ITAR Compliant Data Exchange
|
|
- Agnes Hunter
- 8 years ago
- Views:
Transcription
1 ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams
2 WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/ Pharmaceutical Services/ Oil & Gas/Other 2
3 ITAR & EAR Regulations The International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR) were established by the U.S. Dept. of State to control the export of defense related technology and services. Specifically, all information and material related to ITAR Controlled Technology must be safeguarded from access by non U.S. persons unless a special license or exemption is obtained from the Dept. of State. WebSpace was architected from its inception (with funding from DARPA and input from the NSA) to provide a Private Cloud environment for secure, ITAR compliant content management and multi company collaboration. 3
4 WebSpace Platform = Private Cloud Solution Each WebSpace server is dedicated to a single host company and their designated trading partners Security model and hosting infrastructure specifically designed by leading aerospace and automotive manufacturers to support multi company project teams. Improves program execution while helping maintain ITAR compliance thru rapid deployment of secure, online project repositories. Low administrative overhead and economical subscription based licensing model. dl Outstanding track record of reliability and support 4
5 Core Platform Functionality Secure multi company project areas for cross firewall file sharing Document lifecycle management with enforced electronic approvals Action Item Manager Discussion forums Robust Reporting Full Text Search Engine with Security Filtering Flexible Administration Features Workflow driven eforms 5
6 3 Tier Architecture Data Center (or Customer Intranet) Firewall 1 Firewall 2 DMZ Internet DatabaseTier Application Tier Web Tier Port 1521 or 1443 Port 6802 HTTPS over Port 443 Remote Users Oracle or MS SQL Server Application Server with Java Servlet Engine called Resin Apache or IIS Web Server Active Directory Server (On premises installations only.) J2EE Application Supports all modern browsers You Host or We Host You Decide 6
7 Physical Security Data Center $100M SAS 70 Type II Certified Co Location Facility owned by AT&T with state of the art security, fire suppression, and backup power systems. On Internet backbone with fiber connections to all major telecom providers Strict physical access controls to facility, with no access to cages by non U.S. persons. 24/7 server monitoring and intrusion detection Nightly incremental tape backups and weekly full backups. Encrypted backup tapes moved to off site Iron Mountain storage facility every 30 days. Dedicated hardware and storage for our enterprise clients. Complete segregation of your dt data is provided. d Easy to move your data dt in house at any time. 7
8 Authentication Username and password authentication Password options include: Minimum and Maximum Password Ages Password length and format requirements Account lockouts after a configurable number of failed login attempts Automatic account deactivation i after a configurable duration of inactivity i i Optional Forgot Password function with configurable Password Hint options Ability to force re authentication upon approval of a workflow assignment. Customers who install WebSpace on premises can sync WebSpace user directory with Active Directory and optionally enable single sign on with their AD server. WebSpace also supports mixed mode authentication whereby internal users are authenticated against Active Directory and external users are authenticated via WebSpace WebSpace can also be customized for customers that require 2 factor authentication (i.e. username/password + FIPS certified hardware token or biometric device). 8
9 Data Transmission WebSpace guarantees the integrity of all data, content and messages during transmission & storage. Cyclic Redundancy Checking (CRC), Digital Certificates and 1024 bit SSL encryption protects data and insures it hasn t been corrupted during transmission. 9
10 Notifications Users are alerted to new documents, document revisions, task assignments and discussion threads via notifications. s sent from the WebSpace server never contain attachments, only links to reference documents. Anyone following such a link is first prompted to authenticate prior to gaining access to the document. All notifications from server are logged Customer specific legal/disclaimer text can be added to both the notifications and the login page to alert recipients of ITAR regulations. Upon first login, users must accept a Click through Agreement which can be modified to include customer specific terms of use. 10
11 User Management User Management on the WebSpace server can be: 1. Centralized and handled by one or more Server Admins who create separate companies on the server and add users to them. 2. Delegated across multiple Company Admins who can only administer users within their own company. User management is clearly l segregated tdfrom permissions i management in WebSpace. Server Administrators designate who can create and manage secure project areas containing ITAR and non ITAR data. The creator of a secure project area is called the Project Owner. The Project Owner retains sole control over what users are granted membership to their project area and what access rights each user has. (Even Server Admins do not gain access unless explicitly invited.) 11
12 Restricted User Safeguard Server Administrators can flag non U.S. persons as Restricted Users and ban them from Restricted Projects containing ITAR data Restricted users can not be inadvertently invited to Restricted Projects by Project Owners. This provides a secondary safeguard (beyonduser access permissions within a project area) to prevent ITAR violations. 12
13 Company Visibility Settings Server Administrators can also establish whether users from certain companies have visibility to each other within a secure Project Area. When users from different companies are members of the same secure project area, it is not always appropriate for them to be aware of one another. In competitive bidding or other situations, protecting user identities is paramount. Company visibility settings can keep suppliers and customers anonymous within competitive projects. 13
14 Permissions Management Content access permissions can be granted to individuals or roles within a secure project area, and can be established all the way down to the individual document level if desired. Default permissions are set at the top level of a project and are then inherited by folders and sub folders within that project. Setting user permissions to None at the top level of a project insures that access rights must be explicitly set at the individual folder level (a best practice in ITAR data environments). A Permissions view on every folder, document, task list, and eform within the project quickly identifies what users and/or roles have access to that the selected object. This view includes each user s company affiliation. A Project Permissions Report allows Project Owners to quickly identify what information a user can see across all objects in the project. Report allows display of explicit permissions, inherited permissions, or both. 14
15 This Project Permissions Report makes it easy to determine what content users or roles have access to within the project. 15
16 Secure Linking A Secure Link function allows a document to be shared without changing its permission settings or the permissions of its parent folder. Simply paste a link to a document in another folder, and that link will point users to the latest revision of the source document without letting them see anything else in the parent folder. Worth Noting The Links view of a document lists all the links to the document that have been placed elsewhere on the server. One or all of the existing links can be deleted from this view. 16
17 Auditing All user activity on the server is audited In the event that inadvertent access is granted to ITAR data or documents within a secure project area, robust audit reports allow admins to determine who actually accessed, viewed, and/or downloaded the information (and when). 17
18 Audit Scenarios Verify when and who inadvertently uploaded a document to the wrong project or folder. Verify whether a non U.S. person actually accessed and viewed a document during a time when it was mistakenly made available to them. Verify which secure projects areas certain users have been granted membership to. Verify what permissions users or roles have within given project areas. Verify what users have actually logged into the server from various companies during a given time frame and determine what IP address they came from. Verify how many distinct users have logged into the server during a given time period and what companies they are associated with. Verify how many active user accounts are currently enabled for each company on the server, and when each user last logged on. 18
19 Search Result Security Filtering A powerful full text search engine indexes documents immediately upon upload. Search results are filtered based on a user s project memberships and document permissions. (Users see only results they have the right to view or download.) 19
20 Workflow Driven eforms WebSpace can configure easy to use eforms with associated workflows to automate the review and approval of data export requests, system access requests, or other processes. All requests processed through WebSpace can be reported on, allowing real time visibility bl into pending approvals. Reporting also provides historical verification of all completed requests. 20
21 Task Manager A powerful Task Manager within each secure project area allows tasks/action items to be assigned and managed across your distributed project team. Tightly integrated with the document repository, tasks can contain linked reference attachments and can be used to collect critical document deliverables by assigned due dates. Tasks can be created manually or can be imported from a template, and each task can have one or more approvers who must approve the task prior to completion. A dashboard view shows real time task status information and allows for rapid task editing in a spreadsheet like user interface. 21
22 Exporting Projects Upon the termination of a project or program managed in WebSpace, it s important to be able to export your project data in a neutral format. For a professional services fee, WebSpace project meta data can be exported in a.xml file along with all project documents in an associated.zip file and shipped to customer on DVD or USB drive. Included on DVD or USB drive is a basic data browser that allows you to search and browse the XML project data file outside the system. Fee based on current hourly professional services rate. If needed, the exported XML project file can be imported back into the production server at a later date. Note: Any project export file re imported back into WebSpace will be stripped of its previous membership list and access permissions. Users will need to be re invited to the project after import and granted the appropriate access rights. 22
23 ITAR Best Practices 2 Approaches Option 1 Option 2 Flag all Non U.S. Persons on your server as Restricted Users. Store/share ITAR data only within Restricted WebSpace Project areas. Restricted WbS WebSpace Projects are completely ltl off limits it to Restricted t dusers. Simple to administer, but prevents you from having a mix of U.S. and non U.S. persons in the same Project. No risk of granting the wrong document access rights to a Non U.S. Person within a Project. In lieu of using the Restricted user flag, Server Admin(s) should group all Non U.S. persons in the WebSpace User Directory within special Departments/Organizations under each Company listing. Each WebSpace Project Owner should then create a U.S. Persons and a Non U.S. Persons role within their Project. To grant someone project membership, they should be added to one of these two roles from the WebSpace User Directory. Project Owners should use these roles to establish folder access permissions within their Project. This approach requires a few more administration steps, but it allows for a mix of U.S. citizens/greencard holders and non U.S. citizens/greencard holders in the same Project while maintaining proper access control. 23
24 ITAR Best Practices (Option 1) Restricted Projects/Users WebSpace Server Server Admin: Sets up Companies, Departments, and Users. All Non U.S. Persons are flagged as Restricted users by the server Admin. Once flagged as Restricted they can never be added to a Restricted project area on the server. Company A Company B Company C Organization/Department User 1 Unrestricted User 2 Unrestricted Organization/Dept. within Company A Organization/Department User 3 Unrestricted User 4 Restricted Organization/Dept. within Company B Organization/Department User 5 Unrestricted User 6 Restricted Organization/Dept. within Company C Project Members: Project X (Restricted Project Area) Company A Company B Company C User 1 User 2 User 3 User 5 Project Owner: Creates Restricted project area with folder structure to contain ITAR data. Project Owner is prevented from inviting any users to their project who have been flagged as Restricted by the Server Admin. ITAR Docs User 1 User 2 (Read Write) (Read Only) User 3 (Read Write) User 5 (No Permission) 24
25 ITAR Best Practices (Option 2) Unrestricted Projects WebSpace Server Server Admin: Sets up companies and users and groups all users in each company within Organizations/Departments. These groupings are used to segregate individuals based on their U.S. citizenship/greencardstatus. Company A Company Admins: The Server Admin can assign company specific admins to assist with user management. Company C Organization/Department Organization/Department Organization/Department U.S. Persons Non U.S. Persons U.S. Persons Non U.S. Persons U.S. Persons Non U.S. Persons User 1 User 4 User 5 User 7 User 8 User 10 User 2 User 6 User 9 User 11 Project Members: ITAR Docs Project X (Unrestricted Project Area) U.S. Persons Project Role User 1 User 5 User 4 U.S. Persons Role (Read Write) Non U.S. Persons Project Role Non U.S. Persons Role (No Permission) User 7 User 11 Project Owner: Creates Unrestricted project area and invites both U.S. and Non U.S. Persons to their project by browsing companies setup by Server Admin. Uses Project Roles to control access rights to specific folders containing ITAR data. Non ITAR Docs U.S. Persons Role (Read Write) Non U.S. Persons Role (Read Write) 25
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
More informationOkta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
More informationSecurity Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationHow To Use Egnyte
INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information
More informationSecure Data Hosting. Your data is our top priority.
Secure Data Hosting Your data is our top priority. ESO s world-class security infrastructure is designed to provide data redundancy, security and availability while keeping sensitive HIPAA and PHI information
More informationSECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
More informationPrint4 Solutions fully comply with all HIPAA regulations
HIPAA Compliance Print4 Solutions fully comply with all HIPAA regulations Print4 solutions do not access, store, process, monitor, or manage any patient information. Print4 manages and optimize printer
More informationUSC Marshall School of Business ShareFile_With_Outlook_Client_v2.docx 6/12/13 1 of 9
About ShareFile When you wish to send someone a file or need a file from someone else, your best option is to use ShareFile. It not only provides increased security by automatically encrypting files but
More informationSETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.
SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. 1. Setting up your network to allow incoming connections on ports used by Eyemax system. Default ports used by Eyemax system are: range of ports 9091~9115
More informationGroup Management Server User Guide
Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring
More informationTableau Online Security in the Cloud
Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important
More informationSystem Administration Training
Table of Contents 1 Components: Web Server Components: SQL Server 3 Components: File System 4 Components: Other Components 5 Server Configuration: Pre-Requisites 6 Server Configuration: Running the Installer
More informationUser Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
More informationFileMaker Server 13. Getting Started Guide
FileMaker Server 13 Getting Started Guide 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
More informationSystem Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationEnsuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
More informationSynchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
More informationPolycom CMA System Upgrade Guide
Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or
More informationUser's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
More informationSoftware Update Bulletin
Introducing SendSuite Tracking February 2010 Purpose This bulletin is released to advise SendSuite Tracking users of the new features, enhancements, and improvements in the evolution of the Internal Tracking
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationowncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
More informationUSERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM
USERS MANUAL FOR OWL A DOCUMENT REPOSITORY SYSTEM User Manual Table of Contents Introducing OWL...3 Starting to use Owl...4 The Logging in page...4 Using the browser...6 Folder structure...6 Title Bar...6
More informationConfiguration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
More informationIntroweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationMultiSite Manager. User Guide
MultiSite Manager User Guide Contents 1. Getting Started... 2 Opening the MultiSite Manager... 2 Navigating MultiSite Manager... 2 2. The All Sites tabs... 3 All Sites... 3 Reports... 4 Licenses... 5 3.
More informationNETWRIX USER ACTIVITY VIDEO REPORTER
NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationArchitecture, Implementations, Integrations, and Technical Overview
Architecture, Implementations, Integrations, and Technical Overview Introduction System Architecture & Infrastructure Implementation Parent Portal Medical Center Strategy Integrations SIS Immunization
More informationowncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
More informationXerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
More informationInstallation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
More informationLive Guide System Architecture and Security TECHNICAL ARTICLE
Live Guide System Architecture and Security TECHNICAL ARTICLE Contents 1. Introduction... 2 2. Hosting Environment... 2 2.1. Standards - Compliancy... 3 2.2. Business Continuity Management... 3 2.3. Network
More informationSecurity Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
More informationTeamViewer 9 Manual Management Console
TeamViewer 9 Manual Management Console Rev 9.2-07/2014 TeamViewer GmbH Jahnstraße 30 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About the TeamViewer Management Console... 4 1.1 About the
More informationPRiSM Security. Configuration and considerations
PRiSM Security Configuration and considerations Agenda Security overview Authentication Adding a User Security Groups Security Roles Asset Roles Security Overview Three Aspects of Security Authentication
More informationFileMaker Server 15. Getting Started Guide
FileMaker Server 15 Getting Started Guide 2007 2016 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
More informationAdobe Digital Publishing Security FAQ
Adobe Digital Publishing Suite Security FAQ Adobe Digital Publishing Security FAQ Table of contents DPS Security Overview Network Service Topology Folio ProducerService Network Diagram Fulfillment Server
More informationGetting Started With SAM Director SAM Director User Guide
Getting Started With SAM Director SAM Director User Guide Copyright 2014 License Dashboard Limited. License Dashboard Limited is a trading subsidiary of the Blenheim Group. License Dashboard Limited -
More informationIntroduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
More informationby New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document
Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.
More informationIntunex Oy Skillhive Service Description 1 / 6
Intunex Oy Skillhive Service Description 1 / 6 About Skillhive Skillhive is a social business application designed for connecting and sharing expertise within organizations. Skillhive enables employees
More informationSecure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012
Secure Installation and Operation of Your Xerox Multi-Function Device Version 1.0 August 6, 2012 Secure Installation and Operation of Your Xerox Multi-Function Device Purpose and Audience This document
More informationIntroduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
More informationSecurity FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
More informationUse of Exchange Mail and Diary Service Code of Practice
Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are
More informationHow To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
More informationXerox Digital Alternatives Security and Evaluation Guide. May 2015 Version 1.1
Xerox Digital Alternatives Security and Evaluation Guide May 2015 Version 1.1 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and CompleteView are trademarks of Xerox Corporation
More informationqliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationUNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
More informationPassword Reset PRO INSTALLATION GUIDE
Password Reset PRO INSTALLATION GUIDE This guide covers the new features and settings available in Password Reset PRO. Please read this guide completely to ensure a trouble-free installation. March 2009
More informationOutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does
More informationTableau Server Security. Version 8.0
Version 8.0 Author: Marc Rueter Senior Director, Strategic Solutions, Tableau Software June 2013 p2 Today s enterprise class systems need to provide robust security in order to meet the varied and dynamic
More informationSecurity Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
More informationConfiguration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationFileMaker Security Guide The Key to Securing Your Apps
FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account
More informationBlue Jeans Network Security Features
Technical Guide Blue Jeans Network Security Features Blue Jeans Network understands an organization s need for secure communications. The Blue Jeans cloud-based video conferencing platform provides users
More informationThe Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should
More informationDropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
More informationAdministration Guide. WatchDox Server. Version 4.8.0
Administration Guide WatchDox Server Version 4.8.0 Published: 2015-11-01 SWD-20151101091846278 Contents Introduction... 7 Getting started... 11 Signing in to WatchDox... 11 Signing in with username and
More informationShareFile Security Overview
ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The
More informationSysax Multi Server User manual
Sysax Multi Server User manual Table of Contents 1. Introduction to Sysax Multi Server... 1 1.1. Introduction to Sysax Multi Server... 2 2. Minimum System Requirements... 4 2.1. System Requirements...
More informationFamly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
More information10 Ways to Avoid Ethics Dangers in the Cloud
877.557.4273 catalystsecure.com ARTICLE 10 Ways to Avoid Ethics Dangers in the Cloud Is Cloud Computing Bob Ambrogi, Esq. Director of Communications, Catalyst Repository Systems Is Cloud Computing Ethical
More informationProjectmates User Guide for Montclair State University Facilities Construction Projects
Projectmates User Guide for Montclair State University Facilities Construction Projects Systemates, Inc. Dallas, Texas 214.217.4100 www.montclair.edu/projectmates Copyright 2013 Systemates, Inc. Page 1
More informationMedia Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
More informationfåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.
More informationNEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
More informationSECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions
SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationSaaS Security for Confirmit Horizons
SaaS Security for Confirmit Horizons January 2015 Confirmit Horizons v18.5 Arnt Feruglio Chief Operating Officer The Confirmit Horizons Software From its inception in 1997, the architecture and code of
More informationBlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
More informationSoonr Workplace Enterprise Plan Overview
This document is an overview of the features that are included in the Soonr Workplace Enterprise Plan. The Enterprise Plan is designed for the specific needs of IT departments in larger companies where
More informationSecurity Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
More informationMcAfee Endpoint Encryption for PC 7.0
Migration Guide McAfee Endpoint Encryption for PC 7.0 For use with epolicy Orchestrator 4.6 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationInstalling and configuring Microsoft Reporting Services
Installing and configuring Microsoft Reporting Services Every company, big or small has to use various tools to retrieve data from their Databases. IT departments receive many different requests for data
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationInstallation Guide. SafeNet Authentication Service
SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationAudit Management Reference
www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationProduct Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationMS 10972A Administering the Web Server (IIS) Role of Windows Server
MS 10972A Administering the Web Server (IIS) Role of Windows Server Description: Days: 5 Prerequisites: This course provides students with the fundamental knowledge and skills to configure and manage Internet
More informationInstallation Guide for contineo
Installation Guide for contineo Sebastian Stein Michael Scholz 2007-02-07, contineo version 2.5 Contents 1 Overview 2 2 Installation 2 2.1 Server and Database....................... 2 2.2 Deployment............................
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationGetting Started With Halo for Windows
Getting Started With Halo for Windows For CloudPassage Halo Protecting your Windows servers in a public or private cloud is much easier and more secure with CloudPassage Halo for Windows. Halo for Windows
More informationHP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationCTERA Agent for Mac OS-X
User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationNetWrix SQL Server Change Reporter
NetWrix SQL Server Change Reporter Version 2.2 Administrator Guide Contents NetWrix SQL Server Change Reporter Administrator Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW
More informationPI Cloud Connect Overview
PI Cloud Connect Overview Version 1.0.8 Content Product Overview... 3 Sharing data with other corporations... 3 Sharing data within your company... 4 Architecture Overview... 5 PI Cloud Connect and PI
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationGE Measurement & Control. Remote Comms System. Installation and User Reference Guide
GE Measurement & Control Remote Comms System Installation and User Reference Guide Contents BENEFITS OF REMOTE COMMS SYSTEM... 1 HOW THE REMOTE COMMS SYSTEM WORKS... 3 COMPONENTS OF REMOTE COMMS SYSTEM...
More informationSonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More information