Xerox App Gallery 3.0
|
|
- Sheryl Quinn
- 7 years ago
- Views:
Transcription
1 Xerox App Gallery 3.0 Information Assurance Disclosure Version P04368
2 2016 Xerox Corporation. All rights reserved. Xerox, Xerox, Design, and ConnectKey are trademarks of Xerox Corporation in the United States and/or other countries. Microsoft, SQL Server, Microsoft.NET, Windows, Windows Server, SharePoint, and Windows 7 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Xerox PDF Reader Powered by Foxit Software Company ( This product includes software developed by Aspose ( BR18116 Page 2 of 16
3 Contents Introduction... 4 Purpose... 4 Target Audience... 4 Disclaimer... 4 System Workflows... 5 Gallery Account Creation and Activation Workflow... 5 Browse the App Gallery Workflow... 6 Install of App from App Gallery Workflow... 7 License Workflow... 8 Security Description Xerox App Gallery Network Protocols and Port Numbers Diagram Individual System Components Xerox App Gallery Rackspace Catalog Servers, Design Servers, Load Balancers Xerox ecommerce Server Xerox Corporate Licensing system Xerox App Gallery User Web Pages Devices Xerox Backup Server MySQL Database Server Cloud File Storage App Gallery Portal App Communication between System Components The Role of Xerox Page 3 of 16
4 Introduction Xerox App Gallery is a Xerox Marketplace that allows users to browse Xerox ConnectKey device Apps and install the Apps on the devices themselves. Purpose The purpose of this document is to disclose information for the Xerox App Gallery with respect to system security. System Security, for this paper, is defined as follows: 1. How scan and print jobs are created and submitted 2. How user information is stored and transmitted 3. How the product behaves in a networked environment 4. How the product may be accessed, both locally and remotely NOTE: The customer must be responsible for the security of their network and the Xerox App Gallery does not establish security for any network environment. The purpose of this document is to inform Xerox customers of the design, functions, and features of Xerox App Gallery relative to Information Assurance (IA). This document does not provide tutorial level information about security, connectivity, PDLs, or Xerox App Gallery features and functions. This information is readily available elsewhere. We assume that the reader has a prior knowledge of these types of topics. Target Audience The target audience for this document is Xerox field personnel and customers concerned with IT security. Disclaimer The information in this document is accurate to the best knowledge of the authors, and is provided without warranty of any kind. In no event shall Xerox Corporation be liable for any damages whatsoever as a result of user's use or disregard of the information provided in this document which includes direct, indirect, incidental, consequential, loss of business profits or special damages, even if Xerox Corporation has been advised of the possibility of such damages. Page 4 of 16
5 System Workflows Gallery Account Creation and Activation Workflow Step 1: User connects to the Xerox App Gallery login web page. Step 2: User selects option to create a Xerox App Gallery account. Step 3: User enters required information to create an account and submits the request. Step 4: Xerox App Gallery creates account and activates it Step 5: User is sent back to login page where they enter user id and password to successfully login Page 5 of 16
6 Browse the App Gallery Workflow Step 1: User logs in to Xerox App Gallery. Step 2: User selects the gallery tab. Step 3: User can browse through the apps in the app gallery. Step 4: User can select an app and choose information option. Step 5: User will see the detailed information for the app including screenshots and demo video. Page 6 of 16
7 Install of App from App Gallery Workflow Step 1: User logs into Xerox App Gallery. Step 2: User selects the app in the app gallery they want to install and selects install. Step 3: User selects the device they wish to install the app to. Step 4: Xerox App Gallery installs the app to the chosen device. Step 5: If the app is a cloud repository app, the app and device are registered with the cloud middleware. Page 7 of 16
8 License Workflow Step 1: Gallery user logs into Xerox App Gallery. Step 2: Gallery user selects the Licenses tab. Step 3: Gallery user selects the Purchase button. Step 4: Gallery user is instructed where to purchase licenses or they can click the link to go to the ecommerce site to purchase licenses. Once purchased the user will receive an activation key via . Note: This step is purposely outside of App Gallery control. It is not the responsibility of App Gallery to provide security for this step. Step 5: Gallery user selects the Add button. Step 6: Gallery user enters activation key to activate the licenses purchased for App Gallery. Step 7: Gallery user can see the licenses purchased, the total and remainder of the license s count. Page 8 of 16
9 Step 8: Gallery user can now install an app from app gallery and apply a license to the app. Page 9 of 16
10 Security Description The security considerations are three-fold: 1. The security of the apps found in the Xerox App Gallery 2. The security of the user account information required by the Xerox App Gallery system 3. The security of the devices registered within the system by the user As one can see from the below diagram, information travels through multiple system components over a combination of wired and wireless networks. All use normal, industrystandard technologies and built-in security capabilities. These capabilities do need to be enabled, and the choice of which are used at each point in the system varies. This section captures the security considerations of Xerox App Gallery in the areas shown below: 1. Protocols and Port numbers used by the system 2. Individual system components a. Xerox App Gallery Rackspace Catalog server (2) b. Xerox App Gallery Rackspace Designer server (2) c. Xerox ecommerce server d. Xerox Corporate Licensing System e. Xerox App Gallery User Web Pages f. Devices g. Rackspace Load Balancer servers h. Xerox Backup server i. MYSQL Database server j. Cloud File storage k. App Gallery Portal App 3. Communication between system components a. Communication between Xerox App Gallery User Web Pages and Rackspace Catalog server, Rackspace Designer server and Rackspace Load Balancer servers b. Communication between Rackspace Design server and Xerox Corporate Licensing System c. Communication between Rackspace Catalog server, Rackspace Design Server and Devices d. Communication between the Xerox Backup Server and the Rackspace Catalog server e. Communication between Rackspace Catalog servers, Rackspace Design servers and the Rackspace MYSQL Database server f. Communication between Rackspace Catalog servers, Rackspace Design servers and the Rackspace Cloud Files storage g. App Gallery Portal App Page 10 of 16
11 Xerox App Gallery Network Protocols and Port Numbers Diagram This diagram shows the protocols used in the system. Port numbers are not configurable. For non-secure connection, port number 80 is used. For secure connection, port number 443 is used. For the SMTP server port 25 is used. Xerox ecommerce Xerox Licensing Xerox UK Xerox ecommerce Server XCLS License Server Xerox Backup Server SMTP Router (Desired State) Confirmation Request Rackspace Cloud Servers MySQL Ruby on Rails App Catalog Ubuntu Linux Catalog Server File Server MYSQL Database Server Register & Unregister Apps and Devices SMTP Server (Back-up) SMTP Server (Main) Load Balancers Code Gen Web Svc License Activation SQL Web Svc Server Express Windows Design Web Server Cloud Repositories Confirmation Design XAS App Azure Azure Storage Document Conversion Azure Cloud VM ActiveX Enterprise / SMB Deploy SNMP/HTTP Middleware Middleware Azure Cloud Service Azure Cloud Service Individual System Components Xerox App Gallery Rackspace Catalog Servers, Design Servers, Load Balancers The Xerox App Gallery Servers, which are located in the United Kingdom, run in the Rackspace Platform. There are two considerations for security based on this architecture as follows: 1. Rackspace specific security information 2. Xerox App Gallery Servers specific security information Each consideration is covered below. Page 11 of 16
12 Rackspace Platform Specific Rackspace is an open source cloud company which offers various degrees of security options. Xerox App Gallery have opted to use the security option that comes with the Managed Service level for cloud servers. Rackspace managed service security highlights: System installation to a hardened patched OS System patches are configured by Rackspace to provide continued protection from exploits in the extent that this is offered and accomplished by Microsoft Server and Ubuntu Linux Dedicated firewall and VPN services to help block unauthorized system access Data protection with Rackspace managed backup solutions Dedicated intrusion detection devices to provide an additional layer of protection against unauthorized system access Distributed Denial of Service (DDoS) mitigation services based on proprietary Rackspace PrevenTier system Risk assessment and security consultation by Rackspace professional services teams ISO17799-based policies and procedures regularly reviewed as part of SAS70 Type II audit process All passwords encrypted in transit and while in storage at Rackspace Please visit the Rackspace web site for more information: Xerox App Gallery Cloud Service Specific All communications to and from the Xerox App Gallery Cloud Service are over https, with the exception of communication between the devices and the Rackspace Design server license activation service. Data is transmitted securely and is protected by TLS security for both upload and download. Xerox ecommerce Server The Xerox ecommerce Server is purposely left outside of the Xerox App Gallery workflows. When the button to purchase licenses is pushed, a message is displayed to the user to go to the ecommerce web site to purchase licenses for App Gallery. Xerox App Gallery is not responsible for the security of communication with the ecommerce server. Xerox Corporate Licensing system The Xerox Corporate Licensing System is accessed with https (Hyper Text Transfer Protocol) from the license activation service in the Rackspace Design server. Page 12 of 16
13 Xerox App Gallery User Web Pages All user web pages are accessed with https from a Web Browser. Xerox App Gallery users have to authenticate with the Xerox App Gallery Service to access the user web pages. Once authenticated the user can view: 1. All apps that reside in the App Gallery system. 2. All devices registered by the user in the App Gallery system. Devices Xerox devices have a variety of security features that can be employed to increase security. Availability of these features depends based on model. It is the customer s responsibility to understand and implement appropriate controls for devices behavior. Some examples are as follows: 1. Xerox Image Overwrite electronically shreds information stored on the hard drive of devices as part of the routine job process. 2. Data Encryption uses state of the art encryption technology on data stored within the device as well as for data in motion in and out of the device. For more information about the above examples as well as for other device security related technologies please see The Xerox App Gallery only supports Xerox ConnectKey devices. It is the customer s responsibility to understand the security features of these Xerox devices which are used in the Xerox App Gallery system. Communication between the device and the License Activation Web Service has been changed to use https. Xerox Backup Server The Xerox Backup Server uses https to access the Rackspace Catalog server. Xerox App Gallery backup files are copied from the Catalog server to the backup server which is located in a Xerox facility. MySQL Database Server MySQL database server stores the data used by the designer server and catalog server. MySQL database server uses https to communicate with the Rackspace Catalog server and the Rackspace Designer server. Cloud File Storage Cloud file storage stores files used by the designer server and catalog server. The Rackspace Catalog server and the Rackspace Designer server use https to access the Cloud file storage. Page 13 of 16
14 App Gallery Portal App The Xerox App Gallery Portal App is an app which will be delivered with all NextWave and ConnectKey 2.0i devices. The Xerox App Portal App will give users of the NextWave and ConnectKey 2.0i devices access to the Xerox App Gallery. The Xerox App Gallery Portal App will have the ability to associate a Xerox App Gallery Account with the app which will allow any user walking up to the device to have access to the Xerox App Gallery. The associated credentials will be saved on the device s local storage and will be encrypted for security. Communication between System Components Communication between Xerox App Gallery, Rackspace Catalog Servers, Design Servers and Load Balancers and Xerox App Gallery Web Pages The Xerox App Gallery servers use the https protocol for all communication with the Xerox App Gallery Web Pages. It establishes an https secure connection with the Xerox App Gallery Service which relies on the web page OS to validate the security certificate as part of creation of the TLS connection. The TLS certificate is issued by Comodo (a trusted certificate authority) and ensures that the Xerox App Gallery webserver is in communication with the user s web browser, and no third party can pretend to be that webserver or intercept traffic between the web browser and the webserver. Xerox App Gallery requires users to authenticate before they can use any of its features. Basic authentication is performed with the Xerox App Gallery that provides username and password information over the https protocol. Once authentication is complete, data is passed between the Xerox App Gallery servers and the Xerox App Gallery Web Pages to enable the features of the service within the Xerox App Gallery. This includes all data for apps, information for registered devices, and user data. Communication between Xerox App Gallery, Rackspace Design Server, and Xerox Corporate Licensing System The Xerox App Gallery Rackspace License Activation Service uses the https protocol for all communication with the Xerox Corporate Licensing System. It establishes an https secure connection when the Xerox Corporate Licensing System relies on the certificate authority configuration of the Windows server on which it resides to validate the security certificate as part of establishment of the TLS connection with the Xerox Corporate Licensing System. Page 14 of 16
15 Communication between Xerox App Gallery Rackspace Catalog and Design Servers and Devices The Xerox App Gallery uses SNMPv2 to discover printers and printer capabilities. Customers can configure the community name strings for the agent to use if they have configured their printers to use non-default values. Xerox App Gallery also uses SOAP messages transmitted over the https protocol to communicate with devices in order to accomplish app installation and uninstallation. The WSSE standard for SOAP messages is used to transmit nonce-protected hashes of device administrator credentials to the device to provide authorization. These device administrator credentials are supplied by the user and stored as part of the device record in Xerox App Gallery. The devices communicate directly with the Xerox App Gallery Design server when it tries to validate a license for an App that has been installed on the device. This communication is done via https. Communication between Xerox Backup Server and Xerox App Gallery Rackspace Catalog Server The Xerox Backup Server is a password protected server which communicates via https with the Xerox App Gallery Rackspace Catalog server at a regularly scheduled interval to copy the backup files of Xerox App Gallery to the Xerox Backup Server. The Xerox Backup server is located at a Xerox facility in the United Kingdom. Communication between Xerox App Gallery Portal App and the Xerox App Gallery The Xerox App Gallery Portal App communicates with the Xerox App Gallery via https and the data is transmitted securely and is protected by TLS security. The Xerox App Gallery Portal App can associate App Gallery credentials with the device. These credentials are encrypted on the device. Page 15 of 16
16 The Role of Xerox Xerox strives to provide the most secure software product possible based on the information and technologies available while maintaining the product performance, value, functionality, and productivity. Xerox will: Run industry standard security diagnostics tests in development to determine vulnerabilities. If found, the vulnerabilities will either be fixed, minimized, or documented Monitor, notify, and supply necessary security patches provided by third party software vendors used with the App Gallery software. Page 16 of 16
October 2013 702P00860. Xerox App Studio. Information Assurance Disclosure. Version 2.0
October 2013 702P00860 Xerox App Studio Information Assurance Disclosure Version 2.0 2013 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
More informationDecember 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure
December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
More informationXerox Mobile Print Cloud
September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United
More informationXerox Mobile Print Cloud
Xerox Mobile Print Cloud Information Assurance Disclosure Software Version 3.0 May 2015 702P03595 2013-2015 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
More informationXerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations
Xerox FreeFlow Digital Publisher Information Assurance Disclosure Onsite, Cloud and epublishing Configurations May 2016 2016 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks
More informationSoftware Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide
Software Version 1.0 ConnectKey TM Share to Cloud April 2013 Xerox ConnectKey Share to Cloud User / Administrator s Guide 2013 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and Xerox
More informationXerox PrintSafe Software
Software Version 1.0 Version 1.0 702P03957 Xerox PrintSafe Software Information Assurance Disclosure Xerox PrintSafe Software Copyright 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design,
More informationSynchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
More informationwww.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
More informationStrong Authentication for Juniper Networks SSL VPN
Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationNovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
More informationQuick Start Guide: Utilizing Nessus to Secure Microsoft Azure
Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Introduction Tenable Network Security is the first and only solution to offer security visibility, Azure cloud environment auditing, system
More informationXerox Mobile Print Solution
Software Version 3.0 Version 1.0 702P03147 Xerox Mobile Print Solution Information Assurance Disclosure 1 Introduction... 6 1.1 Purpose... 6 1.1 Target Audience... 6 1.2 Disclaimer... 6 2 System Workflows...
More informationEMR Link Server Interface Installation
EMR Link Server Interface Installation Version 1.0 ** INTRODUCTION ** If you would like assistance with installation, please contact our preferred support provider at support@bonecomputer.com, or call
More informationVPN Overview. The path for wireless VPN users
VPN Overview The path for wireless VPN users First, the user's computer (the blue computer) connects to an access point in the uiuc-wireless-net network and is assigned an IP address in that range (172.21.0.0
More informationformerly Help Desk Authority 9.1.3 Upgrade Guide
formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
More informationDefender 5.7. Remote Access User Guide
Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationPreparing Your Network for an MDsuite Installation
Preparing Your Network for an MDsuite Installation Professional Data Services 1632 East 23 rd Avenue Hutchinson, KS 67502 Toll-free: 800.875.0480 Fax: 858.486.5493 www.mdsuite.com Introduction This document
More informationFoglight Experience Monitor and Foglight Experience Viewer
Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains
More informationMTS Remote Drive Service. Quick Start Guide
MTS Remote Drive Service Quick Start Guide Signing In to Remote Drive service through My Internet Account To sign in to use the service, you need to be a registered user with a user name and password.
More informationHow To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
More informationFileRunner Security Overview. An overview of the security protocols associated with the FileRunner file delivery application
FileRunner Security Overview An overview of the security protocols associated with the FileRunner file delivery application Overview Sohonet FileRunner is a secure high-speed transfer application that
More informationDell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
More informationtechnical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
More informationDell One Identity Cloud Access Manager 7.0.2. Installation Guide
Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationServer Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
More informationPreparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
More informationManaging for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
More informationProduct comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)
Product comparison GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release) GFI LanGuard 2014 Windows Intune General features Scheduled scans Agent-less r Agent-based Integration with Active
More informationVNC User Guide. Version 5.0. June 2012
VNC User Guide Version 5.0 June 2012 Trademarks VNC is a registered trademark of RealVNC Ltd. in the U.S. and in other countries. Other trademarks are the property of their respective owners. Protected
More information4.0 SP1 (4.0.1.0) November 2014 702P03296. Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2
4.0 SP1 (4.0.1.0) November 2014 702P03296 Installation Guide: Windows Server 2008 R2 2014 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, FreeFlow, and VIPP are trademarks of Xerox Corporation
More informationNovaBACKUP xsp Version 12.2 Upgrade Guide
NovaBACKUP xsp Version 12.2 Upgrade Guide NovaStor / August 2011 Rev 20110815 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationConfiguration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06
SafeNet Authentication Service Configuration Guide 1.06 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationIntegration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Apache HTTP Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationVendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
More informationEnterprise Self Service Quick start Guide
Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.
More informationSecurity FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
More informationRemote Access Platform. Architecture and Security Overview
Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards
More informationJetAdvice Manager Data Collector v. 2.1. Date: 2014-06-30
JetAdvice Manager Data Collector v. 2.1 Date: 2014-06-30 NOTE The information contained in this document is subject to change without notice. EuroForm makes no warranty of any kind with regard to this
More informationXerox Security Bulletin XRX13-006
Cumulative update for Common Criteria Certification Background The System Software Versions listed below for the WorkCentre 5845/5855/5865/5875/5890, WorkCentre 7220/7225, WorkCentre 7830/7835/7845/7855
More informationSSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
More informationMcAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
More informationSOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012
SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse
More informationProduct Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
More informationSophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
More informationFor Use with QR Code Scanner / Reader Enabled Applications
Xerox QR Code App Quick Start Guide 702P03999 For Use with QR Code Scanner / Reader Enabled Applications Use the QR (Quick Response) Code App with the following applications: QR Code Scanner / Reader Applications,
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
More information4.0 SP2 (4.0.2.0) May 2015 702P03296. Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2
4.0 SP2 (4.0.2.0) May 2015 702P03296 Installation Guide: Windows Server 2008 R2 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and FreeFlow are trademarks of Xerox Corporation in
More informationDell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
More informationSecure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012
Secure Installation and Operation of Your Xerox Multi-Function Device Version 1.0 August 6, 2012 Secure Installation and Operation of Your Xerox Multi-Function Device Purpose and Audience This document
More informationRetention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
More informationMultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
More informationConnectivity to Polycom RealPresence Platform Source Data
Polycom RealAccess Security White Paper The Polycom RealAccess service is delivered using the Software as a Service (SaaS) model. This white paper outlines how the service protects sensitive customer data
More informationAppalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
More informationStrong Authentication for Juniper Networks
Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright
More informationMy FreeScan Vulnerabilities Report
Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the
More informationSHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
More informationLDAP Synchronization Agent Configuration Guide for
LDAP Synchronization Agent Configuration Guide for Powerful Authentication Management for Service Providers and Enterprises Version 3.x Authentication Service Delivery Made EASY LDAP Synchronization Agent
More informationReference Architecture: Enterprise Security For The Cloud
Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application
More informationMicrosoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
More informationNetwork and Security Controls
Network and Security Controls State Of Arizona Office Of The Auditor General Phil Hanus IT Controls Webinar Series Part I Overview of IT Controls and Best Practices Part II Identifying Users and Limiting
More informationACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07
ACTi NVR Config Converter User s Manual Version 1.0.0.17 2012/06/07 Legal Notice Disclaimer The information contained in this document is intended for general information purposes. ACTi Corporation shall
More informationABB solar inverters. User s manual ABB Remote monitoring portal
ABB solar inverters User s manual ABB Remote monitoring portal List of related manuals Title ABB Remote monitoring portal User s manual NETA-01 Ethernet adapter module User s manual Code (English) 3AUA0000098904
More informationDIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationDell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within
More informationComodo Certificate Manager Version 5.3
Comodo Certificate Manager Version 5.3 Introduction to Auto-Installer Comodo CA Limited, 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Greater Manchester M5 3EQ, United Kingdom.
More information2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
More informationSophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
More informationSynthetic Application Monitoring
Synthetic Application Monitoring... Andrew Martin Senior Technical Consultant Contents End User Experience Monitoring - Synthetic Transactions 3 Argent and Synthetic Transactions 3 Web Based Application
More informationEnd User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationNAS 221 Remote Access Using Cloud Connect TM
NAS 221 Remote Access Using Cloud Connect TM Access the files on your NAS remotely with Cloud Connect TM A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
More informationActive Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
More informationSection 1 CREDIT UNION Member Information Security Due Diligence Questionnaire
SAMPLE CREDIT UNION INFORMATION SECURITY DUE DILIGENCE QUESTIONNAIRE FOR POTENTIAL VENDORS Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire 1. Physical security o Where is
More informationJAMF Software Server Installation and Configuration Guide for Linux. Version 9.2
JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationDIGIPASS Authentication for GajShield GS Series
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
More information2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
More informationAdministrator Operations Guide
Administrator Operations Guide 1 What You Can Do with Remote Communication Gate S 2 Login and Logout 3 Settings 4 Printer Management 5 Log Management 6 Firmware Management 7 Installation Support 8 Maintenance
More informationCareGiver Remote Support Information Technology FAQ
CareGiver Remote Support Information Technology FAQ CareGiver remote support Information Technology FAQ Purpose The purpose of this document is to answer Frequently Asked Questions (FAQs) regarding CareGiver
More informationTroux Hosting Options
Troux Hosting Options Introducing Troux Hosting Options Benefits of a Hosted Troux Environment...3 Convenience...3 Time-to-Value...3 Reduced Cost of Ownership...3 Scalability and Flexibility...3 Security...4
More informationintroducing The BlackBerry Collaboration Service
Introducing the Collaboration Service 10.2 for the Enterprise IM app 3.1 introducing The Collaboration Service Sender Instant Messaging Server Collaboration Service 10 device Recipient V. 1.0 June 2013
More informationICONICS Using the Azure Cloud Connector
Description: Guide to use the Azure Cloud Connector General Requirement: Valid account for Azure, including Cloud Service, SQL Azure and Azure Storage. Introduction Cloud Connector is a FrameWorX Server
More informationXerox Mobile Link 2.0 Frequently Asked Questions (FAQ) - Android
Xerox Mobile Link 2.0 Frequently Asked Questions (FAQ) - Android Xerox Mobile Link is a personal productivity app that connects your mobile phone and tablet to a Xerox Multifunction Printer (MFP). You
More informationStrong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationHP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
More informationGiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
More informationDell Statistica Document Management System (SDMS) Installation Instructions
Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationConfiguration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web App. Technical Manual Template
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationHow to Install SSL Certificates on Microsoft Servers
How to Install SSL Certificates on Microsoft Servers Ch apter 4: Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server... 57 Co mmon Operations... 57 Step 1: Prepare the Microsoft
More informationReadyNAS Remote White Paper. NETGEAR May 2010
ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that
More informationWHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION
WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION Cloud Computing can provide great flexibility for the Estate Master user. You can access your feasibilities, manage you projects
More informationqliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
More informationMadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
More informationConfiguration Guide. SafeNet Authentication Service AD FS Agent
SafeNet Authentication Service AD FS Agent Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document
More informationNokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
More information