How to integrate with OPSWAT GEARS cookie API
|
|
- Roy Turner
- 8 years ago
- Views:
Transcription
1 How to integrate with OPSWAT GEARS cookie API About This Guide...2 Change Log... 3 Background... 4 Cookie Format...5 Cookie: Policy_State... 6 Cookie: License_Key... 6 Cookie: Device_ID... 6 Future enhancements... 6 Notes... 7 Supported browsers... 7 Supported GEARS clients... 7 Figure 1 Typical Sequence Diagram... 8 Figure 2 Schematic without SaaS to GEARS Cloud integration... 9 Figure 3 Schematic with SaaS to GEARS Cloud integration
2 About This Guide GEARS is a platform for network security management for IT and security professionals that provides visibility over all types of endpoint applications from antivirus to hard disk encryption and public file sharing, as well as the ability to enforce compliance and detect threats. More information on GEARS may be found at GEARS can be leveraged by SaaS products to control access to a service according to the compliance status of the endpoint attempting to connect. This guide specifically illustrates how to establish GEARS policy checks for any SaaS product OPSWAT, Inc. All rights reserved. OPSWAT, GEARS and the OPSWAT logo are trademarks of OPSWAT, Inc. All other trademarks, trade names, service marks, service names and images mentioned and/or used herein belong to their respective owners. 2
3 Change Log Date Revision Author Comment Dec 18 th Adam Winn First release 3
4 Background OPSWAT GEARS service runs on an endpoint and periodically checks the compliance status of the device against a security baseline (policy) configured and hosted in GEARS cloud. This compliance information for the endpoint is stored locally and also available from the GEARS cloud. Traditionally the information was available in the local system s registry, or via COM API, or in the cloud via RESTful API. This document describes a new method for retrieving device compliance information, via a cookie stored on the local endpoint. The cookie is generated by the GEARS service and injected into all supported local browsers. This injection happens every time the GEARS service performs a compliance check on the endpoint. The interval of this compliance check is an account-level configuration available in the GEARS cloud and ranges from 5 minutes to 60 minutes. When the cookie is injected, it is given an expiration date equal to the next scheduled compliance check. The cookie injection is automatic and will happen as long as the GEARS client is running. 4
5 Cookie Format Whenever a cookie injection is scheduled, actually three separate cookies are injected. This allows for either secure or insecure integration types. Format of the three cookies: Cookie Name: Device_ID License_Key Policy_State Content: {Unique device ID} {GEARS account license key} 0 or 1 Host: gears.opswat.com Path: / Send For: Any connection type Expires: {Next scheduled compliance check time} Type: Persistent 5
6 Cookie: Policy_State The Policy_State cookie provides the most basic compliance information possible. The content of this cookie is 1 when the device is compliant and 0 when the device is noncompliant. The drawbacks to checking this value without any further checks: 1) Any sufficiently knowledgeable user can manipulate this value 2) It is only known that the endpoint is compliant with some GEARS account s security policy, not any particular GEARS account Cookie: License_Key The License_Key cookie provides the account identifier (as a license key) to which the GEARS client is associated. Because each GEARS account can have a different security baseline (policy), it is important that the endpoint compliance state (Policy_State) is considered in conjunction with the expected license key. Using this cookie requires that the web service has preexisting knowledge of the expected license key. Cookie: Device_ID The Device_ID cookie is provided so the web service can access the richest and most secure information directly from the GEARS cloud. GEARS cloud has RESTful API methods, documented at Calling these REST API methods to get device information requires either a MAC address or a Device_ID. Since most web services (without the use of Java) cannot query the device s MAC address, the Device_ID is made available in this cookie. The REST APIs are secured with OAUTH 2.0. A client_key and client_secret for calling the REST APIs can be obtained by registering at This registration is tied to each GEARS account. While more complicated to implement, the Device_ID integration is much more secure than simply using the Policy_State and/or License_Key cookies because it is not as vulnerable to manipulation on the endpoint. Future enhancements An enhanced solution that would encrypt the contents of the cookie is being explored and may be released in the future. This would require pre-sharing a decryption key with the web service that needs to read the cookie. This would be advantageous for integrations that do not (or cannot) call the GEARS cloud REST APIs. 6
7 Notes 1) Because the cookies are injected on an interval, the presence (and expiration status) of a cookie can be used as a reliable indicator of the presence and running state of GEARS on the endpoint. 2) Cookie injection is automatic as long as GEARS is running on the endpoint. It is not configurable. 3) The cookie is injected into all detected and supported browsers on the endpoint. Even if one fails, the remaining browsers will still be tried. 4) This cookie injection has little to no impact on system resources (CPU, memory, disk IO, etc.) Supported browsers As of December 18 th, 2014, the cookie API is supported on: Windows 7, 8, 8.1: Internet Explorer, Firefox, Chrome* OSX: Safari, Firefox, Chrome * On Windows, the cookie injection will not succeed in Chrome while Chrome is running. The other Windows browsers do not have this limitation. A possible enhancement has been identified and is being researched. It would involve using HTML5 local storage instead of a traditional cookie. Supported GEARS clients As of December 18 th, 2014, the cookie API is supported and implemented in: GEARS for Windows: Persistent (managed) version GEARS for Windows: On demand (guest) version, no UAC* GEARS for Windows: On demand (guest) version, with UAC GEARS for Mac: Persistent (managed) version GEARS for Mac: On demand (guest) version * GEARS for Windows, On Demand version is available with and without UAC. When using the non-uac version as a user without local administrator rights, the cookie injection will not work with Internet Explorer 7
8 Figure 1 Typical Sequence Diagram 8
9 Figure 2 Schematic without SaaS to GEARS Cloud integration Figure 3 Schematic with SaaS to GEARS Cloud integration For more information, or if you have any questions about the steps above, please log into the OPSWAT Portal at and submit a ticket to request assistance from our support team. 9
Sophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
More informationLBSEC. http://www.liveboxcloud.com
2014 LBSEC http://www.liveboxcloud.com LiveBox Srl does not release declarations or guarantee regarding this documentation and its use and declines any expressed or implied commercial or suitability guarantee
More informationHow to set up Pulse Secure Host Checker SSL VPN with OPSWAT Gears Client
How to set up Pulse Secure Host Checker SSL VPN with OPSWAT Gears Client About This Guide... 2 Method #1: Antivirus Policy... 3 Method #2: Custom Process and Registry Check... 8 Method #3: Third Party
More informationCIDR Range Subnet Mask 85.115.32.0/19 85.115.32.0-85.115.63.255 85.115.32.0 255.255.224.0
MAC Endpoint Technical Overview Overview Websense MAC Web Endpoint is designed to provide a seamless experience to end users for authenticating and directing traffic to the Websense Cloud Security infrastructure.
More informationUse Host Information in Policy Enforcement
Use Host Information in Policy Enforcement Although you may have stringent security at your corporate network border, your network is really only as secure as the end devices that are accessing it. With
More informationINUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture
More informationWhite Paper. McAfee Cloud Single Sign On Reviewer s Guide
White Paper McAfee Cloud Single Sign On Reviewer s Guide Table of Contents Introducing McAfee Cloud Single Sign On 3 Use Cases 3 Key Features 3 Provisioning and De-Provisioning 4 Single Sign On and Authentication
More informationRelease Notes for Websense Web Endpoint (32- and 64-bit OS)
Release Notes for Websense Web Endpoint (32- and 64-bit OS) Updated: 8-Feb-2013 Applies To: Websense Cloud Web Security solutions Use the Release Notes to learn about: What s new in Websense Web Endpoint?
More informationIntegrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
More informationAbila Grant Management. System Requirements
Abila Grant Management This is a publication of Abila, Inc. Version 2015 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names
More information1. Determine Your Current Software Version
1. Determine Your Current Software Version The procedure for upgrading your EAGLE to the version 2.2 software will depend upon the software version that is currently running on your EAGLE. To determine
More informationPingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0
Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity
More informationRingCentral for Desk. User Guide
RingCentral for Desk User Guide RingCentral for Desk User Guide Contents Contents Introduction... 3 About the RingCentral for Desk........................................................ 4 About this Guide.................................................................
More informationCounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
More informationMDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...
More informationGrant Management. System Requirements
January 26, 2014 This is a publication of Abila, Inc. Version 2014.x 2013 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned
More informationWhite Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
More informationEffective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
More informationWeb Based Application Tool (WBAT) For SMS Implementation!
Web Based Application Tool (WBAT) For SMS Implementation! Non-Compliance could kill the Viability of your Business Aircraft Operations! FDTL (Fixed & Rotary Wing) Safety Data Management Hazard Identification
More informationComplete Patch Management
Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia
More informationCloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
More informationReading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)
Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email
More informationImplementation Guide. Version 10
Implementation Guide Version 10 Synthesis Enterprise Portal Implementation Guide Part Identification: RPIGSEP10 ReliaSoft Corporation Worldwide Headquarters 1450 South Eastside Loop Tucson, Arizona 85710-6703,
More informationCheck list for web developers
Check list for web developers Requirement Yes No Remarks 1. Input Validation 1.1) Have you done input validation for all the user inputs using white listing and/or sanitization? 1.2) Does the input validation
More informationSecuring the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
More informationNessus Cloud User Registration
Nessus Cloud User Registration Create Your Tenable Nessus Cloud Account 1. Click on the provided URL to create your account. If the link does not work, please cut and paste the entire URL into your browser.
More informationUila SaaS Installation Guide
USER GUIDE Uila SaaS Installation Guide January 2016 Version 1.8.1 Company Information Uila, Inc. 2905 Stender Way, Suite 76E Santa Clara, CA 95054 USER GUIDE Copyright Uila, Inc., 2014, 15. All rights
More informationNew Student Orientation Information Technology Packet
New Student Orientation Information Technology Packet Welcome Welcome to the College of Nursing (CoN)! The Information Technology (IT) Department provides technical support to students, faculty, and staff.
More informationCrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
More informationInstallation and Administration Guide
Installation and Administration Guide Release 8 This installation guide will walk you through how to install and deploy Conga Composer, including recommended settings for the application. Contact Support:
More informationArchitecture, Implementations, Integrations, and Technical Overview
Architecture, Implementations, Integrations, and Technical Overview Introduction System Architecture & Infrastructure Implementation Parent Portal Medical Center Strategy Integrations SIS Immunization
More informationZed E-Commerce and WebCRM 7.5. Release Notes 11/29/2011
Zed E-Commerce and WebCRM 7.5 Release Notes 11/29/2011 PA-DSS 2.0 Validated What is PA-DSS? (Payment Application Data Security Standard) The global security standard created by the Payment Card Industry
More informationClearing Browser Cache/History
Clearing Browser Cache/History A number of concerns in RamCT can usually be resolved by clearing the Browser Cache on your local computer. The browsers that are supported with RamCT are Internet Explorer,
More informationFeature List for Kaspersky Password Manager
Feature List for Kaspersky Password Manager Overview... Features by Platform...3 Feature Descriptions...4 Glossary...7 PAGE Feature List for Kaspersky Password Manager Overview Kaspersky Password Manager
More informationThis presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared
More informationRingCentral for Salesforce. User Guide
RingCentral for Salesforce User Guide Table of Contents Table of Contents 3 Introduction 3 About RingCentral for Salesforce 3 About This Guide 4 Basics 4 Options 5 Log in 6 Placing Calls 7 Placing an International
More informationEHR OAuth 2.0 Security
Hospital Health Information System EU HIS Contract No. IPA/2012/283-805 EHR OAuth 2.0 Security Final version July 2015 Visibility: Restricted Target Audience: EHR System Architects EHR Developers EPR Systems
More informationSophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
More informationHow to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications
SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this
More informationUsing SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
More informationNew Online Banking Guide for FIRST time Login
New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms
More informationDiscovery Education Integration for Higher Ed. Administrator Guide. Version 1.0 for Blackboard Learn 9.1 SP10+
Discovery Education Integration for Higher Ed Administrator Guide Version 1.0 for Blackboard Learn 9.1 SP10+ 20 12 Blackboar d Inc. Pro pri etar y and C onfident ial Publication Date: April, 2014 Revision
More informationRingCentral for Desk. Admin Guide
RingCentral for Desk Admin Guide RingCentral for Desk Admin Guide Contents Contents Introduction... 3 About RingCentral for Desk........................................................... 4 About this
More informationBMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
More informationHow To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
More informationSend and receive encrypted e-mails
Manual Send and receive encrypted e-mails Bank J. Safra Sarasin Ltd Document Owner Security Classification Document Type Bank J. Safra Sarasin Ltd internal and external use Manual Document change history
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationRequest Manager Installation and Configuration Guide
Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationEndpoint Security VPN for Windows 32-bit/64-bit
Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
More informationMcAfee Network Security Platform 8.2
8.2.7.71-8.2.3.84 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.2 Revision B Contents About this release New features Enhancements Resolved Issues Installation instructions Known
More informationXenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...
More informationInvincea Advanced Endpoint Protection
SOLUTION OVERVIEW Invincea Advanced Endpoint Protection A next-generation endpoint security solution to defend against advanced threats combining breach prevention, detection, and response The battle to
More informationBEST PRACTICES WHITE PAPER. BMC BladeLogic Client Automation and Intel Core vpro Processors
BEST PRACTICES WHITE PAPER BMC BladeLogic Client Automation and Intel Core vpro Processors Table of Contents Introduction................................................... 1 About BMC.......................................................
More informationPI Cloud Connect. Frequently Asked Questions
PI Cloud Connect Frequently Asked Questions Version 1.0.5 Content FAQ...3 General questions... 3 Signing up... 4 Deployment... 5 Publishing... 5 Subscribing... 6 User accounts... 7 Security... 8 Pricing...
More informationMac OS X User Manual Version 2.0
Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
More informationAccessing the Online Meeting Room (Blackboard Collaborate)
Step 1: Check your System and Install Required Software NOTE: Make sure you are on the computer you will be using to access the online meeting room AND that you are using the internet browser (ie: firefox,
More informationTechnology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection
Technology Blueprint Secure Your Virtual Desktop Infrastructure Optimize your virtual desktop infrastructure for performance and protection LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
More informationWorkday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
More informationSecure Remote Access Give users in office remote access anytime, anywhere
Secure Remote Access Give users in office remote access anytime, anywhere June 2008 Introduction As organizations strive to increase productivity, secure remote access to network resources becomes increasingly
More informationGood MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
More informationSOLITEC products or services for which a separate privacy policy is provided.
1 of 9 Privacy Policy This Privacy Policy explains what information SOLITEC Software Solutions GesmbH and its related entities ( SOLITEC ) collect about you and why, what we do with that information, how
More informationWeb24 Supported Software
Web24 Supported Software Browser & OS Requirements Connectivity, hardware and browser support are critical to providing the best user experience within Web24. We work hard to make sure that Web24 renders
More informationHow To Use Kiteworks On A Microsoft Webmail Account On A Pc Or Macbook Or Ipad (For A Webmail Password) On A Webcomposer (For An Ipad) On An Ipa Or Ipa (For
GETTING STARTED WITH KITEWORKS DEVELOPER GUIDE Version 1.0 Version 1.0 Copyright 2014 Accellion, Inc. All rights reserved. These products, documents, and materials are protected by copyright law and distributed
More informationFrequently Asked Questions Ag Banking Online
Table of Contents Note: To quickly navigate to the answer, click on the question. What is Multi-Factor Authentication (MFA) and its purpose?... 2 This is my first time accessing the online application.
More informationPulse Secure Desktop Client
Pulse Secure Desktop Client Platforms Guide Product Release 5.1 Document Revision 2.0 Published: 2015-02-25 2015 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700 Zanker Road, Suite 200
More informationVirtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
More informationUSER GUIDE: MaaS360 Services
USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document
More informationReference Guide for WebCDM Application 2013 CEICData. All rights reserved.
Reference Guide for WebCDM Application 2013 CEICData. All rights reserved. Version 1.2 Created On February 5, 2007 Last Modified August 27, 2013 Table of Contents 1 SUPPORTED BROWSERS... 3 1.1 INTERNET
More informationForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
More informationThe UC Learning Center: Disabling Pop-Up Blockers
The UC Learning Center: Disabling Pop-Up Blockers In order to launch online courses within the UC Learning Center all pop-up blockers must be turned off. This guide will walk you through disabling pop-up
More informationContent Protection in Silverlight. Microsoft Corporation
Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting
More informationCertified Secure Computer User
Certified Secure Computer User Exam Info Exam Name CSCU (112-12) Exam Credit Towards Certification Certified Secure Computer User (CSCU). Students need to pass the online EC-Council exam to receive the
More information2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
More informationXerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationDIGITAL FORENSIC INVESTIGATION OF CLOUD STORAGE SERVICES
DIGITAL FORENSIC INVESTIGATION OF CLOUD STORAGE SERVICES Hyunji Chung, Jungheum Park, Sangjin Lee, Cheulhoon Kang Presented by: Abdiwahid Abubakar Ahmed, ID #201205820 2 OUTLINE 1. Introduction 2. Cloud
More informationHow To Sync Google Drive On A Mac Computer With A Gmail Account On A Gcd (For A Student) On A Pc Or Mac Or Mac (For An Older Person) On An Ipad Or Ipad (For Older People) On
Installation and Setup of Google Drive for Students on Mac OS X Purpose: This guide will lead you through the Google Drive Installation and Configuration. Pre-requisites: 1) ODU Student Gmail account 2)
More informationInstallation Guide. (You can get these files from http://www.clariostechnology.com/intelligentreports/install)
Clarios Technology Pty. Ltd. Intelligent Reporter Installation Guide Installing Intelligent Reports JIRA plugin The Intelligent Reports plugin for JIRA is available through the Atlassian Marketplace. Follow
More informationSophos SafeGuard Native Device Encryption for Mac quick startup guide. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac quick startup guide Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 2 Working with SafeGuard
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationRemote Access End User Reference Guide for SHC Portal Access
Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required
More informationWHITE PAPER. Domo Advanced Architecture
WHITE PAPER Domo Advanced Architecture Overview There are several questions that any architect or technology advisor may ask about a new system during the evaluation process: How will it fit into our organization
More informationCloud Security. Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs. peterjopling. 2011 IBM Corporation
Cloud Security Peter Jopling joplingp@uk.ibm.com IBM UK Ltd Software Group Hursley Labs peterjopling 2011 IBM Corporation Cloud computing impacts the implementation of security in fundamentally new ways
More informationMac OS X. Staff members using NEIU issued laptops and computers on Active Directory can access NEIU resources that are available on the wired network.
Mac OS X The University Technology Services is privileged to offer a secure wifi network to the university community. Connecting to this network will provide you with benefits in security and improved
More informationLearn More Cloud Extender Requirements Cheat Sheet
Learn More Cloud Extender Requirements Cheat Sheet Overview This document defines all requirements to ensure a successful installation of the MaaS360 Cloud Extender to enable use of ActiveSync Manager
More informationCyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
More informationUser-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
More informationInstructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
More informationInstalling CaseMap Server User Guide
Installing CaseMap Server User Guide CaseMap Server, Version 1.8 System Requirements Installing CaseMap Server Installing the CaseMap Admin Console Installing the CaseMap SQL Import Utility Testing Installation
More informationbbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5
bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft
More informationSophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
More informationWeb Class Configuration and Test Guide
Web Class Configuration and Test Guide Web class visual material is accessed via your web browser via the URL provided for each web class. The new Engage web class system supports most operating systems:
More informationSERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
More informationSECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
More informationCasper Suite. Security Overview
Casper Suite Security Overview JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave S Suite
More informationCisco Identity Services Engine
Cisco Identity Services Engine Secure Access Stefan Dürnberger CCIE Security Sourcefire Certified Expert Most organizations, large and small, have already been compromised and don t even know it: 100 percent
More informationAn Oracle White Paper Dec 2013. Oracle Access Management OAuth Service
An Oracle White Paper Dec 2013 Oracle Access Management OAuth Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may
More information