file transfers is anticipated as well as configuration options for multi-user accounts. With this capability, DEMs can be defined and pushed to specific users as a means of controlling approved data exchange methods. Switch Encryption The Switch Client creates a secure package containing information to be shared. When creating a package, the Package Creator first generates a 128-bit package ID and an AES-256 encryption key. AES- 192, AES-128 or other algorithms may be used for package encryption keys if configured in policy as shorter key lengths may be useful for future offline access and offline key recovery scenarios. Package content is encrypted with the package key in Cipher Block Chaining (CBC) mode, and the package ID is stored in the package header. The Switch Client establishes an SSL-protected connection to the ESI, and proceeds only if the server s certificate is trusted. The client uploads the package ID, package key, and any security policies to the server. The ESI encrypts the received data before it is stored in the Database to ensure it cannot be compromised. Compression of encrypted data is incorporated into the package creation process. Industry standard algorithms are adaptively selected based on content type and compression factors. When an Information Recipient is assigned to a package, the owner is granting that recipient access to the encryption key. To decrypt a package for a recipient, the Switch Client first retrieves the package ID from the unencrypted package header. The client connects to the server via SSL, providing the recipients Switch identity, password and the package ID. The ESI validates the client identity and checks any security policies or restrictions related to the package, Information Owner, or the owner s organization. If these checks indicate the recipient is authorized to view the secure package, the package key is retrieved from 10 Egress White Paper A Fresh Approach to Secure Data Exchange

13 the database and sent to the client through an SSL-secured connection. The client can then decrypt the content of the secure package and present it to the recipient. In situations where the recipient is offline and cannot contact the ESI, previously accessed packages can be viewed with the Switch Client. The Switch Browser does not allow offline access. To support this operation, the ESI creates a 256-bit shared secret, for each Egress Switch user. As part of the connection protocol to the ESI, the Switch Client requests an encrypted form of this shared secret where the encryption key is derived from the user identity and password. The Switch Client can store package encryption keys and associated security policies locally according to policy, in an encrypted form using the encrypted shared secret. If the recipient attempts to access a secure package but no connection to the server can be made, the recipient identity and password can be used to gain access to the cached keys and policy information. In this way, only packages that have been accessed once through an ESI connection can be accessed offline, and even then, only with the recipient s credentials. Switch in Restrictive Environments Egress Switch is built using industry standard encryption; it operates with accepted key lengths and key management schemes. To ensure data is secured in accordance with defined operating and handling procedures Egress Switch will encrypt information using FIPS-140 certified cryptographic modules if the hosting computer is running Microsoft Windows operating system (Windows XP and newer) and placed into FIPS mode of operation. Future versions of the Switch client are expected to incorporate a FIPS-certified cryptographic module from a third party such as OpenSSL or RSA. Ultimately, Egress will complete a NIST certification with selfauthored implementations of cryptographic algorithms. Switch in Operation Adding secure data exchange technology into established user workflows and practices can potentially be disruptive. To avoid user downtime or unwanted help desk calls, Switch is designed to support every common sharing operation in as few steps as possible. While other methods of sharing are possible, the following examples highlight user work flows and best practices to keep information secure when sharing it. with Attachment Once the Information Owner has registered as a Switch user and downloaded the Switch Client, they are ready to complete one of the most common data sharing operations. With the Microsoft Outlook Add-in installed, securing attachments is essentially transparent to the user. 1) The Information owner signs in to Switch and opens MS Outlook. 2) The owner creates a new and selects the files to be attached. 3) When the is composed, the owner clicks send which activates Switch. 4) Switch creates a secure package with all attached files, adds the recipients as authorized recipients of the secure package, and allows the to be processed by the server. 5) At any time, the owner can use the Switch Package Library to inspect the package security settings, audit information, or change recipients and security parameters. Egress White Paper A Fresh Approach to Secure Data Exchange 11

14 The only additional step to sending (creating the secure package) is done automatically. The further task of monitoring the package is a new level of control previously not available. For the recipient of this , the process is equally straight-forward. The recipient receives their and double clicks the attachment. The secure package is opened and ready to be used assuming the recipient has a Switch account and the free Switch Browser software. For unregistered recipients, simple instructions explaining how to set up Switch are appended to the outgoing . CD/DVD sent by Regular Mail There are situations where an Information Owner needs to be certain that their sensitive information has reached an intended recipient. In these cases, there can be no risk that the information has been lost, mishandled, or fallen into the wrong hands. Using the real-time control features of Egress Switch makes it possible to be certain that only the intended recipient can access shared information. 1) The Information Owner signs into Switch and opens the Switch Package Creator. 2) The owner drags in a folder containing a large data set to be shared. 3) The owner assigns no recipients thereby forcing any recipient to contact the owner for access. 4) The owner selects Create Package and selects the Egress Switch CD/DVD Data Exchange Mechanism, and they are prompted to insert blank optical media. 5) With no further steps and no additional authoring software, the secure package is written to the media. 6) The owner places the media in a mailer addressed to the recipient and sends it through regular mail. In this workflow, there are actually fewer steps than usually required as the data encryption and CD/DVD authoring is done automatically. The owner simply selects their files and burns them. For the recipient of this CD, the process is straight-forward. The recipient receives the CD, inserts into their PC and are prompted to sign into Switch or register for a Switch ID. The Switch browser is included on the CD and will auto-run so that the recipient can gain access to the information. Since the owner has not specified a recipient, the recipient makes an access request through Switch that notifies the owner to grant access. At this point the owner is assured that the recipient has received the information. File Uploaded to FTP Server Many systems have limitations on the size of an including attachments. These limits are usually set by a service provider or the IT staff. When an Information Owner needs to share files beyond this limit, an FTP site is a common alternative. Using Egress Switch to secure the shared information means it can no longer be compromised by relaxed security practices of FTP sites that may use a common folder for many users. Access can be easily compromised, and the jumble of files that build up over time make it even more likely for sensitive information to fall into the wrong hands. Secure FTP sites offer little additional security as the primary difference from FTP is the use of SSL on communications lines; no further protection or control over shared information is provided. 1) The Information Owner signs into Switch and opens the Switch Package Creator. 2) The owner drags the large files to be shared. 3) The owner assigns a recipient, who was previously notified by that the file will be available on the FTP site. 12 Egress White Paper A Fresh Approach to Secure Data Exchange

15 4) Next, the owner selects Create Package and selects Egress Switch file package from the Data Exchange Mechanisms. Finally they are prompted for a location to save the file. 5) The owner saves the file to the desktop so it is ready for upload. 6) The owner opens their FTP client and transfers the file to the FTP site. In this workflow, the Information Owner has the additional step of creating a secure package before uploading the information to the FTP site. With this protection, the file is encrypted during upload, while stored on the site and during download even if Secure FTP is used. Further, all control over the file to assign or change recipients and security policies means there is no risk that the information is compromised during the transfer or while stored in intermediate locations. As noted above, there are new Data Exchange Mechanisms planned for future releases that will streamline this process further by automatically uploading the secure package once it is created. Conclusions To ensure that information is always under the control of the owner after it has been shared is not a trivial task. Egress Switch does exactly this with the added benefit of simplifying the process of sharing for end users of various skill levels. The focus throughout the design and development process has been to protect shared information by applying security policies to data entities, not to the container of the data. This is in sharp contrast to many of the legacy encryption products available today such as full disk encryption. At the same time, key design objectives have included: Strong Security use of best-of-breed technologies for encryption of data in motion and data at rest; Simplifying User Experience designed to match sharing workflows; Scale from individual users to large organizations Software as a Service model, available over the web for single users or multi-user accounts. Egress Switch presents an innovative new way to remove risk from data exchange and keep businesses flowing. This represents an ideal solution to inject security into today s informal information exchange while avoiding disruption to the user workflow. By using Egress Switch to secure data exchange, individuals and organizations can have confidence that the information which they consider valuable will not be mishandled by third parties who may have valid reasons to hold or operate on that data. Egress White Paper A Fresh Approach to Secure Data Exchange 13

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents

More information

Egress Switch Reader. User Guide 2.3

Egress Switch Reader. User Guide 2.3 Egress Switch Reader User Guide 2.3 November 2015 Confidentiality statement This document contains information confidential and proprietary to Egress Software Technologies. It shall not be disclosed in

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

Egress Switch Client Deployment Guide V4.x

Egress Switch Client Deployment Guide V4.x Egress Switch Client Deployment Guide V4.x www.egress.com 2007-2013 Egress Software Technologies Ltd Table of Contents System Requirements... 4 Deployment Process... 4 Computer & User Based Policy Application...

More information

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data

More information

Email Archiving User Guide Outlook Plugin. Manual version 3.1

Email Archiving User Guide Outlook Plugin. Manual version 3.1 Email Archiving User Guide Outlook Plugin Manual version 3.1 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith Road Hammersmith London W14 8TH United Kingdom Omniquad

More information

Cloud Attached Storage 5.0

Cloud Attached Storage 5.0 Release Notes Cloud Attached Storage 5.0 March 2015 2015 Cloud Attached Storage 5.0 Release Notes 1 1 Release Contents Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document

More information

Top 7 Tips for Better Business Continuity

Top 7 Tips for Better Business Continuity Top 7 Tips for Better Business Continuity With Hosted Fax www.biscom.com sales@biscom.com (+1) 800-477-2472 or (+1) 978-250-1800 Introduction Biscom s Secure File Transfer (Biscom SFT) solution enables

More information

Client side. DESlock + Data Encryption

Client side. DESlock + Data Encryption Data Encryption DESlock + is a simple-to-use encryption application for companies large and small. Take advantage of the optimized setup that speeds up the time to adoption for admins. The client side

More information

redcoal EmailSMS for MS Outlook and Lotus Notes

redcoal EmailSMS for MS Outlook and Lotus Notes redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: support@redcoal.com Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

How To Use Quantum Rbs Inc. Small Business Backup

How To Use Quantum Rbs Inc. Small Business Backup Small Business Backup & Recovery (File Servers, Peer-to-Peer, Laptops, Desktops) Smart Features: Continuous Backup Anywhere Access to Backed Up Data Simple Rate Plan Secure Bank Grade Encryption Open Files

More information

Implementing Transparent Security for Desktop Encryption Users

Implementing Transparent Security for Desktop Encryption Users Implementing Transparent Security for Desktop Encryption Users Solutions to automate email encryption with external parties Get this White Paper Entrust Inc. All All Rights Reserved. 1 1 Contents Introduction...

More information

Protecting Data-at-Rest with SecureZIP for DLP

Protecting Data-at-Rest with SecureZIP for DLP Protecting Data-at-Rest with SecureZIP for DLP TABLE OF CONTENTS INTRODUCTION 3 PROTECTING DATA WITH DLP 3 FINDING INDIVIDUAL AND SHARED INFORMATION-AT-REST 4 METHODS FOR REMEDIATION 4 ENCRYPTING UNPROTECTED

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Host Access Management and Security Server

Host Access Management and Security Server Host Access Management and Security Server Evaluation Guide Host Access Management and Security Server Evaluation Guide 12.2 Copyrights and Notices Copyright 2015 Attachmate Corporation. All rights reserved.

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

GoToMyPC Corporate Advanced Firewall Support Features

GoToMyPC Corporate Advanced Firewall Support Features F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy

More information

OpenText Managed File Transfer (MFT) is an enterprise

OpenText Managed File Transfer (MFT) is an enterprise OpenText IX Secure MFT Simplified, accelerated, and managed enterprise file exchange OpenText Managed File Transfer (MFT) is an enterprise solution for managing the exchange of rich digital content inside

More information

Windows BitLocker Drive Encryption Step-by-Step Guide

Windows BitLocker Drive Encryption Step-by-Step Guide Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft

More information

1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V)... 3 1.1 Terminology... 4 1.2 Key Capabilities... 4

1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V)... 3 1.1 Terminology... 4 1.2 Key Capabilities... 4 MED-V v1 Contents 1 Introduction to Microsoft Enterprise Desktop Virtualization (MED-V)... 3 1.1 Terminology... 4 1.2 Key Capabilities... 4 2 High-level Architecture... 6 2.1 System Requirements for MED-V

More information

Secured email Enterprise eprivacy Suite

Secured email Enterprise eprivacy Suite EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy

More information

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft

More information

Backup and Recovery FAQs

Backup and Recovery FAQs May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General

More information

EasyLock. User Manual. Intuitive Encryption Application for portable Storage Devices

EasyLock. User Manual. Intuitive Encryption Application for portable Storage Devices 1 EasyLock User Manual Intuitive Encryption Application for portable Storage Devices User Manual Version 1.0.0.8 2004-2010 CoSoSys Ltd. 2 Table of Contents Table of Contents... 2 1. Introduction... 3 2.

More information

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

An Analysis of Propalms TSE and Microsoft Remote Desktop Services An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management

More information

Technical Overview of Terminal Services

Technical Overview of Terminal Services Technical Overview of Terminal Services Microsoft Corporation Updated: January 2005 Abstract Windows Server 2003 includes the Terminal Services features of Windows 2000, the client and protocol enhancements

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic. OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does

More information

Table of Contents. 2015 Cicero, Inc. All rights protected and reserved.

Table of Contents. 2015 Cicero, Inc. All rights protected and reserved. Desktop Analytics Table of Contents Contact Center and Back Office Activity Intelligence... 3 Cicero Discovery Sensors... 3 Business Data Sensor... 5 Business Process Sensor... 5 System Sensor... 6 Session

More information

User Guide. Version 3.0 April 2006

User Guide. Version 3.0 April 2006 User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

Data Security and Governance with Enterprise Enabler

Data Security and Governance with Enterprise Enabler Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

The Encryption Anywhere Data Protection Platform

The Encryption Anywhere Data Protection Platform The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,

More information

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?

InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS? What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software

More information

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

Optus EmailSMS for MS Outlook and Lotus Notes

Optus EmailSMS for MS Outlook and Lotus Notes Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights

More information

PROPALMS TSE 6.0 March 2008

PROPALMS TSE 6.0 March 2008 PROPALMS March 2008 An Analysis of and Terminal Services: Contents System Administration... 2 Server Management... 3 Application Management... 5 Security... 7 End User Experience... 8 Monitoring and Reporting...

More information

Table of Contents. Page 1 of 6 (Last updated 30 July 2015)

Table of Contents. Page 1 of 6 (Last updated 30 July 2015) Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Copyright Giritech A/S. Secure Mobile Access

Copyright Giritech A/S. Secure Mobile Access Secure Mobile Access From everywhere... From any device... From user......to applications Page 3...without compromising on security and usability... and to my PC in the office: Secure Virtual Access Contrary

More information

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

How To Secure Your Data Center From Hackers

How To Secure Your Data Center From Hackers Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

How To Secure Your System From Cyber Attacks

How To Secure Your System From Cyber Attacks TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

Windows Azure Pack Installation and Initial Configuration

Windows Azure Pack Installation and Initial Configuration Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

WebEx Remote Access White Paper. The CBORD Group, Inc.

WebEx Remote Access White Paper. The CBORD Group, Inc. WebEx Remote Access White Paper The CBORD Group, Inc. Document Revision: 1 Last revised: October 30, 2007 Changes are periodically made to the information contained in this document. While every effort

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Top 10 Questions to Ask when Choosing a Secure File Transfer Solution

Top 10 Questions to Ask when Choosing a Secure File Transfer Solution Top 10 Questions to Ask when Choosing a Secure File Transfer Solution Top 10 Questions to Ask when Choosing a Secure File Transfer Solution Companies that have made an investment in a Secure File Transfer

More information

Mimecast Large File Send

Mimecast Large File Send DATASHEET Mimecast Large File Send For sending large files, lets go back to email Mimecast Large File Send simplifies large file sharing for users by removing the complexity and frustration associated

More information

Storage Guardian Remote Backup Restore and Archive Services

Storage Guardian Remote Backup Restore and Archive Services Storage Guardian Remote Backup Restore and Archive Services Storage Guardian is the unique alternative to traditional backup methods, replacing conventional tapebased backup systems with a fully automated,

More information

Gladinet Cloud Backup V3.0 User Guide

Gladinet Cloud Backup V3.0 User Guide Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet

More information

Acano solution. Security Considerations. August 2015 76-1026-01-E

Acano solution. Security Considerations. August 2015 76-1026-01-E Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration

More information

PRIVACY, SECURITY AND THE VOLLY SERVICE

PRIVACY, SECURITY AND THE VOLLY SERVICE PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers

More information

Resonate Central Dispatch

Resonate Central Dispatch Resonate Central Dispatch Microsoft Exchange 2010 Resonate, Inc. Tel. + 1.408.545.5535 Fax + 1.408.545.5502 www.resonate.com Copyright 2013 Resonate, Inc. All rights reserved. Resonate Incorporated and

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

A Buyer's Guide to Data Loss Protection Solutions

A Buyer's Guide to Data Loss Protection Solutions A Buyer's Guide to Data Loss Protection Solutions 2010 Websense, Inc. All rights reserved. Websense is a registered trademark of Websense, Inc. in the United States and certain international markets. Websense

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

Securing Data on Portable Media. www.roxio.com

Securing Data on Portable Media. www.roxio.com Securing Data on Portable Media www.roxio.com Contents 2 Contents 3 Introduction 4 1 The Importance of Data Security 5 2 Roxio Secure 5 Security Means Strong Encryption 6 Policy Control of Encryption 7

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization

Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization Understanding Northwestern University s contract with Symantec Symantec Solutions for Cost Reduction & Optimization Chris Hagelin and Shane Scholes Symantec Account Manager and Symantec Sales Engineer

More information

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an

More information

Netwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015

Netwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015 Netwrix Auditor Administrator's Guide Version: 7.1 10/30/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation

More information

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and

More information

Online Transaction Processing in SQL Server 2008

Online Transaction Processing in SQL Server 2008 Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,

More information

Remote Access Platform. Architecture and Security Overview

Remote Access Platform. Architecture and Security Overview Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards

More information

December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure

December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation

More information

Xerox Mobile Print Cloud

Xerox Mobile Print Cloud September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Mediasite EX server deployment guide

Mediasite EX server deployment guide Mediasite EX server deployment guide 2008 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc. Additional copies

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

Media Shuttle s Defense-in- Depth Security Strategy

Media Shuttle s Defense-in- Depth Security Strategy Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Netwrix Auditor for Windows Server

Netwrix Auditor for Windows Server Netwrix Auditor for Windows Server Quick-Start Guide Version: 7.0 7/7/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

Citrix Access Gateway Plug-in for Windows User Guide

Citrix Access Gateway Plug-in for Windows User Guide Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information