TEST METHODOLOGY. SSL/TLS Performance. v1.0

Size: px
Start display at page:

Download "TEST METHODOLOGY. SSL/TLS Performance. v1.0"

Transcription

1 TEST METHODOLOGY SSL/TLS Performance v1.0

2 Table of Contents 1 Introduction The Need for SSL/TLS Performance Testing About This Test Methodology Inclusion Criteria SSL/TLS Functionality Validation Encryption/Inspection Validation Cipher Negotiation Performance Maximum SSL/TLS Handshakes per Second HTTPS Capacity with No Transaction Delay ,880 KB HTTP Response Size 40 Connections per Second KB HTTP Response Size 150 Connections per Second KB HTTP Response Size 600 Connections per Second KB HTTP Response Size 2500 Connections per Second Application Average Response Time: HTTP HTTPS Capacity with No Transaction Delay (HTTP Persistent Connections) ,880 KB HTTP Response Size 40 Connections per Second KB HTTP Response Size 150 Connections per Second KB HTTP Response Size 600 Connections per Second KB HTTP Response Size 2,500 Connections per Second... 7 Contact Information

3 1 Introduction 1.1 The Need for SSL/TLS Performance Testing The use of the Secure Sockets Layer (SSL) protocol, and its newer iteration, Transport Layer Security (TLS), has been on the rise with the ever-increasing need for privacy online. Modern cybercampaigns frequently focus on attacking users through the most common web protocols and applications. NSS Labs continues to receive inquiries from enterprise customers during their assessments of vendors that provide SSL/TLS decryption and protection technologies. To this end, NSS has developed a methodology to test the capabilities and performance of devices providing SSL/TLS protection. 1.2 About This Test Methodology NSS test reports are designed to address the challenges faced by enterprise security and IT professionals in selecting and managing security products. The scope of this particular methodology includes: Verification of SSL/TLS capability SSL/TLS performance Based on the needs identified in NSS research, the following capabilities are considered essential in any SSL/TLScapable device: Ability to perform SSL inspection Ability to negotiate to all modern ciphers and key sizes Ability to detect and block web-based (HTTP and HTTPS) attacks, including malware and exploits 1.3 Inclusion Criteria In order to encourage the greatest participation and to allay any potential concerns of bias, NSS invites all security vendors claiming SSL/TLS capabilities to submit their products at no cost. Vendors with major market share as well as challengers with new technology will be included. This test will be open to various technologies including next generation firewalls (NGFW), next generation intrusion prevention systems (NGIPS), secure web gateway (SWG), and others. In this Test Methodology, only inline devices are tested. Inline devices are defined as devices that neither terminate the SSL/TLS connection, nor reencrypt the information using a separate cipher/key for transmission to the end device. 3

4 2 SSL/TLS Functionality Validation 2.1 Encryption/Inspection Validation In order to confirm that the device under test (DUT) is correctly decrypting and inspecting SSL/TLS traffic, a functionality test will be performed where a known malicious file is embedded in the encrypted traffic. NSS has access to various well-known malicious files, including but not limited to: EICAR file MS Aurora CVE Shellshock CVE Adobe Flash Player ByteArray With Workers Use-After-Free The device will be expected to properly detect the known malicious file. 2.2 Cipher Negotiation The DUT is expected to accurately negotiate and recognize modern SSL/TLS ciphers in order to decrypt and inspect SSL/TLS traffic. This test will be performed using a script that will attempt an SSL/TLS negotiation using both current and older versions of SSL/TLS protocols as well as all known ciphers. There are currently 323 cipher suites registered with IANA. The results of this test will be reported as a matrix of supported SSL/TLS versions and ciphers. 4

5 3 Performance This section measures the performance of the DUT using various traffic conditions that provide metrics for HTTPbased real-world performance. Individual implementations will vary based on usage; however, these quantitative metrics provide a gauge as to whether a particular DUT is appropriate for a given environment. Note: For these tests, the device will be configured in the same manner as for Test 2.1 (Encryption/Inspection Validation). This will ensure that in these tests traffic is not bypassing any inspection engine for the purpose of better performance. Each of the tests in this section will be performed multiple times, with the following configurations: No Encryption A comparative baseline will be established. TLS 1.2 cipher suites: o TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 using a 256-bit key strength o TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256 using a 256-bit key strength o TLS_RSA_WITH_AES_128_GCM_SHA256 using a 2048-bit asymmetric key o TLS_RSA_WITH_AES_256_GCM_SHA384 using a 2048-bit asymmetric key o TLS_RSA_WITH_AES_128_GCM_SHA256 using a 4096-bit asymmetric key o TLS_RSA_WITH_AES_256_GCM_SHA384 using a 4096-bit asymmetric key 3.1 Maximum SSL/TLS Handshakes per Second This test measures a vendor s handshake performance using TLS v1.2 with the key sizes and ciphers referenced in section 3. This is purely to determine the number of handshakes that can be performed per second. No data will be transferred after the handshake is sucessfully completed, and the session will be terminated immediately. 3.2 HTTPS Capacity with No Transaction Delay The aim of these tests is to stress the HTTPS detection engine and determine how the DUT copes with network loads of varying average packet size and varying connections per second. By creating genuine session-based traffic with varying session lengths, the DUT is forced to track valid TCP sessions, thus ensuring a higher workload than for simple packet-based background traffic. This provides a test environment that is as close to real-world conditions as it is possible to achieve in a lab environment, while ensuring absolute accuracy and repeatability. Each transaction consists of a single HTTPS GET request,and there are no transaction delays (i.e., the web server responds immediately to all requests). All packets contain valid payload (a mix of binary and ASCII objects) and address data, and this test provides an excellent representation of a live network (albeit one biased towards HTTP traffic) at various network loads ,880 KB HTTP Response Size 40 Connections per Second Maximum 40 new connections per second per Gigabit of traffic with a 2,880 KB HTTPS response. With low connection rates and large packet sizes, all DUTs should be capable of performing well throughout this test. In 5

6 KB HTTP Response Size 150 Connections per Second Maximum 150 new connections per second per Gigabit of traffic with a 768 KB HTTPS response size. With low connection rates and large packet sizes, all DUTs should be capable of performing well throughout this test. In KB HTTP Response Size 600 Connections per Second Maximum 600 new connections per second per Gigabit of traffic with a 192 KB HTTPS response. With medium packet sizes and increased connection rates, this represents an average production network. In addition, the session is encrypted in order to ascertain performance degradation. This test will use a 2048-bit certificate and key size KB HTTP Response Size 2500 Connections per Second Maximum 2,500 new connections per second per Gigabit of traffic with a 44 KB HTTPS response size. With decreased packet sizes and increased connection rates, this may also represent an average production network. In 3.3 Application Average Response Time: HTTP The test traffic is passed through the DUT and directly back to the test generator. The latency results are recorded for each response size (44 KB, 192 KB, 768 KB, and 2,880 KB HTTPS) and at a load level of 90% of the maximum throughput with zero packet loss, as previously determined in section HTTPS Capacity with No Transaction Delay (HTTP Persistent Connections) The aim of these tests is to stress the HTTPS detection engine and determine how the DUT copes with network loads of varying average packet size and varying connections per second while decrypting and inspecting all traffic. By creating genuine session-based traffic with varying session lengths, the DUT is forced to track valid TCP sessions, thus ensuring a higher workload than for simple packet-based background traffic. This provides a test environment that is as close to real-world conditions as it is possible to achieve in a lab environment, while ensuring absolute accuracy and repeatability. This test will use HTTP persistent connections, with each TCP connection containing ten HTTP GETs and associated responses. All packets contain valid payload (a mix of binary and ASCII objects) and address data, and this test provides an excellent representation of a live network (albeit one biased towards HTTPS traffic) at various network loads. The stated response size is the total of all HTTP responses within a single TCP session ,880 KB HTTP Response Size 40 Connections per Second Maximum 40 new connections per second per Gigabit of traffic with a 2,880 KB HTTPS response. With low connection rates and large packet sizes, all DUTs should be capable of performing well throughout this test. In 6

7 KB HTTP Response Size 150 Connections per Second Maximum 150 new connections per second per Gigabit of traffic with a 768 KB HTTPS response size. With low connection rates and large packet sizes, all DUTs should be capable of performing well throughout this test. In KB HTTP Response Size 600 Connections per Second Maximum 600 new connections per second per Gigabit of traffic with a 192 KB HTTPS response. With medium packet sizes and increased connection rates, this represents an average production network. In addition, the session is encrypted in order to ascertain performance degradation. This test will use a 2048-bit certificate and key size KB HTTP Response Size 2,500 Connections per Second Maximum 2,500 new connections per second per Gigabit of traffic with a 44 KB HTTPS response size. With decreased packet sizes and increased connection rates, this may also represent an average production network. In 7

8 Contact Information NSS Labs, Inc. 206 Wild Basin Road Building A, Suite 200 Austin, TX USA This and other related documents available at: To receive a licensed copy or report misuse, please contact NSS Labs NSS Labs, Inc. All rights reserved. No part of this publication may be reproduced, copied/scanned, stored on a retrieval system, ed or otherwise disseminated or transmitted without the express written consent of NSS Labs, Inc. ( us or we ). Please read the disclaimer in this box because it contains important information that binds you. If you do not agree to these conditions, you should not read the rest of this report but should instead return the report immediately to us. You or your means the person who accesses this report and any entity on whose behalf he/she has obtained this report. 1. The information in this report is subject to change by us without notice, and we disclaim any obligation to update it. 2. The information in this report is believed by us to be accurate and reliable at the time of publication, but is not guaranteed. All use of and reliance on this report are at your sole risk. We are not liable or responsible for any damages, losses, or expenses of any nature whatsoever arising from any error or omission in this report. 3. NO WARRANTIES, EXPRESS OR IMPLIED ARE GIVEN BY US. ALL IMPLIED WARRANTIES, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT, ARE HEREBY DISCLAIMED AND EXCLUDED BY US. IN NO EVENT SHALL WE BE LIABLE FOR ANY DIRECT, CONSEQUENTIAL, INCIDENTAL, PUNITIVE, EXEMPLARY, OR INDIRECT DAMAGES, OR FOR ANY LOSS OF PROFIT, REVENUE, DATA, COMPUTER PROGRAMS, OR OTHER ASSETS, EVEN IF ADVISED OF THE POSSIBILITY THEREOF. 4. This report does not constitute an endorsement, recommendation, or guarantee of any of the products (hardware or software) tested or the hardware and/or software used in testing the products. The testing does not guarantee that there are no errors or defects in the products or that the products will meet your expectations, requirements, needs, or specifications, or that they will operate without interruption. 5. This report does not imply any endorsement, sponsorship, affiliation, or verification by or with any organizations mentioned in this report. 6. All trademarks, service marks, and trade names used in this report are the trademarks, service marks, and trade names of their respective owners. 8

ENTERPRISE EPP COMPARATIVE REPORT

ENTERPRISE EPP COMPARATIVE REPORT ENTERPRISE EPP COMPARATIVE REPORT Security Stack: Socially Engineered Malware Authors Bhaarath Venkateswaran, Randy Abrams, Thomas Skybakmoen Tested Products Bitdefender Endpoint Security v5.3.15.539 ESET

More information

SSL Performance Problems

SSL Performance Problems ANALYST BRIEF SSL Performance Problems SIGNIFICANT SSL PERFORMANCE LOSS LEAVES MUCH ROOM FOR IMPROVEMENT Author John W. Pirc Overview In early 2013, NSS Labs released the results of its Next Generation

More information

2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles

2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles FIREWALL COMPARATIVE ANALYSIS Performance 2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles Tested Products Barracuda F800, Check Point 12600, Cyberoam CR2500iNG, Dell SonicWALL NSA 4500,

More information

WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS

WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS WEB APPLICATION FIREWALL COMPARATIVE ANALYSIS Security Value Map (SVM) Author Thomas Skybakmoen Tested Products Barracuda Networks Web Application Firewall 960 Citrix NetScaler AppFirewall MPX 11520 Fortinet

More information

TEST METHODOLOGY. Distributed Denial-of-Service (DDoS) Prevention. v2.0

TEST METHODOLOGY. Distributed Denial-of-Service (DDoS) Prevention. v2.0 TEST METHODOLOGY Distributed Denial-of-Service (DDoS) Prevention v2.0 Table of Contents 1 Introduction... 4 1.1 The Need for Distributed Denial-of-Service Prevention... 4 1.2 About This Test Methodology

More information

NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS

NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS Security Value Map (SVM) Author Thomas Skybakmoen Tested Products Barracuda F800b Check Point 13500 Cisco ASA 5525-X Cisco ASA 5585-X SSP60 Cisco FirePOWER

More information

WEB APPLICATION FIREWALL PRODUCT ANALYSIS

WEB APPLICATION FIREWALL PRODUCT ANALYSIS WEB APPLICATION FIREWALL PRODUCT ANALYSIS F5 Big-IP ASM 10200 v11.4.0 Authors Ryan Liles, Orlando Barrera Overview NSS Labs performed an independent test of the F5 Big-IP ASM 10200. The product was subjected

More information

TEST METHODOLOGY. Data Center Firewall. v2.0

TEST METHODOLOGY. Data Center Firewall. v2.0 TEST METHODOLOGY Data Center Firewall v2.0 Table of Contents 1 Introduction... 4 1.1 The Need for Firewalls in the Data Center... 4 1.2 About This Test Methodology and Report... 4 1.3 Inclusion Criteria...

More information

Market Segment Definitions

Market Segment Definitions Market Segment Definitions Author Joshua Mittler Overview In addition to product testing, NSS Labs quantitatively evaluates market size for each of the product categories tested. NSS provides metrics that

More information

Bold Move Further Builds Blue Coat Portfolio

Bold Move Further Builds Blue Coat Portfolio ANALYST BRIEF Bold Move Further Builds Blue Coat Portfolio SOLERA ACQUISITION PROVIDES BLUE COAT ABILITY TO LEVERAGE BIG DATA ANALYTICS Author John W. Pirc Overview On May 23, 2013, security vendor Blue

More information

TEST METHODOLOGY. Hypervisors For x86 Virtualization. v1.0

TEST METHODOLOGY. Hypervisors For x86 Virtualization. v1.0 TEST METHODOLOGY Hypervisors For x86 Virtualization v1.0 Table of Contents 1 Introduction... 4 1.1 The Need For Virtualization... 4 1.2 About This Test Methodology And Report... 4 1.3 Inclusion Criteria...

More information

DATA CENTER IPS COMPARATIVE ANALYSIS

DATA CENTER IPS COMPARATIVE ANALYSIS DATA CENTER IPS COMPARATIVE ANALYSIS Total Cost of Ownership () 2014 Thomas Skybakmoen, Jason Pappalexis Tested s Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview

More information

DATA CENTER IPS COMPARATIVE ANALYSIS

DATA CENTER IPS COMPARATIVE ANALYSIS DATA CENTER IPS COMPARATIVE ANALYSIS Security 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Data Center Overview

More information

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities?

Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? ANALYST BRIEF Can Consumer AV Products Protect Against Critical Microsoft Vulnerabilities? Author Randy Abrams Tested Products Avast Internet Security 7 AVG Internet Security 2012 Avira Internet Security

More information

ENTERPRISE EPP COMPARATIVE ANALYSIS

ENTERPRISE EPP COMPARATIVE ANALYSIS ENTERPRISE EPP COMPARATIVE ANALYSIS Socially Engineered Malware Randy Abrams, Jayendra Pathak, Ahmed Garhy Tested Products Fortinet Fortigate 100D Management station Forticlient- 5.0.7.333 McAfee VirusScan

More information

TEST METHODOLOGY. Secure Web Gateway (SWG) v1.5.1

TEST METHODOLOGY. Secure Web Gateway (SWG) v1.5.1 TEST METHODOLOGY Secure Web Gateway (SWG) v1.5.1 Table of Contents 1 Introduction... 4 1.1 The Need for Secure Web Gateways... 4 1.2 About This Test Methodology... 4 1.3 Inclusion Criteria... 5 1.4 Deployment...

More information

Siemens PLC Vulnerabilities

Siemens PLC Vulnerabilities ANALYST BRIEF Siemens PLC Vulnerabilities Author Bob Walder Overview Supervisory Control Automation and Data Acquisition (SCADA) systems are cornerstones of modern industrial society. Via the use of Programmable

More information

DATA CENTER IPS COMPARATIVE ANALYSIS

DATA CENTER IPS COMPARATIVE ANALYSIS DATA CENTER IPS COMPARATIVE ANALYSIS Security Value Map (SVM) 2014 Thomas Skybakmoen, Jason Pappalexis Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview

More information

2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles

2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles FIREWALL COMPARATIVE ANALYSIS Total Cost of Ownership (TCO) 2013 Thomas Skybakmoen, Francisco Artes, Bob Walder, Ryan Liles Tested s Barracuda F800, Check Point 12600, Cyberoam CR2500iNG, Dell SonicWALL

More information

Breach Found. Did It Hurt?

Breach Found. Did It Hurt? ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many

More information

Is Your Browser Putting You at Risk?

Is Your Browser Putting You at Risk? ANALYST BRIEF Is Your Browser Putting You at Risk? PART 2: CLICK FRAUD Authors Francisco Artes, Stefan Frei, Ken Baylor, Jayendra Pathak, Bob Walder Overview The US online advertising market in 2011 was

More information

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT

Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT Internet Explorer Exploit Protection ENTERPRISE BRIEFING REPORT TESTED PRODUCTS: AVG Internet Security Network Edition v8.0 Kaspersky Total Space Security v6.0 McAfee Total Protection for Endpoint Sophos

More information

Why Is DDoS Prevention a Challenge?

Why Is DDoS Prevention a Challenge? ANALYST BRIEF Why Is DDoS Prevention a Challenge? PROTECTING AGAINST DISTRIBUTED DENIAL-OF-SERVICE ATTACKS Authors Andrew Braunberg, Mike Spanbauer Overview Over the past decade, the threat landscape has

More information

Evolutions in Browser Security

Evolutions in Browser Security ANALYST BRIEF Evolutions in Browser Security TRENDS IN BROWSER SECURITY PERFORMANCE Author Randy Abrams Overview This analyst brief aggregates results from NSS Labs tests conducted between 2009 and 2013

More information

CORPORATE AV / EPP COMPARATIVE ANALYSIS

CORPORATE AV / EPP COMPARATIVE ANALYSIS CORPORATE AV / EPP COMPARATIVE ANALYSIS Exploit Evasion Defenses 2013 Randy Abrams, Dipti Ghimire, Joshua Smith Tested Vendors AVG, ESET, F- Secure, Kaspersky, McAfee, Microsoft, Norman, Panda, Sophos,

More information

TEST METHODOLOGY. Network Firewall Data Center. v1.0

TEST METHODOLOGY. Network Firewall Data Center. v1.0 TEST METHODOLOGY Network Firewall Data Center v1.0 Table of Contents 1 Introduction... 4 1.1 The Need for Firewalls In The Data Center... 4 1.2 About This Test Methodology and Report... 4 1.3 Inclusion

More information

Host Anti-Malware Performance COMPARATIVE TEST REPORT

Host Anti-Malware Performance COMPARATIVE TEST REPORT Host Anti-Malware Performance COMPARATIVE TEST REPORT HOST MALWARE PROTECTION METHODOLOGY VERSION: 2 JANUARY 16, 2009 Published by NSS Labs. 2009 NSS Labs CONTACT: 5115 Avenida Encinas Suite H Carlsbad,

More information

Mobile App Containers: Product Or Feature?

Mobile App Containers: Product Or Feature? ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating

More information

NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS

NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS NEXT GENERATION FIREWALL COMPARATIVE ANALYSIS Security Author Thomas Skybakmoen Tested Products Barracuda F800b Check Point 13500 Cisco ASA 5525-X Cisco ASA 5585-X SSP60 Cisco FirePOWER 8350 Cyberoam CR2500iNG-XP

More information

BROWSER SECURITY COMPARATIVE ANALYSIS

BROWSER SECURITY COMPARATIVE ANALYSIS BROWSER SECURITY COMPARATIVE ANALYSIS Privacy Settings 2013 Randy Abrams, Jayendra Pathak Tested Vendors Apple, Google, Microsoft, Mozilla Overview Privacy is an issue on the front lines of the browser

More information

Achieve Deeper Network Security

Achieve Deeper Network Security Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order

More information

An Old Dog Had Better Learn Some New Tricks

An Old Dog Had Better Learn Some New Tricks ANALYST BRIEF An Old Dog Had Better Learn Some New Tricks PART 2: ANTIVIRUS EVOLUTION AND TECHNOLOGY ADOPTION Author Randy Abrams Overview Endpoint protection (EPP) products are ineffective against many

More information

BlackBerry Business Cloud Services. Version: 6.1.7. Release Notes

BlackBerry Business Cloud Services. Version: 6.1.7. Release Notes BlackBerry Business Cloud Services Version: 6.1.7 Release Notes Published: 2015-04-02 SWD-20150402141754388 Contents 1 Related resources...4 2 What's new in BlackBerry Business Cloud Services 6.1.7...

More information

NETWORK FIREWALL TEST METHODOLOGY 3.0. To receive a licensed copy or report misuse, Please contact NSS Labs at: +1 512-961-5300 or advisor@nsslabs.

NETWORK FIREWALL TEST METHODOLOGY 3.0. To receive a licensed copy or report misuse, Please contact NSS Labs at: +1 512-961-5300 or advisor@nsslabs. NETWORK FIREWALL TEST METHODOLOGY 3.0 To receive a licensed copy or report misuse, Please contact NSS Labs at: +1 512-961-5300 or advisor@nsslabs.com 2011 NSS Labs, Inc. All rights reserved. No part of

More information

The CISO s Guide to the Importance of Testing Security Devices

The CISO s Guide to the Importance of Testing Security Devices ANALYST BRIEF The CISO s Guide to the Importance of Testing Security Devices Author Bob Walder Overview Selecting security products is a complex process that carries significant risks if not executed correctly;

More information

BlackBerry Professional Software For Microsoft Exchange Compatibility Matrix January 30, 2009

BlackBerry Professional Software For Microsoft Exchange Compatibility Matrix January 30, 2009 BlackBerry Professional Software For Microsoft Exchange Compatibility Matrix January 30, 2009 2008 Research In Motion Limited. All rights reserved. www.rim.com Page: 1 RECOMMENDED SUPPORTED SUPPORTED BEST

More information

GENERAL TARIFF. 2) Internet Service is provided at C&W's discretion, depending on the availability of suitable facilities and equipment.

GENERAL TARIFF. 2) Internet Service is provided at C&W's discretion, depending on the availability of suitable facilities and equipment. Page 6.1 INTERNET ACCESS SERVICES General 1. Description 1. This item is subject to the terms and provisions of Part A of this Tariff. 2. This Part applies to the following C&W services: Dialup Internet

More information

ELECTRONIC SIGNATURE AGREEMENT

ELECTRONIC SIGNATURE AGREEMENT ELECTRONIC SIGNATURE AGREEMENT 1. Agreement If you contract with us electronically or otherwise request documentation or disclosures electronically, you specifically consent and agree that we may provide

More information

New Security Features

New Security Features New Security Features BlackBerry 10 OS Version 10.3.2 Published: 2015-06-08 SWD-20150608104314635 Contents About this guide... 4 What's new... 4 NFC smart card support... 5 OCSP stapling support in the

More information

TEST METHODOLOGY. Web Application Firewall. v6.2

TEST METHODOLOGY. Web Application Firewall. v6.2 TEST METHODOLOGY Web Application Firewall v6.2 Table of Contents 1 Introduction... 4 1.1 The Need for Web Application Firewalls... 4 1.2 About This Test Methodology and Report... 4 1.3 Inclusion Criteria...

More information

BlackBerry Enterprise Server Express for IBM Domino. October 7, 2014 Version: 5.0 Service Pack: 4. Compatibility Matrix

BlackBerry Enterprise Server Express for IBM Domino. October 7, 2014 Version: 5.0 Service Pack: 4. Compatibility Matrix BlackBerry Enterprise Server Express for IBM Domino October 7, 2014 Version: 5.0 Service Pack: 4 Compatibility Matrix Published: 2014-10-08 SWD-20141008134243982 Contents 1...4 Legend... 4 Operating system...

More information

Work Space Manager for BES12 26387_449

Work Space Manager for BES12 26387_449 Work Space Manager for BES12 26387_449 About this document This guide contains fixed and known issues for version 26387_449 of Work Space Manager for BES12. To see previous versions of the release notes,

More information

Accessing BlackBerry Data Services Using Wi-Fi Networks

Accessing BlackBerry Data Services Using Wi-Fi Networks Accessing BlackBerry Data Services Using Wi-Fi Networks 2007 Research In Motion Limited. All rights reserved. 2 of 7 Contents Introduction...3 Wi-Fi access to BlackBerry data services...3 Priority for

More information

Achieve Deeper Network Security and Application Control

Achieve Deeper Network Security and Application Control Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet

More information

TEST METHODOLOGY. Distributed Denial- of- Service (DDoS) Prevention. v1.0

TEST METHODOLOGY. Distributed Denial- of- Service (DDoS) Prevention. v1.0 TEST METHODOLOGY Distributed Denial- of- Service (DDoS) Prevention v1.0 Table of Contents 1 Introduction... 5 1.1 The Need for Distributed Denial- of- Service Prevention... 5 1.2 About This Test Methodology

More information

Multiple Drivers For Cyber Security Insurance

Multiple Drivers For Cyber Security Insurance ANALYST BRIEF Multiple Drivers For Cyber Security Insurance EXPECTATIONS PLACED ON INSURANCE CARRIERS RISE WITH MARKET GROWTH Author Andrew Braunberg Overview There has been considerable good news for

More information

ACHILLES CERTIFICATION. SIS Module SLS 1508

ACHILLES CERTIFICATION. SIS Module SLS 1508 ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security

More information

TERMS AND CONDITIONS

TERMS AND CONDITIONS TERMS AND CONDITIONS 1. Your Acceptance Welcome to the website operated by Joint Aid Management ( JAM ) International. By using or visiting this website, you signify your agreement to the terms and conditions

More information

TERMS & CONDITIONS: LIMITED LICENSE:

TERMS & CONDITIONS: LIMITED LICENSE: TERMS & CONDITIONS: The use of any product, service or feature (the "Materials") available through the internet websites accessible at 4tellus.com, ("Website") by any user of the Website ("You" or "Your"

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide BlackBerry Enterprise IM for Cisco Version 4.0 Published: 2015-07-27 SWD-20150727130252800 Contents BlackBerry Enterprise IM for Cisco Preinstallation checklist...4

More information

RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES

RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES RELOCATEYOURSELF.COM B.V - TERMS OF USE OF SERVICES The following constitute the terms and conditions of access and use of the Services, as defined hereunder, which shall be deemed to have been read and

More information

BlackBerry Enterprise Server for Novell GroupWise. Compatibility Matrix March 31, 2010

BlackBerry Enterprise Server for Novell GroupWise. Compatibility Matrix March 31, 2010 BlackBerry Enterprise Server for Novell GroupWise Compatibility Matrix March 3, 200 2009 Research In Motion Limited. All rights reserved. www.rim.com Page: 32 Bit Operating Systems - BlackBerry Enterprise

More information

Covered California. Terms and Conditions of Use

Covered California. Terms and Conditions of Use Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products

More information

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING? A Cloud Security Primer : WHAT ARE YOU OVERLOOKING? LEGAL DISCLAIMER The information provided herein is for general information and educational purposes only. It is not intended and should not be construed

More information

BlackBerry Enterprise Server Express for Microsoft Exchange

BlackBerry Enterprise Server Express for Microsoft Exchange BlackBerry Enterprise Server Express for Microsoft Exchange Compatibility Matrix December 19, 2013 2013 BlackBerry. All rights reserved. Page: 1 Operating Systems: BlackBerry Enterprise Server and BlackBerry

More information

Reference Architecture: Enterprise Security For The Cloud

Reference Architecture: Enterprise Security For The Cloud Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application

More information

Electronic business conditions of use

Electronic business conditions of use Electronic business conditions of use This document provides Water Corporation s Electronic Business Conditions of Use. These are to be applied to all applications, which are developed for external users

More information

Terms and Conditions for Online Payment

Terms and Conditions for Online Payment Terms and Conditions for Online Payment The Terms and Conditions contained herein shall apply to any person ( Applicant ) using the services of NIMCET-2015 for making Application/Initial Fee payments through

More information

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to

More information

Application to access Chesters Trade

Application to access Chesters Trade Application to access Chesters Trade Please fill in all details below: Account Number Company Name Company Phone Number Fax Number Contact Name Mobile Number Email Address Please review the Terms of Use

More information

Terms & Conditions. Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com).

Terms & Conditions. Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com). Terms & Conditions Introduction. The following terms and conditions govern your use of this website (VirginiaHomeRepair.com). Your use of this website and Content as defined below constitutes your acceptance

More information

Copyright 2006. Sagicor Life Insurance Company. All rights reserved.

Copyright 2006. Sagicor Life Insurance Company. All rights reserved. Terms & Conditions Welcome to Sagicor Life Insurance Company ( Sagicor ). Sagicor maintains this website for your personal information, education and communication. Your access to and use of this website

More information

Next-Generation Firewalls: Critical to SMB Network Security

Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls: Critical to SMB Network Security Next-Generation Firewalls provide dramatic improvements in protection versus traditional firewalls, particularly in dealing with today s more

More information

Terms and Conditions For Online-Payments

Terms and Conditions For Online-Payments Terms and Conditions For Online-Payments The Terms and Conditions contained herein shall apply to any person ( User ) using the services of Karnataka Examination Authority for making payment for Common

More information

NEXT GENERATION FIREWALL TEST REPORT

NEXT GENERATION FIREWALL TEST REPORT NEXT GENERATION FIREWALL TEST REPORT Check Point Software Technologies, Ltd. 13800 Next Generation Firewall Appliance vr77.20 Author Timothy Otto Overview NSS Labs performed an independent test of the

More information

You must not transmit any worms or viruses or any code of a destructive nature.

You must not transmit any worms or viruses or any code of a destructive nature. TERMS OF SERVICE ---- OVERVIEW This website is operated by Mill Creek Town Center Business Association. Throughout the site, the terms we, us and our refer to Mill Creek Town Center Business Association.

More information

BlackBerry Enterprise Server Express for Microsoft Exchange

BlackBerry Enterprise Server Express for Microsoft Exchange BlackBerry Enterprise Server Express for Microsoft Exchange Compatibility Matrix September 20, 2012 2012 Research In Motion Limited. All rights reserved. www.rim.com Page: 1 Operating Systems: BlackBerry

More information

Network Security Equipment The Ever Changing Curveball

Network Security Equipment The Ever Changing Curveball Network Security Equipment The Ever Changing Curveball breakingpointsystems.com This document contains information that is the property of BreakingPoint Systems, Inc. This information may not be copied,

More information

ASYMMETRIC DIGITAL SUBSCRIBER LINE INTERNET ACCESS TERMS

ASYMMETRIC DIGITAL SUBSCRIBER LINE INTERNET ACCESS TERMS ASYMMETRIC DIGITAL SUBSCRIBER LINE INTERNET ACCESS TERMS The following Terms and Conditions govern the rights and obligations of Cable and Wireless and the Customer in connection with Cable and Wireless

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

Policies For Online-Payments

Policies For Online-Payments Policies For Online-Payments The Terms and Conditions contained herein shall apply to any person ( User ) using the services of PharmaInfo Publications (PI) for making Journal Article Publication Fee payments

More information

TEST METHODOLOGY. Endpoint Protection Evasion and Exploit. v4.0

TEST METHODOLOGY. Endpoint Protection Evasion and Exploit. v4.0 TEST METHODOLOGY Endpoint Protection Evasion and Exploit v4.0 Table of Contents 1 Introduction... 3 1.1 Inclusion Criteria... 3 2 Product Guidance... 5 2.1 Recommended... 5 2.2 Neutral... 5 2.3 Caution...

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

TERMS OF SERVICE OVERVIEW

TERMS OF SERVICE OVERVIEW TERMS OF SERVICE OVERVIEW This website is operated by Meridian. Throughout the site, the terms we, us and our refer to Meridian. Meridian offers this website, including all information, tools and services

More information

Part 3: Performance Testing

Part 3: Performance Testing ENTERPRISE SECURITY PRODUCT TESTING: BEST PRACTICES Part 3: Performance Testing Author Bob Walder Overview Security vendors marketing claims are often exaggerated and frequently do not reflect real-world

More information

Compatibility Matrix. BlackBerry Enterprise Server for Microsoft Exchange. Version 5.0.4

Compatibility Matrix. BlackBerry Enterprise Server for Microsoft Exchange. Version 5.0.4 Compatibility Matrix BlackBerry Enterprise Server for Microsoft Exchange Version 5.0.4 Published: 2016-01-13 SWD-20160113140222708 Contents BlackBerry Enterprise Server for Microsoft Exchange compatibility

More information

E-Sign Disclosure & E-Statements Terms and Conditions

E-Sign Disclosure & E-Statements Terms and Conditions (888) 734-4567 info@allianceassociationbank.com www.allianceassociationbank.com E-Sign Disclosure & E-Statements Terms and Conditions E-Sign Disclosure Alliance Association Bank is a division of Western

More information

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher

When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher TrendLabs When attackers have reached this stage, it is not a big issue for them to transfer data out. Spencer Hsieh Trend Micro threat researcher Advanced persistent threats (APTs) refer to a category

More information

Compatibility Matrix. Strong Authentication by BlackBerry. Version 1.8

Compatibility Matrix. Strong Authentication by BlackBerry. Version 1.8 Compatibility Matrix Strong Authentication by BlackBerry Version 1.8 Published: 2016-02-03 SWD-20160203124911593 Contents Introduction... 4 Legend...5 Strong Authentication server...6 Operating system...6

More information

43% Figure 1: Targeted Attack Campaign Diagram

43% Figure 1: Targeted Attack Campaign Diagram TrendLabs Data exfiltration is the final stage of a targeted attack campaign where threat actors steal valuable corporate information while remaining undetected. 1 43% of most serious threats to the company

More information

Compatibility Matrix. VPN Authentication by BlackBerry. Version 1.7.1

Compatibility Matrix. VPN Authentication by BlackBerry. Version 1.7.1 Compatibility Matrix VPN Authentication by BlackBerry Version 1.7.1 Published: 2015-07-09 SWD-20150709134854714 Contents Introduction... 4 Legend...5 VPN Authentication server... 6 Operating system...6

More information

Terms and Conditions For Online-Payments

Terms and Conditions For Online-Payments Terms and Conditions For Online-Payments The Terms and Conditions contained herein shall apply to any person ( User ) using the services of State Council Of Vocation Training for making counselling fee

More information

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork,

These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, TERMS AND CONDITIONS INFLUENCERS AT WORK These TERMS AND CONDICTIONS (this Agreement ) are agreed to between InfluencersAtWork, Ltd. ( InfluencerAtWork ) and you, or if you represent a company or other

More information

Terms and Conditions For Online-Payments

Terms and Conditions For Online-Payments Terms and Conditions For Online-Payments The Terms and Conditions contained herein shall apply to any person ( User ) using the services of Haryana State Technical Education Society (HSTES) for making

More information

4 Delivers over 20,000 SSL connections per second (cps), which

4 Delivers over 20,000 SSL connections per second (cps), which April 21 Commissioned by Radware, Ltd Radware AppDirector x8 and x16 Application Switches Performance Evaluation versus F5 Networks BIG-IP 16 and 36 Premise & Introduction Test Highlights 1 Next-generation

More information

Unified Threat Management Throughput Performance

Unified Threat Management Throughput Performance Unified Threat Management Throughput Performance Desktop Device Comparison DR150818C October 2015 Miercom www.miercom.com Contents Executive Summary... 3 Introduction... 4 Products Tested... 6 How We Did

More information

TERMS OF SERVICE OVERVIEW

TERMS OF SERVICE OVERVIEW TERMS OF SERVICE OVERVIEW This website is operated by TCRC 563. Throughout the site, the terms we, us and our refer to TCRC 563. TCRC 563 offers this website, including all information, tools and services

More information

BlackBerry Mobile Conferencing

BlackBerry Mobile Conferencing BlackBerry Mobile Conferencing BlackBerry Device Software 5.0 User Guide Version: 3.0 SWD-1908281-0130021643-001 Contents Conference call basics... 2 About BlackBerry Mobile Conferencing... 2 Join a conference

More information

BlackBerry Enterprise Server Express. Version: 5.0 Service Pack: 4. Update Guide

BlackBerry Enterprise Server Express. Version: 5.0 Service Pack: 4. Update Guide BlackBerry Enterprise Server Express Version: 5.0 Service Pack: 4 Update Guide Published: 2012-08-31 SWD-20120831100948745 Contents 1 About this guide... 4 2 Overview: BlackBerry Enterprise Server Express...

More information

TERMS OF SERVICE OVERVIEW

TERMS OF SERVICE OVERVIEW TERMS OF SERVICE ----- OVERVIEW This website is operated by Nebraska State Reading Association, hereafter referred to as NEREADS.org. Throughout the site, the terms we, us and our refer to NEREADS.org.

More information

Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview

Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview May 2015 Overview Functional highlights Functional details Legal notices Overview Support for Dell SonicWALL malware detection

More information

Hamilton.net User Agreement Revised August 31, 2004. Acceptance of Terms Through Use

Hamilton.net User Agreement Revised August 31, 2004. Acceptance of Terms Through Use Hamilton.net User Agreement Revised August 31, 2004 Acceptance of Terms Through Use By using the Hamilton.net Internet Service (the Service ), you signify your agreement to all of the terms, conditions,

More information

TERMS OF SERVICE OVERVIEW

TERMS OF SERVICE OVERVIEW TERMS OF SERVICE ----- OVERVIEW This website is operated by Priceless Enterprise. Throughout the site, the terms we, us and our refer to Priceless Enterprise. Priceless Enterprise offers this website,

More information

Updating Your BlackBerry Device Software Version: 5.0. Update Guide

Updating Your BlackBerry Device Software Version: 5.0. Update Guide Updating Your Version: 5.0 Update Guide SWD-934286-1030044722-001 Contents... 2 About updating the... 2 Update the over the wireless network... 2 Return to the previous version of the... 3 Delete the previous

More information

Compatibility Matrix. BlackBerry Enterprise Server Express for Microsoft Exchange. Version 5.0.4

Compatibility Matrix. BlackBerry Enterprise Server Express for Microsoft Exchange. Version 5.0.4 Compatibility Matrix BlackBerry Enterprise Server Express for Microsoft Exchange Version 5.0.4 Published: 2016-01-13 SWD-20160113140023414 Contents BlackBerry Enterprise Server Express for Microsoft Exchange

More information

GlaxoSmithKline Single Sign On Portal for ClearView and Campaign Tracker - Terms of Use

GlaxoSmithKline Single Sign On Portal for ClearView and Campaign Tracker - Terms of Use GlaxoSmithKline Single Sign On Portal for ClearView and Campaign Tracker - Terms of Use IMPORTANT! YOUR REGISTRATION AND USE OF THIS GlaxoSmithKline Single Sign On Portal for ClearView and Campaign Tracker

More information

BlackBerry Enterprise Server for Microsoft Exchange. Compatibility Matrix January 31, 2011

BlackBerry Enterprise Server for Microsoft Exchange. Compatibility Matrix January 31, 2011 BlackBerry Enterprise Server for Microsoft Exchange Compatibility Matrix January 31, 2011 2010 Research In Motion Limited. All rights reserved. www.rim.com Page: 1 Operating Systems: BlackBerry Enterprise

More information

Business User Agreement

Business User Agreement Business User Agreement Star Telephone Membership Corporation will provide Star Telephone FireLine DSL Service to on the terms and conditions listed below. Star Telephone FireLine DSL Service will be delivered

More information

Terms of Use Gateway Clipper Website

Terms of Use Gateway Clipper Website Terms of Use Gateway Clipper Website General Information Regarding These Terms of Use Master terms: Unless otherwise noted on a particular site or service, these master terms of use ( Master Terms ) apply

More information

Compatibility Matrix March 05, 2010

Compatibility Matrix March 05, 2010 BlackBerry Enterprise Server Express Compatibility Matrix March 05, 2010 2010 Research In Motion Limited. All rights reserved. www.rim.com Page: 1 Operating Systems - BlackBerry Enterprise Server Express

More information