White Paper. Security: Cortado Corporate Server for BlackBerry. Information on the Cortado infrastructure and Bluetooth printing
|
|
- Flora Tate
- 8 years ago
- Views:
Transcription
1 White Paper Security: Cortado Corporate Server for BlackBerry Information on the Cortado infrastructure and Bluetooth printing This white paper provides information about the security of BlackBerry and Cortado Corporate Server, featuring access to the company network, printing, faxing and Present-to-Screen functions. You will learn how secure Cortado Corporate Server for BlackBerry is and what you can do to ensure maximum security. The BlackBerry infrastructure Technical basics Tips for secure server configuration The BlackBerry device Tips for secure BlackBerry configuration Cortado and BlackBerry Note Please note that ThinPrint GmbH has compiled all information and descriptions in this document based on currently accessible information on the treated subjects and based on the current state of the art and assumes no liability for the accuracy of the information. Cortado Explorer Printing with Bluetooth Printing to network printers and faxing Present-to-Screen Tips for secure Cortado configuration
2 Copyright This document is the intellectual property of ThinPrint GmbH. This document may be copied in whole or in part, provided this Copyright notice is included in every copy. Registered Trade Marks All hardware and software names mentioned in this document are the registered trademarks of their respective companies or should be regarded as such. ThinPrint GmbH Alt-Moabit 91 a/b Berlin Germany/ Alemania ThinPrint Pty. Ltd. L 10, 275 Alfred Street North Sydney / NSW / 2060 Australia ThinPrint, Inc Center Ridge Rd, Suite 630 Cleveland, Ohio USA/EEUU ThinPrint, Inc Yates Drive, Suite 200 Westminster, Colorado USA/EEUU info@thinprint.com Web: Issued: July 1, 2008 (v24)
3 Contents Introduction... 4 The BlackBerry infrastructure... 5 The BlackBerry device... 6 BlackBerry and Cortado... 7 Cortado Explorer: Access your company network... 7 Bluetooth printing... 8 Printing to network printers and faxing Present-to-Screen Summary More information Cortado Security White Paper 3
4 Introduction Introduction The security of mobile devices is under continuous debate. In particular, access to company networks from mobile devices, and the transmission of sensitive data via Bluetooth, raises questions about the security of mobile technology. This white paper explains the Cortado Corporate Server for BlackBerry infrastructure from a server and client perspective. When the word BlackBerry is used, it refers to the original BlackBerry smartphone devices from RIM (Research in Motion), not those of third-party manufacturers that also use the BlackBerry Connect technology. RIM, the manufacturer of BlackBerry, places high value on security and in recent years has continued to improve the technology so that the devices are more secure than other mobile phones or PDAs. The Cortado solution fully integrates itself into the BlackBerry menu structure; for example, when you open an , the menu will include the print option. You can then choose whether the text or the attachment is to be printed, whether you want to send a fax, or if you want to see the data on the screen of another device (Present-to-screen). With Cortado Corporate Server, users have the same access as if they were on a normal workstation: access to all network drives, as well as Document Management Systems, SAP Enterprise Portal, and Microsoft Sharepoint. Additionally, Cortado enables the printing of s, attachments and files located in the corporate network via Bluetooth, and network printing, as well as faxing and Present-to-screen. In this white paper you will learn everything about the security aspects of these features. The security of Cortado Corporate Server for BlackBerry greatly depends on the secure configuration of both the server and BlackBerry devices. This white paper offers many useful tips on how to set up a secure BlackBerry and Cortado Corporate Server environment. 4 White Paper Cortado Security
5 The BlackBerry infrastructure The BlackBerry infrastructure If you use a BlackBerry, your company requires a BlackBerry Enterprise Server (BES) with a connection to the mail server. These servers would logically be located behind the company firewall, as depicted in Illus. 1. s sent from the mail server to the BlackBerry are encrypted with 3DES/AES. The encryptions conform to a worldwide recognized security standard. DES and AES (Data Encryption Standard/Advanced Encrypted Standard) is approved in USA, UK and other countries for restricted government data. Illus. 1 MDS channel: 3DES/AES encryption Bluetooth encryption: 128 Bit Illus. 1 BlackBerry architecture, here with Bluetooth printer The encrypted data is sent via the internet to a BlackBerry Network Operation Center (NOC), which is operated by RIM. From the NOC, it is distributed to the various mobile networks, which then send the message to the end device. Data is sent from between BlackBerry Enterprise Server and BlackBerry device through a channel that encrypts each data packet with either 3DES or AES, depending on configuration. The keys are only stored at the end points of this communication, in the customer's area of responsibility. In other words, the keys are only located on the user's own BES on one hand and on the user's end device, the BlackBerry, on the other hand. This guarantees that none of the components involved in the data transfer have access to customer data. All services, such as , PIM 1, and MDS 2 are sent through this secure channel, which is an integral part of the BlackBerry solution from RIM. 1 Personal Information Management: calendar, memo, contacts, etc. 2 Mobile Data Service: enables access to the internet and company server Cortado Security White Paper 5
6 The BlackBerry infrastructure Configuring a secure infrastructure The following tips help you to securely configure your BlackBerry infrastructure. Disable services on the server that are not needed Specify mandatory (group) policies on the server for all BlackBerries (the default IT policy should be the most secure). Prohibit users from installing software Put BES behind a firewall (see Illus. 1) BES: open only the port that is needed for communication with the mail server (port 3101, outgoing connections) The BlackBerry device The biggest security risk for a BlackBerry is certainly when it is lost or stolen. There are various safety precautions for this. Basically, one can say that BlackBerry has achieved a much higher level of security than conventional mobile phones and PDAs. BlackBerry is as vulnerable against mechanical invasion as other devices unless, of course, data was previously deleted by an administrator or local encryption is enabled. Password protection BlackBerry is equipped with a screensaver that can only be disabled with a password (4-14 characters). Easy passwords are not allowed. If the password is incorrectly entered 10 times (default setting), the device will be locked. The administrator can increase or decrease the number of incorrect entries. Password protection is optional and should always be activated. The password itself is not saved on the BlackBerry, but only its hash value; this is saved in the device's flash memory and cannot be read by other applications, such as Java. Remote deletion of all data If a BlackBerry is lost or stolen, all data stored on it can be deleted remotely by overwriting it. This is also possible if the SIM card 3 has been replaced. Encryption of local data Local data (address book, memos, etc.) can be encrypted with AES and therefore additionally protected in case someone acquires direct access to the device. Also the domain password for using Cortado Explorer is encrypted if it is stored locally on the BlackBerry smartphone. Storing the password locally can be disabled by the administrator and this is recommended for higher security. The Cortado Explorer can then only be opened with the password. Cortado security Cortado Corporate Server uses the BlackBerry Enterprise Server architecture (see illustration on Page 5). Print jobs are sent securely via the BES to the BlackBerry smartphone. Due to the innovative streaming technology, the document itself or the complete print job is at no time on the BlackBerry smartphone. Even if the device is lost or stolen, it is impossible to access the documents. 3 Subscriber Identity Module: Smart card in mobile devices to identify the user. 6 White Paper Cortado Security
7 BlackBerry and Cortado Configuring a secure BlackBerry device Set high password protection (maximum length) for local data and change password regularly. Disable the option of storing the domain password on the BlackBerry smartphone. Set encryption for local data (enable content protection). Set the number of incorrect entries for the password before the device is locked. Delete (remotely) all data if the device is lost or stolen. Only use devices of the latest generation (4.1 or later). Protect SIM card with password. Protect the media card (password and/or encryption) Change default device name (BlackBerry8810, for example) to an individual name. BlackBerry and Cortado The Cortado Corporate Server lets you have information available at any time and at any place, all via your BlackBerry smartphone. You can view, copy and paste, print and fax documents (files from your network or attachments) on the spot. Cortado Corporate Server is a client-server based solution, where the server component is installed behind a firewall at the company site (see Illus. 1). The communication between the clients on the BlackBerry smartphones and the Cortado Corporate Server takes place completely through the secure MDS channel. The Cortado Corporate Server does not have any connection to the outside, just internal server connections, to the mail server and to the BES. We will now take a close look at the security of these features. Cortado Explorer: Access your company network The Cortado Explorer enables users to access the company network, for example to transfer and organize files and folders. Together with the flexible output options Cortado Corporate Server offers, the user can work with his BlackBerry smartphone just like he can from the desktop in his office. Security is very important in this mobile scenario. With Cortado Corporate Server, each user has the same rights as he has from his workstation. Cortado Corporate Server reads and uses the rights from the Active Directory, without causing any changes or extensions to it. To access the company network, users use the same domain password that they use at their desktop. User password storage can be centrally enabled or disabled by the administrator. By disabling this option the administrator ensures that loss or theft of BlackBerry smartphones cannot lead to unauthorized access to the company network. Cortado Security White Paper 7
8 BlackBerry and Cortado Users utilizing the Cortado Explorer on their BlackBerry smartphones have the following rights: they can only see folders they would be able to see from their desktop they can only delete files and folders they are also allowed to delete from their desktop they can only use the network printers they are allowed to use in the company network they can only edit documents, they are allowed to edit from their desktop Restricting rights in ADAM As a second level of security, Cortado Corporate Server enables the administrator to restrict the rights for the mobile user, amongst other reasons because working form the BlackBerry is not the same as working from the desktop. This can be especially useful to prevent deleting files by accident. The restrictions are made possible by additional settings in the ADAM (Active Directory Application Mode) from Cortado Corporate Server. On this level it is only possible to restrict rights, not to expand them. The rights in Active Directory stay untouched. For example the following rights can be restricted on the Cortado Server for the mobile users: Deleting files (the right to delete files from the desktop is not touched by this) Bluetooth printing Downloading files from the corporate network to the mobile device Uploading files from the mobile device to the corporate network Sending files from the corporate network as attachments Viewing files from the corporate network with the BlackBerry viewer Mapping of WebDAV Online drives Rights can be restricted for single users, user groups, or for all users. Tip! Cortado Corporate Server features can be selectively installed. Printing, faxing and Present-to-Screen features can be enabled, even if you do not want to use the Cortado Explorer. Bluetooth printing Cortado enables you to print s, attachments or documents from your corporate network via Bluetooth to the next printer. The BlackBerry can connect via Bluetooth to other devices, such as a printer. Bluetooth is a radio link that, unlike infrared, does not require direct line-of-sight. The range varies between Bluetooth devices from 10 to 100 meters ( feet) depending on the radio class. A Blackberry's range is 10 meters (30 feet). Bluetooth devices are categorized into three security modes. BlackBerry supports the highest and safest category 3. In this category, authentication is required when establishing a connection and encryption is available. 8 White Paper Cortado Security
9 BlackBerry and Cortado Frequency hopping Generally, radio communications can be intercepted. The short range makes it more difficult, but so does frequency hopping. Bluetooth sends each transmission through one of 79 radio channels. The channel changes 1,600 times a second and only the two communication partners know which channel is currently being used. If an eavesdropper is listening in, he would have to record all 79 channels. This is possible with special hardware, but time-consuming. Pairing When Bluetooth devices communicate with each other, they first have to link up (pairing). During pairing, keys are created for encrypted data transmission. Each Bluetooth device is equipped with algorithms for authentication and encryption. BlackBerry uses the highest key available on the other device for encryption devices, between 8-bit (minimum) and 128-bit (maximum). Keys are created and exchanged during pairing. Pairing means that a Bluetooth device searches for and displays all other Bluetooth devices within its range. The desired device, such as a printer, is selected from the list. A PIN for the other device (here, the printer) must be entered to establish a connection. Encrypted data transmission applies a symmetric encryption; in other words, sender and recipient both use the same key for encryption and decryption. This key is created during pairing from the following three numbers: Device address (MAC address) A random number PIN of the device to which the connection is established (here, the printer) The user only needs to make a single entry; namely, the PIN. The device uses the PIN and the other two numbers to create a (initially temporary) key, with which data is encrypted and transferred between the paired devices. This key is sent to the target device (here, the printer) during pairing. A BlackBerry can only be paired with devices that have a PIN. Of the above numbers, the PIN is actually the only one that is not radio transmitted. In practice, the BlackBerry user goes to the printer to find out its PIN. A Bluetooth device then only runs the risk of eavesdropping when all three of the following happen simultaneously: is turned on (at the moment) Device is in "discoverable" mode (to communicate with other Bluetooth devices) Device is within the physical range of the attacker (10 meters / 30 feet for BlackBerry) The discoverable status is disabled on the device by default. Printing with Cortado If you want to print, the file is sent from the mail server or from the file server to the Cortado server. The Cortado server creates a print job, compresses it with the Thin- Print technology, and streams it to the BlackBerry. This system uses the MDS channel from RIM, so that the print data follows the same path as communication (see illustration on Page 5). The print data is therefore optimally protected along the way from the server to the end device. Cortado Security White Paper 9
10 BlackBerry and Cortado It is not necessary to download the file to the BlackBerry before printing. Compression and streaming also ensure that the complete print job is never in the air, which adds to the security. Criticism of Bluetooth Security risks are often mentioned in connection with Bluetooth. One issue is that the radio connection, particularly pairing, can be intercepted, giving eavesdroppers access to the keys. Another criticism is that the PIN is often either too short or simple and therefore easily found by trial-and-error. Furthermore, it is considered a weakness that interfering signals can break an open Bluetooth connection and it is then necessary to reenter the PIN, which can then be intercepted. These criticisms can be refuted by proper training, responsible use and careful configuration. Solution 1: Use long PIN Solution 2: 128-bit encryption Solution 3: Pair in a secure environment Solution 4: Prohibit pairing An eavesdropper requires the PIN to tap the connection. "0000" is the default PIN on many devices. This setting should be changed immediately using the longest PIN possible. The PIN may not be so trivial that it is easy to figure out (like or ). If you use a 16-digit PIN, you can be almost certain that a hacker will not figure it out. The key used for transmitting all data is then also secure. BlackBerry supports 128-bit encryption, which is today considered tap-proof. However, not every end device supports this type of encryption. When paired, Bluetooth devices exchange data in the encryption depth. Black- Berry uses the maximum encryption supported by the partner device (printer or Bluetooth adapter). For example, the following Bluetooth adapter use 128-bit encryption: Anycom Blue Printer Adapter PM-400 or HP BT 1300 Bluetooth Adapter. The Pentax PocketJet 3Plus printer supports 56-bit encryption. Be careful only to pair devices in a secure environment, such as in private or company spaces, and never anywhere where there are crowds (trade shows, airports). Because the BlackBerry's Bluetooth interface usually only has a range of 10 meters (30 feet), this is a manageable environment in which you can easily eliminate eavesdroppers. If the connection between paired devices is lost and the PIN has to be reentered, open your ears and check your surroundings. Only pair your device if you are certain that nobody is eavesdropping. Once the devices are paired, the ensuing data traffic cannot be tapped because it is encrypted and the keys are only known to the paired devices. Device pairing can be prohibited in the configuration settings. In practice, the administrator would pair the BlackBerry once with the (portable) printers in a secure environment and then prohibit pairing with other devices. Then you can be certain that your data will not be tapped. In summary, one can say that Bluetooth is secure when the devices are paired in a tap-proof environment and the PIN is sufficiently long. 10 White Paper Cortado Security
11 BlackBerry and Cortado Tips for Bluetooth security Use a long and not trivial PIN (use maximum character length). Only pair the device in a tap-proof environment, not in crowded, public places. Then block pairing for the device (if possible). Permanently saving the partner device in the authentication list is safer than entering the PIN each time. Always disable "discoverable" (it will still be possible to print) Only turn on Bluetooth for as long as necessary. Never connect to unfamiliar devices and ignore unexpected messages and prompts to reenter your PIN. Use printers or Bluetooth adapters that support encryption. Printing to network printers and faxing Printing and faxing without Bluetooth Printing to network printers or sending a fax is possible without a Bluetooth connection. The BlackBerry tells the Cortado server which document is to be faxed or printed. It is not necessary to download the document to the BlackBerry. The Cortado server sends the fax or print job directly to the selected fax machine or network printer. In other words, the BlackBerry initiates the process but the data does not travel through the mobile device; it is sent directly from the server to the printer or fax machine. For printing to network printers, the printers must first be created on the Cortado server. The network printers on the server will then be displayed in the list of available printers on the BlackBerry. Thanks to ThinPrint's technology it is also possible to print to printers in masked networks. If you want to avoid printing via Bluetooth, you can use this method to print to all network printers in your company and all remote offices. This is also possible with SSL encryption 4. Thanks to the open Cortado Corporate Server architecture it is possible to integrate Cortado with third party software systems like tracking and accounting software. This way print jobs could for example be created from the BlackBerry smartphone, then picked up from any network printer with a magnetic swipe card or smart card, and at the same time be tracked (user, document printed, and on which printer the job was run). Present-to-Screen The Present-to-screen function sends files from the company network or attachments from the BlackBerry to a laptop or PC, where they can be viewed in original size. Users can hold presentations via their BlackBerry smartphone by transferring documents to a computer screen in a highly compressed format. With Present-to-Screen, files of any format can now be sent quickly and simply from a BlackBerry smartphone to a notebook or PC screen, even if the user forgot the appropriate file at the office. This allows the user to view documents such as diagrams, blueprints, or complex spreadsheets. 4 Please ask Cortado Support or Consulting for details. Cortado Security White Paper 11
12 Summary The desired document can be selected from the company network with the Cortado Explorer. Only a compressed view of the file is transmitted to the smartphone's SD card 5, also providing opportunities for big savings of up to 80 percent in regard to download time and data transfer. The connection from the smartphone to the notebook or PC is established via USB cable. The file never leaves the smartphone and no footprint will be left on the notebook or PC as soon as the USB cable is disconnected again. This way the data transfer to the smartphone and to the laptop or PC is secure. Summary With conscientious configuration, BlackBerry is secure. Data is sent through the MDS channel from the server and thus is encrypted with a method (3DES/AES) that experts classify as secure. Cortado Corporate Server is a client-server based solution, where the server component is installed behind a firewall at the company site. The communication between the Cortado client on the BlackBerry smartphone and the Cortado Corporate Server also takes place completely through the secure MDS channel. The Cortado Corporate Server does not have any connection to the outside, just internal server connections, to the mail server and BlackBerry Enterprise Server (BES) for example. The use of the Cortado Explorer is password protected. With the Cortado Explorer users can only perform those actions and access those folders, files and network printers that they are allowed to by their rights in Active Directory. As a second layer of security, rights and features can additionally be restricted on the Cortado Corporate Server, for example for deleting, downloading or uploading files from or to the Black- Berry smartphone. This can be done for all users, for user groups and single users. For sending files as attachments, fax and network printing, data is send directly from the Cortado Corporate Server. No data is transferred back to the handheld device. Even if using Bluetooth printing, at no time the document itself or the complete print job are on the BlackBerry smartphone. Thus, even if the device is lost or stolen, it's impossible to access the documents. Bluetooth connections are secure if certain security measures are taken. The BlackBerry smartphone has achieved a much higher level of security than other mobile phones. Locally stored data is password protected and can also be encrypted. In case of loss or theft, all data can be deleted remotely. More information Cortado Corporate Server for BlackBerry: Free demo download, brochures, and manuals at -> Enterprise Solutions -> Cortado Corporate Server for BlackBerry. 5 Secure Digital Memory Card: Smart card for mobile devices. 12 White Paper Cortado Security
Configuration. Cortado Corporate Server in a Novell environment. Version 4.0
Cortado Corporate Server in a Novell environment Version 4.0 Configuration Cortado. A Division of ThinPrint ThinPrint AG Alt-Moabit 91 a/b 10559 Berlin Germany/ Alemania ThinPrint Pty. Ltd. L 10, 275 Alfred
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationWICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
More informationCortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
More informationWhite Paper: Secure Printing and Mobile Devices
White Paper: Secure Printing and Mobile Devices Secure Printing and Mobile Devices 1 Introduction... 3 2 The Importance of IT Security... 3 3 Industry Overview... 4 4 Printing and Mobile Security Solutions...
More informationWindows computer as a ThinPrint Client Gateway. Technical Information
Windows computer as a ThinPrint Client Gateway Technical Information Cortado AG Alt-Moabit 91 a/b 10559 Berlin Germany/ Alemania Cortado, Inc. 7600 Grandview Avenue Suite 200 Denver, Colorado 80002 USA/EEUU
More informationTechnical White Paper BlackBerry Security
Technical White Paper BlackBerry Security For Microsoft Exchange Version 2.1 Research In Motion Limited 2002 Research In Motion Limited. All Rights Reserved Table of Contents 1. INTRODUCTION... 1 2. ARCHITECTURE...
More informationONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
More informationSecurity Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
More informationSync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
More informationFeature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
More informationInnovative Secure Boot System (SBS) with a smartcard.
Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable
More informationIntegration of SAP, Unix, AS/400, and mainframe spool systems in Microsoft Terminal Services and Citrix Presentation Server environments
Host Integration Host Integration Integration of SAP, Unix, AS/400, and mainframe spool systems in Microsoft Terminal Services and Citrix Presentation Server environments Direct printing via TCP/IP For
More informationBlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note
BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...
More informationPolicy Title: HIPAA Access Control
Policy Title: HIPAA Access Control Number: TD-QMP-7018 Subject: Ensuring that access to EPHI is only available to those persons or programs that have been appropriately granted such access. Primary Department:
More informationDigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationTechnical Information
Licensing Using License Manager for ThinPrint and Cortado Licenses Technical Information Cortado AG Alt-Moabit 91 a/b 10559 Berlin Germany/ Alemania Cortado, Inc. 7600 Grandview Avenue Suite 200 Denver,
More informationChapter 3 Safeguarding Your Network
Chapter 3 Safeguarding Your Network The RangeMax NEXT Wireless Router WNR834B provides highly effective security features which are covered in detail in this chapter. This chapter includes: Choosing Appropriate
More informationSIEMENS MOBILE PHONE MANAGER (MPM) AND BLACKBERRY BUILT-IN DESKTOP MANAGER IN USE WITH THE SIEMENS SK65
SIEMENS MOBILE PHONE MANAGER (MPM) AND BLACKBERRY BUILT-IN DESKTOP MANAGER IN USE WITH THE SIEMENS SK65 www.siemens.com/sk65 Content Overview... 3 Technical Requirements... 3 Siemens Mobile Phone Manager...
More information2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
More informationCitrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
More informationLegal Notes. Regarding Trademarks. Models supported by the KX printer driver. 2011 KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationProtecting Microsoft Internet Information Services Web Servers with ISA Server 2004
Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents
More informationQuick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.
Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationBluetooth wireless technology basics
Bluetooth wireless technology basics Abstract... 2 Introduction... 2 How Bluetooth wireless technology works... 3 BWT network topologies... 4 BWT security... 5 Establishing BWT connections... 6 Activating
More informationUsing the Omnisec 525 fax encryptor over BGAN
Using the Omnisec 525 fax encryptor over BGAN Version 2 6 June 2008 inmarsat.com/bgan Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
More informationHow To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
More informationDJIGZO EMAIL ENCRYPTION. Djigzo white paper
DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or
More informationIBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
More informationNovell Filr. Mobile Client
Novell Filr Mobile Client 0 Table of Contents Quick Start 3 Supported Mobile Devices 3 Supported Languages 4 File Viewing Support 4 FILES THAT CANNOT BE VIEWED IN THE FILR APP 4 FILES THAT GIVE A WARNING
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
More informationServer Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
More informationInstallation and Setup Guide
Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.
More informationNovell Filr 1.0.x Mobile App Quick Start
Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,
More informationBlackBerry Enterprise Solution Security Release 4.1.2 Technical Overview www.vodafone.com.mt
BlackBerry Enterprise Solution Security Release 4.1.2 Technical Overview www.vodafone.com.mt Life is now BlackBerry Enterprise Solution Security 1 Contents 5 Wireless security 5 BlackBerry Enterprise Solution
More informationCopyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationAndroid App User Guide
www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationInternet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.
Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Internet Security................................................................ 4
More informationSimply Better Printing in Any IT Architecture
Simply Better ing in Any IT Architecture Driver Free ing One virtual printer driver, the Thin Output Gateway, replaces all printer drivers on the printing server or desktop. Advanced Adaptive Compression
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationPassword Depot for Android
Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry
GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for
More informationSecurity Technical. Overview. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Security Technical Overview Published: 2014-01-17 SWD-20140117135425071 Contents 1 New in this release...10 2 Overview...
More informationVIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY. AUTHOR: Raúl Siles. Founder and Security Analyst at Taddong
VIDEO Intypedia012en LESSON 12: WI FI NETWORKS SECURITY AUTHOR: Raúl Siles Founder and Security Analyst at Taddong Hello and welcome to Intypedia. Today we will talk about the exciting world of security
More informationCIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper
CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in
More informationInstallation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
More informationHow To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device
Page 2 of 14 Securing Critical Corporate Data in a Mobile World Page 3 of 14 Table of Contents 1 Mobile is the New Normal... 4 1.1 The Critical Importance of Mobile Security... 4 1.2 Mobile Security Challenges...
More informationKaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
More informationSecureCom Mobile s mission is to help people keep their private communication private.
About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationLX Remote. Software Operator s Manual. Software version: 2.2.2. www.lxremote.com
LX Remote Software Operator s Manual Software version: 2.2.2 www.lxremote.com Part number: NEMM024_Rev_F Last updated: May 2015 Copyright 2011-2015 All rights reserved Copyright 2011-2015 NorthEast Monitoring,
More informationBridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using
More informationXerox Mobile Print Cloud
September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United
More informationKaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
More informationSecuring end-user mobile devices in the enterprise
IBM Global Technology Services Thought Leadership White Paper January 2012 Securing end-user mobile devices in the enterprise Develop an enforceable mobile security policy and practices for safer corporate
More informationConfiguring the WT-4 for ftp (Infrastructure Mode)
Introduction En Configuring the WT-4 for ftp (Infrastructure Mode) This document provides basic instructions on configuring the WT-4 wireless transmitter and a ftp server for transmission over an infrastructure
More informationNokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia for Business Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E50 Legal Notice Copyright Nokia 2006. All rights reserved. Reproduction, transfer, distribution
More informationRemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
More informationSafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
More informationHow Reflection Software Facilitates PCI DSS Compliance
Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit
More informationConfiguring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationFirmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
More informationBlackBerry Enterprise Solution
BlackBerry Enterprise Solution Security Technical Overview for BlackBerry Enterprise Server Version 4.1 Service Pack 5 and BlackBerry Device Software Version 4.5 2008 Research In Motion Limited. All rights
More informationUsing BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
More information2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
More informationCyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
More informationAdministration Guide. Wireless software upgrades
Administration Guide Wireless software upgrades SWDT207654-207654-0727045705-001 Contents Upgrading the BlackBerry Device Software over the wireless network... 3 Wireless software upgrades... 3 Sources
More informationNOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT
You can read the recommendations in the user, the technical or the installation for NOVELL ZENWORKS ENDPOINT SECURITY MANAGEMENT 4.0. You'll find the answers to all your questions on the NOVELL ZENWORKS
More informationHomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
More informationLogitech Advanced 2.4 GHz Technology
Logitech Advanced 2.4 GHz Technology Revision 1.1H March 2, 2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN FEATURES...4 3 ASSOCIATION MODEL... 5 4 ENCRYPTION...
More informationBlackBerry Enterprise Solution v4.1 For Microsoft Exchange Life is now
BlackBerry Enterprise Solution v4.1 For Microsoft Exchange Life is now EXTENDING EXCHANGE WITH SECURE WIRELESS SOLUTIONS BlackBerry Enterprise Server software integrates with Microsoft Exchange and your
More informationHP ProtectTools Windows Mobile
HP ProtectTools Windows Mobile White Paper Introduction... 2 Risks... 2 Features... 3 Password Hashing... 4 Password Generation... 5 Password Types... 5 Strong Alphanumeric Passwords... 5 Password Lifetime...5
More informationRemote Administration
Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over
More informationWhite Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
More informationIBM Data Security Services for endpoint data protection endpoint encryption solution
Protecting data on endpoint devices and removable media IBM Data Security Services for endpoint data protection endpoint encryption solution Highlights Secure data on endpoint devices Reap benefits such
More informationPolicy and Profile Reference Guide
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Policy and Profile Reference Guide Published: 2014-06-16 SWD-20140616165002982 Contents 1 About this guide... 10 2 New IT policy
More informationWireless-N. User Guide. PCI Adapter WMP300N (EU) WIRELESS. Model No.
2,4 GHz WIRELESS Wireless-N PCI Adapter User Guide Model No. WMP300N (EU) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of
More informationThinPrint 10.6 Simply Better
ThinPrint 10.6 Simply Better Simply Better Printing For All IT Architectures Reduce the burden associated with user support Eliminate bandwidth, server and printer hardware costs as well as reduce paper
More informationAXIS 5810 A Bluetooth Print Plug. Quick Start
AXIS 5810 AXIS 5810 A Bluetooth Print Plug Quick Start BLUETOOTH is a trademark owned by its proprietor and used by Axis Communications AB under license 1 AXIS 5810 Regulatory Information Regulatory Information
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
More informationIBackup Drive User Guide
IBackup Drive User Guide TABLE OF CONTENTS Introduction... 3 Features... 4 Install IBackup Drive... 5 Login to IBackup Drive... 5 About Main Screen... 7 Settings... 8 Toolbar Options... 11 IBackup Drive
More informationSecure Email Client Guide
PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing
More informationIntroweb Remote Backup Client for Mac OS X User Manual. Version 3.20
Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup
More informationUser Guide. Version 3.0 April 2006
User Guide Version 3.0 April 2006 2006 Obvious Solutions Inc. All rights reserved. Dabra and Dabra Network are trademarks of Obvious Solutions Inc. All other trademarks owned by their respective trademark
More informationAddressing document imaging security issues
Addressing document imaging security issues Document imaging makes it possible to integrate paper documents with existing workflow processes and business applications, e.g., e-mail, fax, and electronic
More informationData Security and Governance with Enterprise Enabler
Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date
More informationDesigning Enterprise Mobility
Designing Enterprise Mobility Cortado Corporate Server M Work beyond your desk, simply & efficiently Productivity: Work on the go just as easily as from a desktop PC Usability: Mobile access to corporate
More informationLogMeIn Hamachi. Getting Started Guide
LogMeIn Hamachi Getting Started Guide Contents What Is LogMeIn Hamachi?...3 Who Should Use LogMeIn Hamachi?...3 The LogMeIn Hamachi Client...4 About the Relationship Between the Client and Your LogMeIn
More informationSystem Security Policy Management: Advanced Audit Tasks
System Security Policy Management: Advanced Audit Tasks White Paper October 6, 2005 2005 Altiris Inc. All rights reserved. ABOUT ALTIRIS Altiris, Inc. is a pioneer of IT lifecycle management software that
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationintroducing The BlackBerry Collaboration Service
Introducing the Collaboration Service 10.2 for the Enterprise IM app 3.1 introducing The Collaboration Service Sender Instant Messaging Server Collaboration Service 10 device Recipient V. 1.0 June 2013
More informationDIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
More informationOhio Supercomputer Center
Ohio Supercomputer Center Portable Security Computing No: Effective: OSC-09 05/27/09 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original Publication
More informationLogitech Advanced 2.4 GHz Technology With Unifying Technology
Logitech Advanced 2.4 GHz Technology Revision 070709 July 7, 2009 TABLE OF CONTENTS 1 INTRODUCTION: THE MOVE TO WIRELESS PERIPHERALS IN BUSINESS...3 2 SYSTEM OVERVIEW...4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN
More informationSetting Up Email on Your Palm. Treo 700wx Smartphone
Setting Up Email on Your Palm Treo 700wx Smartphone Intellectual property notices 2006 Palm, Inc. All rights reserved. Trademark, copyright, patent, and other intellectual property notices are set forth
More informationMN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
More informationBlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
More information