SafeNet Authentication Service Security Considerations
|
|
|
- Abner Newton
- 10 years ago
- Views:
Transcription
1 SafeNet Authentication Service Security Considerations Publication Date: Nov Revision 1.1
2 Information provided is confidential and proprietary to SafeNet, Inc. ( SafeNet )
3 Executive Summary Service robustness is one of the main concerns when enterprises are considering a cloud-based offering; even more so when the offering is a fundamental data security solution, such as strong authentication and identity management. This document discusses the measures SafeNet has taken in ensuring the robustness of SafeNet Authentication Service. Major Takeaways SafeNet Authentication Service is designed to ensure a multi-tenant/multi-tier architecture, ensuring data separation between tenants of the service. The scalable architecture of SafeNet Authentication Service ensures high availability and disaster recovery. OTP Seed data is protected using FIPS certified hardware security modules, ensuring that authentication sensitive data is never exposed. Customer user directories are synched with SafeNet Authentication Service using a lightweight synchronization agent. All communication between this agent and the service point of presence (POP) is encrypted with AES256 encryption running on Secure Tunnel. Service Points of Presence run at military grade datacenters, ensuring physical protection, network protection and monitoring, and network and power resilience. SafeNet is periodically running penetration tests by third-party auditors to ensure the robustness of the service. SafeNet Authentication Service is undergoing ISO certification, as well as SAS 70 certification, with the expectation to finalize these processes in
4 Introduction For more than a decade, the software industry has been shifting towards service-based solution delivery and information security solutions in general, with specific focus on multi-factor authentication. According to Gartner s User Authentication Magic Quadrant 2012, By 2017, more than 50 percent of enterprises will choose cloud-based services as the delivery option for new or refreshed user authentication implementations, up from less than 10 percent today. One of the main concerns when moving to a cloud-based/service delivery model is the robustness and availability of the solutions. These concerns become an even bigger issue when delivering info-security solutions from the cloud as a service, and more so when offering a fundamental solution, such as user authentication service, which is usually the most important layer in the organization s info-security architecture. SafeNet, a leader in the user authentication and data protection markets, sees great importance in assuring its customers that info-security services offered by SafeNet will comply with the highest standards of data protection for managed services. SafeNet considers protection of sensitive information as critical for the success of SafeNet Authentication Service. Compliance to the standards and regulations of generally-managed services, as well as to specific information security management systems, continues to be at the forefront of SafeNet s strategy. Currently, SafeNet is undergoing ISO certification, with the expectation to finalize this process in This document discusses the security and data protection methodologies and technologies SafeNet uses to ensure the robustness and continuous availability of SafeNet Authentication Service. It starts with a discussion on the technologies needed to ensure the protection of SafeNet Authentication Service sensitive and critical data, as well as to ensure the high availability of the service. The document also discusses the operational aspects of ensuring the robustness of the service, including a description of the Point of Presence (PoP) for the service, and the way the equipment and service is set up to meet the defined level of robustness. At the end of the document, the development process of SafeNet Authentication Service is outlined, highlighting the process for eliminating security vulnerabilities in the code that runs at the heart of the service. 2
5 Using Security Technologies to Ensure the Robustness of SafeNet Authentication Service General Service Architecture Figure 1 illustrates SafeNet Authentication Service architecture. Each of the two points of presence (PoP) is a replica of the other, and the architecture is scalable in the sense that more PoPs and more service instances per PoPs can be added to support more authentication traffic, as well as additional geographic regions. User data is synchronized from the customer s user repository to the hosted environment using SafeNet Authentication Service s Directory Sync Agent, and a secure tunnel between the agent and the users database in the PoP. Authentication requests are handled by RADIUS and SAML protocols that are considered to be secured and trusted. Access to the service for customers and service providers is delivered via the Administrator s Portal. Connection to this portal is secured via HTTPS, ensuring that users have a secure connection from their browsers. Prior to being given access to the portal, each administrator must authenticate to the service using their dedicated two-factor authentication token. Multi-Tenant and Multi-Tier Figure 1: SafeNet Authentication Service High-Level Architecture SafeNet Authentication Service works in a secure multi-tenant environment, where the information of each account is separated from one another, and administrators have access only to the users that 3
6 belong to their account. The sensitive information related to a specific account is stored with an AES256 encryption key. Keys are created, stored, and maintained through a Windows Data Protection API (DPAPI). The use of Windows DPAPI ensures that encryption keys are protected by Windows, and that they cannot be copied to another system. Note that any attempt to access information in the service database requires an encryption key. These encryption keys are needed not only for reading the data but also for copying, moving, deleting, or restoring items (rows) in the database. SafeNet Authentication Service uses a hierarchy of parent-child relationships for all accounts, whereby there is a central root account from which all sub-accounts are derived, up to an infinite level. That being said, privacy is protected in the chain, as an account can only be viewed and managed by its parent unless the account has explicitly delegated control to its grandparent or has explicitly invited an external operator to manage its operation. Figure 2 illustrates such a multi-tier environment. User Store Synchronization Figure 2: SAS in Multi-Tier Environment Synchronization between a customer s User Store and the SafeNet Authentication Service User Repository is performed using an on-premise agent, which supports a large number of user stores and databases, including LDAP, Active Directory, and many more. The agent s key features are: LDAP Support: The agent can be used with almost any LDAP Directory Server. The agent supports custom LDAP schemas. 4
7 Non-Intrusive: The agent does not write to the user repository and does not require any scheme change. An administrator account is not required in order to connect to the Directory Server. Multiple Directory Servers can be synchronized. Secure Tunnel: All communication between the Synchronization Agent and SafeNet Authentication Service is encrypted with AES 256 encryption. In addition, an SSL secure tunnel is supported between the LDAP Synchronization Agent and the LDAP Directory Server. AES key exchange is done by AES key wrapping using RSA 1024-bit keys. OTP Seed Protection One Time Password solutions use a shared secret between the user s authenticator and the authentication system, which serves as a root of trust from which a publicly known mechanism creates the random One Time Password. These shared secrets are called OTP Seeds and they are the root of trust between the authenticators and the authentication server, protecting mainly confidentiality but also integrity. SafeNet Authentication Service encrypts the OTP seeds database, and uses FIPS Level 3-certified Hardware Security Module (HSM) to protect the system s confidentiality and integrity by protecting the seeds. In addition, the HSM is used to manage the keys needed to encrypt the other parts of the system. Hardware Security Modules (HSMs) are secure cryptographic processing appliances targeted mainly at managing and protecting encryption keys, and accelerating the cryptographic processes (in that sense, it acts as a cryptographic accelerator) for high-performance environments. The use of HSMs ensures that OTP seed records and authentication secrets never exist in a decrypted form in the host memory and cannot be copied or stolen. The FIPS Level 3 HSM is tamper-resistant, protected from physical or logical attempts to break into the device and gain access to the keys. The use of HSMs to protect the service OTP seeds provides a unique level of security, and ensures robust and secure service delivery. 5
8 SafeNet Authentication Service Operations Security and Compliance SafeNet Authentication Service operational security and robustness are at the top of the deployment strategy. The service is based on a number of strategically located global Points-of-Presence (PoP). The datacenters are fully redundant at every point, be it Internet connectivity, network switching, or application and database access between the centers, as well as hot standby of all equipment within the datacenters themselves. Compliance is also at the top of SafeNet s priorities. SafeNet Authentication Service is currently undergoing ISO certification, as well as SAS 70 certification. These two processes are expected to be completed in The next sub-sections discuss the security, robustness, and business continuity of SafeNet Authentication Service, with focus on operational aspects in the service Points of Presence. Points of Presence and Compliance SafeNet Authentication Service is deployed using two Point of Presence (PoP), where one PoP is in the UK and the other is in Canada. The SafeNet Authentication Service PoPs are both certified, and both ensure network separation between applications and allow for multi-factor authentication for specific applications (refer to the next sub-sections for more details). All of these are mandatory requirements to ensure PCI-DSS compliance. The two PoPs are working under Canada s Personal Information Protection and Electronic Documents Act (PIPEDA), ensuring that sensitive information is protected under the Canadian privacy law and that the Canadian PoP complies with EU privacy regulations and vice versa. Datacenter Access Control and Physical Security Physical security underpins any cloud-based service and so all datacenters have 24-hour manned security, including foot patrols and perimeter inspections with biometric scanning for access. SafeNet datacenters are fully equipped with video surveillance throughout each facility and their perimeters with tracking of asset removal, ensuring that equipment and security of data held within that equipment is assured. SafeNet s equipment within the datacenter is housed within dedicated concrete-walled rooms, with all computing equipment located in access-controlled steel cages again assuring a high level of protection over both equipment and data. The following is a list of physical security features of SafeNet Authentication Service PoPs: Each PoP is surrounded by 3.5 meter/11.5 feet high perimeter fence. Army-trained guard dogs patrol the perimeter fence. The PoPs walls are 3 meter/10 feet thick. All doors within the datacenter are made of solid steel. Video surveillance cameras are spread throughout each facility. Protection against electromagnetic pulse attacks. 24x7 manned protection - no unsecured access to the datacenter. Three-factor authentication used for entrance to the datacenter. 6
9 Network Resilience Each PoP is provided with multi-vendor and neutral-network connections to major Internet Service Providers (ISPs), and is located near major Internet hubs so that SafeNet can retain the ability to select the most resilient network at any time. Network connections to the datacenters are provided using secure links with high-capacity bandwidth over fiber connections to ensure minimum latency of authentication requests turn-around. All fiber-based connections enter the datacenter buildings via secure concrete vaults. The internal network infrastructure of the PoP is built upon a high-speed fiber based network to ensure high-capacity throughput. This infrastructure uses multiple connections through highly secured network firewalls and routers to deliver full redundancy, as well as optimal traffic delivery. The following is a list of network security features of SafeNet Authentication Service PoPs: Datacenters are network carrier neutral Multiple fiber channels at each datacenter Use of multiple Internet service providers to ensure continuous and high-bandwidth Internet access Power Supply Redundancy Power is delivered to the datacenters using an underground utility power feed, which is then supplemented and backed up by on-site redundant (N+1) diesel generators with local diesel fuel storage. Power is delivered into the rooms via redundant (N+1) CPS/UPS systems to ensure ongoing supply, with power delivered to the PoP equipment racks using redundant power distribution units (PDUs). Redundant air conditioning units guarantee stable temperature and humidity levels that are needed for proper operation of the datacenters. Disaster Recovery Each user s access device will typically be set up to connect to both a primary and a secondary PoP. As SafeNet Authentication Service performs real-time data replication between datacenters, should the primary connection fail, the customer s device will automatically authenticate users to the secondary PoP without any service interruption. Data between PoPs is transmitted across encrypted links using AES256-based encryption to create a trusted and secure tunnel between the sites. Regular disaster recovery tests are conducted to verify projected recovery times, as well as prove the ongoing integrity of customer data within the PoPs. Network Security and Monitoring Assuring Integrity Within each PoP, a sophisticated network of routers and firewalls ensures network separation, integrity, and confidentiality of the data and access to that data. Within the network itself, internal firewalls segregate traffic between the application and database tiers to ensure confidentiality and integrity, as well as deliver a high level of availability. 7
10 Intrusion detection monitoring is deployed throughout the internal network in order to capture and report events to a security event management system for logging, alerts, and reports thus delivering a high degree of network traffic auditability. A third-party service provider continuously scans the network externally and alerts changes in the baseline configuration to increase audit levels. Additional levels of network traffic monitoring are conducted on a 24x7 basis across key points within the infrastructure and automated reports are delivered on a daily basis to the network administrator. Service Penetration Testing SafeNet undergoes regular application and network penetration testing by third parties. The assessment methodology includes structured review processes based on recognized best-in-class practices as defined by such methodologies as the ISECOM's Open Source Security Testing Methodology Manual (OSSTMM), the Open Web Application Security Project (OWASP), Web Application Security Consortium (WASC), and ISO Information Security Standard. A grey-box approach of application security audit is adopted for the purpose of the audit. Figure 3 shows the security attack vectors that are usually being tested during such tests. To date, no major security issues were found in these penetration tests, and all minor issues are being fixed as part of the regular development cycle. Figure 3: Application security attack vectors tested in Penetration Testing 8
11 SafeNet Secure Application Development Lifecycle To ensure service security and robustness, SafeNet engineering teams are working using a strict Application Development Lifecycle method. SafeNet Authentication Service is developed using the Agile development method that ensures quick yet reliable turnaround between requirements gathered until service delivery. The Agile methodology enables SafeNet to react fast to new risks and changes in the global threat analysis. Requirements Definition Product managers gather requirements as part of their day-to-day duties. According to SafeNet development methodology these requirements are turned into User Stories. The input for these User Stories arrives from analysis of the market, and requirements from SafeNet prospects and customers, as well as innovative ideas coming from SafeNet CTO office or from the engineering teams. As part of this step, a threat model is being carried out. The process considers the macro cyber-security environment and all known attacks. Changes to the current working assumptions are translated into User Stories and gain high priority in the Sprint Planning (see below). Sprint Planning Development sprints are scheduled once in a number of weeks. For each sprint, product management, engineering leaders, and a representative from the CTO office evaluate the User Stories that are still open and decide on the content of the sprint. Implementation Code is being implemented. As part of the engineering process, code undergoes source code review. Code reviews and walk-throughs are conducted regularly using a structured approach. A particular emphasis is being put on security and making the system invulnerable to threats. Unit testing is done by each developer. Sprint Testing As all the different teams working on a specific sprint hand in their developed code, sprint testing is being carried out by SafeNet Quality Assurance group, who perform black-box testing on the entire sprint code. Service Update Upon Product Management decision, all development is done in sprints since the latest service update has been released. Prior to the actual service update, the following tasks are being performed: Provisioning Testing: Equal in its scope to alpha testing in product development. This is done on the updated service in a controlled environment and performed by SafeNet Cloud Operations team. With the conclusion of these tests, the code has successfully passed three rounds of testing, each done by a different group. Unit testing done by the developer, Sprint Code Testing done by the QA group and Service Update Provisioning Testing done by Cloud operations. 9
12 A Planned Release Notification (PRN) is sent to all existing customers notifying them on the scope of the update and planned date of the actual service update. Penetration testing: Penetration testing is usually done on a dedicated system that is not in use but runs in the same environment as the operational service. As penetration testing may cause service disruption, SafeNet is running these tests on non-operational services. At the last stage, all data is backed up from the operational service, which allows SafeNet to roll back immediately in case of unexpected catastrophe. 10
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
Protect Everything: Networks, Applications and Cloud Services
Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active
Enterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%
Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
ProjectManager.com Security White Paper
ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for
Secure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
Cloud Contact Center. Security White Paper
Cloud Contact Center Security White Paper Introduction Customers communicate with organizations in a variety of forms from phone conversations to email, web chat and social media. As each interaction may
Level I - Public. Technical Portfolio. Revised: July 2015
Level I - Public Technical Portfolio Revised: July 2015 Table of Contents 1. INTRODUCTION 3 1.1 About Imaginatik 3 1.2 Taking Information Security Seriously 3 2. DATA CENTER SECURITY 3 2.1 Data Center
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
Security from a customer s perspective. Halogen s approach to security
September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving
How To Make A Multi-Tenant Platform Secure And Secure
Authentication As A Service Why new Cloud based Authentication solutions will be adopted by about 50% of the companies by 2017? Jason Hart CISSP CISM VP Cloud Solutions What a great world Today's World
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Addressing Cloud Computing Security Considerations
Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft
BeBanjo Infrastructure and Security Overview
BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
Secure and control how your business shares files using Hightail
HIGHTAIL FOR ENTERPRISE: SECURITY OVERVIEW Secure and control how your business shares files using Hightail Information the lifeblood of any business is potentially placed at risk every time digital files
Ensuring the Security of Your Company s Data & Identities. a best practices guide
a best practices guide Ensuring the Security of Your Company s Data & Identities Symplified 1600 Pearl Street, Suite 200» Boulder, CO, 80302» www.symplified.com» @Symplified Safe and Secure Identity Management
Birst Security and Reliability
Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their
Understanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview
Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD
PROTECTING YOUR VOICE SYSTEM IN THE CLOUD Every enterprise deserves to know what its vendors are doing to protect the data and systems entrusted to them. Leading IVR vendors in the cloud, like Angel, consider
Frankfurt Data Centre Overview
Technical Services Briefing Document Frankfurt Data Centre Overview Version 2.1 Contents Introduction... 3 TelecityGroup Data Centre in Frankfurt... 4 Data Centre Characteristics... 4 Technologies in Use
CLOUD FRAMEWORK & SECURITY OVERVIEW
CLOUD FRAMEWORK & OVERVIEW From small businesses to the largest Fortune 500 Enterprises, customers trust the irise cloud infrastructure when collaborating to define and design their applications. This
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
Perceptive Software Platform Services
Perceptive Software Platform Services CLOUD SOLUTIONS process and content management Perceptive Software Platform Services Perceptive Software process and content management systems have been deployed
Privacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
SITECATALYST SECURITY
SITECATALYST SECURITY Ensuring the Security of Client Data June 6, 2008 Version 2.0 CHAPTER 1 1 Omniture Security The availability, integrity and confidentiality of client data is of paramount importance
How To Use Egnyte
INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information
TOP SECRETS OF CLOUD SECURITY
TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3
Xerox Digital Alternatives Security and Evaluation Guide. May 2015 Version 1.1
Xerox Digital Alternatives Security and Evaluation Guide May 2015 Version 1.1 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and CompleteView are trademarks of Xerox Corporation
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Our Key Security Features Are:
September 2014 Version v1.8" Thank you for your interest in PasswordBox. On the following pages, you ll find a technical overview of the comprehensive security measures PasswordBox uses to protect your
StratusLIVE for Fundraisers Cloud Operations
6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace
CloudDesk - Security in the Cloud INFORMATION
CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES
Keyfort Cloud Services (KCS)
Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency
Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity
Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516) 773-3533 Ekartha India Pvt. Ltd. 814/B Law College Road Demech House, 4th Floor Erandwane, Pune, India Email: [email protected] Web:
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities. 8.1.1 Inventory of assets. Tripwire IP360 provides comprehensive host
Open Data Center Alliance Usage: Provider Assurance Rev. 1.1
sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS
How To Protect Your Cloud Computing Resources From Attack
Security Considerations for Cloud Computing Steve Ouzman Security Engineer AGENDA Introduction Brief Cloud Overview Security Considerations ServiceNow Security Overview Summary Cloud Computing Overview
Xerox Litigation Services. In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk
Xerox Litigation Services In the Cybersecurity Hot Seat: How Law Firms are Optimizing Security While Reducing Cost and Risk Your Highest Priority is also Your Greatest Challenge Data breaches are not just
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
Anypoint Platform Cloud Security and Compliance. Whitepaper
Anypoint Platform Cloud Security and Compliance Whitepaper 1 Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security.
Security & Infra-Structure Overview
Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
Security Whitepaper. NetTec NSI Philosophy. Best Practices
Security Whitepaper NetTec NSI provides a leading SaaS-based managed services platform that to efficiently backup, monitor, and troubleshoot desktops, servers and other endpoints for businesses. Our comprehensive
YubiCloud OTP Validation Service. Version 1.2
YubiCloud OTP Validation Service Version 1.2 5/12/2015 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship product, the YubiKey, uniquely
Cloud Management. Overview. Cloud Managed Networks
Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Security and Data Protection for Online Document Management Software
Security and Data Protection for Online Document Management Software Overview As organizations transition documents and company information to Software as a Service (SaaS) applications that are no longer
Nuance OnDemand provides security and reliablity.
provides security and reliablity. Achieving the highest level of security within IVR, Web and mobile customer service applications while meeting the challenges of security certification, compliance and
SAS 70 Type II Audits
Thinking from IntraLinks SAS 70 Type II Audits SAS 70 Type II Audits Ensuring Data Security, Reliability and Integrity If your organization shares sensitive data over the Internet, you need rigorous controls
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105
OCTOBER 2015 TAULIA SUPPLIER ARCHITECTURE OVERVIEW TAULIA 201 MISSION STREET SAN FRANCISCO CA 94105 CONTENTS OVERVIEW 3 SOFTWARE DESIGN 3 CUSTOMER ARCHITECTURE.. 4 DATA CENTERS. 4 RELIABILITY. 5 OPERATIONS
TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4
TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6 TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 Cloud services (Data Centre) and related Functional requirement Cloud services as a Control
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Mirantis OpenStack Express: Security White Paper
Mirantis OpenStack Express: Security White Paper Version 1.0 2005 2014 All Rights Reserved www.mirantis.com 1 Introduction While the vast majority IT professionals are now familiar with the cost-saving
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
Blue Jeans Network Security Features
Technical Guide Blue Jeans Network Security Features Blue Jeans Network understands an organization s need for secure communications. The Blue Jeans cloud-based video conferencing platform provides users
Tableau Online Security in the Cloud
Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important
Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption
THE DATA PROTECTIO TIO N COMPANY Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption whitepaper Executive Summary Long an important security measure, encryption has
Clever Security Overview
Clever Security Overview Clever Security White Paper Contents 3 Introduction Software Security 3 Transport Layer Security 3 Authenticated API Calls 3 Secure OAuth 2.0 Bearer Tokens 4 Third Party Penetration
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
Clarizen Security White Paper
WHITE PAPER Clarizen Security White Paper Standards and Practices UNITED STATES 1.866.502.9813 UNITED KINGDOM +44.0.20.3411.2345 ISRAEL +972.9.794.4300 FRANCE +33.18.28839.66 www.clarizen.com Table of
Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud
Simone Brunozzi, AWS Technology Evangelist, APAC Fortress in the Cloud AWS Cloud Security Model Overview Certifications & Accreditations Sarbanes-Oxley (SOX) compliance ISO 27001 Certification PCI DSS
Famly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
Citrix GoToAssist Service Desk Security
Citrix GoToAssist Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. 2 Many service
Advanced Service Desk Security
Advanced Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. gotoassist.com Many service
SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
YubiCloud Validation Service. Version 1.1
YubiCloud Service Version 1.1 5/29/2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship product, the YubiKey, uniquely combines
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Security and Managed Services
iconnect Cloud Archive System Overview Security and Managed Services iconnect Cloud Archive (formerly known as Merge Honeycomb ) iconnect Cloud Archive offers cloud-based storage for medical images. Images
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Enterprise Architecture Review Checklist
Enterprise Architecture Review Checklist Software as a Service (SaaS) Solutions Overview This document serves as Informatica s Enterprise Architecture (EA) Review checklist for Cloud vendors that wish
EmpLive Technical Overview
Version 1.6 Updated 27/08/2015 Support: +61 2 8399 1688 Email: [email protected] Website: wfsaustralia.com Legal Notice Copyright WFS: A WorkForce Software Company. All Rights Reserved. By receiving
<cloud> Secure Hosting Services
Global Resources... Local Knowledge Figtree offers the functionality of Figtree Systems Software without the upfront infrastructure investment. It is the preferred deployment solution for organisations
SaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
Secure, private, and trustworthy: enterprise cloud computing with Force.com
Secure, private, and trustworthy: enterprise cloud computing with Force.com WHITE PAPER Contents Abstract... 1 Introduction to security, privacy, and trust... 1 Cloud computing and information security
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
