Frequently asked questions
|
|
- Dinah Adams
- 7 years ago
- Views:
Transcription
1 Frequently asked questions
2 For more information, visit Usher.com Toll Free (US ONLY): Direct Dial:
3 1 What is Usher? Usher is a mobile identity platform designed to provide security for every business process and system access across an enterprise. It replaces traditional forms of enterprise identity such as IDs, passwords, and tokens, with mobile identity badges on a smartphone. Usher is based on four big ideas: Dematerializing traditional forms of identity into a mobile identity badge, stored on a smartphone Linking a mobile identity badge to its owner, ensuring that only the rightful owner can use it Extending the mobile identity to every business process and application, enabling users to use their mobile identity badge to perform the same functions they previously would using physical forms of identity Deploying mobile identity to thousands of users within your organization Why does MicroStrategy have Usher? Usher is founded on two disruptive technologies mobile software and cloud deployment. MicroStrategy was a visionary in bringing these technologies to the BI market through its industry leading Analytics Platform, and following the company s success, CEO Michael Saylor identified opportunities to extend these capabilities to new markets. Cybersecurity represents possibly the most important mission critical concern facing every enterprise, institution, or organization on the planet, and Usher provides a mobile identity solution. Usher is designed not only to deliver both security and convenience to end users, but it also leverages the MicroStrategy Analytics Platform to deliver unique and powerful intelligence insights regarding all identity activities. Q: What does Usher offer? Usher features a cloud or on-premises self-service web portal, enabling an administrator to create and manage thousands of badges in a matter of minutes. With Usher, end users can: Confirm identity in person Log onto applications Open entryways Validate identity over the phone Unlock workstations Once distributed and configured, Usher badges can be used for password-less authentication to SAML-based cloud and web apps, Windows and Mac workstations, and physical access systems. Usher badges also permit peer-to-peer identity verification, and deliver powerful identity analytics and ongoing network management support for a comprehensive offering.
4 2 What specific versions/configurations of target applications and systems are supported with Usher? Usher includes the following: Directory Gateways: Active Directory OpenLDAP Logical Gateways: Configure Usher with cloud, web, and mobile applications; workstations, and single sign-on (SSO) systems to eliminate passwords. SAML Configuration/Web SSO Salesforce.com Google Apps Microsoft Sharepoint Requires an Active Directory Federation Services server, with an SSL-certificate signed by a third party Exchange/OWA Requires an Active Directory Federation Services server, with an SSL-certificate signed by a third party. Wordpress Mobile web SSO Mobile app SSO Mac unlock with Bluetooth OS X Bluetooth Low Energy 4.0 Requires previously established Active Directory Gateway Login for Windows 7, 8, 2008 Requires previously established Active Directory Gateway Physical Gateways: Configure Physical Access Control Systems (PACS) to eliminate physical keys and cards Lenel OnGuard v Paxton Server v4.28 or later These require an adapter that is a Windows-based web service that communicates with the PACS server using DataConduit Lenel and Paxton adapter requirements: Windows Server 2008 R2 operating system (64-bit) or later Microsoft Internet Information Services version 7.0 or later Microsoft.NET Framework version 4.0 (64-bit) or later MySQL 5.5 database, with 64-bit DSN system pointing to it, to log adapter activity and errors
5 3 S2 Netbox v4.4 Adapter requirements: Red Hat Linux (64-bit) operating system Apache Tomcat web server version or later Netbox server installed and enabled for remote connection MySQL 5.5 database, with 64-bit DSN system pointing to it, to log adapter activity and errors Honeywell EBI vr430.1 What is the pricing for Usher? Usher generally follows a monthly per-user subscription license fee model. A standard, baseline charge applies, and additional charges depend on the breadth of features included in your deployment. For a detailed discussion of pricing specific to your environment, please contact sales@. What devices and mobile platforms does Usher support? Currently, Usher is supported for devices running ios 7 and above, and Android 4 and above. Bluetooth peer discovery, as well as access to buildings and Mac workstations is enabled for iphone version 4s, 5, 5s, 6, 6 Plus, and ipod 5. Android supports Bluetooth peer discovery only. How is Usher deployed? Usher is hosted in a cloud environment. Self-service deployments utilize this SOC 2 Type II compliant cloud environment to host the entire Usher architecture. For customers with a private cloud mandate, the entire Usher Platform can be installed behind the firewall for a full on-premises deployment. Contact sales@ for additional details. What happens if the phone is lost or stolen? In the mobile identity context, losing the phone is often associated with losing your wallet or keys. The traditional measure no longer apply, such as canceling cards, changing locks, losing productivity during visits to credentialing authorities, etc. In the case of Usher these credentials and keys are software based, and a single administrative action can revoke all Usher privileges for a specific user/phone instantly. This logs the user our of the phone and will not permit further login for the user on that device without explicit permission. Meanwhile, on a replacement smartphone, the user simply installs Usher from the app store and authenticates to instantly restore all of their badges and credentials.
6 4 How does Usher work without Internet access? Usher currently offers a number of offline capabilities. For physical access, you can have a Bluetooth reader (either the UBeacon or ipad reader) at the door, which is connected to the network (hard-wired or Wi-Fi), and a disconnected Usher mobile client can unlock the door For logical access, a disconnected Usher mobile client can unlock a Mac workstation Peer-to-peer validation works when the validated user is offline, but the validator must be online How is Usher secure? Usher uses the most robust industry standards to incorporate the best practices in system security. The Usher server architecture is built on Public Key Infrastructure (PKI) to ensure that only authorized Usher users communicate with the Usher server, and only from authorized Usher client devices. The Usher server identifies a valid user by their client s unique X.509 certificate, which the Usher server generates and assigns when the user initially launches the Usher app. This public-private key cryptography workflow ensures that requests to the Usher server only come from legitimate Usherenabled devices. Furthermore, the Usher server provides an out-of-band (OOB) communication channel that uses 256-bit SSL protocol to prevent interception of sensitive data over public networks. User authentication occurs through this OOB channel, involving multiple factors (explained below) and employing TLS encryption for all traffic over the channel that does not allow phishing or interception of user credentials. AES-128 GCM encryption protects basic user data such as username and . What security/data PII does Usher manage? Where does this data reside? Usher manages only basic user information including first name, last name, address, company name and job titles. These fields are stored in the server and the mobile devices, and protected by AES- 128 GCM encryption. What factors of authentication does Usher offer? Usher is a true multi-factor authentication solution, leveraging the following security factors: Knowledge factor, or something you know passcode-protected app and/or device Inherence factor, or something you are integration with Touch ID Possession factor, or something you have the phone itself, with its unique cryptographic certificate used to communicate with the Usher server Does Usher slow down my phone? No, Usher is a light app that will not slow down your phone.
7 5 Does Usher drain my phone battery? Usher uses Bluetooth Low Energy (BLE) to communicate with other devices in order to achieve logical access, physical access, as well as peer-to-peer user discovery. BLE is designed to transmit small amounts of data over a low energy link, thus requiring low power. The amount of additional power required to support the Usher BLE communications is negligible. Does Usher take a lot of space/memory on my phone? Usher occupies very little space itself. Space occupation may increase if you enable pre-caching functionalities. Usher won t take a lot of memory either; memory usage of Usher is at the same level of popular apps, such as Facebook, WhatsApp, LinkedIn, etc. How does the registration/enrollment process work? Registration and enrollment work as follows: The network administrator adds a user to Usher via the user s address Usher sends an to the user with a unique badge link The user clicks the link on their mobile device, which opens the Usher app If this is the first time the Usher app is launched, the server assigns it an access token, the app generates a key pair and a certificate signing request (CSR) and sends the CSR to the server. The server returns an X.509 client certificate based on the CSR to the app, and associates this access token and certificate with the current user. From that point on, the app uses the X.509 certificate and access token in every request to the server Usher server returns the badge information to the Usher app, which displays it to the user What reports and analytics can Usher provide? Usher Intelligence is built on the MicroStrategy Analytics Platform backend, PRIME, and frontend Analytics Platform, empowering Usher administrators with a view into the health of their Usher network population and trending over time, allowing for in-depth resource and member analysis, and transaction record auditing. How do I get support for Usher? To reach Usher s 24/7-support hotline, please contact one of the numbers below: (US only)
8 1850 Towers Crescent Plaza Tysons Corner, VA Copyright All Rights Reserved. COLL
Frequently asked questions
Frequently asked questions FAQ: MicroStrategy 9s/9.5 General What is MicroStrategy 9s? MicroStrategy 9s combines the world s most sophisticated analytics platform with Usher, a revolutionary security platform.
More informationSecure Your Enterprise with Usher Mobile Identity
Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize
More informationWHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationEnable and Turn on MicroStrategy 9s for Existing Projects. Mox Weber, Suhrud Atre, and Rakesh Arora
Enable and Turn on MicroStrategy 9s for Existing Projects Mox Weber, Suhrud Atre, and Rakesh Arora MicroStrategy World Tracks This Session is Part of MicroStrategy World Track 06: Enterprise BI I Forward-Looking
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationMobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationThe increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
More informationAdding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
More informationANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics
MicroStrategy Analytics: Delivering Secure Enterprise Analytics Copyright Information All Contents Copyright 2015 MicroStrategy Incorporated. All Rights Reserved. Trademark Information MicroStrategy, MicroStrategy
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationHow To Use Usher For Business
MicroStrategy Enterprise Security Secure your enterprise with MicroStrategy Usher, the revolutionary new enterprise security platform Nearly 90% of IT Security Professionals Are Concerned About A Data
More informationUsher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy
Usher Mobile Identity for Higher Education Institutions Rebecca Parks Associate Product Manager, MicroStrategy Agenda Overview of Mobile Identity Verify Personal ID Login to University Systems Unlock Doors
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationSecurity Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
More informationAccess Your Cisco Smart Storage Remotely Via WebDAV
Application Note Access Your Cisco Smart Storage Remotely Via WebDAV WebDAV (Web-based Distributed Authoring and Versioning), is a set of extensions to the HTTP(S) protocol that allows a web server to
More informationPowerful analytics. and enterprise security. in a single platform. microstrategy.com 1
Powerful analytics and enterprise security in a single platform microstrategy.com 1 Make faster, better business decisions with easy, powerful, and secure tools to explore data and share insights. Enterprise-grade
More informationADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
More informationDell World Software User Forum 2013
Dell World Software User Forum 2013 December 9-12 Austin, TX SaaS Mobile Management Overview of Cloud Client Manager and integration with KACE K1000 Introducing Dell Enterprise Mobility Management Your
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationAn Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationProduct Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
More informationApps for every employee
Apps for every employee ipad 12:30 PM 100% Apps for every employee Mobilize everyday processes, remove costly bottlenecks, and accelerate the business. 12:30 PM 100% Apps for expense submission, corporate
More informationThe Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationThe Essential Security Checklist. for Enterprise Endpoint Backup
The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationResearch Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
More informationThe Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise
More informationDirectory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of
More informationUsing Usher at MicroStrategy FAQ
Using Usher at MicroStrategy FAQ We appreciate your support in using Usher at MicroStrategy. Usher is not perfect yet, but it is rapidly making improvements to surpass the use of plastic. We are constantly
More informationEnterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationCopyright Giritech A/S. Secure Mobile Access
Secure Mobile Access From everywhere... From any device... From user......to applications Page 3...without compromising on security and usability... and to my PC in the office: Secure Virtual Access Contrary
More informationQuickStart Guide for Managing Mobile Devices. Version 9.2
QuickStart Guide for Managing Mobile Devices Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF
More informationThe Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationMobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
More informationEmployee Active Directory Self-Service Quick Setup Guide
Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:
More informationSymantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
More informationOverview of Microsoft Enterprise Mobility Suite (EMS) Cloud University
Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1
More informationMicrosoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com
More informationMicroStrategy Cloud Reduces the Barriers to Enterprise BI...
MicroStrategy Cloud Reduces the Barriers to Enterprise BI... MicroStrategy Cloud reduces the traditional barriers that organizations face when implementing enterprise business intelligence solutions. MicroStrategy
More informationDropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationImproving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
More informationDeriving a Trusted Mobile Identity from an Existing Credential
Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile
More informationSAS Mobile BI Security and the Mobile Device
SAS Mobile BI Security and the Mobile Device Version 1.0 April 24, 2015 Contents Introduction...1 Security Features Provided by SAS Mobile BI and SAS Visual Analytics...2 Introduction... 2 Lock the SAS
More informationtibbr Now, the Information Finds You.
tibbr Now, the Information Finds You. - tibbr Integration 1 tibbr Integration: Get More from Your Existing Enterprise Systems and Improve Business Process tibbr empowers IT to integrate the enterprise
More informationSOLUTION BRIEF MOBILE SECURITY. Securely Accelerate Your Mobile Business
SOLUTION BRIEF MOBILE SECURITY Securely Accelerate Your Mobile Business CA Technologies allows you to accelerate mobile innovation for customers and employees without risking your enterprise data or applications.
More informationactivecho Driving Secure Enterprise File Sharing and Syncing
activecho Driving Secure Enterprise File Sharing and Syncing activecho Overview In today s enterprise workplace, employees are increasingly demanding mobile and collaborative solutions in order to get
More informationOut-of-Band Multi-Factor Authentication Cloud Services Whitepaper
Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper StrikeForce Technologies, Inc. 1090 King Georges Post Rd. Edison, NJ 08837, USA Tel: 732 661-9641 Fax: 732 661-9647 http://www.sftnj.com
More informationFileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.
FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates
More informationMobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
More informationAccess the TCNJ Palo Alto Networks VPN using the GlobalProtect VPN client
Access the TCNJ Palo Alto Networks VPN using the GlobalProtect VPN client June 2014 Table of Contents Introduction 1 Determine the Windows Operating System Version 2 Install the GlobalProtect VPN client
More informationMOBILITY. Transforming the mobile device from a security liability into a business asset. pingidentity.com
MOBILITY Transforming the mobile device from a security liability into a business asset. pingidentity.com Table of Contents Introduction 3 Three Technologies That Securely Unleash Mobile and BYOD 4 Three
More informationCloudessa AAA and Captive Portal Cloud Service
Cloudessa AAA and Captive Portal Cloud Service Key Advantages Cloudessa AAA and Captive Portal Cloud Service makes it easy for any merchant, venue, institution, or organization to provide on-site WiFi
More informationnexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationOffer Specifications Dell Email Management Services (EMS): mobilencrypt
Offer Specifications Dell Email Management Services (EMS): mobilencrypt Services Overview mobilencrypt is an on-the-device email encryption solution that enables mobile users to send and receive encrypted
More informationMobile Deposit Frequently Asked Questions
Mobile Deposit Frequently Asked Questions What is TopLine Mobile Deposit? Mobile Deposit, available through TopLine s Mobile App, allows you to conveniently deposit your checks remotely by using your mobile
More informationComodo Mobile Device Manager Software Version 1.0
Comodo Mobile Device Manager Software Version 1.0 Installation Guide Guide Version 1.0.041114 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.CMDM Setup... 3 1.1.System
More informationNew Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
More informationAPI-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
More informationDirectory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107
Okta White paper Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-dint-053013 Table of Contents
More informationEnterprise Security with mobilecho
Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come
More informationWorkday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
More informationAirnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students.
Airnet-Student Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students. Airnet-Student has two key advantages over the current Airnet
More informationTwo-Factor Authentication (2FA) Registration Instructions Symantec VIP Access
Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access To strengthen KBR information security and safeguard company data, Information Technology will implement two-factor authentication
More informationMANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013
MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters
More informationWHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW
NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW INTRODUCTION As businesses adopt new technologies that touch or leverage critical company data, maintaining the highest level of security is their
More informationRemote Desktop Services User's Guide
Contents Remote Desktop Services Document Revision Control Revision Description Author DATE 1.0 Initial Release Karen M. Hess 3/24/2015 1.1 Added section for viewing mapped drives Karen M. Hess 4/15/2015
More informationWeb Conferencing: Unleash the Power of Secure, Real-Time Collaboration
White Paper Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration This paper focuses on security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support
More informationENTERPRISE MOBILE BACKEND AS A SERVICE EVALUATION CHECKLIST
ENTERPRISE MOBILE BACKEND AS A SERVICE EVALUATION CHECKLIST Considerations for choosing a secure, scalable, and reliable enterprise mobile backend platform OVERVIEW Organizations often struggle with identifying
More informationPortal for ArcGIS. Satish Sankaran Robert Kircher
Portal for ArcGIS Satish Sankaran Robert Kircher ArcGIS A Complete GIS Data Management Planning & Analysis Field Mobility Operational Awareness Constituent Engagement End to End Integration Collect, Organize,
More informationIdentity in the Cloud
White Paper Identity in the Cloud Use the cloud without compromising enterprise security Table of Contents The Cloud Conundrum 3 Managing Cloud Identity 3 The Identity Lifecycle 4 SaaS Single Sign-On 4
More informationLeveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
More informationMulti-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management
Multi-Factor Authentication for your Analytics Implementation Siamak Ziraknejad VP, Product Management 1 Agenda What is Multi-Factor Authentication & Why is it important The Usher Security Badge Badge
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationPRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
More informationMaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
More informationUsher: a comprehensive. enterprise security guide
Usher: a comprehensive enterprise security guide TABLE OF CONTENTS Introduction 5 Logical access controls 6 Physical access controls 6 Identity authentication solutions 7 Chapter 1: Components of an enterprise
More informationKaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
More informationUsing Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
More informationVodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence
Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users
More informationThe Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
More informationSalesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
More informationThe Encryption Anywhere Data Protection Platform
The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,
More informationWhere are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players
The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,
More informationThe Centrify Vision: Unified Access Management
The Centrify Vision: Unified Access Management Control, Secure and Audit Access To Your On-Premise and Cloud-based Infrastructure On-premise Centrify the Enterprise Cloud Personal Devices Mobile Devices
More informationios Team Administration Guide (Legacy)
ios Team Administration Guide (Legacy) Contents About ios Development Team Administration 5 At a Glance 6 Team Admins Manage Team Membership and Assign Roles in the Member Center 6 Development Devices
More informationThis paper introduces the security policies, practices, and procedures at Smartsheet.
SMARTSHEET SECURITY Abstract This paper introduces the security policies, practices, and procedures at Smartsheet. Readers will gain an understanding of the Smartsheet operating environment and application
More information