Flash Padlock. Self-Secured and Host-Independent USB Flash Drive White Paper. April 2007 Prepared by ClevX, LLC for Corsair Memory

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Flash Padlock. Self-Secured and Host-Independent USB Flash Drive White Paper. April 2007 Prepared by ClevX, LLC for Corsair Memory"

Transcription

1 Flash Padlck - White Paper Flash Padlck Self-Secured and Hst-Independent USB Flash Drive White Paper April 2007 Prepared by ClevX, LLC fr Crsair Memry 1 INTRODUCTION Millins f USB Flash Drives (UFDs) are being used fr data backup, transfers, as well as intermediate and primary strage. UFDs pse a unique security challenge. Being tiny and highly prtable, they are easily lst r stlen alng their cntent. Thus, many peple are reluctant t emply UFDs t stre financial data, user names, passwrds, credit card data, and ther sensitive infrmatin. In additin, mst mid and large sized rganizatins restrict the use f UFDs as they pse a ptential crprate infrmatin leak as referenced by Sarbains-Oxley. Sensitive infrmatin, if cpied t ne f these drives, might end up in the wrng hands. T prtect the UFD and its cntent frm malicius and unauthrized access, user authenticatin is required. This white paper describes existing UFD authenticatin practices and their inherited drawbacks. It then describes Flash Padlck - a self-secured, hst-independent (crss platfrm) USB Flash Drive with a hardware authenticatin mechanism*. Finally, we cmpare Flash Padlck with existing slutins t demnstrate its ptimal balance f usability, security, and price. * - US and Freign Patents Pending Cpyright ClevX, LLC Page 1 f 5

2 Flash Padlck - White Paper 2 LACK OF STANDARD AUTHENTICATION Currently, the cmputer's standard USB Mass Strage Class has n prvisin fr authenticatin. The UFD cnnects t the cmputer and the hst s Operating System (OS). The detectin f a USB drive prmpts lading f a standard driver that results in munting the device as standard file system disk. This mechanism is prvided by a number f perating systems and sme embedded equipment such as that used in ffices and manufacturing. Authenticatin, if required, is the respnsibility f the hst; it must engage the user in a authenticatin prcedure t grant access. A cmmnly used methd is sftware based passwrd authenticatin that becmes a prprietary functinal extensin f the USB Mass Strage class. Anther is fingerprint recgnitin knwn as bimetric authenticatin. 2.1 Passwrd Based Authenticatin Passwrd authenticatin requires hst sftware t extend the functinality f the standard driver. Typically, UFDs are shipped with a single public memry partitin. T activate security, the user is required t re-frmat the drive, dividing it int tw, fixed sized, partitins: ne public, ne private. A prgram executed frm the public partitin cntrls access t the private partitin. Typically, a passwrd grants access t the private partitin that results in a switch: the private partitin munts at the expense f the public partitin. File peratins nw pass thrugh an encryptin prcess t the private partitin. This cnfiguratin remains until the user exits t recnnect with the public partitin r unplugs the drive. Passwrd based authenticatin has a number f drawbacks: Authenticatin is Hst and OS dependent. While the public partitin is visible t any USB Mass Strage Class cmpliant OS, access t the private partitin is cntrlled by a prprietary authenticating applicatin. Therefre, authenticating applicatins must be custmized fr different perating envirnments. Cmplex Usability. Many users avid, r give up altgether, because the prcedure is perceived as cmplex and nt particularly intuitive. Nn-cmputer savvy users find it cmplex. Frmatting the device results in erasing the entire the drive. Previusly stred infrmatin requires backup prir t frmatting. Partitining the UFD is static. Users are unable t anticipate the required size fr private partitining. If mre space is needed later, repartitining requires refrmatting. Cumbersme partitin management. Users perceive the UFD as fragmented media and need t be cnsciusly aware f file lcatin (private r public?). Cpying files between partitins is cumbersme as intermediate media is required t hld files during a partitin switch. Backup and restratin f an entire drive is nn-trivial as partitins need t be accessed separately. Gd security requires cmplex passwrds. In rder t defend against dictinary and similar attacks, it is recmmended t use pass phrases that are lng, cmplex, and include special characters. Plicy dictates a frequent change f passwrds that make them even mre difficult t remember. In reality, passwrds dn't frequently change and tend t be simple and easy t remember. Often times, the same passwrd is used fr multiple lgins and access. Security breaches. A keybard prvided passwrd might intrduce a security breach. Cpyright ClevX, LLC Page 2 f 5

3 Flash Padlck - White Paper Passwrd Extractin by malicius sftware. Keybard lggers and ther spyware might intercept passwrds and redirect t a malicius surce. This is risky in security hstile envirnments such as public cmputers in a place such as a library, Internet café, kisk, etc. Extract passwrd by dictinary/brute-frce attack. A malicius applicatin can generate a great number f passwrds in an attempt t gain access t a prtected UFD. This may take sme time and is passwrd dependent. As mentined abve, users typically use simple passwrds as it is difficult t recall strng/gd passwrds. 2.2 Bimetric Authenticatin Less cmmn than passwrds, Bimetrics utilizes a small finger-print scanning sensr. Authenticatin is quite similar t passwrd based drives with bth public and private partitins. The private partitin is made available when the authrized fingerprint is recgnized. Bimetric authenticatin is mre resistive than passwrd based attacks. Hwever, there are drawbacks t this methd as well. Authenticatin is Hst and OS dependent. While the public partitin is visible t any USB Mass Strage Class cmpliant OS, access t the private partitin is restricted t a OS applicatin that is capable f executing authenticatin. Lng-term reliability has nt yet been established. Current methds f finger print recgnitin, when packaged in a small scale UFD, d nt prvide the necessary reliability. There are many reprts indicating prblems with false-psitive and false-negative readings. A back dr passwrd is ften used t cmpensate fr inherit unreliability. This undermines the basis fr bimetric authenticatin in the first place. Thus, it has all the vulnerabilities f passwrd prtectin. Fingerprint recgnitin is best perfrmed when the finger is clean withut cuts. Changes in skin surface can ptentially create prblems. Bimetrics is expensive. Bimetrics adds a cnsiderable price premium. Bimetric drives have seen limited success in the market place. Restricted t ffice envirnments. It is impssible t wrk with bimetric sensrs wearing glves, which may be required fr bitech and military applicatins. 3 FLASH PADLOCK Cpyright ClevX, LLC Page 3 f 5

4 Flash Padlck - White Paper Flash Padlck is a self-secured, hst independent (crss platfrm) USB Flash drive with a hardware authenticatin mechanism. When lcked, a Flash Padlck is invisible t its hst. Authenticatin is based n crrect entry f a user defined PIN using the n-bard keypad. A crrect PIN activates a Flash Padlck allwing it t perate as a standard USB mass strage device. A PIN can cnsume up t 10 digits and is nt stred anywhere that is accessible frm the cmputer. Battery equipped, PIN entry can be perfrmed while detached frm a hst cmputer. Status indicatrs prvide visual feedback fr authenticatin. A red status indicatr means the drive is lcked; green indicates the drive is unlcked and ready fr peratin. An aut-lcking feature allw Padlcks t lck themselves when remved r the hst shuts dwn. If the drive is unlcked under battery pwer, it will autmatically re-lck if a hst is nt detected within 15 secnds. Flash Padlck represents bth usability and security. True Hst Independent and Crss Platfrm. Since authenticatin des nt depend n hst functins, it wrks equally well with all perating systems that supprt the USB Mass Strage Class: fr example Windws, Mac OS, Linux, and ffice equipment. Authenticatin is self cntained. N special sftware r driver installatin required. In fact, the hst cmputer is nt invlved and unaware f the authenticatin prcess. Flash Padlck prvides cmplete PIN management. Zer File System Cnfiguratin. Since the drive can nly munt after authenticatin, there is n need fr extraneus partitining. The user experiences a single partitin that utilizes the entire media. Ease f Use. The Flash Padlck usage mdel is intuitive and resembles that used with debit cards and ATM machines. The user remembers a shrt PIN as ppsed t a lng and cmplex passwrd. Immune t hst-riginated attacks. Since n Flash Padlck cmmunicatin channel exists when lcked, it is immune t attacks riginating frm its hst. Tw Factr Authenticatin. Flash Padlck makes a natural Tw Factr Authenticatin device recmmended by gvernment and financial institutins. The term Tw Factr Authenticatin is used t describe an authenticatin mechanism that requires (1) smething yu have (Flash Padlck) and (2) smething yu knw (PIN). 4 SUMMARY The prliferatin f UFDs pses a unique security threat fr peple and institutins that need t prtect sensitive infrmatin. A rbust authenticatin mechanism is required t secure Flash drives and their cntent. Passwrd authenticatin is hst dependent, cmplex, and susceptible t hacking attacks. Bimetrics are expensive and unreliable. Flash Padlck is a self-secured and crss platfrm USB Flash drive that takes a new apprach t drive security. Flash Padlcks strike the ptimal balance between usability, security, and price. Flash Padlcks are develped and prduced by Crsair Memry ( based n licensed DataLck technlgy frm ClevX, LLC ( ). Cpyright ClevX, LLC Page 4 f 5

5 5 APPENDIX: AUTHENTICATION COMPARISON TABLE Lcking principle Flash Padlck - White Paper Feature Flash Padlck Passwrd Bimetric Electrmechanical - the UFD is inaccessible until the crrect PIN cmbinatin is entered n the device itself Encrypted private znes accessed by passwrd - authenticatin frm hst Requires Media Partitining N Yes Yes Hst exchanged passwrd N Yes Yes* Detectable by hst Only when unlcked At all times At all times Device lcked by default Yes N N Requires pre-cnfiguratin N Yes Yes Functins supplied by hst Nne Yes Yes Offline peratin Yes N N Hst/OS independence Yes N N Vulnerability t hacking frm hst Nne Pssible Pssible Security prfile recnfiguratin Optinal Yes Yes Reliability High High Medium Encrypted private znes accessed by finger print authenticatin with passwrd backup User must remember Shrt PIN Passwrd Backup Passwrd Reliability depends n passwrd length and cmplexity Vulnerability t passwrd grabbing Vulnerability t ff-line passwrd guessing N Yes Yes ** N Yes N N Yes Yes* Impact n price Minr Minr Substantial * Vulnerability is present via the passwrd backup mechanism ** User must remember backup passwrd Cpyright ClevX, LLC Page 5 f 5

Integrating With incontact dbprovider & Screen Pops

Integrating With incontact dbprovider & Screen Pops Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint

More information

IT Essentials (ITE v6.0) Chapter 6 Exam Answers 100% 2016

IT Essentials (ITE v6.0) Chapter 6 Exam Answers 100% 2016 IT Essentials (ITE v6.0) Chapter 6 Exam Answers 100% 2016 1. What wuld be a reasn fr a cmputer user t use the Task Manager Perfrmance tab? t increase the perfrmance f the CPU t view the prcesses that are

More information

Licensing Windows Server 2012 for use with virtualization technologies

Licensing Windows Server 2012 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This

More information

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY

More information

Licensing Windows Server 2012 R2 for use with virtualization technologies

Licensing Windows Server 2012 R2 for use with virtualization technologies Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents

More information

The Relativity Appliance Installation Guide

The Relativity Appliance Installation Guide The Relativity Appliance Installatin Guide February 4, 2016 - Versin 9 & 9.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

GUIDANCE FOR BUSINESS ASSOCIATES

GUIDANCE FOR BUSINESS ASSOCIATES GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.

More information

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS Best practices IT security refers t the bdy f techniques and best practices t prtect yur cmputers and yur interests in the use f IT services, such as nline

More information

HIPAA HITECH ACT Compliance, Review and Training Services

HIPAA HITECH ACT Compliance, Review and Training Services Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical

More information

5.2.1 Passwords. Information Technology Policy. Policy. Purpose. Policy Statement. Applicability of this Policy

5.2.1 Passwords. Information Technology Policy. Policy. Purpose. Policy Statement. Applicability of this Policy Infrmatin Technlgy Plicy 5.2.1 Passwrds Plicy Area: 5.2 Security Title: 5.2.1 Passwrds Issued by: Assistant Vice-President/CIO, ITS Date Issued: 2006 July 24 Last Revisin Date: 2011 Octber 19 Apprved by:

More information

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm 2

More information

Treasury Gateway Getting Started Guide

Treasury Gateway Getting Started Guide Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access

More information

Service Desk Self Service Overview

Service Desk Self Service Overview Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service

More information

AML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email:

AML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: AML Internet Manr Curt, Manr Farm Huse, Lndn Rad, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: Backup@AmlInternet.c.uk Cntents Page Situatin Analysis 3 AML Internet - The Slutin

More information

Deployment Overview (Installation):

Deployment Overview (Installation): Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int

More information

Frequently Asked Questions LIME Security Suite

Frequently Asked Questions LIME Security Suite Frequently Asked Questins LIME. Fr living. Everyday. Q: What Is? A: is a sftware applicatin, which prvides prtectin frm nline viruses and ther malicius risk whiles n the Internet. Q: Is the service secured

More information

Installation Guide Marshal Reporting Console

Installation Guide Marshal Reporting Console Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling

More information

Software Update Notification

Software Update Notification Sftware Update Ntificatin PSS0223-02 Mastersizer 3000 v1.01 sftware Abstract This dcument details the release f sftware PSS0223-02 v1.01 f the sftware fr the Mastersizer 3000 laser diffractin system. It

More information

4394 Gazzetta tal-gvern ta Malta MINISTRY OF FINANCE. Value Added Tax Department. Fiscal Cash Register Specifications

4394 Gazzetta tal-gvern ta Malta MINISTRY OF FINANCE. Value Added Tax Department. Fiscal Cash Register Specifications 4394 Gazzetta tal-gvern ta Malta MINISTRY OF FINANCE Value Added Tax Department Fiscal Cash Register Specificatins TYPE A: NON PORTABLE STAND ALONE FISCAL CASH REGISTER 1. LEGAL FRAMEWORK The Value Added

More information

Trends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003

Trends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003 Trends and Cnsideratins in Currency Recycle Devices Nvember 2003 This white paper prvides basic backgrund n currency recycle devices as cmpared t the cmbined features f a currency acceptr device and a

More information

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1

Improved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1 Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues

More information

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus

More information

Tech Notes Promise RAID

Tech Notes Promise RAID Tech Ntes Prmise RAID 03/05/ Purpse: T increase familiarity with the Prmise RAID systems in bth Windws Based and DOS based sftware, including the crrect methd fr rebuilding arrays, crrecting drive errrs,

More information

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3 EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.

More information

BackupAssist SQL Add-on

BackupAssist SQL Add-on WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system

More information

RSA SecurID Software Token Security Best Practices Guide. Version 3

RSA SecurID Software Token Security Best Practices Guide. Version 3 RSA SecurID Sftware Tken Security Best Practices Guide Versin 3 Cntact Infrmatin G t the RSA crprate web site fr reginal Custmer Supprt telephne and fax numbers: www.rsa.cm. Trademarks RSA, the RSA Lg

More information

Disk Encryption with YubiKey and TrueCrypt. Version: 1.3

Disk Encryption with YubiKey and TrueCrypt. Version: 1.3 Disk Encryptin with YubiKey and TrueCrypt Versin: 1.3 February 24, 2014 Intrductin Disclaimer yubic Yubic is the leading prvider f simple, pen nline identity prtectin. The cmpany s flagship prduct, the

More information

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.

ACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop. Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it

More information

State of Wisconsin. File Server Service Service Offering Definition

State of Wisconsin. File Server Service Service Offering Definition State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm

More information

Disk Redundancy (RAID)

Disk Redundancy (RAID) A Primer fr Business Dvana s Primers fr Business series are a set f shrt papers r guides intended fr business decisin makers, wh feel they are being bmbarded with terms and want t understand a cmplex tpic.

More information

The ADVANTAGE of Cloud Based Computing:

The ADVANTAGE of Cloud Based Computing: The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has

More information

Understand Business Continuity

Understand Business Continuity Understand Business Cntinuity Lessn Overview In this lessn, yu will learn abut: Business cntinuity Data redundancy Data availability Disaster recvery Anticipatry Set What methds can be emplyed by a system

More information

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide

ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm,

More information

Ensuring end-to-end protection of video integrity

Ensuring end-to-end protection of video integrity White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring

More information

ITL BULLETIN FOR JANUARY 2016 SECURING INTERACTIVE AND AUTOMATED ACCESS MANAGEMENT USING SECURE SHELL (SSH)

ITL BULLETIN FOR JANUARY 2016 SECURING INTERACTIVE AND AUTOMATED ACCESS MANAGEMENT USING SECURE SHELL (SSH) ITL BULLETIN FOR JANUARY 2016 SECURING INTERACTIVE AND AUTOMATED ACCESS MANAGEMENT USING SECURE SHELL (SSH) Murugiah Suppaya, Karen Scarfne, 1 and Larry Feldman, 2 Editrs Cmputer Security Divisin Infrmatin

More information

Network Intrusion Detection

Network Intrusion Detection Netwrk Intrusin Detectin Best f Breed Prtectin with SNORT Implementing Snrt Snrt can be readily implemented with the help f a special Linux distributin named Sentinix (http://www.sentinix.rg). Wait a minute,

More information

Password Reset for Remote Users

Password Reset for Remote Users 1 Passwrd Reset fr Remte Users Curin prvides a cmpnent fr the PasswrdCurier Passwrd Prvisining System that manages the lcal passwrd cache in cnjunctin with self-service passwrd reset activities. The slutin

More information

BIOS-enabled security features in HP business notebooks

BIOS-enabled security features in HP business notebooks Technical white paper BIOS-enabled security features in HP business ntebks Table f cntents Basics f security prtectin 2 Prtectin against unauthrized access 2 Prebt authenticatin using BIOS 2 Frgtten passwrds

More information

Adobe Sign. Enabling Single Sign-On with SAML Reference Guide

Adobe Sign. Enabling Single Sign-On with SAML Reference Guide Enabling Single Sign-On with SAML Reference Guide 2016 Adbe Systems Incrprated. All Rights Reserved. Prducts mentined in this dcument, such as the services f identity prviders Micrsft Active Directry Federatin,

More information

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library

More information

Security Support in Mobile Platforms (part I) Vincent Naessens - MSEC

Security Support in Mobile Platforms (part I) Vincent Naessens - MSEC Security Supprt in Mbile Platfrms (part I) Vincent Naessens - MSEC Security Mechanisms in Mbile Platfrms 1. Platfrm Supprt fr Data and Credential Prtectin 2. App Distributin 3. App Islatin 4. Mbile Device

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

Readme File. Purpose. What is Translation Manager 9.3.1? Hyperion Translation Manager Release 9.3.1 Readme

Readme File. Purpose. What is Translation Manager 9.3.1? Hyperion Translation Manager Release 9.3.1 Readme Hyperin Translatin Manager Release 9.3.1 Readme Readme File This file cntains the fllwing sectins: Purpse... 1 What is Translatin Manager 9.3.1?... 1 Cmpatible Sftware... 2 Supprted Internatinal Operating

More information

Monthly All IFS files, all Libraries, security and configuration data

Monthly All IFS files, all Libraries, security and configuration data Server Backup Plicy Intrductin Data is ne f Banks DIH Limited s mst imprtant assets. In rder t prtect this asset frm lss r destructin, it is imperative that it be safely and securely captured, cpied, and

More information

PENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers

PENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers PENNSYLVANIA SURPLUS LINES ASSOCIATION Electrnic Filing System (EFS) Frequently Asked Questins and Answers 1 What changed in Release 2.0?...2 2 Why was my accunt disabled?...3 3 Hw d I inactivate an accunt?...4

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U

More information

EA-POL-015 Enterprise Architecture - Encryption Policy

EA-POL-015 Enterprise Architecture - Encryption Policy Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:

More information

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall

Implementing ifolder Server in the DMZ with ifolder Data inside the Firewall Implementing iflder Server in the DMZ with iflder Data inside the Firewall Nvell Cl Slutins AppNte www.nvell.cm/clslutins JULY 2004 OBJECTIVES The bjectives f this dcumentatin are as fllws: T cnfigure

More information

Datasheet. PV4E Management Software Features

Datasheet. PV4E Management Software Features PV4E Management Sftware Features PV4E is a field prven cmprehensive slutin fr real-time cntrl ver netwrk infrastructure and devices The new and refreshed Graphic User Interface (GUI) is nw even mre attractive,

More information

Technical White Paper

Technical White Paper The Data Integrity Imperative If it isn t accurate, it isn t available. Technical White Paper Visin Slutins, Inc. Intrductin The fundamental requirement f high availability sftware is t ensure that critical

More information

TrustED Briefing Series:

TrustED Briefing Series: TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers

More information

Creating automated reports using VBS AN 44

Creating automated reports using VBS AN 44 Creating autmated reprts using VBS AN 44 Applicatin Nte t the KLIPPEL R&D and QC SYSTEM Publishing measured results is imprtant t custmers and clients. While the KLIPPEL database cntains all infrmatin

More information

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents

More information

The AppSec How-To: Choosing a SAST Tool

The AppSec How-To: Choosing a SAST Tool The AppSec Hw-T: Chsing a SAST Tl Surce Cde Analysis Made Easy GIVEN THE WIDE RANGE OF SOURCE CODE ANALYSIS TOOLS, SECURITY PROFESSIONALS, AUDITORS AND DEVELOPERS ALIKE ARE FACED WITH THE QUESTION: Hw

More information

The Law Office of the Future: Remote Access and Virtual Law Firms Jeffrey S. Krause, Esq.

The Law Office of the Future: Remote Access and Virtual Law Firms Jeffrey S. Krause, Esq. The Law Office f the Future: Remte Access and Virtual Law Firms Jeffrey S. Krause, Esq. Presentatin Outline Intrductin Wrking Remte vs. Virtual Office Wrking Remte Temprary way t wrk Access yur ffice cmputer

More information

TaskCentre v4.5 MS SQL Server Trigger Tool White Paper

TaskCentre v4.5 MS SQL Server Trigger Tool White Paper TaskCentre v4.5 MS SQL Server Trigger Tl White Paper Dcument Number: PD500-03-02-1_0-WP Orbis Sftware Limited 2010 Table f Cntents COPYRIGHT... 1 TRADEMARKS... 1 INTRODUCTION... 2 Overview... 2 Features...

More information

Volume THURSTON COUNTY CLERK S OFFICE. e-file SECURE FTP Site (January 2011) User Guide

Volume THURSTON COUNTY CLERK S OFFICE. e-file SECURE FTP Site (January 2011) User Guide Vlume 1 THURSTON COUNTY CLERK S OFFICE e-file SECURE FTP Site (January 2011) User Guide Table f Cntents C H A P T E R 1 FTP e-filing SERVICE 1 Dcument Requirements 1 Scanners 2 File naming cnventin 2 e-file

More information

Serv-U Distributed Architecture Guide

Serv-U Distributed Architecture Guide Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U

More information

Data Protection Act Data security breach management

Data Protection Act Data security breach management Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing

More information

Comtrex Systems Corporation. CISP/PCI Implementation Guidance for Odyssey Suite

Comtrex Systems Corporation. CISP/PCI Implementation Guidance for Odyssey Suite CISP/PCI Implementatin Guidance fr Odyssey Suite Applicable Applicatin Versin This dcument supprts the fllwing applicatin versin: Odyssey Suite Versin 2.0 Intrductin Systems which prcess payment transactins

More information

Application Note: 202

Application Note: 202 Applicatin Nte: 202 MDK-ARM Cmpiler Optimizatins Getting the Best Optimized Cde fr yur Embedded Applicatin Abstract This dcument examines the ARM Cmpilatin Tls, as used inside the Keil MDK-ARM (Micrcntrller

More information

VCU Payment Card Policy

VCU Payment Card Policy VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this

More information

The Organizational NOS (Network Operating System)

The Organizational NOS (Network Operating System) The Organizatinal NOS ( Operating System) Bryan.vandussen@reedbusiness.cm Nvember 2008 The Organizatinal NOS Executive Summary perating systems (perating systems designed and develped fr netwrking devices

More information

The AccuSpeechMobile solution is a fully mobile voice-enabling software solution, that noninvasively. existing mobile enterprise wide applications.

The AccuSpeechMobile solution is a fully mobile voice-enabling software solution, that noninvasively. existing mobile enterprise wide applications. 1. Questin: Yu say that yu have an innvative mbile apprach t deplying vice prductivity t enterprise applicatins. Hw is AccuSpeechMbile different frm existing vice architectures? Answer: When ne lks at

More information

Recommended Backup Plan for SQL 2000 Server Database Servers

Recommended Backup Plan for SQL 2000 Server Database Servers Recmmended Backup Plan fr SQL 2000 Server Database Servers (DAISI) General Ntes STI recmmends that data backup be perfrmed n a regular basis. Transactin Lg Backup Users shuld nt truncate the Transactin

More information

Wireless Light-Level Monitoring

Wireless Light-Level Monitoring Wireless Light-Level Mnitring ILT1000 ILT1000 Applicatin Nte Wireless Light-Level Mnitring 1 Wireless Light-Level Mnitring ILT1000 The affrdability, accessibility, and ease f use f wireless technlgy cmbined

More information

In addition to assisting with the disaster planning process, it is hoped this document will also::

In addition to assisting with the disaster planning process, it is hoped this document will also:: First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business

More information

Backups and Backup Strategies

Backups and Backup Strategies IT Security Office Versin 2.3 02/19/10 Backups and Backup Strategies IT managers need t plan fr backups in terms f time and space required. Hwever, mst mdern backup sftware can cmpress the backup files

More information

Cloud Services MDM. Windows 8 User Guide

Cloud Services MDM. Windows 8 User Guide Clud Services MDM Windws 8 User Guide 10/24/2014 CONTENTS Overview... 2 Supprted Devices... 2 System Capabilities... 2 Enrllment and Activatin... 3 Prcess Overview... 3 Verify Prerequisites... 3 Dwnlad

More information

Helpdesk Support Tickets & Knowledgebase

Helpdesk Support Tickets & Knowledgebase Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate

More information

Using PayPal Website Payments Pro UK with ProductCart

Using PayPal Website Payments Pro UK with ProductCart Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...

More information

Citrix XenServer from HP Getting Started Guide

Citrix XenServer from HP Getting Started Guide Citrix XenServer frm HP Getting Started Guide Overview This guide utlines the basic setup, installatin, and cnfiguratin steps required t begin using yur Citrix XenServer frm HP. A first time wizard-based

More information

WEB APPLICATION SECURITY TESTING

WEB APPLICATION SECURITY TESTING WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are

More information

IT Help Desk Service Level Expectations Revised: 01/09/2012

IT Help Desk Service Level Expectations Revised: 01/09/2012 IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+

More information

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337 HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

Webalo Pro Appliance Setup

Webalo Pro Appliance Setup Webal Pr Appliance Setup 1. Dwnlad the Webal virtual appliance apprpriate fr yur virtualizatin infrastructure, using the link yu were emailed. The virtual appliance is delivered as a.zip file that is n

More information

Completing the CMDB Circle: Asset Management with Barcode Scanning

Completing the CMDB Circle: Asset Management with Barcode Scanning Cmpleting the CMDB Circle: Asset Management with Barcde Scanning WHITE PAPER The Value f Barcding Tday, barcdes are n just abut everything manufactured and are used fr asset tracking and identificatin

More information

Otomasyon, Danışmanlık Ltd. Şti. INDILOAD DATACARD M AN UAL. Antetli03.doc / Page 9 of 1. Kibele Hedef mükemmele ulasmaksa.

Otomasyon, Danışmanlık Ltd. Şti. INDILOAD DATACARD M AN UAL. Antetli03.doc / Page 9 of 1. Kibele Hedef mükemmele ulasmaksa. Otmasyn, Danışmanlık Ltd. Şti. INDILOAD DATACARD M AN UAL Antetli03.dc / Page 9 f 1 Otmasyn, Danışmanlık Ltd. Şti. Chapter 1 : General Chapter 2 : Cnnectins Chapter 3 : Operatin Chapter 4 : Technical sheet

More information

Managing Access and Help Protect Corporate Email Data on Mobile Devices with Enterprise Mobile Suite

Managing Access and Help Protect Corporate Email Data on Mobile Devices with Enterprise Mobile Suite Managing Access and Help Prtect Crprate Email Data n Mbile Devices with Enterprise Mbile Suite Last updated: 7/15/15 Balancing prductivity and security Emplyees want t be able t use their wn devices t

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

Optimal Payments Extension. Supporting Documentation for the Extension Package. 20140225 v1.1

Optimal Payments Extension. Supporting Documentation for the Extension Package. 20140225 v1.1 Optimal Payments Extensin Supprting Dcumentatin fr the Extensin Package 20140225 v1.1 Revisin Histry v1.1 Updated Demac Media branding v1.0 Initial Dcument fr Distributin supprt@ptimalpayments.cm Page

More information

Fermilab Time & Labor Desktop Computer Requirements

Fermilab Time & Labor Desktop Computer Requirements Fermilab Time & Labr Desktp Cmputer Requirements Fermilab s new electrnic time and labr reprting (FTL) system utilizes the Wrkfrce Central prduct frm Krns. This system is accessed using a web brwser utilizing

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

Telelink 6. Installation Manual

Telelink 6. Installation Manual Telelink 6 Installatin Manual Table f cntents 1. SYSTEM REQUIREMENTS... 3 1.1. Hardware Requirements... 3 1.2. Sftware Requirements... 3 1.2.1. Platfrm... 3 1.2.1.1. Supprted Operating Systems... 3 1.2.1.2.

More information

Key Steps for Organizations in Responding to Privacy Breaches

Key Steps for Organizations in Responding to Privacy Breaches Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins

More information

QBT - Making business travel simple

QBT - Making business travel simple QBT - Making business travel simple In business travel, cmplexity csts. S, we ffer less f it. We adpt the latest technlgy and make it simple, transparent and highly persnal. S yu get mre f what yu need

More information

Process Automation With VMware

Process Automation With VMware Prcess Autmatin With VMware Intelligent Service Autmatin fr Real and Virtual Envirnments Intrductin This Whitepaper describes hw the UC4 platfrm integrates with the VMware vsphere Server and the VMware

More information

Ten Steps for an Easy Install of the eg Enterprise Suite

Ten Steps for an Easy Install of the eg Enterprise Suite Ten Steps fr an Easy Install f the eg Enterprise Suite (Acquire, Evaluate, and be mre Efficient!) Step 1: Dwnlad the eg Sftware; verify hardware and perating system pre-requisites Step 2: Obtain a valid

More information

DTU Data Transfer Utilities Software User manual

DTU Data Transfer Utilities Software User manual DTU Data Transfer Utilities Sftware User manual Ft. Atkinsn, Wiscnsin USA Panningen, Nederland www.digi-star.cm D3912-GB Rev A Sept 11 Table f cntents TABLE OF CONTENTS DTU Sftware general... 1 Minimum

More information

Connecting to Email: Live@edu

Connecting to Email: Live@edu Cnnecting t Email: Live@edu Minimum Requirements fr Yur Cmputer We strngly recmmend yu upgrade t Office 2010 (Service Pack 1) befre the upgrade. This versin is knwn t prvide a better service and t eliminate

More information

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin

More information

Software and Hardware Change Management Policy for CDes Computer Labs

Software and Hardware Change Management Policy for CDes Computer Labs Sftware and Hardware Change Management Plicy fr CDes Cmputer Labs Overview The cmputer labs in the Cllege f Design are clsely integrated with the academic needs f faculty and students. Cmputer lab resurces

More information

Policy on Free and Open-source Software. Government Policy of Iceland

Policy on Free and Open-source Software. Government Policy of Iceland Plicy n Free and Open-surce Sftware Gvernment Plicy f Iceland Prime Minister s Office December 2007 Intrductin Free and pen-surce sftware is sftware based n a surce cde which the authrs chse t make public

More information

Customers FAQs for Webroot SecureAnywhere Identity Shield

Customers FAQs for Webroot SecureAnywhere Identity Shield Custmers FAQs fr Webrt SecureAnywhere Identity Shield Table f Cntents General Questins...2 Why is the bank ffering Webrt SecureAnywhere sftware?... 2 What des it prtect?... 2 Wh is Webrt?... 2 Is Webrt

More information

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010

SPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010 OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity

More information

Unified Infrastructure/Organization Computer System/Software Use Policy

Unified Infrastructure/Organization Computer System/Software Use Policy Unified Infrastructure/Organizatin Cmputer System/Sftware Use Plicy 1. Statement f Respnsibility All emplyees are charged with the security and integrity f the cmputer system. Emplyees are asked t help

More information

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.

Introduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved. Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and

More information

CSE 231 Fall 2015 Computer Project #4

CSE 231 Fall 2015 Computer Project #4 CSE 231 Fall 2015 Cmputer Prject #4 Assignment Overview This assignment fcuses n the design, implementatin and testing f a Pythn prgram that uses character strings fr data decmpressin. It is wrth 45 pints

More information

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation

ViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is

More information