1 Cryptzone Group AB (publ) The Simple Encryption Platform An Overview Created 2011 For technical questions
2 Agenda... Simple Encryption Platform (SEP) An introduction Product presentation Technical Presentation of Secured , Secured eusb, Secured efile, and Secured ecollaboration Use cases for the Simple Encryption Platform
3 More resources.. Direct access to Crytpzone Group resource center Webinars Demos / Workshops - Whitepapers Case Studies - Solution Guides - Product Sheets - Security as a Service - Software Manuals -
4 In short..... Secured Policy-controlled encryption Secured makes it possible for the end user to send secured s and attachment to anyone directly from Outlook and Lotus Notes. The receiver can open the secured on any platform as Mac, PC, iphone, ipad, Blackberry, Symbian and Android and reply back encrypted and secured. Secured eusb Centrally managed USB encryption tool Secured eusb makes it possible to convert a regular USB flash drive into a secured USB flash drive with strong security that users can safely travel with. The central management console offers detailed content reporting about every flash drive and the ability to lock down or wipe the flash drive. Secured efile Centrally controlled file/folder security and encryption Secured efile enables collaborative access to an individual user, work groups or Active Directory OU groups. The end user to secure any file or folder and assign individual or group access rights to it. The SEP manager will control authentication and key management. The secured data can be stored anyplace within the network, including networked share drives, desktops, laptops, USB flash drives and portable media. Secured ecollaboration Microsoft SharePoint File security & encryption Secured ecollaboration is a file encryption & security add-on to your existing Microsoft SharePoint deployment. It adds functionality which allows users to encrypt documents and files right from within SharePoint but also on the users desktop, USB flash drives, portable hard drives, network drives, etc.
5 SEP Simple Encryption Platform... See a video at Client Applications Server Management Console Document Security Secured Secured efile ecollaboration Outbound Compliance Secured Endpoint Security Secured eusb Global Object Synchronization: Policies Licenses Shared Secrets Encryption Keys EPM Stealth Keys Passwords Templates Standard SQL database platform One way synchronization with directories:. Active Directory Lotus Domino LDAP Microsoft SharePoint Basic Management: Role based administration User rights management Policy design and administration Auditing and incident reporting Education management Help Desk / Lost password Recovery Intellectual Property: EPM - Enterprise Protection Method Resource/ License Management DCR - Data Content Reporting Existing infrastructure integration such as Microsoft RMS and content management solutions
6 Secured Send a secured to any recipient that can then reply back secured... See Video Send a secured from Outlook or Lotus Notes including attachments will be encrypted. Options to save the secured in Outlook and Exchange. Recipient signs up - The recipient sign up for the service and can then view the secured . Recipients can view the secured on Mac, PC, iphone, ipad, Symbian, Blackberry, Android devices, etc. Reply securely The recipient can reply securely using any application or on device such as a Mac, PC, iphone, ipad, Symbian, Blackberry, Android device. The free reader It is possible for the recipient to download a free Reader that integrates into Outlook and Lotus Notes
7 Secured eusb Lifecycle management for encrypted USB flash drives... See Video Secure any standard flash drive - End user can secure and encrypt any standard flash drive. Zero footprint, which allows IT to secure flash drives and hand them out to end users without running an application on the endpoint. Enforce USB encryption - Users will be enforced to encrypt flash drives to be able to store information on them. Data Content Reporting (DCR) - Generate intelligent reports that shows all content movements on the flash drive. Kill Pill Close down access rights or wipe the secured flash drive remotely.
8 Secured efile File encryption solution for Data Protection and Compliance... See Video Secure any document Empower end users to secure any document on desktops, network drives and portable media. and Enterprise Protection Method (EPM) End users can change access rights to documents at any time. Access rights will be reflected to all versions of the document. Create portable packages End users can collaborate secured with external recipients by creating portable secure packages. Collaborate securely with customers and partners Partners and customers can download and install software that will enable them to create and open secured documents.
9 Secured ecollaboration Document encryption for SharePoint and the desktop... See Video Secure any document Empower end users to secure any document on SharePoint and the desktop. Enterprise Protection Method (EPM) End users can change access rights to documents at any time. Access rights will be reflected to all versions of the document. Create portable packages End users can collaborate secured with external recipients by creating portable secure packages. Collaborate securely with customers and partners Partners and customers can download and install software that will enable them to create and open secured documents.
10 Secured ecollaboration Document encryption for SharePoint and the desktop... SharePoint Encryption Deployment Manager Automatically encrypt thousands of documents based on document name, document list, document metadata tags, document creator, document classification, document type etc. SharePoint Encryption Rules Manager Documents that are uploaded to SharePoint will be automatically encrypted based on rules. Product SDK The SDK makes it possible to build automated workflows in SharePoint where documents automatically get encrypted. It is also possible to use the SDK to automatically encrypt files and folders located on other locations.
11 The Simple Encryption Platform - SEP Secured efile, Secured ecollaboration, Secured , and Secured eusb
12 Components From Small Businesses to Large Enterprises... Standard components SEP Server Run as a service on the main server. SEP Management Console -.NET based management application that can run on the server or at any desktop. You can deploy multiple instances of the SEP console which allows management from any location of choice. Client Distribution package Contains the MSI generator that will create the MSI package for 32bit and 64bit machines. Additional components Secured ecollaboration solution - A WSP add in that integrates into SharePoint. Secured For Lotus Notes there is a Lotus Notes Deployment tool and template editor. Secured eusb All encrypted USB flash drives have a Secured eusb client that operates the end user interface and the connection to the SEP server. SEP Client installation package generated inside the SEP Management Console.
13 Enterprise Deployment Architecture Diagram... Cryptzone deployment architecture diagram Storage All data is stored in a SQL database. The SEP server can connect to any standard Microsoft SQL database. Directories - The SEP main server can connect to Active Directory and SharePoint for user and group management. Directory Services Main company server SEP Server, SEP MC Microsoft SQL Server Backup server SEP Server, SEP MC The SEP client can connect to the central server using SSL or HTTPS. Organization Network Deployment and scaling instructions can be found at center/enterprise/ Synchronized SEP Client Clients using SEP
14 Installation and set up From Small Businesses to Large Enterprises... A standard installation takes 1-4 hours depending on the environment. There is a Best Practice Set up Wizard to simplify the deployment process. Also included is a default Best Practice security policy that is most commonly used among Cryptzone customers. The wizard will assist with set up of: AD connection and sync Define Master Password Define Admin Password Select the main administrator License management policy Assign default policy to all users Generate custom templates Cryptzone Professional Service team can assist organizations in the set up process of the solution. The configuration manual help organizations to configure the pre designed Best Practices policy to fit the organizations requirements. The configuration manual are available at center/enterprise/ A special manual how to set up the solution for external access using a web service is available at center/enterprise/ A special manual for Lotus Notes users are available at center/enterprise/
15 Redundancy and backup No worries... SQL Database The core component of Simple Encryption Platform is the database in SQL. This means it is very important to back up the database daily. The database can easily be moved to any location without any problems. SEP Clients will not be affected if the server where the SEP server components is installed will go down or fail. The SEP server and SEP Management console can easily be reinstalled and reconnected to the SQL Database in less than 10 minutes. Clients If the SEP server goes down the SEP clients will continue to function without any issues. Lost functionality will be; Policies can not be updated centrally NEW encryption keys cannot be synchronized. Users cannot change access rights to secured files/folders. If a user secures a file/folder the user cannot add access right to other users. USB memory sticks that has been encrypted with Secured eusb will capture logs file locally until the SEP server is up and running and will then deliver the updated information. Licenses cannot be moved or changed.
16 Considerations Storage and network utilization... Enterprise Server Desktop Client 1 user profile will on average store up to 100 k per user profile. The network handshake between the Management Server and the SEP Client or agent, takes 8KB. SEP Client and user agent have separate polices updates, but will average on 0.4Kb 1KB per policy depending on the information it includes. Event takes approximately 0.4KB. Sending an event to the Management Server takes 1KB, not including the event file itself (the log file). SEP Client, Secured eusb will store logs locally until synchronized with the server. Size of logs will vary depending on the number of changes performed per action. Logs are filtered and compressed before transferring to SEP to minimize traffic and storage. A log file for normal file usage will estimated on average take 0.6 KB per completed action. SEP Client dynamically load and release resources as needed, system resources used will vary depending on tasks and licenses. In passive mode the SEP monitor will use ~2700K of memory and USB monitor around 980K. CPU usage is negligible. In active mode during a user session the task of securing a file will average around 8 MB for SEP monitor and 4-10 MB SEMX Explorer. SEMX can have a peak memory usage of 27 MB for an operation and on a 2.4 Ghz system CPU usage averages on 50% during intense encryption operations. Opening additional secured folders will use 4-10 MB for each folder, so should a user choose to have 10 active secured folders the combined memory usage would be 40+ MB. As folders are closed and the SEP Client is logged out, memory usage will return to passive mode. During a normal install disk space usage is below 15MB for the SEP Client and log file can be size restricted or disabled depending on configuration.
17 Uninstallation What to think about... Encrypted data Files and folders - All encrypted files and folders needs to be unencrypted before uninstalling the software. USB Memory sticks - Encrypted USB memory stick will continue to function without the SEP Server. To uninstall the solution from the USB memory stick, unencrypt all data and then format the stick. SEP Server Store and document Master password and all Group passwords. Backup and store the database for future reference. Store a set of the installation files and manuals. s If the organization needs easy access to encrypted s then the archive function should be activated when the software is installed. Then the organization will have a centralized storage of all sensitive data. The data can be stored secured or unsecured.
18 Support and documentation With focus on professional support... Support Support calls available - 24/7/365. Cryptzone support is performed by highly skilled Solution Engineers that will contact customer within 24 hours for personal support. Phone UK: Phone USA/Canada: Phone Sweden: +46 (0) Documentation Manuals and instructions can be downloaded at prise For Whitepapers and more technical papers go to prise Customers can support questions to or go to for more help. The Solution Engineers have access to professional tools making it possible for them to see customers screen and give better support. Cryptzone Professional Services team offers special support, deployment, educations etc. at a fee.
19 Additional details of the Simple Encryption Platform
20 Password Recovery For Secured ... No helpdesk necessary Shared secret recovery If the user would need to remember a shared secret created for a specific secured contact the user can find this information in their own client. The user simply goes to settings and the secured contact list. There they can display all shared secrets ever created to a secured contact. Central Policy - If this is possible or not can be defined by policy.
21 Password Recovery For Secured efile and Secured eusb... Password Recovery Wizard Helpdesk user - The system comes with a ready to go Helpdesk user that can perform the Password Recovery task. User message Everywhere where an end user needs to enter a password there is a message informing about password recovery. It is possible to centrally define the information. Recovery ticket For every Secured file, folder or USB there is a unique recovery ticket. Recover wizard - The system offers a Recovery Wizard for helpdesk. The wizard will tell the helpdesk personnel what user that created the secured file, folder or USB. This is to assist helpdesk to do a security check of the person calling.
22 Restore of user profile Nothing to worry about it is all automatic... Issues User profile in Citrix / Terminal server gets damaged and needs to be recreated User machine crashes and the data cannot be restored User have several machines Windows crashes Etc Solution Global Object Synchronization Cryptzone has built a synchronization concept where information like policies, licenses, encryption keys, logs, templates etc. are automatically synchronized between Cryptzone server and one or several clients. For the IT department this means that a recovery is fully automatic in case of the issues to the right happens. All that needs to be done is to reinstall the client. Encrypted s, files and folders can and will be backuped in the same procedure as any other , file or folder.
23 Give licenses to end users License management... How to give license Licensing for SEP is managed per user. Each user is allowed to have the software installed on several machines and only 1 license will be used. The SEP Management Console is used to manage licenses. A license can be added or removed from a user on the fly. The system comes with the ability to manage licenses by policies. Example: If user belongs to certain group the user will receive a license automatically. If user is removed from group the license will be removed. A group can be a AD group, SharePoint group or custom created group in the system. System manager can give licenses to end users manually.
24 An employee leaves How to recover all information... Data recovery Encrypted USB sticks All USB sticks can be opened with the master password. Secured files and folders All secured files and folders can be opened and unencrypted with the master password. Secured Simply log in as the user to a profile and all secured s can be accessed. Another possibility is also to use the archiving function where all secured s can be stored at central location. Lock down Encrypted USB sticks Can be lock down using the Kill Pill Command in the SEP Management Console Secured files and folders Will be locked down automatically using AD Disable or Delete command for an AD account. It is also possible to remove access by removing the user license. Secured Will be locked down automatically using AD Disable or Delete command for an AD account. It is also possible to remove access by removing the user license
25 Cryptzone Group (publ) AB Global Headquarters: Drakegatan 7, SE Goteborg, Sweden
26 Appendix Product Information
27 SEP Client Overview... SEP Client SEP Server SEP Management Console Best Practice Proactive management platform and intelligent client synchronizes: Security policies Stealth encryption keys User and system access rights Password & helpdesk recovery passwords Intuitive interface and workflows Intelligent Client Global Object Synchronization Active Directory Security Methodology Enterprise Protection Method Strongest methodology available Automatic authentication key management System generates dynamic one-time keys for each content element System access protection one password FIPS certified AES256 encryption algorithm Help Desk Lost Password Access client Applications Security Secured communications Secured econtrol Content Filtering for communications Data at Rest Storage Secured efile file and folder encryption Secured ecollaboration Document encryption for Microsoft SharePoint End Point Security Secured eusb portable device storage Secured edisk - laptop/desktop encryption Secured edevice portable device, portable media and port control w/dlp
28 Additional details of Secured
29 Why is encryption so complex? The problem for IT is: My users struggle with computers... My users struggles with any new procedures... My users... How to deliver the with strong encryption, but make it easy so that anybody can read/reply? My users and recipients use all types of mobility devices; iphones, Blackberry Phones, Android devices, PDA s how do you support them?
30 Questions that you have to ask?... How does the sender send the encrypted ? New procedures? Is there a way to automate the decision to encrypt or not? Does this encryption method ensure regulatory compliance? What happens if I need to archive my ? Is the local copy encrypted? & Can I still use Windows Desktop Search? Do I need to download a client to view an encrypted ? What if I want to? Is the web delivery a third party service or can I manage the service? Can recipients view and reply with a portable device ie., phones, etc?
31 Cliff Notes on Secured Proven market leader!... Simply press send secured button. Send to anybody in the world regardless Recipient can view s with client application, browser or portable device Centrally managed by SEP, integrated with Microsoft Active Directory Global Objects Synchronization - Proactive server and client synchronization Global Communications - Web service allow users to read/reply to encrypted s Strong Encryption - AES 256 bit FIPS Certified Methodology Enterprise Protection Method - Automatic authentication & key management
32 What is Global Communications? What does it do for my organization? It s a in-house service that you can customize to look exactly how you want the service to look like! It s is a fool-proof method of delivering encrypted s for any type of user, any client, any device! It can control how long you want to offer the delivery of the encrypted ! Secured and our Global Communications functionality doesn t impact your Microsoft Exchange Server nor require additional network infrastructure to support the web service! And it s available at a quarter of the cost of traditional appliance solutions.
33 Secured ... Secured End Point Security for Encryption Best Practice Proactive management platform and intelligent client synchronizes: Security policies Stealth encryption keys User and system access rights Password & helpdesk recovery passwords Intuitive interface and workflows Empowerment for internal/external users Audit trail of all end user actions Integration with Active Directory Security Methodology System SKG Patented encryption technology Strongest methodology available Automatic authentication key management System generates dynamic one-time keys for each content element System access protection one password FIPS certified AES256 encryption algorithm Features Regulatory Compliance Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules Fully integrated into Microsoft Outlook and Lotus Notes End to End messaging virtual channel Send to anyone capability any client app or web based Receivers can download a full Reader and reply back secured for free Receivers can activate a Reader Lite with zero footprint Ease of use Press Send secured or Send with Secured econtrol policy Centralized policy based encryption Archive encrypted and compressed
34 Additional details of Secured eusb
35 Encrypts Any USB flash drive in the market today! Secured eusb.. Encrypt any brand, any model, any size... Simple to use optional automatic encryption Use on any computer in the world! Client application or zero footprint deployment SEP Manager - Data Content Reporting Complete inventory of USB flash drives by user Risk Intrusion Report DLP Content Search Origin of all of the data on the drive What was done with the data What data is currently on the drive real time! Centralized Control - Life Cycle Management Lock-out command to block access Kill Pill command to wipe data on drive Strong Encryption AES 256 bit FIPS Certified
36 What is Life Cycle Management? What does it do for my organization? Controls the birth, use and death of encrypted USB flash drives. It s a fool-proof method of managing the encryption process - auto encryption or chose the work flow with a custom process! LCM can be managed centrally to have standard security policies to protect the data and guarantee that the device will be disabled based those policies! Control user access of a trusted employee who is now an ex-employee. He has your data & won t return the drive. You can wipe the data and kill the device - no matter where the drive is - even off net!
37 Secured eusb... eusb Encrypts ANY USB flash drive in the market today! Best Practice Proactive management platform and intelligent client synchronizes: Security policies Stealth encryption keys User and system access rights Password & helpdesk recovery passwords Intuitive interface and workflows no training Audit trail of all end user actions Lost flash drive Kill Pill support Integration with Active Directory Web based connection to SEP Console Security Methodology EPM (Enterprise Protection Method) FIPS certified AES256 encryption algorithm Brute force protection and Automatic Data Compression up to 5:1 Enforced synchronization of portable device Regulatory Compliance Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules Features Encrypt any brand, any model, any size Distributed or Zero Footprint Deployment Security Policy whole drive or partial encryption Security Policy based enforced encryption Fastest encryption 16 GB in one minute Encryption.exe is portable, use on any computer in the world no license required! Secured workflow - work in a secured vault create, edit, delete Unlimited Passwords Help Desk Lost Password Recovery Support DCR Data Content Reporting Inventory list of all secured USB flash drives & what user that owns it Monitor all content on every secured USB flash drive in the organization by manufacturer Automatic data audit reporting by user, access, actions and files Help Desk Audit Trail reporting
38 Additional details of Secured ecollaboration
39 Do I really need secure documents? Questions that need to be asked... I know that encryption can be complex, but isn t there a easier way? How do you provide collaborative access to documents and manage user rights? Do I have to manually encrypt the data? How do you manage encryption on documents on the desktop and SharePoint? How do you manage the encryption keys for documents on network drives, those locally stored, or ed?
40 What is EPM? What does it do for my organization?... EPM (Enterprise Protection Method) automates the way a user deals with authentication and key management basically one or two clicks. It s is a fool-proof method of providing access rights & the associated encryption key to documents for individuals, work groups, AD or SharePoint Groups! EPM is managed centrally so IT can have standard security policies and access rights for documents or empower the end users to make access decisions. Enterprise Protection Method can be configured to allow automatic encryption of uploaded documents to specific libraries. Also EPM can allow automatic encryption of previously stored documents!
41 Document encryption for SharePoint Secured ecollaboration... Secure Documents with automatic authentication Centrally managed by SEP, integrated with Active Directory & SharePoint EPM - Auto authentication & key management Simple to use one click encryption Added icon shows it s encrypted Sharing Access double click to open Supports full versioning & checkin/check-out Automatic upload of encrypted files Regulatory Compliance HIPAA HiTECH, SOX, GLB Act, FTC s Red Flag Rules
42 Secured ecollaboration - EPM... Secure Microsoft Documents with automatic authentication Best Practice Proactive management platform and intelligent client synchronizes: Security policies Stealth encryption keys User and system access rights Password & helpdesk recovery passwords Intuitive interface and workflows Empowerment for internal/external users Audit trail of all end user actions Integration with Active Directory Security Methodology EPM (Enterprise Protection Method) Document creator can add/remove access rights Manage access to documents Manager, Contributor and Reader levels System access protection one password FIPS certified AES256 encryption algorithm Features Regulatory Compliance Sarbanes Oxley, GLB Act, HIPAA HITECH, FTC Red Flag Rules User work flow doesn t change Simple to use one click encryption Supports full versioning, checkin, & checkout Document icon shown visually as encrypted Secure documents can travel and rest secured on any media or device including network shared drives, FTP servers, DVDs, etc. EPM Stealth Key Technology and Automatic authentication/key management End users can secure data and add access rights to AD users and groups Share data with customers and partners Free Reader Self-Extracting option
43 Additional details of Secured efile
44 Why protect files & folders? It s data at rest, but usually in use and stored everywhere! Providing collaboration access of files/folders is the most effective way to organize and maximize your employees intellectual talent, but what about protecting the data? Giving access could be a big mistake! Regulatory Compliance regarding data at rest!.. HIPAA HITECH Act.. Gramm-Leach-Bliley Act.. FTC s Red Flag Rules State Laws; Massachusetts, Nevada, California, New York. 38 other states. Companies that don t meet regulatory compliance rules and laws will receive punitive penalties and fines, and it s more than fines; non-compliance correlates to the company s monetary value!
45 Why is certificate based file encryption so complex? The problem for IT is: My users struggle with computers... My users struggles with any new procedures... My users... How to deliver access to secured files & folders with strong encryption, but make it easy for the right people to read? I would like to set up centralized rules so that when a member of a work group or AD groups encrypts a file - everybody that should have rights have rights, and others don t. I need to dumb this process down!
46 This is what I want to learn about? How do you provide collaborative access to files and folders, and manage user rights while maintaining high security? I assume I can create AD OU secured groups, but can I create work groups? Can my users add access rights individuals or groups to share secured data? Most users create files on their desktop and move them to network shared drive how do you manage encryption? And when you access the files do you have to use a certificate? Files and Folders located on network share drives are usually stored locally, on USB s, burnt on CD/DVD s are they controlled? How do I share encrypted files/folders to people outside my network?
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
Introducing Databackup.com Cloud Backup File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Global Explosion of Data The demand for cloud storage is just getting started.
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
TECHNOLOGY REPORT Email Security Solutions 1 TECHNOLOGY REPORT SUPPLEMENT EMAIL SECURITY TECHNOLOGY REPORT IF YOUR EMAIL IS SO CRITICAL, CAN YOU BE SURE IT S REALLY REALLY PRIVATE? FIND THE FULL RESULTS
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators. Overview of ShareSync Easy, intuitive sharing and syncing ShareSync
Business and enterprise cloud sync, backup and sharing solutions Private Cloud Synchronization Collaboration Backup / Versioning Web Access Mobile Access LDAP / Active Directory Federated RADIUS Single
NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Reliable Backup and Recovery Designed for Your Growing Business Overview delivers market leading backup and recovery protection from server to desktop. Easily protect more data while you reduce storage
Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Intronis Cloud Backup and Recovery is a file based backup application that allows users to back up their critical data to the
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
System Documentation 03/01/2012 SecureSend File Transfer Portal Usage Guide Recommended Usage Instructions and Frequently Asked Questions Jose Ruano, Stephen Weatherly TABLE OF CONTENTS EXECUTIVE SUMMARY...3
Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
Welcome Package Quick-Start Guide Staples Online Backup & Sync Easy to set up and manage Be up and running in under 5 minutes Welcome! Hello and thank you for choosing Staples Online Backup and Sync service.
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
RDM+ Remote Desktop for Mobiles RDM+ Desktop for Windows Getting Started Guide Introduction... 3 1. Installing RDM+ Desktop on a computer... 3 2. Preparing for remote connection... 4 3. RDM+ Desktop window...
Remote Data Backup Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and expensive method for
Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient
SecureVault Online Backup Service FAQ C0110 SecureVault FAQ (EN) - 1 - Rev. 19-Nov-2007 Table of Contents 1. General 4 Q1. Can I exchange the client type between SecureVault PC Backup Manager and SecureVault
eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets
Qsync Qsync is a cloud based file synchronization service empowered by QNAP Turbo NAS. Simply add files to your local Qsync folder, and they will be available on your Turbo NAS and all its connected devices.
An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management
1221 John Q. Hammons Drive Madison, WI 53717 P.O. Box 44966, Madison, WI 53717 P: 608.826.2400 TF: 800.366.9091 F: 608.831.4243 www.sva.com Introduction Computers are the default storage medium for most
GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 email@example.com www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS
Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and
Failback/Restore-Should a failure occur, HEROware manages the Failback and Restore process for you. Please contact HEROware technical support to schedule your restoration process. HEROware s goal is simple,
USER GUIDE CLOUDME FOR WD SENTINEL Page 2 of 18 TABLE OF CONTENTS INTRODUCTION 3 Safe European Storage How does this really work? 3 3 GETTING STARTED 4 Setting up an account Setting up a company account
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
USER GUIDE CLOUDME FOR WD SENTINEL Document 2013-11-17 Page 2 of 13 TABLE OF CONTENTS INTRODUCTION 2 Safe European Storage 2 How does this really work? 2 GETTING STARTED 3 Setting up an account 3 Setting
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
GENERAL What is Box at Fresno State? Box at Fresno State is a simple, reliable, and secure online file storage and sharing service. Box provides secure access to files at work, off campus and from most
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium
Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
PROPALMS March 2008 An Analysis of and Terminal Services: Contents System Administration... 2 Server Management... 3 Application Management... 5 Security... 7 End User Experience... 8 Monitoring and Reporting...
Incorporated 3/7/06; Rev 9/18/09 PaperClip Compliant Email Service Whitepaper Overview The FTC Safeguard Rules require Financial, Insurance and Medical providers to protect their customer s private information
Investment and Governance Division 614.995.9928 tel Ted Strickland, Governor 30 East Broad Street, 39 th Floor 614.644.9152 fax R. Steve Edmonson, Director / State Chief Information Officer Columbus, Ohio
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
Administration Guide WatchDox Server Version 4.8.0 Published: 2015-11-01 SWD-20151101091846278 Contents Introduction... 7 Getting started... 11 Signing in to WatchDox... 11 Signing in with username and
Contents Installation Overview... 2 How to Install Ad-Aware Management Server... 3 How to Deploy the Ad-Aware Security Solutions... 5 General Deployment Conditions... 5 Deploying Ad-Aware Management Agent...
GRAVITYZONE UNIFIED SECURITY MANAGEMENT Use Cases for Beta Testers Introduction This document provides beta testers with guidelines for testing Bitdefender GravityZone solutions. To send your feedback,
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec
DDN Solution Brief Personal Storage for the Enterprise WOS Cloud Secure, Shared Drop-in File Access for Enterprise Users, Anytime and Anywhere 2011 DataDirect Networks. All Rights Reserved DDN WOS Cloud
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
Administration Guide NetIQ Privileged Account Manager 3.0.1 December 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does
BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering
The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
The Cloud Desktop For Business Unify Your Business IT Experience All your apps & data in the cloud, all in one place. The Cloud Desktop houses all of your organization's applications and data in one easy-to-access
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Xopero Backup Build your private cloud backup environment Getting started 07.05.2015 List of contents Introduction... 2 Get Management Center... 2 Setup Xopero to work... 3 Change the admin password...
Installation Guide DOCSVAULT Document Management System for everyone 9 v Desktop and Web Client v On Premises Solution v Intelligent Data Capture v Email Automation v Workflow & Record Retention Installing
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Overview The sparkweave suite of applications is next-generation secure communication and collaboration technology for the changing needs of the enterprise. Sparkweave combines the best attributes of consumer
Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions
Protecting Data-at-Rest with SecureZIP for DLP TABLE OF CONTENTS INTRODUCTION 3 PROTECTING DATA WITH DLP 3 FINDING INDIVIDUAL AND SHARED INFORMATION-AT-REST 4 METHODS FOR REMEDIATION 4 ENCRYPTING UNPROTECTED
Email Archiving User Guide Outlook Plugin Manual version 3.1 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith Road Hammersmith London W14 8TH United Kingdom Omniquad
InstaFile Complete Document management System Index : About InstaFile 1.1 What is InstaFile 1.2 How does it work 1.3 Where you can use InstaFile 1.4 Why only InstaFile InstaFile features and benefits Start
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
Chapter 1 Scenario 1: Acme Corporation In This Chapter Description of the Customer Environment page 18 Introduction to Deploying Pointsec PC page 20 Prepare for Deployment page 21 Install Pointsec PC page
The Challenge The Solution Today's employees demand mobile access to office information in order to maximise their productivity and they expect that enterprise collaboration and communication tools should
White Paper Filr An Enterprise Approach to Mobile File Access and Sharing Table of Contents page Anywhere, Any Device File Access with IT in Control...2 Filr Competitive Differentiators...2 Filr High-Level
Enterprise Private Cloud Storage The term cloud storage seems to have acquired many definitions. At Cloud Leverage, we define cloud storage as an enterprise-class file server located in multiple geographically
Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
Media Server Installation & Administration Guide Smarter Surveillance for a Safer World On-Net Surveillance Systems, Inc. One Blue Hill Plaza, 7 th Floor, PO Box 1555 Pearl River, NY 10965 Phone: (845)
User Guide for OpenDrive Application v126.96.36.199 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended