Syncplicity Security and Control Features

Size: px
Start display at page:

Download "Syncplicity Security and Control Features"

Transcription

1 Abstract This paper describes EMC Syncplicity security features and controls for protecting enterprise data at the user, device, file, and folder level. Last Updated: March 2015

2 Copyright 2015 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. For the most up- to- date listing of EMC product names, see EMC Corporation Trademarks on EMC.com. White Paper H

3 Table of Contents Purpose... 4 Syncplicity Overview... 5 Syncplicity Architecture... 6 End- To- End Encryption... 7 Orchestration Layer Data Storage... 7 Syncplicity Approach to Security User- Level Security and Controls... 9 Authentication... 9 Administration Device- Level Security and Controls Authentication Access Policies Encryption Administration Mobile Device Management Folder- Level Security and Controls Folder Sharing Folder Data (File) Protection File- Level Security and Controls Encryption Storage Control File Contents Protection Administration Reporting and Monitoring Third- Party Security Testing Privacy Certifications and Compliance Additional Information

4 Purpose The trends leading up to 2015 are clear - the velocity and costs of disclosed security breaches are at the highest levels the industry has seen. Today s security officer needs to strike a balance between delivering business productivity and securing enterprise information. Syncplicity provides a protection- by- enablement strategy that mitigates the risk of end- users bringing their own cloud- based file sync and share solutions into the enterprise. Ensuring the confidentiality, privacy, integrity, and availability of customer data is of the utmost importance. Syncplicity delivers a highly secure file sync and share service built to meet the requirements of enterprises. Syncplicity uses multiple layers of protection and defense- in- depth to ensure end- to- end protection of files and confidential data. The purpose of this paper is to detail the information security architecture and capabilities of Syncplicity. 4

5 Syncplicity Overview Syncplicity is an easy- to- use, enterprise- grade file sync and share solution. Our vision is to redefine Files for the mobile workforce. Unlike other solutions: Users get improved productivity from access and sharing of all their files from all their devices automatically, with no extra steps. IT gets control over all of the content that currently exists in unmanaged locations like attachments, local desktop folders, and consumer cloud services. IT gets strong security, controls and storage flexibility to protect corporate files and adhere to compliance requirements. Figure 1. Syncplicity Functional Architecture 5

6 Key components of the Syncplicity functional architecture are shown in Figure 1 and include: A frictionless user experience. Syncplicity allows users to easily access and share files from all of their devices with a highly- optimized and native user experience on every major device platform. This is critical for driving end- user adoption and improving organizational security by reducing dependence on attachments and consumer- grade online file sharing solutions. A comprehensive set of security features and controls. Security and controls at the user, device, folder, and file level give IT the tools and infrastructure integration to deploy the solution with confidence and maintain control of and visibility into large- scale file sharing. Enterprise- grade administration and control features. Administration, support, and reporting features give IT the tools they need to deploy and support Syncplicity at scale. StorageVaults provide flexibility to ensure security and compliance. Syncplicity StorageVaults provide a policy- driven hybrid cloud that gives IT the control it needs over data storage and residency to meet internal and industry regulations for file handling and data residency. Using StorageVaults, organizations can configure Syncplicity to store file versions and history in multiple storage arrays at the same time, based on user, group, and folder policies. No silos approach to enterprise content sources. Syncplicity Panorama provides mobile, VPN- less access to enterprise content stored in SharePoint, File Shares, and Home Directories. This enables IT to give end- users mobile access to content without having to migrate it. Rights Management. With Secure Shared Files, recipients receive a protected copy of a file (including watermarks, allowing screen capture, allowing printing, allowing offline access, and etc). The Syncplicity Secure Shared File feature protects the file so that it remains protected even after users download it. Syncplicity Architecture The Syncplicity logical architecture is comprised of a few primary components: A cloud- based orchestration layer that controls the sync process, enabling sharing of files and folders between users and devices. This is a multi- tenant cloud- based service that is common across all Syncplicity customers. Syncplicity StorageVaults control where files (and past file versions) are stored in Syncplicity. This layer is single- tenant for customers that choose on premise storage and is multi- tenant for customers using Syncplicity s public cloud storage. The storage layer is the actual physical storage that the StorageVaults point to and where files are actually stored. 6

7 IMPORTANT: When a user or device needs to receive a file, the file is sent directly from the storage and compute layers to the device, not through the orchestration layer. Figure 2 illustrates these components and how data/files flows between them. End- To- End Encryption Figure 2. Syncplicity Architecture Encryption of files in transit is done through TLS/SSL via HTTPS traffic. Unlike our competition, files are encrypted at rest on mobile devices. Encryption at rest in our data store is done using encryption keys that are stored in a separate data store from all user- specific information and metadata in the orchestration layer. The orchestration layer is decoupled from the storage layer at the service provider site, which is an opaque store for raw files. Orchestration Layer Data Storage Data stored in the orchestration layer is minimal, and includes: File name, creation date, size, SHA- 256 hash Storage information (# of chunks, chunk size, encryption key, data length after encryption/compression) Virtual path relative to the sync point root Full path to where synched and shared folders are mapped on the user s machines Information such as file size, SHA- 256 hash, and encryption keys are stored in separate databases from all user- specific information. 7

8 Syncplicity Approach to Security There are several guiding principles for how we approach enterprise- grade security: You own the data. As recent news stories have demonstrated, one of the biggest inhibitors to cloud adoption is the question of who owns or has access to customer data. We make it completely clear that we do not own customer data, can t use customer data, and can t even see customer data. Make security as seamless as possible. There are many ways to enhance security while making the user experience easy. Single sign on (SSO) is an obvious approach to reduce user friction and keep users happy. We always look to reuse our customer s existing security infrastructure rather than replicate it. Centralize policies. Use of centralized policies offers security and compliance without requiring users or IT to take extra steps. We d rather have you set a policy for external folder sharing than make users ask admins to set up secure workspaces. Make compliance policy- driven. One of the most important aspects to corporate and regulatory compliance and security is data location. But it does no good if users have to think about it and change their behavior. Policy- driven approaches ensure compliance without impacting the user experience. Protect by enabling (and monitoring). Ironically, sometimes the best way to secure a process is to not lock it down, but allow it to happen with the proper controls and IT reporting in place. When users go to consumer products, data is at risk and IT doesn t even know about it. Meaningful and automatic reporting gives IT a way to manage the unmanageable. Trust but verify. There is a veritable alphabet soup of certifications and attestations that cloud vendors can go through. We will go through the process of gaining relevant certifications. Security, privacy, and compliance should not interfere with user experience. It is not only possible to build security features and controls that don t create friction for users, but they can also enhance user productivity. Be as restrictive or permissive as your business demands. Every organization has varying requirements for security and compliance. IT administrators and security professionals should be able to fine- tune security policies and controls to meet the needs of their business, and their users. Security features don t matter if users go around them. attachments and consumer- grade cloud services have created huge risk for enterprises. The only way to mitigate this risk is to give users consumer- grade experiences that make their jobs easier, while still complying with enterprise- grade security requirements. And if IT does not meet these needs, users will go around them. The cloud is the future, and it can be secure. Cloud- based SaaS applications are the way that technology will be deployed and consumed by users and organizations. One of our key missions is to make the cloud one of the most secure deployment models that exist. All content is not created equal. While SaaS is the future, storing data in the cloud is only one of several deployment options for cloud applications. We believe organizations should have complete flexibility in where data is stored. Furthermore, centralized policies that are completely invisible to the user should automate how and where data is stored. 8

9 With regard to specific features and controls, Syncplicity was developed to offer protection and control of company data in four key areas: User- level security. Protecting user accounts and data from access Device- level security. Protecting accounts and files in Syncplicity on desktop client apps and mobile apps Folder- level security. Security and control regarding the sharing of folders inside and outside the organization File- level security. Providing security and control of files and file content in transit and at rest The following four sections provide details on how we protect at each of these levels. User- Level Security and Controls Authentication Single sign on (Active Directory or any SAML- based authentication). Authentication can be completely delegated to the customer s AD/LDAP by leveraging federated authentication (Figure 3). With a customer- managed SAML identity provider, users no longer enter their Syncplicity username and password to access Syncplicity on the desktop, the web, and mobile devices. Instead, they leverage their existing corporate credentials to log in and, in many cases, do so in a completely transparent way with absolutely no forms to fill out. o Because authentication is delegated to secure, authorized servers outside of Syncplicity s control, Syncplicity servers are never privy to corporate passwords authentication credentials remain squarely in the control of the corporate system. o Organizations can take control of their passwords by implementing strong password policies, password expiration timeframes, and repeat use policies using their existing authentication infrastructure o SAML initiated logins are controlled through customer managed IDP at first login of the Syncplicity desktop and/or mobile client(s). Once authenticated the Syncplicity clients do not require future user re- authentication and authentication is managed using a combination of a long long- lived machine token and short- lived session tokens. 9

10 The machine tokens are long- lived and stored using each client OS APIs for credential storage, though users can easily deactivate them to revoke access to their Syncplicity account from that device. For a sync operation (upload, download, share etc.) the client uses a short- lived session token valid for approximately 75 minutes after which the session token is rotated. o The web client (my.syncplicity.com) uses a cookie- based token that has a 30 min inactivity timer. o Multi- factor authentication Using a SAML identity provider (IdP), Syncplicity supports multi- factor authentication such as one- time- passwords and PKI certificates. Figure 3. Syncplicity SSO Authentication Flow Active Directory Sync (provisioning and de- provisioning). Syncplicity supports integration with OneLogin, Okta, and Ping Identity to offer automated provisioning and de- provisioning of user accounts from Active Directory. o Provide instant access to Syncplicity when a new user is created in Active Directory o Revoke access to Syncplicity immediately when a user s account is deactivated or deleted in Active Directory o Provision Syncplicity to specific groups like marketing or engineering directly from Active Directory o Roll out Syncplicity progressively to groups or organization units defined in Active Directory 10

11 o Map Syncplicity account provisioning to Active Directory groups, making it easier to manage licensing and resources. o Remote wipe automatically when an account is deleted in Active Directory, permanently removing files from all connected devices Administrator domain restrictions. Syncplicity can be configured to require admins to only access the Administration Console from specified domains. Administrator password complexity policy. Enforce password complexity policies for administrator passwords to provide an extra layer of protection for admin accounts. Secure password storage For non- SAML accounts, Syncplicity enforces a minimum length and complexity on user- generated passwords and the credentials are stored as a salted SHA- 256 hash. The password is never stored by Syncplicity for authentication purposes. Account lockout on multiple failed authentication requests. User accounts are temporarily locked after five consecutive unsuccessful login attempts. Administration Ranked Group Policy Sets. Create sets of policies (user, device, folder, and file) that are applied to users in ranked order, giving granular control over all policies at the group level. Ranked Storage Sets. Gives granular control over where Syncplicity stores files for users based on group membership. User management. Easily manage user account set up and support. o Preconfigure user accounts to ensure that certain folders are synced by default (e.g., Documents, etc.) o Access user accounts to support users and access content o Delete or suspend user accounts Group management. Set policies that enable deployment to user groups at scale. o Automatic folder sharing allows admins to ensure that members of user groups gain immediate access to folders that are shared with the group. o Automatic folder de- provisioning on role change ensures that users are removed from shared folder access when the user is removed from a group. This works in conjunction with folder remote wipe policies to permanently delete files and folders from user accounts when they are removed from a group. 11

12 o Storage quotas can be set for users in each group to limit the amount of content that different users can add to the service. Administrator- driven user account remote wipe. Administrators can remote wipe user accounts, disabling user access to Syncplicity accounts from any device. User account remote wipe policy. Set a policy for what happens to user data and files when an account is deleted. Data and files can be left on devices or permanently remote- wiped from those devices automatically. Free account restrictions. Administrators have ability to restrict users from signing up for free (consumer) Syncplicity accounts on their own using their business account. IP Based Restriction - By default, Syncplicity allows administrators to perform admin actions from any IP address. This setting allows organizations to ensure that company administrators are using an approved IP address when performing admin actions via My Syncplicity or via API calls. Ranges of approved IP addresses and a custom error message can be specified. Device- Level Security and Controls Authentication Optional 2- factor authentication. In conjunction with a customer- managed SAML identity provider, customers can distinguish between devices managed by a Mobile Device Management (MDM) solution and non- MDM secured devices by using the MDM to push a client certificate onto the mobile device, enabling 2- factor authentication. o As part of the SAML authentication process, the SAML identity provider should be configured to check for a valid client certificate as well as the user name and password for the user. Devices without the proper certificate will be denied authentication and binding. Customers will need to work with the SAML identity provider and MDM of their choice to perform the proper configuration of this type of authentication. o This works with any MDM solution, not just MDM solutions that have been fully integrated with Syncplicity. MDM delegated authentication. Configure Syncplicity for ios and Android to utilize Good Dynamics for authentication (see Mobile Device Management below). Mobile device passcode. Set an optional four- digit passcode that is required for access to Syncplicity on mobile devices. Failure to type the correct code 10 times will result in the account and all files being permanently deleted from the device. 12

13 Access Policies Client desktop Active Directory restriction policy By default, Syncplicity allows users to register any computer with their account and start synchronizing folders. This policy setting restricts access to the Syncplicity service to computers that are joined to specified Active Directory domains. Website access policy - By default, Syncplicity allows users to access their account in a web browser. Such access gives users the ability to view their news feed, browse and download files, change their personal information, deactivate computers, and perform other actions. This policy setting allows organizations to restrict access to the website only to computers that have been authorized to run the Syncplicity client and ensures the website can only be launched directly from the client using the "Browse to My Syncplicity" link. This policy setting is useful especially in conjunction with the "Active Directory Restriction Policy" to restrict access to Syncplicity from public kiosks. Mobile application access policy - By default, Syncplicity allows users to access their account using Syncplicity's native mobile applications for iphone, ipads, and ipod Touch. Such access gives users the ability to view their news feed, browse and download files, and perform other actions. This policy setting prevents users from connecting to their Syncplicity accounts from their mobile devices. If the policy is set to Access from Syncplicity s native mobile applications is restricted, no users within the organization will be able to use Syncplicity s mobile apps including all users who are already using a mobile app. This policy does not affect the ability of users to access their accounts via mobile web browsers. Website access is controlled through the website access policy. Concurrent Use Restriction - Administrators can define what measures Syncplicity should take when concurrent use of a device from multiple locations is detected. Admins can disable a user, block user transactions, send an notification to both the user and administrators or send an to administrators only. Concurrent use of a device from multiple locations can indicate that an account is being accessed by another user and therefore compromised. Encryption Encryption at rest on mobile devices. Unlike our competition, files are encrypted at rest on mobile devices using AES 256- bit encryption. Customers using MDM integration with Good Technology leverage a FIPS certified container. Encryption at rest on Windows and Mac. Syncplicity does not offer native encryption on desktops. However, organizations that implement hard- drive encryption or other endpoint encryption services may use the Syncplicity client with no negative disruptions. Administration Device remote wipe policy. Set a policy for what happens to files when a device is removed from a user account. Files can be left on devices or permanently remote- wiped from those devices automatically. 13

14 Mobile synchronization policies. Control the sync process to better manage mobile devices and enforce security standards o Mobile device synchronization policy. Enable or restrict push synchronization to mobile devices o Android SD card synchronization policy. Enable or restrict Android users from saving Syncplicity files on an SD card o Mobile synchronization limits. Set file size limits for mobile push synchronization o Mobile sync settings (Wi- Fi or wireless). Determine whether mobile push synchronization will work over Wi- Fi and/or wireless connections Registration wizard configuration Determines whether the user is given the option to configure folders to synchronize and share or to skip user configuration and only use the administrator preconfigured folders and shares Client Update Policy From time- to- time, new releases of the Syncplicity client are made available with the latest functionality, bug fixes, and performance improvements. This determines whether all installed clients within the company will prompt users to upgrade for any update, required updates, or no updates. Mobile Device Management Syncplicity for Good ios and Android is a MDM- enabled mobile app that provides easy, secure sharing of corporate data while remaining compliant with IT policies in organizations utilizing Good Dynamics. Protect corporate information in transit and at rest with a FIPS- compliant container using AES 256- bit encryption Apply granular application data controls without reducing mobile worker productivity Support strong password policies for mobile app access without requiring strong password policies to access the device Enforce OS and mobile app version requirements Detect jail- broken devices upon application launch Prevent data leakage from mobile apps Enable remote revocation of app access and remote data wipe Separate mobile app data from personal data, respecting user privacy 14

15 Folder- Level Security and Controls Folder Sharing External folder sharing policy. Set a policy that determines if users can share folders with users that are not in the corporate Syncplicity account Shared folder permissions. Set permissions on folders that are shared to other users. o Owner permission. Users who initially create a folder automatically receive owner permission. Owners can share folders with other users (except for sharing with external users if external sharing is disabled) and set sharing permission level. Owners can never permanently lose data if other users delete a file or folder. o Editor permission. Collaborators have read/write access to all files in a shared folder. If a user with editor permission deletes a file in a folder, that deletion is propagated to all users. o Reader permission. Readers can read a file in a shared folder. If a user with reader permission deletes a file in a shared folder that deletion is not propagated to other users. This is a critical feature that enables organizations to push content to large groups of mobile users without losing data. Folder permission propagation. Users can only share a folder with another user using the highest permission level that they have been granted. Users with reader permission can only share a folder to another user and give them reader permission. This is a critical feature that enables organizations to push content to large groups of mobile users without losing control of the shared files. Folder share naming convention. Determines whether a share name always has the name of the owner of the shared folder appended to the folder name. This is useful for avoiding confusion in situations such as where multiple users may share different folders but name each the same such as project folder. Folder Data (File) Protection Folder retention (remote wipe) policy Determines whether files and folders are automatically deleted from a user s devices and cloud applications when he or she loses access to a folder. When access to a folder is lost, a folder retention policy determines whether the user will continue to have access to files and folders already downloaded or synced to their devices and cloud applications. Any new folder retention policy will automatically take effect for all unshared operations performed after the change is set. Under the retention section, there are two policies: o When a user is removed from a shared Syncplicity folder, leave a copy of the folder on the user s computers and devices. If this policy is selected, after a user s access to a shared folder is removed, that folder and any downloaded or synchronized files will no longer synchronize but will continue to exist on their devices and cloud apps. The user will no longer have access to the folder through the online file browser or on their mobile devices. 15

16 o When a user is removed from a shared Syncplicity folder, permanently delete the folder on all the user s computers and devices. If this policy is selected, after a user s access to a shared folder is removed, that folder and any downloaded or synchronized files will no longer synchronize and any files and sub- folders within that folder will be permanently deleted from their devices and cloud apps. The user will no longer have access to the folder through the online file browser or on their mobile devices. If a device is offline when access is removed, the folder will be wiped the next time the device connects to the Internet. Storage Sets. Gives IT control over which StorageVault Syncplicity uses to store files in a folder. File- Level Security and Controls Encryption File encryption in transit. Encryption of all data in transit, including files, is done through FIPS compliant TLS/SSL protocols via HTTPS. Our native clients use AES- 256 symmetric encryption and RSA for session key generation. Encryption at rest (cloud storage). Files are protected at rest in our data store using 256- bit AES encryption. The encryption keys are stored in a separate dedicated, access- controlled database in the orchestration layer. The encryption keys are stored separately from all user- specific and file attribute information in the orchestration Layer. The encryption keys are not persisted anywhere in the storage layer. Encryption at rest (on- premise storage). As with cloud storage, files are protected at rest using 256- bit AES encryption. Likewise, the encryption keys are stored in a separate data store from all user- specific and file attribute information in the orchestration layer. The encryption keys are not persisted anywhere in the storage layer. With on- premise storage, customers can opt to disable Syncplicity encryption because the data is housed in a private on- site datacenter protected by the enterprise s security controls. Storage Control Certified cloud data centers. Syncplicity cloud storage utilizes SSAE- 16 SOC1 Type II and SOC2 audited data centers and features % data resiliency. On- premise storage via Syncplicity StorageVaults. Choose to store files on premise with EMC Isilon Scale- Out NAS, EMC Atmos Object Storage, or EMC VNX/VNXe (Enterprise Edition only). Leverage your enterprise security controls inside your data center and ensure compliance with data residency and sovereignty requirements. o Your files never reside within our data centers. Files are stored only on your servers and client devices. 16

17 o Configure storage and compute nodes in DMZ for easier external access (Figure 2) or behind firewall to require VPN Access to Syncplicity (Figure 3). o StorageVault Authentication adds an additional layer of security to the on- premise StorageVault so Syncplicity personnel cannot view file contents. No cloud file caching when using on- premise storage. Unlike the competition that uses their cloud layer as a file cache even when using on- premise storage, Syncplicity does not cache files in the cloud. When files move from an on- premise data store, the files move directly to client devices and mobile apps and do not pass through our cloud. Ranked Storage Sets. Gives granular control over which StorageVault Syncplicity uses to store files for users based on group membership or assignment at the folder- level. File Contents Protection Folder remote wipe policy. Set a policy for what happens to files when folder access is removed from the user. Files can be left on devices or permanently remote- wiped from those devices automatically. Shared link policies. Syncplicity gives users and admins several security controls for sending shared links. o Restrict recipient access. You may restrict access to a shared file to only the recipient(s) you specify. This way, if someone forwards a link to an unauthorized recipient, that recipient cannot download the file. Of course, you can still create public shared links if your organizational policy allows it. o Require a password to access documents. Require recipients to enter a password to access a shared link. o Download tracking. Users can view who has downloaded the shared files, how many times they have been downloaded, and when they were last downloaded. o No file size restrictions. No matter whether you use cloud storage or on- premise storage, there are no file size limitations. Shared links give IT the control they need to secure company files. o Set link expirations. Set a company- wide policy to automatically expire links after a specified timeframe o Require restricted access. Set a policy to require users to restrict access to authorized recipients and not allow public shared links o Require passwords. Ensure that users cannot create a shared link without requiring a password o Set password policies. Set a company- wide policy for password strength o Monitor usage. Audit and track file download activity via Syncplicity s file, folder, and user reports 17

18 Secure Shared Files (Rights Management) Assign rights management policies such as access controls, watermarks, and print controls that apply to a file no matter where it is moved after downloading from a Secure Shared Link. Mobile Open In Restriction Policy. Protect files from being opened in third- party applications, where they could be stored in a device/application cache (outside the Syncplicity secure container) or uploaded to another cloud storage provider outside of IT control. Data retention policies. Configure how long file versions and deleted files are retained in user accounts based on number of versions, file age, or custom logic. Default is 30 days. Active file retention policies. Set timeframe for deleting unmodified active files based on your compliance and enterprise risk management mandates. Deleted files are subject to data retention policies or can be expunged immediately. Administrators can run reports to see files pending deletion in the next 60 days. Customer administrators should use this policy with caution. Enable/disable news feed via RSS. RSS is a popular way to subscribe to frequently changing content on the web and have such content automatically delivered to you in a variety of convenient ways. When you enable this feature on My Syncplicity, your users will be able to obtain a secure link to their Syncplicity News Feed and enter that link into applications like Microsoft Outlook. Once there, Outlook and Reader will periodically download the Syncplicity News Feed and present it to the user in a familiar, easy- to- use interface. Without RSS, users would instead have to log into My Syncplicity manually to find out what s been happening inside their Syncplicity folders. Administration File type exclusions. Configure Syncplicity to not synchronize certain file types for storage and security reasons Branching policy - When two (or more) Syncplicity users edit the same file at the same time, Syncplicity immediately detects the conflict and stores both versions safely online. By default, Syncplicity will also create a new file for each conflicting version to help users properly resolve the conflict, either by merging the two versions together or picking one as the final authoritative version. If you disable this feature, Syncplicity will instead use the version uploaded most recently as the final authoritative version. 18

19 Reporting and Monitoring Storage usage dashboard. Get a snapshot of storage use (active, history, and deleted files) so you can monitor overall usage Storage by file type. Determine what types of files consume your storage resources o See which files are consuming the most storage across three categories: active files, previous file versions, and deleted files o Filter reports using a specified comma separated list of file type extensions o Display reports for the entire organization or a single user o Detect acceptable use violations that may subject the organization to legal or compliance risk User storage by file type. With this report admins can identify file usage patterns by individual user. o Shows which users are consuming the most storage by file type o Displays total storage consumed and consumption by active files, previous versions, and deleted files o Supports adherence to acceptable use policies o Enables more efficient use of network bandwidth and storage resources Storage utilization reports. View storage or bandwidth by all users, active users, disabled users, or individuals to better understand consumption patterns and distribute IT costs. o Identify power users and share their tips and tricks with other groups to increase adoption o Distinguish between active/inactive files and active/disabled users to adjust policies o Inform planning, policy. and purchase decisions by spotting usage trends o Download user details to charge back costs to departments 19

20 User access reports. Audit a user, a folder, or a file and see who had access from what device and what was done o Help users retrace their actions and find or restore a folder or file o Meet compliance requirements for tracking changes and access to a file or folder o Protect critical company files with a view into actions taken on special documents Administrator Action Report. For a specified date range each administrator action is listed with details on who performed the action, from which device and IP address, the date and time the action was performed, and what was changed. Report access. Gain easy access to reports data o Export any of the reports into a CSV file that is automatically saved to your administrator Syncplicity Reports folder o Automatically generate reports into Syncplicity reporting folders for access by admins o Reporting folders: With Syncplicity s reporting folders policy, admins can keep reports organized while controlling access to report information. Automatically place each report type in its own folder Establish sharing permissions for folders to protect sensitive information Enable report folders to be synced to any device Quickly review, change, or expire policies through the admin console 20

21 Third- Party Security Testing We conduct third party application security assessments of our applications as part of our SDLC. The assessment methodology includes whitebox and blackbox testing. Assessments address the following areas of concern: All applicable issues covered by OWASP Top 10, SANS Top 20, and other standards General application architecture issues SQL injection Cross- site scripting (XSS) Session management vulnerabilities Access control Server path manipulation and traversal (files, directories, etc.) Use of encryption Application related denial of service Sensitive information exposure Platform (public vulnerabilities) and configuration vulnerabilities 21

22 Privacy Certifications and Compliance Syncplicity cloud storage and orchestration layers utilize SSAE- 16 SOC1 Type II, SOC2, and SOC3 audited data centers. Syncplicity cloud storage and orchestration layers utilize ISO audited data centers. HIPAA Syncplicity has the necessary controls and safeguards to securely handle protected health care information (PHI) on behalf of our customers. The Federal Information Processing Standard (FIPS) Publication is a U.S. government security standard that specifies the security requirements for cryptographic modules protecting sensitive information. To support customers with FIPS requirements, Syncplicity VPN endpoints operate using FIPS validated hardware. The U.S. Department of Commerce, in concert with the European Commission, developed a Safe Harbor Framework that allows U.S. organizations to comply with the Directive by abiding by a set of Safe Harbor Privacy Principles. Companies certify their compliance with these principles on the U. S. Department of Commerce website. The framework was approved by the EU in 2000 and gives companies that abide by the principles assurance that the EU will consider their practices adequate privacy protections for EU citizens. The Swiss Federal Act on Data Protection (FADP) went into effect in July 1993, followed by important modifications in January The FADP would prohibit the transfer of personal data to countries that do not meet Switzerland s adequacy standard for privacy protection. While the United States and Switzerland share the goal of enhancing privacy protection for their citizens, the United States takes a different approach to privacy from that taken by Switzerland. 22

23 Additional Information For further information on EMC Syncplicity security controls, please request a copy of our Standardized Information Gathering (SIG) questionnaire report. 23

SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX

SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX White Paper SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX Abstract This white paper explains the benefits to the extended enterprise of the on-

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

Ensuring Enterprise Data Security with Secure Mobile File Sharing. A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started

More information

Security Architecture Whitepaper

Security Architecture Whitepaper Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer

More information

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions Choosing a File Sync & Share Solution PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions Agenda File Sync & Share What and Why File Sync & Share How Selection Criteria Q & A Summary 3

More information

Egnyte Cloud File Server. White Paper

Egnyte Cloud File Server. White Paper Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage

More information

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All

More information

Okta/Dropbox Active Directory Integration Guide

Okta/Dropbox Active Directory Integration Guide Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 [email protected] 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

Salesforce1 Mobile Security Guide

Salesforce1 Mobile Security Guide Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

Storgrid EFS Access all of your business information securely from any device

Storgrid EFS Access all of your business information securely from any device Datasheet Storgrid EFS Access all of your business information securely from any device September 2014 2014 STORGRID International Holding BV. This document is created with the utmost care. To prevent

More information

Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst

Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst ESG Lab Review Secure Enterprise Online File Sharing with Syncplicity Date: November 2014 Author: Tony Palmer, Senior Lab Analyst, Aviv Kaufmann, Lab Analyst Abstract: Organizations are challenged in today

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Getting Started with AD/LDAP SSO

Getting Started with AD/LDAP SSO Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM [email protected]

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM [email protected] Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]

More information

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test

More information

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches

Sean Horne CTO EMC UKI. The leakage of Intellectual Property.. .and the risk of Privacy, Trustworthiness, Governance and Data Breaches Sean Horne CTO EMC UKI The leakage of Intellectual Property...and the risk of Privacy, Trustworthiness, Governance and Data Breaches 1 The business of Insurance is guided by Trust Insurance is a promise

More information

Soonr Workplace Enterprise Plan Overview

Soonr Workplace Enterprise Plan Overview This document is an overview of the features that are included in the Soonr Workplace Enterprise Plan. The Enterprise Plan is designed for the specific needs of IT departments in larger companies where

More information

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

ShareFile Security Overview

ShareFile Security Overview ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The

More information

Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration

Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration White Paper Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration This paper focuses on security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support

More information

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide Deliver file sharing and synchronization services using Citrix ShareFile Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Setting up a ShareFile Account... 6

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Kony Mobile Application Management (MAM)

Kony Mobile Application Management (MAM) Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview

More information

An Enterprise Approach to Mobile File Access and Sharing

An Enterprise Approach to Mobile File Access and Sharing White Paper File and Networking Services An Enterprise Approach to Mobile File Access and Sharing Table of Contents page Anywhere, Any Device File Access with IT in Control...2 Novell Filr Competitive

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Leverage Your EMC Storage Investment with User Provisioning for Syncplicity:

Leverage Your EMC Storage Investment with User Provisioning for Syncplicity: Leverage Your EMC Storage Investment with User Provisioning for Syncplicity: Automate and simplify Syncplicity user/group management tasks EMC Global Solutions Abstract Make the most of your existing EMC

More information

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices

Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement

More information

ITAR Compliant Data Exchange

ITAR Compliant Data Exchange ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

Secure and control how your business shares files using Hightail

Secure and control how your business shares files using Hightail HIGHTAIL FOR ENTERPRISE: SECURITY OVERVIEW Secure and control how your business shares files using Hightail Information the lifeblood of any business is potentially placed at risk every time digital files

More information

How To Secure An Rsa Authentication Agent

How To Secure An Rsa Authentication Agent RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,

More information

How To Protect Your Mobile Devices From Security Threats

How To Protect Your Mobile Devices From Security Threats Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

EMC Data Protection Search

EMC Data Protection Search EMC Data Protection Search Version 1.0 Security Configuration Guide 302-001-611 REV 01 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published April 20, 2015 EMC believes

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Blue Jeans Network Security Features

Blue Jeans Network Security Features Technical Guide Blue Jeans Network Security Features Blue Jeans Network understands an organization s need for secure communications. The Blue Jeans cloud-based video conferencing platform provides users

More information

Comparing Box and Egnyte. White Paper

Comparing Box and Egnyte. White Paper White Paper Revised July, 2013 Introduction File storage in the cloud has broad appeal for individuals as well as large businesses. At a macro level, there are two types of file storage/sharing solutions:

More information

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...

More information

ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators.

ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators. ShareSync from LR Associates Inc. A business-grade file sync and share service that meets the needs of BOTH users and administrators. Overview of ShareSync Easy, intuitive sharing and syncing ShareSync

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Cloud Services MDM. Overview & Setup Admin Guide

Cloud Services MDM. Overview & Setup Admin Guide Cloud Services MDM Overview & Setup Admin Guide 10/27/2014 CONTENTS Systems Overview... 2 Solution Overview... 2 System Requirements... 3 Admin Console Overview... 4 Logging into the Admin Console... 4

More information

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD? BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile

More information

Project management integrated into Outlook

Project management integrated into Outlook Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: October 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com

More information

Manage all your Office365 users and licenses

Manage all your Office365 users and licenses Manage all your Office365 users and licenses Delegate 365 White Paper Authors: Toni Pohl, Martina Grom Version: 1.2 of December 2014 atwork information technology gmbh. All rights reserved. For information

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

WHITE PAPER. Understanding Transporter Concepts

WHITE PAPER. Understanding Transporter Concepts WHITE PAPER Understanding Transporter Concepts Contents Introduction... 3 Definition of Terms... 4 Organization... 4 Administrator... 4 Organization User... 4 Guest User... 4 Folder Hierarchies... 5 Traditional

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Enterprise Mobility as a Service

Enterprise Mobility as a Service Service Description: Insert Title Enterprise Mobility as a Service Multi-Service User Management for Mobility 1. Executive Summary... 2 2. Enterprise Mobility as a Service Overview... 3 3. Pricing Structure...

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

HIPAA Privacy & Security White Paper

HIPAA Privacy & Security White Paper HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 [email protected] Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements

More information

Workday Mobile Security FAQ

Workday Mobile Security FAQ Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy

More information

Introduction to the Mobile Access Gateway

Introduction to the Mobile Access Gateway Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Mobile Admin Security

Mobile Admin Security Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing

More information

Migrating Exchange Server to Office 365

Migrating Exchange Server to Office 365 Migrating Exchange Server to Office 365 By: Brien M. Posey CONTENTS Domain Verification... 3 IMAP Migration... 4 Cut Over and Staged Migration Prep Work... 5 Cut Over Migrations... 6 Staged Migration...

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

RSS Cloud Solution COMMON QUESTIONS

RSS Cloud Solution COMMON QUESTIONS RSS Cloud Solution COMMON QUESTIONS 1 Services... 3 Connectivity... 5 Support... 6 Implementation... 7 Security... 8 Applications... 9 Backups... 9 Email... 10 Contact... 11 2 Services What is included

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Citrix ShareFile Enterprise technical overview

Citrix ShareFile Enterprise technical overview Citrix ShareFile Enterprise technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose new challenges. IT is transitioning from the sole provider of user

More information

Workspot Enables Spectrum of Trust. Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01

Workspot Enables Spectrum of Trust. Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01 Workspot Enables Spectrum of Trust Photo by Marc_Smith - Creative Commons Attribution License http://www.flickr.com/photos/49503165485@n01 Created with Haiku Deck TABLE OF CONTENTS Leadership Team Problem:

More information

Connectivity to Polycom RealPresence Platform Source Data

Connectivity to Polycom RealPresence Platform Source Data Polycom RealAccess Security White Paper The Polycom RealAccess service is delivered using the Software as a Service (SaaS) model. This white paper outlines how the service protects sensitive customer data

More information

Data Protection: From PKI to Virtualization & Cloud

Data Protection: From PKI to Virtualization & Cloud Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security

More information

Generating an Apple Push Notification Service Certificate

Generating an Apple Push Notification Service Certificate www.novell.com/documentation Generating an Apple Push Notification Service Certificate ZENworks Mobile Management 2.6.x January 2013 Legal Notices Novell, Inc., makes no representations or warranties with

More information

What is OneDrive for Business?

What is OneDrive for Business? What is OneDrive for Business? This article is based on public presentations at the Microsoft Ignite event and is not an official Microsoft document and may not represent an official Microsoft position

More information

iphone in Business Security Overview

iphone in Business Security Overview iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

Netwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015

Netwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015 Netwrix Auditor Administrator's Guide Version: 7.1 10/30/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation

More information

Gladinet Cloud Backup V3.0 User Guide

Gladinet Cloud Backup V3.0 User Guide Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

Administering Jive Mobile Apps

Administering Jive Mobile Apps Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native

More information

GoodData Corporation Security White Paper

GoodData Corporation Security White Paper GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share

More information