KEYWORDS: PEAS, MACINTOSH, MACS, LAPTOPS, ENCRYPTION, INVENTORY, APPLE, ASSET
|
|
- Arlene Hodge
- 8 years ago
- Views:
Transcription
1 Standards: IT Asset Management Standards for Apple Macintosh Products (EISS- 8d.1) Business Unit: Information Security and Privacy Office Policy Reference: IT Asset Management Policy (EISP-8.1) Effective Date: 08/01/2015 Last Update: N/A KEYWORDS: PEAS, MACINTOSH, MACS, LAPTOPS, ENCRYPTION, INVENTORY, APPLE, ASSET PURPOSE: In accordance with the Enterprise Information Security Program (EISP-5.1), devices are required to comply with all Enterprise Information Security Policies, applicable Enterprise Security Standards, (e.g. Enterprise IT Acquisition, SDLC and Maintenance Standards and Enterprise IT Asset Management Standards) and Enterprise Security Procedures. Partners Enterprise Apple Support (PEAS) is the standard support model for Apple Macintosh devices within the Partners HealthCare community. This standard applies to Partners HealthCare, its institutions, workforce, employees, researchers and contractors of Partners HealthCare or a Partners HealthCare Institution. Key to this program is the ability to facilitate compliance with federal and state regulations, and Partners HealthCare policies. Requirements have been organized for ease of use into the following areas: 1. Standard Use 2. Standard Environment 3. Standard Access Rights 4. Standards for Data Capture These standards were developed in alignment with the NIST Control Families. STANDARDS: 1. Standard Use 1.1. Partners Enterprise Apple Support (PEAS) is the standard for Apple Macintosh devices within the Partners HealthCare community All institutionally-purchased or owned Apple Macintosh devices must be enrolled in PEAS PEAS is available for personally owned Apple Macintosh devices Any Apple Macintosh device used as their primary work device to conduct Partners HealthCare business must be enrolled in PEAS. NOTE: Any personally owned Apple Macintosh product that connects to Partners network resources is required to comply with Enterprise Information Security Policies, Standards and Procedures. By enrolling personally owned Apple Macintosh products in PEAS, individuals can validate their compliance with all applicable Partners HealthCare Information Security Policies, Standards and Procedures in a simple and standard manner. Pub/Rev: 8/1/2015 Sensitivity: Institutional Page 1 of 5
2 2. Standard Environment 2.1. PEAS standard implementation consists of a client-server infrastructure composed of a central inventory and policy server, and an end-user client. 3. Standard Access Rights are provided as follows: 3.1. PEAS Enterprise Administrators: Access to the full administrative console is restricted to members of the PEAS team. These administrators have visibility to all data and may modify policies according to Institutional guidelines, initiative, or policies PEAS Site Administrators: Access to read and update inventory of only their departments Macs. Site Administrators do not have access to other inventory. Site Administrators have the ability to develop policy specific to their department devices. Only PEAS Enterprise Administrators can implement policies Partners HealthCare Information Security Officers: Read-Only access is granted to inventory and reporting features. This group cannot modify policies Partners Enterprise Research Infrastructure and Services (ERIS): Access to a limited subset of data is granted to ERIS technicians for troubleshooting and inventory purposes. This group has access to view and update inventory data. This group cannot modify policies. 4. Standards for Data Inventory. The following list comprises the current state of collection for data capture. Partners HealthCare may update data elements collected in order to address operational or security initiatives. This document will be updated periodically to reflect changes to data collection practices Device Information captured by PEAS functionality: Computer name PEAS Site (for departmental purposes customizable per department) Last inventory update (based on polling of client) Last check-in date (last time the client contacted the server) IP address Software version (client software version) Managed or Unmanaged (for removing retired systems) Last enrollment date MDM capabilities Software computer ID (ID assigned by server) Asset Tag Bluetooth low energy capable Time Machine encryption status Time since boot 4.2. Hardware information captured by PEAS functionality: Make, Model, Model identifier UDID (unique device ID) Serial number Processor type and number of processors Bus speed Cache size Primary and secondary MAC address Total RAM and available RAM slots Pub/Rev: 8/1/2015 Sensitivity: Institutional Page 2 of 5
3 Battery capacity SMC version (System Management Controller) NIC Speed (Network Interface Controller) Optical drive information, Boot ROM 4.3. Operating System information captured by PEAS functionality: Operating System, OS version, and build number Active Directory status (bound to domain or not) Master password set FileVault users 4.4. Ownership information (populated by PPD and Active directory) captured by PEAS functionality: Partners HealthCare ID (Partners username) Full name address Phone number Job title Department Institution Location (building and room number) 4.5. Purchasing information captured by PEAS functionality Purchased or leased (we do not lease) Purchase order number and date Warranty Expiration date (AppleCare end date) AppleCare ID 4.6. Storage and disk encryption information captured by PEAS functionality: Disk model and revision number Disk serial number Disk drive capacity S.M.A.R.T. status (Self-Monitoring, Analysis and Reporting Technology) Number of disk partitions Partition name(s) and size Percentage of disk in use FileVault 2 state Core storage (Core Storage is a layer between the disk partition and the file system) Partition scheme FileVault 2 partition encryption state Individual recovery key validation Institutional recovery key (if individual recovery key is missing) Disk encryption configuration FileVault 2 enabled users 4.7. Extension Attributes (PEAS custom collected data) captured by PEAS functionality: Adobe Flash Player installed and version number Apple Software updates needed Bash vulnerability patched (ShellShock) Cisco AnyConnect version Current AirPort network (Wifi network) Pub/Rev: 8/1/2015 Sensitivity: Institutional Page 3 of 5
4 EnCase installation (Forensic Client Software) Enterprise Vault installed and version iworm botnet detection Java collection: JRE version, Java Web Plugin and version Patch management enabled (beta program) Patch management group (beta program) PEAS terminator (un-enrollment tool) PGP encryption status and percentage Recovery partition presence Screen-saver timeout SSH Last used date Syncplicity installed and version 4.8. Other information captured by PEAS functionality: Applications - Software collects a list of installed applications in order to provide the correct software through self-service Profiles Example: PEAS pushes a Java VPN hotfix to make VPN work Certificate Inventory No other Keychain Access data is collected User Accounts Local accounts listed on the device (UID, Username, Admin, Admin status, and home directory path) ENFORCEMENT Compliance must be met within 90 days of the effective date of this standard. All Partners HealthCare workforce members and Partners HealthCare Information Systems must comply with enterprise information security policies, standards and procedures unless a variance has been granted per the Information Security Program Policy [EISP-5.1] and supporting standards. In the absence of a Partners HealthCare standard, industry best practices are required. Disregard or failure to comply with Enterprise Information Security and Privacy Policies will be investigated in conformance with established entity procedures. Sanctions will be applied in accordance with Human Resources policies or Medical Staff Bylaws, Rules and Regulations and in accordance with the Breaches of Confidentiality and Information Security Sanctions for Employees and Medical Staff PH-116. REFERENCE: These standards are developed to provide actionable requirements that will reflect compliance with the overarching Enterprise IT Asset Management Policy (EISP-8.1). All Enterprise Information Security Policies, Standards and Procedures are published on Trove. The International Standards Organization (ISO) is a network of the national standards institutes of 148 countries with a Central Secretariat in Geneva, Switzerland, that coordinates the system. More information about ISO can be found at National Institute of Standards and Technology (NIST): Advancing the state-of-the-art in IT in such applications as cyber security and biometrics, the National Institute of Standards and Technology accelerates the development and deployment of systems that are reliable, usable, interoperable, and secure; advances measurement science through innovations in mathematics, statistics, and computer science; and conducts research to develop the measurements and standards infrastructure for emerging information technologies and applications. More information about NIST can be found at Pub/Rev: 8/1/2015 Sensitivity: Institutional Page 4 of 5
5 ATTACHMENTS: There are no attachments to these standards. DEVELOPMENT AND CONSULTATION Enterprise Security Policies are drafted and maintained by Partners Information Security Office and in collaboration with stakeholders including Partners executive management, departmental managers, staff and system owners. Reviewed by: Original Review Date: Revision Approval Dates: Information Security Operating Committee 6/23/2015 Brent Richter, Associate Director Enterprise 6/18/2015 Research Infrastructure and Services (ERIS) Jigar Kadakia, CISPO 7/14/2015 Jim Noga, CIO 7/15/2015 Pub/Rev: 8/1/2015 Sensitivity: Institutional Page 5 of 5
QuickStart Guide for Client Management. Version 8.7
QuickStart Guide for Client Management Version 8.7 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software
More informationHow To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free
Setting Up a Macintosh For Use In The Medical Center The purpose of this document is to provide some assistance and direction to the users of Macintosh computers in The Medical Center network environment.
More informationBest-of-Breed Enterprise Mac Management
White Paper Best-of-Breed Enterprise Mac Management Choose the right tool for the job A decade ago, the Mac was an uncommon sight in many businesses and routinely ignored by corporate IT. Today, more and
More informationCasper Suite Release Notes. Version 9.1
Casper Suite Release Notes Version 9.1 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave
More informationParallels Mac Management v4.0
Parallels Mac Management v4.0 Deployment Guide July 18, 2015 Copyright 1999 2015 Parallels IP Holdings GmbH and its affiliates. All rights reserved. All other marks and names mentioned herein may be trademarks
More informationAdministering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012
Administering FileVault 2 on OS X Lion with the Casper Suite Technical Paper July 2012 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that
More informationEnd User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
More informationAdministering FileVault 2 on OS X Mavericks with the Casper Suite v9.2 or Later. Technical Paper October 2013
Administering FileVault 2 on OS X Mavericks with the Casper Suite v9.2 or Later Technical Paper October 2013 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all
More informationQuickStart Guide for Managing Computers. Version 9.2
QuickStart Guide for Managing Computers Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software
More informationCasper Suite. Security Overview
Casper Suite Security Overview JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave S Suite
More informationMobile Device Security and Encryption Standard and Guidelines
Mobile Device Security and Encryption Standard and Guidelines University Mobile Computing and Device best practices are currently defined as follows: 1) The use of any sensitive or private data on mobile
More informationMobile device and application management. Speaker Name Date
Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more
More informationState of South Carolina Policy Guidance and Training
State of South Carolina Policy Guidance and Training Policy Workshop All Agency Mobile Security July 2014 Agenda Questions & Follow-Up Policy Workshop Overview & Timeline Policy Overview: Mobile Security
More informationTelstra Mobile Device Management (T MDM) Getting Started Guide
Telstra Mobile Device Management (T MDM) Getting Started Guide Welcome Thank you for your interest in T MDM and Welcome! In this guide we will take you through the steps to enrolling your first device
More informationWhy SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?
SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several
More informationGuidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
More informationIntegrating Mac OS X 10.6 with Active Directory. 1 April 2010
Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active
More informationSymantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
More informationA M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various
More informationEnterprise Security with mobilecho
Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come
More informationEasily integrate Mac into Microsoft System Center
Master your Macs in the Business Easily integrate Mac into Microsoft System Center Sascha Uhl Business Development Manager suhl@parallels.com Leader in Cloud Services Enablement and Desktop Virtualization
More informationWindows Phone 8.1 Mobile Device Management Overview
Windows Phone 8.1 Mobile Device Management Overview Published April 2014 Executive summary Most organizations are aware that they need to secure corporate data and minimize risks if mobile devices are
More informationUsing Mac OS X 10.7 Filevault with Centrify DirectControl
Using Mac OS X 10.7 Filevault with Centrify DirectControl August 2011, Revision 2 OS X 10.7's Filevault has the ability to encrypt the entire disk. Full Disk Encryption is compatible with Centrify Active
More informationAn Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
More informationState of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents
More informationApple Security Checklist Companion A practical guide for automating security standards in the Apple Enterprise with the Casper Suite
Apple Security Checklist Companion A practical guide for automating security standards in the Apple Enterprise with the Casper Suite June 2010 JAMF Software, LLC 2010 JAMF Software, LLC. All Rights Reserved.
More informationIntroduction to Cisco Inventory and Reporting
CHAPTER 1 Introduction to Cisco Inventory and Reporting This chapter provides an overview of the Cisco Inventory and Reporting service and covers the following areas: Overview Key Features and Benefits
More informationNew Choices in Windows * Device Management
White Paper 4th Generation Intel Core Processors and Intel Atom Processors Intel and Windows 8.1* Mobility New Choices in Windows * Device Management Considerations in Deciding How to Manage Windows Devices
More informationApps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.
Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying
More informationDeploying. Mac. Five best practices
Deploying Mac Five best practices Deploying Mac Today more than ever, IT teams are looking to support Mac users at work. These five best practices used by medium and large organizations like yours will
More informationAbsolute Manage MDM. John Wu Systems Engineer jcwu@absolute.com
Absolute Manage MDM John Wu Systems Engineer jcwu@absolute.com Saving Time and Money Comprehensive IT Automation Patch Management Software Distribution Software License Management Power Management Asset
More informationSecurity Tool Kit System Checklist Departmental Servers and Enterprise Systems
Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems
More informationSingle Console vs. Best of Breed A position paper looking at two perspectives in choosing a client management system for the Mac OS.
Single Console vs. Best of Breed A position paper looking at two perspectives in choosing a client management system for the Mac OS. March 2009 JAMF Software, LLC 2009 JAMF Software, LLC. All Rights Reserved.
More informationLabTech Mobile Device Management Overview
You are here: Using LabTech > Mobile Device Management > Mobile Device Management Overview LabTech Mobile Device Management Overview Features LabTech mobile device management (MDM) is a fully integrated
More informationApple Client Management with JAMF. Andrew D Huston Client Infrastructure Group Informa8on Services Kent State University
Apple Client Management with JAMF Andrew D Huston Client Infrastructure Group Informa8on Services Kent State University Intro Intro 2011 Kent State University President s Excellence in Action Award Winner
More informationDell Enterprise Mobility Management
Dell Enterprise Mobility Management Comprehensive mobile enablement solution enables your unique mobility/byod strategy Secure the business. Empower the user. It s no secret that employees who use mobile
More informationCounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
More informationBest Practice Document Hints and Tips
Marshal Ltd. Date: 02/06/2007 Marshal EndPoint Security From Best Practice Document Hints and Tips Marshal Software Ltd CSL 005 Marshal EndPoint Security Best Practice (2) Privacy Control: None Version:
More informationSUMMIT ASSET MANAGEMENT DATASHEET
SUMMIT ASSET MANAGEMENT DATASHEET SUMMIT, Symphony SUMMIT, the Symphony SUMMIT logo, and all other Symphony SUMMIT product, brand or service names are registered trademarks or trademarks of Symphony SUMMIT,
More informationAPPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
More informationConfiguring Virtual Blades
CHAPTER 14 This chapter describes how to configure virtual blades, which are computer emulators that reside in a WAE or WAVE device. A virtual blade allows you to allocate WAE system resources for use
More informationMobile Device as a Platform for Assured Identity for the Federal Workforce
Mobile Device as a Platform for Assured Identity for the Federal Workforce Dr. Sarbari Gupta President and CEO, Electrosoft U.S. Army Information Technology Agency (ITA) Security Forum Fort Belvoir Electrosoft
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationUSER GUIDE: MaaS360 Financial IT Reg Enforcement Service
USER GUIDE: MaaS360 Financial IT Reg Enforcement Service 3.2011 Copyright 2011 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software
More informationRSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware
RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware Contact Information Go to the RSA corporate website for regional Customer Support telephone
More informationEndpoint Security VPN for Mac
Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by
More informationUSER GUIDE: MaaS360 Services
USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document
More informationWhitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
More informationIntroduction to Mobile Application Management (MAM)
Introduction to Mobile Application Management (MAM) Overview This guide details how your organization can manage mobile applications using AirWatch's Mobile Application Management (MAM) functionality.
More informationVirtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
More informationKaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
More informationThe Casper Suite An ROI overview
The Casper Suite An ROI overview Introduction Inside Read how the Casper Suite delivers significant ROI in the following areas: Imaging Inventory Software Distribution Patch Management Settings and Security
More informationVirginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Handheld Mobile Device Security Standard This standard is applicable to all VCU School of Medicine personnel.
More informationRebasoft Auditor Quick Start Guide
Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered
More informationwhitepaper Absolute Manage: Client Management Managing Macs in a Windows Environment
Absolute Manage: Client Management Intelligent, Automated, Cross-Platform Management of All Your Computers if you can buy one, and only one set of tools for managing your Mac network, Absolute Manage would
More informationHP Client Automation Standard Fast Track guide
HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation
More informationSupport for the HIPAA Security Rule
WHITE PAPER Support for the HIPAA Security Rule PowerScribe 360 Reporting v2.0 HEALTHCARE 2 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe
More informationSMALL BUSINESS OUTSOURCING
SMALL BUSINESS OUTSOURCING PCs on Lease 24X7 Remote Supports Professional Fees Service Level Agreement SMALL BUSINESS OUTSOURCING (SMO) CONNECTING YOUR BUSINESS TO THE TECHNOLOGY RESOURCES YOU NEED Implement
More informationCOMLINK Cloud Technical Specification Guide CLOUD DESKTOP
COMLINK Cloud Technical Specification Guide CLOUD DESKTOP Updated June 13, 2014 *Subject to Change* Table of Contents 1 Overview of Cloud Desktop 1-2 CloudProtect 1 DataProtect 2 Server Protect 2 Desktop
More informationWHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0
WHITE PAPER Support for the HIPAA Security Rule RadWhere 3.0 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of the RadWhere 3.0 system as part of
More information1 Mobile Device Management
roduct Service Description 1 Mobile Device Management Mobile Device Management (MDM) is the process of monitoring, configuring, and securing mobile devices over-the-air (OTA). Hardware and software technologies
More informationSCADA Cloud Computing
SCADA Cloud Computing Information on Cloud Computing with SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: erik.daalder@nl.yokogawa.com
More informationhttp://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationSOMITS is located in the 1648 Pierce Drive School of Medicine Building, Suite AB51.
School of Medicine Information Technology Services All newly enrolled School of Medicine students are encouraged to visit the School of Medicine s IT office before orientation to obtain help configuring
More informationManaging BitLocker Encryption
Managing BitLocker Encryption WWW.CREDANT.COM Introduction Organizations are facing a data security crisis. Despite decades of investment in security, breaches of sensitive information continue to dominate
More informationHow Microsoft IT manages mobile device management
IT Insights A service of Microsoft IT Showcase How Microsoft IT manages mobile device management July 2015 Bring Your Own Device (BYOD) is no longer just a trend. It is arguably the dominant culture in
More informationMEGA Web Application Architecture Overview MEGA 2009 SP4
Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.
More informationWhite Paper. Support for the HIPAA Security Rule PowerScribe 360
White Paper Support for the HIPAA Security Rule PowerScribe 360 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of the PowerScribe 360 system as
More informationFileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
More informationHow To Write A Mobile Device Policy
BYOD Policy Implementation Guide BYOD Three simple steps to legally secure and manage employee-owned devices within a corporate environment We won t bore you with the typical overview that speaks to the
More informationCharles Firth charles@firthconsulting.com. Managing Macs in a Windows World
Charles Firth charles@firthconsulting.com Managing Macs in a Windows World Prerequisites Familiarity with Windows Active Directory networks Interest in Macintosh OSX integration and support Basic understanding
More informationMac OS X Security Checklist:
Mac OS X Security Checklist: Implementing the Center for Internet Security Benchmark for OS X Recommendations for securing Mac OS X The Center for Internet Security (CIS) benchmark for OS X is widely regarded
More informationRecovering Encrypted Disks Using Windows Preinstallation Environment. Technical Note
Recovering Encrypted Disks Using Windows Preinstallation Environment Technical Note Preface Documentation version Documentation version: 11.0, Release Date: Legal Notice Copyright Symantec Corporation.
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33
ios Security Decoded Dave Test Classroom and Lab Computing Penn State ITS Feedback - http://j.mp/psumac33 Why care about ios Security? 800M 800 million ios devices activated 130 million in last year 98%
More informationSystems Manager Cloud-Based Enterprise Mobility Management
Datasheet Systems Manager Systems Manager Cloud-Based Enterprise Mobility Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, monitoring, and
More informationProof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
More informationEnterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationPatch Management SoftwareTechnical Specs
Patch Management SoftwareTechnical Specs 1. Scalable: a. The PMS (Patch Management Software)must be scalable(can grow as network grows). b. The PMSmust be able to support more than 10k nodes from a single
More informationSecurity for Mac Computers in the Enterprise
Security for Mac Computers in the Enterprise October, 2012 Mountain Lion 10.8 Contents Introduction 3 Service and App Protection 4 Gatekeeper 4 Digital Signatures and Developer IDs 4 App Sandboxing 5 Mandatory
More informationSUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationHands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl
More informationENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS
ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization
More informationSystems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
More informationSymantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
More informationMcAfee Enterprise Mobility Management
McAfee Enterprise Mobility Management Providing mobile application enablement and HIPAA security compliance Table of Contents HIPAA and ephi 3 Overview of 3 HIPAA Compliance for Remote Access 4 Table 1.
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationTABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
More informationMobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
More informationApple Technical White Paper Best Practices for Integrating OS X with Active Directory
Best Practices for Integrating OS X with Active Directory OS X Yosemite v10.10 December 2014 Contents Introduction to directory services support in OS X... 3 OS X and Active Directory... 4 Impact of mobility...
More informationCounterACT 7.0 Single CounterACT Appliance
CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment
More informationAcronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE
Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution
More informationMicrosoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com
More informationXperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment
Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Xperia TM T3 Exchange ActiveSync The my Xperia
More informationRSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
More informationWhat We Do: Simplify Enterprise Mobility
What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable
More informationProgram: Systems Engineering Certificate. Prerequisite: None. Hardware/Software required:
Program: Systems Engineering Certificate Prerequisite: None Hardware/Software required: 1. PC or Mac Any device capable of running remote software. 2. Audio output capable PC so that you can interact with/listen
More information