Flash Padlock. Self-Secured and Host-Independent USB Flash Drive White Paper. April 2007 Prepared by ClevX, LLC for Corsair Memory
|
|
- Mervin Lindsey
- 8 years ago
- Views:
Transcription
1 Flash Padlck - White Paper Flash Padlck Self-Secured and Hst-Independent USB Flash Drive White Paper April 2007 Prepared by ClevX, LLC fr Crsair Memry 1 INTRODUCTION Millins f USB Flash Drives (UFDs) are being used fr data backup, transfers, as well as intermediate and primary strage. UFDs pse a unique security challenge. Being tiny and highly prtable, they are easily lst r stlen alng their cntent. Thus, many peple are reluctant t emply UFDs t stre financial data, user names, passwrds, credit card data, and ther sensitive infrmatin. In additin, mst mid and large sized rganizatins restrict the use f UFDs as they pse a ptential crprate infrmatin leak as referenced by Sarbains-Oxley. Sensitive infrmatin, if cpied t ne f these drives, might end up in the wrng hands. T prtect the UFD and its cntent frm malicius and unauthrized access, user authenticatin is required. This white paper describes existing UFD authenticatin practices and their inherited drawbacks. It then describes Flash Padlck - a self-secured, hst-independent (crss platfrm) USB Flash Drive with a hardware authenticatin mechanism*. Finally, we cmpare Flash Padlck with existing slutins t demnstrate its ptimal balance f usability, security, and price. * - US and Freign Patents Pending Cpyright ClevX, LLC Page 1 f 5
2 Flash Padlck - White Paper 2 LACK OF STANDARD AUTHENTICATION Currently, the cmputer's standard USB Mass Strage Class has n prvisin fr authenticatin. The UFD cnnects t the cmputer and the hst s Operating System (OS). The detectin f a USB drive prmpts lading f a standard driver that results in munting the device as standard file system disk. This mechanism is prvided by a number f perating systems and sme embedded equipment such as that used in ffices and manufacturing. Authenticatin, if required, is the respnsibility f the hst; it must engage the user in a authenticatin prcedure t grant access. A cmmnly used methd is sftware based passwrd authenticatin that becmes a prprietary functinal extensin f the USB Mass Strage class. Anther is fingerprint recgnitin knwn as bimetric authenticatin. 2.1 Passwrd Based Authenticatin Passwrd authenticatin requires hst sftware t extend the functinality f the standard driver. Typically, UFDs are shipped with a single public memry partitin. T activate security, the user is required t re-frmat the drive, dividing it int tw, fixed sized, partitins: ne public, ne private. A prgram executed frm the public partitin cntrls access t the private partitin. Typically, a passwrd grants access t the private partitin that results in a switch: the private partitin munts at the expense f the public partitin. File peratins nw pass thrugh an encryptin prcess t the private partitin. This cnfiguratin remains until the user exits t recnnect with the public partitin r unplugs the drive. Passwrd based authenticatin has a number f drawbacks: Authenticatin is Hst and OS dependent. While the public partitin is visible t any USB Mass Strage Class cmpliant OS, access t the private partitin is cntrlled by a prprietary authenticating applicatin. Therefre, authenticating applicatins must be custmized fr different perating envirnments. Cmplex Usability. Many users avid, r give up altgether, because the prcedure is perceived as cmplex and nt particularly intuitive. Nn-cmputer savvy users find it cmplex. Frmatting the device results in erasing the entire the drive. Previusly stred infrmatin requires backup prir t frmatting. Partitining the UFD is static. Users are unable t anticipate the required size fr private partitining. If mre space is needed later, repartitining requires refrmatting. Cumbersme partitin management. Users perceive the UFD as fragmented media and need t be cnsciusly aware f file lcatin (private r public?). Cpying files between partitins is cumbersme as intermediate media is required t hld files during a partitin switch. Backup and restratin f an entire drive is nn-trivial as partitins need t be accessed separately. Gd security requires cmplex passwrds. In rder t defend against dictinary and similar attacks, it is recmmended t use pass phrases that are lng, cmplex, and include special characters. Plicy dictates a frequent change f passwrds that make them even mre difficult t remember. In reality, passwrds dn't frequently change and tend t be simple and easy t remember. Often times, the same passwrd is used fr multiple lgins and access. Security breaches. A keybard prvided passwrd might intrduce a security breach. Cpyright ClevX, LLC Page 2 f 5
3 Flash Padlck - White Paper Passwrd Extractin by malicius sftware. Keybard lggers and ther spyware might intercept passwrds and redirect t a malicius surce. This is risky in security hstile envirnments such as public cmputers in a place such as a library, Internet café, kisk, etc. Extract passwrd by dictinary/brute-frce attack. A malicius applicatin can generate a great number f passwrds in an attempt t gain access t a prtected UFD. This may take sme time and is passwrd dependent. As mentined abve, users typically use simple passwrds as it is difficult t recall strng/gd passwrds. 2.2 Bimetric Authenticatin Less cmmn than passwrds, Bimetrics utilizes a small finger-print scanning sensr. Authenticatin is quite similar t passwrd based drives with bth public and private partitins. The private partitin is made available when the authrized fingerprint is recgnized. Bimetric authenticatin is mre resistive than passwrd based attacks. Hwever, there are drawbacks t this methd as well. Authenticatin is Hst and OS dependent. While the public partitin is visible t any USB Mass Strage Class cmpliant OS, access t the private partitin is restricted t a OS applicatin that is capable f executing authenticatin. Lng-term reliability has nt yet been established. Current methds f finger print recgnitin, when packaged in a small scale UFD, d nt prvide the necessary reliability. There are many reprts indicating prblems with false-psitive and false-negative readings. A back dr passwrd is ften used t cmpensate fr inherit unreliability. This undermines the basis fr bimetric authenticatin in the first place. Thus, it has all the vulnerabilities f passwrd prtectin. Fingerprint recgnitin is best perfrmed when the finger is clean withut cuts. Changes in skin surface can ptentially create prblems. Bimetrics is expensive. Bimetrics adds a cnsiderable price premium. Bimetric drives have seen limited success in the market place. Restricted t ffice envirnments. It is impssible t wrk with bimetric sensrs wearing glves, which may be required fr bitech and military applicatins. 3 FLASH PADLOCK Cpyright ClevX, LLC Page 3 f 5
4 Flash Padlck - White Paper Flash Padlck is a self-secured, hst independent (crss platfrm) USB Flash drive with a hardware authenticatin mechanism. When lcked, a Flash Padlck is invisible t its hst. Authenticatin is based n crrect entry f a user defined PIN using the n-bard keypad. A crrect PIN activates a Flash Padlck allwing it t perate as a standard USB mass strage device. A PIN can cnsume up t 10 digits and is nt stred anywhere that is accessible frm the cmputer. Battery equipped, PIN entry can be perfrmed while detached frm a hst cmputer. Status indicatrs prvide visual feedback fr authenticatin. A red status indicatr means the drive is lcked; green indicates the drive is unlcked and ready fr peratin. An aut-lcking feature allw Padlcks t lck themselves when remved r the hst shuts dwn. If the drive is unlcked under battery pwer, it will autmatically re-lck if a hst is nt detected within 15 secnds. Flash Padlck represents bth usability and security. True Hst Independent and Crss Platfrm. Since authenticatin des nt depend n hst functins, it wrks equally well with all perating systems that supprt the USB Mass Strage Class: fr example Windws, Mac OS, Linux, and ffice equipment. Authenticatin is self cntained. N special sftware r driver installatin required. In fact, the hst cmputer is nt invlved and unaware f the authenticatin prcess. Flash Padlck prvides cmplete PIN management. Zer File System Cnfiguratin. Since the drive can nly munt after authenticatin, there is n need fr extraneus partitining. The user experiences a single partitin that utilizes the entire media. Ease f Use. The Flash Padlck usage mdel is intuitive and resembles that used with debit cards and ATM machines. The user remembers a shrt PIN as ppsed t a lng and cmplex passwrd. Immune t hst-riginated attacks. Since n Flash Padlck cmmunicatin channel exists when lcked, it is immune t attacks riginating frm its hst. Tw Factr Authenticatin. Flash Padlck makes a natural Tw Factr Authenticatin device recmmended by gvernment and financial institutins. The term Tw Factr Authenticatin is used t describe an authenticatin mechanism that requires (1) smething yu have (Flash Padlck) and (2) smething yu knw (PIN). 4 SUMMARY The prliferatin f UFDs pses a unique security threat fr peple and institutins that need t prtect sensitive infrmatin. A rbust authenticatin mechanism is required t secure Flash drives and their cntent. Passwrd authenticatin is hst dependent, cmplex, and susceptible t hacking attacks. Bimetrics are expensive and unreliable. Flash Padlck is a self-secured and crss platfrm USB Flash drive that takes a new apprach t drive security. Flash Padlcks strike the ptimal balance between usability, security, and price. Flash Padlcks are develped and prduced by Crsair Memry ( based n licensed DataLck technlgy frm ClevX, LLC ( ). Cpyright ClevX, LLC Page 4 f 5
5 5 APPENDIX: AUTHENTICATION COMPARISON TABLE Lcking principle Flash Padlck - White Paper Feature Flash Padlck Passwrd Bimetric Electrmechanical - the UFD is inaccessible until the crrect PIN cmbinatin is entered n the device itself Encrypted private znes accessed by passwrd - authenticatin frm hst Requires Media Partitining N Yes Yes Hst exchanged passwrd N Yes Yes* Detectable by hst Only when unlcked At all times At all times Device lcked by default Yes N N Requires pre-cnfiguratin N Yes Yes Functins supplied by hst Nne Yes Yes Offline peratin Yes N N Hst/OS independence Yes N N Vulnerability t hacking frm hst Nne Pssible Pssible Security prfile recnfiguratin Optinal Yes Yes Reliability High High Medium Encrypted private znes accessed by finger print authenticatin with passwrd backup User must remember Shrt PIN Passwrd Backup Passwrd Reliability depends n passwrd length and cmplexity Vulnerability t passwrd grabbing Vulnerability t ff-line passwrd guessing N Yes Yes ** N Yes N N Yes Yes* Impact n price Minr Minr Substantial * Vulnerability is present via the passwrd backup mechanism ** User must remember backup passwrd Cpyright ClevX, LLC Page 5 f 5
Integrating With incontact dbprovider & Screen Pops
Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint
More informationGUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
More informationLicensing Windows Server 2012 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This
More informationLicensing Windows Server 2012 R2 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents
More informationA96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015
A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY
More informationThe Relativity Appliance Installation Guide
The Relativity Appliance Installatin Guide February 4, 2016 - Versin 9 & 9.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
More informationRECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au
RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS Best practices IT security refers t the bdy f techniques and best practices t prtect yur cmputers and yur interests in the use f IT services, such as nline
More information5.2.1 Passwords. Information Technology Policy. Policy. Purpose. Policy Statement. Applicability of this Policy
Infrmatin Technlgy Plicy 5.2.1 Passwrds Plicy Area: 5.2 Security Title: 5.2.1 Passwrds Issued by: Assistant Vice-President/CIO, ITS Date Issued: 2006 July 24 Last Revisin Date: 2011 Octber 19 Apprved by:
More informationHIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
More informationTreasury Gateway Getting Started Guide
Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-n and security prtal which allws yu access t multiple services simultaneusly thrugh the same sessin, prvides cnvenient access
More informationAML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email:
AML Internet Manr Curt, Manr Farm Huse, Lndn Rad, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: Backup@AmlInternet.c.uk Cntents Page Situatin Analysis 3 AML Internet - The Slutin
More informationWhite Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com
White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm 2
More informationService Desk Self Service Overview
Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service
More information4394 Gazzetta tal-gvern ta Malta MINISTRY OF FINANCE. Value Added Tax Department. Fiscal Cash Register Specifications
4394 Gazzetta tal-gvern ta Malta MINISTRY OF FINANCE Value Added Tax Department Fiscal Cash Register Specificatins TYPE A: NON PORTABLE STAND ALONE FISCAL CASH REGISTER 1. LEGAL FRAMEWORK The Value Added
More informationImproved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
More informationTrends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003
Trends and Cnsideratins in Currency Recycle Devices Nvember 2003 This white paper prvides basic backgrund n currency recycle devices as cmpared t the cmbined features f a currency acceptr device and a
More informationInstallation Guide Marshal Reporting Console
Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling
More informationDeployment Overview (Installation):
Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int
More informationCOPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
More informationBackupAssist SQL Add-on
WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system
More informationRSA SecurID Software Token Security Best Practices Guide. Version 3
RSA SecurID Sftware Tken Security Best Practices Guide Versin 3 Cntact Infrmatin G t the RSA crprate web site fr reginal Custmer Supprt telephne and fax numbers: www.rsa.cm. Trademarks RSA, the RSA Lg
More informationAccess EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3
EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.
More informationSoftware Update Notification
Sftware Update Ntificatin PSS0223-02 Mastersizer 3000 v1.01 sftware Abstract This dcument details the release f sftware PSS0223-02 v1.01 f the sftware fr the Mastersizer 3000 laser diffractin system. It
More informationACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.
Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it
More informationState of Wisconsin. File Server Service Service Offering Definition
State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm
More informationROSS RepliWeb Operations Suite for SharePoint. SSL User Guide
ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm,
More informationEnsuring end-to-end protection of video integrity
White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring
More informationDisk Redundancy (RAID)
A Primer fr Business Dvana s Primers fr Business series are a set f shrt papers r guides intended fr business decisin makers, wh feel they are being bmbarded with terms and want t understand a cmplex tpic.
More informationDisk Encryption with YubiKey and TrueCrypt. Version: 1.3
Disk Encryptin with YubiKey and TrueCrypt Versin: 1.3 February 24, 2014 Intrductin Disclaimer yubic Yubic is the leading prvider f simple, pen nline identity prtectin. The cmpany s flagship prduct, the
More informationUnderstand Business Continuity
Understand Business Cntinuity Lessn Overview In this lessn, yu will learn abut: Business cntinuity Data redundancy Data availability Disaster recvery Anticipatry Set What methds can be emplyed by a system
More informationThe ADVANTAGE of Cloud Based Computing:
The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has
More informationPENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers
PENNSYLVANIA SURPLUS LINES ASSOCIATION Electrnic Filing System (EFS) Frequently Asked Questins and Answers 1 What changed in Release 2.0?...2 2 Why was my accunt disabled?...3 3 Hw d I inactivate an accunt?...4
More informationBIOS-enabled security features in HP business notebooks
Technical white paper BIOS-enabled security features in HP business ntebks Table f cntents Basics f security prtectin 2 Prtectin against unauthrized access 2 Prebt authenticatin using BIOS 2 Frgtten passwrds
More informationNetwork Intrusion Detection
Netwrk Intrusin Detectin Best f Breed Prtectin with SNORT Implementing Snrt Snrt can be readily implemented with the help f a special Linux distributin named Sentinix (http://www.sentinix.rg). Wait a minute,
More informationCreating automated reports using VBS AN 44
Creating autmated reprts using VBS AN 44 Applicatin Nte t the KLIPPEL R&D and QC SYSTEM Publishing measured results is imprtant t custmers and clients. While the KLIPPEL database cntains all infrmatin
More informationTech Notes Promise RAID
Tech Ntes Prmise RAID 03/05/ Purpse: T increase familiarity with the Prmise RAID systems in bth Windws Based and DOS based sftware, including the crrect methd fr rebuilding arrays, crrecting drive errrs,
More informationSession 9 : Information Security and Risk
INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin
More informationACTIVITY MONITOR Real Time Monitor Employee Activity Monitor
ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library
More informationMonthly All IFS files, all Libraries, security and configuration data
Server Backup Plicy Intrductin Data is ne f Banks DIH Limited s mst imprtant assets. In rder t prtect this asset frm lss r destructin, it is imperative that it be safely and securely captured, cpied, and
More informationServ-U Distributed Architecture Guide
Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U
More informationAdobe Sign. Enabling Single Sign-On with SAML Reference Guide
Enabling Single Sign-On with SAML Reference Guide 2016 Adbe Systems Incrprated. All Rights Reserved. Prducts mentined in this dcument, such as the services f identity prviders Micrsft Active Directry Federatin,
More informationSecurity Support in Mobile Platforms (part I) Vincent Naessens - MSEC
Security Supprt in Mbile Platfrms (part I) Vincent Naessens - MSEC Security Mechanisms in Mbile Platfrms 1. Platfrm Supprt fr Data and Credential Prtectin 2. App Distributin 3. App Islatin 4. Mbile Device
More informationEA-POL-015 Enterprise Architecture - Encryption Policy
Technlgy & Infrmatin Services EA-POL-015 Enterprise ure - Encryptin Plicy Authr: Craig Duglas Date: 17 March 2015 Dcument Security Level: PUBLIC Dcument Versin: 1.0 Dcument Ref: EA-POL-015 Dcument Link:
More informationPassword Reset for Remote Users
1 Passwrd Reset fr Remte Users Curin prvides a cmpnent fr the PasswrdCurier Passwrd Prvisining System that manages the lcal passwrd cache in cnjunctin with self-service passwrd reset activities. The slutin
More informationImplementing ifolder Server in the DMZ with ifolder Data inside the Firewall
Implementing iflder Server in the DMZ with iflder Data inside the Firewall Nvell Cl Slutins AppNte www.nvell.cm/clslutins JULY 2004 OBJECTIVES The bjectives f this dcumentatin are as fllws: T cnfigure
More informationThe Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future
The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents
More informationReadme File. Purpose. What is Translation Manager 9.3.1? Hyperion Translation Manager Release 9.3.1 Readme
Hyperin Translatin Manager Release 9.3.1 Readme Readme File This file cntains the fllwing sectins: Purpse... 1 What is Translatin Manager 9.3.1?... 1 Cmpatible Sftware... 2 Supprted Internatinal Operating
More informationTrustED Briefing Series:
TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers
More informationThe Law Office of the Future: Remote Access and Virtual Law Firms Jeffrey S. Krause, Esq.
The Law Office f the Future: Remte Access and Virtual Law Firms Jeffrey S. Krause, Esq. Presentatin Outline Intrductin Wrking Remte vs. Virtual Office Wrking Remte Temprary way t wrk Access yur ffice cmputer
More informationDatasheet. PV4E Management Software Features
PV4E Management Sftware Features PV4E is a field prven cmprehensive slutin fr real-time cntrl ver netwrk infrastructure and devices The new and refreshed Graphic User Interface (GUI) is nw even mre attractive,
More informationTaskCentre v4.5 MS SQL Server Trigger Tool White Paper
TaskCentre v4.5 MS SQL Server Trigger Tl White Paper Dcument Number: PD500-03-02-1_0-WP Orbis Sftware Limited 2010 Table f Cntents COPYRIGHT... 1 TRADEMARKS... 1 INTRODUCTION... 2 Overview... 2 Features...
More informationThe AppSec How-To: Choosing a SAST Tool
The AppSec Hw-T: Chsing a SAST Tl Surce Cde Analysis Made Easy GIVEN THE WIDE RANGE OF SOURCE CODE ANALYSIS TOOLS, SECURITY PROFESSIONALS, AUDITORS AND DEVELOPERS ALIKE ARE FACED WITH THE QUESTION: Hw
More informationTechnical White Paper
The Data Integrity Imperative If it isn t accurate, it isn t available. Technical White Paper Visin Slutins, Inc. Intrductin The fundamental requirement f high availability sftware is t ensure that critical
More informationHelpdesk Support Tickets & Knowledgebase
Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate
More informationThe AccuSpeechMobile solution is a fully mobile voice-enabling software solution, that noninvasively. existing mobile enterprise wide applications.
1. Questin: Yu say that yu have an innvative mbile apprach t deplying vice prductivity t enterprise applicatins. Hw is AccuSpeechMbile different frm existing vice architectures? Answer: When ne lks at
More informationVolume THURSTON COUNTY CLERK S OFFICE. e-file SECURE FTP Site (January 2011) User Guide
Vlume 1 THURSTON COUNTY CLERK S OFFICE e-file SECURE FTP Site (January 2011) User Guide Table f Cntents C H A P T E R 1 FTP e-filing SERVICE 1 Dcument Requirements 1 Scanners 2 File naming cnventin 2 e-file
More informationThe Organizational NOS (Network Operating System)
The Organizatinal NOS ( Operating System) Bryan.vandussen@reedbusiness.cm Nvember 2008 The Organizatinal NOS Executive Summary perating systems (perating systems designed and develped fr netwrking devices
More informationVCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
More informationData Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
More informationRecommended Backup Plan for SQL 2000 Server Database Servers
Recmmended Backup Plan fr SQL 2000 Server Database Servers (DAISI) General Ntes STI recmmends that data backup be perfrmed n a regular basis. Transactin Lg Backup Users shuld nt truncate the Transactin
More informationServ-U Distributed Architecture Guide
Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v15.1.2.0 Page 1 f 20 Intrductin Serv-U
More informationApplication Note: 202
Applicatin Nte: 202 MDK-ARM Cmpiler Optimizatins Getting the Best Optimized Cde fr yur Embedded Applicatin Abstract This dcument examines the ARM Cmpilatin Tls, as used inside the Keil MDK-ARM (Micrcntrller
More informationWEB APPLICATION SECURITY TESTING
WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are
More informationWireless Light-Level Monitoring
Wireless Light-Level Mnitring ILT1000 ILT1000 Applicatin Nte Wireless Light-Level Mnitring 1 Wireless Light-Level Mnitring ILT1000 The affrdability, accessibility, and ease f use f wireless technlgy cmbined
More informationIn addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
More informationManaging Access and Help Protect Corporate Email Data on Mobile Devices with Enterprise Mobile Suite
Managing Access and Help Prtect Crprate Email Data n Mbile Devices with Enterprise Mbile Suite Last updated: 7/15/15 Balancing prductivity and security Emplyees want t be able t use their wn devices t
More informationComtrex Systems Corporation. CISP/PCI Implementation Guidance for Odyssey Suite
CISP/PCI Implementatin Guidance fr Odyssey Suite Applicable Applicatin Versin This dcument supprts the fllwing applicatin versin: Odyssey Suite Versin 2.0 Intrductin Systems which prcess payment transactins
More informationCloud Services MDM. Windows 8 User Guide
Clud Services MDM Windws 8 User Guide 10/24/2014 CONTENTS Overview... 2 Supprted Devices... 2 System Capabilities... 2 Enrllment and Activatin... 3 Prcess Overview... 3 Verify Prerequisites... 3 Dwnlad
More informationHIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337
HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders
More informationBackups and Backup Strategies
IT Security Office Versin 2.3 02/19/10 Backups and Backup Strategies IT managers need t plan fr backups in terms f time and space required. Hwever, mst mdern backup sftware can cmpress the backup files
More informationIT Help Desk Service Level Expectations Revised: 01/09/2012
IT Help Desk Service Level Expectatins Revised: 01/09/2012 Overview The IT Help Desk team cnsists f six (6) full time emplyees and fifteen (15) part time student emplyees. This team prvides supprt fr 25,000+
More informationOptimal Payments Extension. Supporting Documentation for the Extension Package. 20140225 v1.1
Optimal Payments Extensin Supprting Dcumentatin fr the Extensin Package 20140225 v1.1 Revisin Histry v1.1 Updated Demac Media branding v1.0 Initial Dcument fr Distributin supprt@ptimalpayments.cm Page
More informationCompleting the CMDB Circle: Asset Management with Barcode Scanning
Cmpleting the CMDB Circle: Asset Management with Barcde Scanning WHITE PAPER The Value f Barcding Tday, barcdes are n just abut everything manufactured and are used fr asset tracking and identificatin
More informationWebalo Pro Appliance Setup
Webal Pr Appliance Setup 1. Dwnlad the Webal virtual appliance apprpriate fr yur virtualizatin infrastructure, using the link yu were emailed. The virtual appliance is delivered as a.zip file that is n
More informationTen Steps for an Easy Install of the eg Enterprise Suite
Ten Steps fr an Easy Install f the eg Enterprise Suite (Acquire, Evaluate, and be mre Efficient!) Step 1: Dwnlad the eg Sftware; verify hardware and perating system pre-requisites Step 2: Obtain a valid
More informationCloud Services Frequently Asked Questions FAQ
Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like
More informationOtomasyon, Danışmanlık Ltd. Şti. INDILOAD DATACARD M AN UAL. Antetli03.doc / Page 9 of 1. Kibele Hedef mükemmele ulasmaksa.
Otmasyn, Danışmanlık Ltd. Şti. INDILOAD DATACARD M AN UAL Antetli03.dc / Page 9 f 1 Otmasyn, Danışmanlık Ltd. Şti. Chapter 1 : General Chapter 2 : Cnnectins Chapter 3 : Operatin Chapter 4 : Technical sheet
More informationVersion: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch
More informationConnecting to Email: Live@edu
Cnnecting t Email: Live@edu Minimum Requirements fr Yur Cmputer We strngly recmmend yu upgrade t Office 2010 (Service Pack 1) befre the upgrade. This versin is knwn t prvide a better service and t eliminate
More informationUsing PayPal Website Payments Pro UK with ProductCart
Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...
More informationFermilab Time & Labor Desktop Computer Requirements
Fermilab Time & Labr Desktp Cmputer Requirements Fermilab s new electrnic time and labr reprting (FTL) system utilizes the Wrkfrce Central prduct frm Krns. This system is accessed using a web brwser utilizing
More informationTelelink 6. Installation Manual
Telelink 6 Installatin Manual Table f cntents 1. SYSTEM REQUIREMENTS... 3 1.1. Hardware Requirements... 3 1.2. Sftware Requirements... 3 1.2.1. Platfrm... 3 1.2.1.1. Supprted Operating Systems... 3 1.2.1.2.
More informationSBClient and Microsoft Windows Terminal Server (Including Citrix Server)
SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance
More informationAvatier Identity Management Suite
Avatier Identity Management Suite AIMS Versin 9 System Requirements Versin 9 2603 Camin Ramn Suite 110 San Ramn, CA 94583 Phne: 800-609-8610 925-217-5170 FAX: 925-217-0853 Email: supprt@avatier.cm Page
More informationKey Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
More informationInstant Chime for IBM Sametime Quick Start Guide
Instant Chime fr IBM Sametime Quick Start Guide Fall 2014 Cpyright 2014 Instant Technlgies. All rights reserved. Cpyright and Disclaimer This dcument, as well as the sftware described in it, is furnished
More informationQBT - Making business travel simple
QBT - Making business travel simple In business travel, cmplexity csts. S, we ffer less f it. We adpt the latest technlgy and make it simple, transparent and highly persnal. S yu get mre f what yu need
More informationBLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS
BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS SERIES: 1 General Rules RULE: 17.1 Recrd Retentin Scpe: The purpse f this rule is t establish the systematic review, retentin and destructin
More informationPolicy on Free and Open-source Software. Government Policy of Iceland
Plicy n Free and Open-surce Sftware Gvernment Plicy f Iceland Prime Minister s Office December 2007 Intrductin Free and pen-surce sftware is sftware based n a surce cde which the authrs chse t make public
More informationInformation & Communications Technology ICT Security Compliance Guide (Student)
Infrmatin & Cmmunicatins Technlgy ICT Security Cmpliance Guide (Student) RESTRICTED Dcument ID: ICT-SSG Versin 1.1 Effective Date 1 Nv 2011 Dcument Cntrl Revisin Histry Versin Date Descriptin Authr 1.0
More informationTable of Contents. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
Table f Cntents Tp Pricing and Licensing Questins... 2 Why shuld custmers be excited abut Micrsft SQL Server 2012?... 2 What are the mst significant changes t the pricing and licensing fr SQL Server?...
More informationHarePoint HelpDesk for SharePoint. For SharePoint Server 2010, SharePoint Foundation 2010. User Guide
HarePint HelpDesk fr SharePint Fr SharePint Server 2010, SharePint Fundatin 2010 User Guide Prduct versin: 14.1.0 04/10/2013 2 Intrductin HarePint.Cm (This Page Intentinally Left Blank ) Table f Cntents
More informationCitrix XenServer from HP Getting Started Guide
Citrix XenServer frm HP Getting Started Guide Overview This guide utlines the basic setup, installatin, and cnfiguratin steps required t begin using yur Citrix XenServer frm HP. A first time wizard-based
More informationSPECIFICATION. Hospital Report Manager Connectivity Requirements. Electronic Medical Records DRAFT. OntarioMD Inc. Date: September 30, 2010
OntariMD Inc. Electrnic Medical Recrds SPECIFICATION Hspital Reprt Manager Cnnectivity Requirements DRAFT Date: September 30, 2010 Versin: 1.0 2007-2010 OntariMD Inc. All rights reserved HRM EMR Cnnectivity
More informationwww.novell.com/documentation System Security ZENworks Mobile Management 2.6.x November 2012
www.nvell.cm/dcumentatin System Security ZENwrks Mbile Management 2.6.x Nvember 2012 Legal Ntices Nvell, Inc., makes n representatins r warranties with respect t the cntents r use f this dcumentatin, and
More informationApril 3, 2014. Release Notes
April 3, 2014 Release Ntes Cntacting Lestream Lestream Crpratin 411 Waverley Oaks Rd. Suite 316 Waltham, MA 02452 USA http://www.lestream.cm Telephne: +1 781 890 2019 Fax: +1 781 688 9338 T submit an enhancement
More informationexpertise hp services valupack consulting description security review service for Linux
expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS
More informationDTU Data Transfer Utilities Software User manual
DTU Data Transfer Utilities Sftware User manual Ft. Atkinsn, Wiscnsin USA Panningen, Nederland www.digi-star.cm D3912-GB Rev A Sept 11 Table f cntents TABLE OF CONTENTS DTU Sftware general... 1 Minimum
More informationINTERMEDIATE CAD FILE MANAGEMENT
INTERMEDIATE CAD FILE MANAGEMENT Intrductin File mismanagement is the dwnfall f many brilliant individuals. If yu are wise, yu wn't be ne f the peple wh meet disaster due t pr file management. Cmputers
More informationKnowledge Base Article
Knwledge Base Article Crystal Matrix Interface Cmparisn TCP/IP vs. SDK Cpyright 2008-2012, ISONAS Security Systems All rights reserved Table f Cntents 1: INTRODUCTION... 3 1.1: TCP/IP INTERFACE OVERVIEW:...
More information