Connectivity to Polycom RealPresence Platform Source Data
|
|
- Austen Ray
- 8 years ago
- Views:
Transcription
1 Polycom RealAccess Security White Paper The Polycom RealAccess service is delivered using the Software as a Service (SaaS) model. This white paper outlines how the service protects sensitive customer data from unauthorized access. RealAccess provides a subscribing customer access to a dedicated web portal, which includes a broad range of on-demand monitoring and managing of videoconferencing services along with in-depth reporting capabilities. Reports are based on data collected from a customer s Polycom RealPresence Platform and automatically uploaded to the cloud-based RealAccess portal using a data extraction agent installed on the customer s premises. Potential Points of Vulnerability The following potential points of vulnerability with the RealAccess portal are outlined in this white paper: Connectivity to Polycom RealPresence Platform source data Transfer of customer data over the Internet to the RealAccess data store Storage of information on the RealAccess cloud-based database server Display and delivery of information between the RealAccess portal and end users via web browsers User authentication to access information Connectivity to Polycom RealPresence Platform Source Data The RealAccess agent gathers data from various RealPresence Platform sources and transports it to the RealAccess data store. The following diagram is an overview of the security provided by RealAccess. August A 1
2 RealAccess software agent The agent is an instance operating as a virtual machine. The agent s OS has been hardened with the latest security patches, best practices for software configurations, and the removal of unnecessary services. Additionally, the OS security has been verified using security scan tools, including Nessus, Nexpose, and Nmap, as well as manual testing. The agent resides in the customer s DMZ, with access to the cloud and the RealPresence Platform component(s) on the customer s RealPresence video network. The agent has only one login for administrative access by the Polycom administrator. There is a service on the agent that uses device-specific credentials to make API calls on specific ports to access data from sources such as call servers (Polycom RealPresence Distributed Media Application (DMA )), scheduling and provisioning servers (Polycom RealPresence Resource Manager), and media controllers (MCU). While accessing these devices, all credentials are encrypted via https tunnel using TLS with 256-bit encryption. The agent does not store data collected from the RealPresence Platform in any shape or form (cache or storage) in its archives. If you would like to perform penetration testing of the agent prior to deployment, contact your Polycom Representative for more information. Transfer of Customer Data Over the Internet to the RealAccess Data Store The next step in the data delivery process is to transport and deposit customer data to the RealAccess data store, located in an SSAE 16 Type II certified data center. All communication with the RealAccess Polycom, Inc. 2
3 agent and data store is via an OpenVPN tunnel. Any attempt to monitor the link between the agent and data center servers will only show encrypted data packets instead of cleartext information. All maintenance activities, OS patching, code updates, and NTP time synchronization for the agent are handled via this OpenVPN tunnel from the data center. Storage of Information on the RealAccess Cloud-Based Database Server The RealAccess database server is located in an SSAE 16 Type II certified data center that runs dedicated databases and application servers. When the RealAccess database server receives data from the customer, it is verified for integrity, processed, and saved onto the database. The RealAccess database and application servers reside in the data center behind a fully patched Check Point firewall. Access for any services not required by RealAccess is blocked. Each customer s data resides in the multitenant system and is compartmentalized using access controls to provide data isolation between RealAccess customers. Servers are located in a secure data center, with only authorized data center staff members having access. The servers are not directly accessible from outside the data center, and all customer data is backed up on a daily basis. Customer data is encrypted at rest and will be anonymized upon customer request at the end of a subscription. The anonymization process includes and is not limited to searching and sanitizing all customer-specific data (such as name, site information, and IP address) with randomly generated alphanumeric characters. Display and Delivery of Information Between the RealAccess Portal and End Users via Web Browsers All communication with the RealAccess portal web servers and client browsers is over a standard secure SSL connection that encrypts all requests and responses. This is achieved with an https connection that uses TLS1.2 with a 256-bit encryption layer of SSL using certificates. This connection is encrypted and authenticated using AES_128GCM with DHE_RSA as the key exchange mechanism. Anyone snooping packets traveling between the web server and the user s browser will only see strongly encrypted data packets. Additionally, thorough penetration tests were conducted using automated and manual methods to ensure that the portal is free of cross-site scripting (XSS), cross-site request forgery (XSRF), and cookie-sniffing vulnerabilities, as well as other security bugs. User Authentication to Access Information User authentication for RealAccess is done two ways. The simplest is to use the authorized customer domain. Users who are part of this domain can use their address to register at the self sign-in portal. They then authenticate themselves with the ed activation link and choose a password. The other way is to use the RealAccess portal authentication service, which supports Active Directory Federation Services (AD FS).With this method, the portal already is set up for single sign-on (SSO) and Polycom, Inc. 3
4 integrated with the customer s active directory via SAML. The user can then use their network credentials to log into the portal. With this method, the user first logs into the portal with their enterprise network credentials. The request is forwarded on a secure https connection that uses TLS1.2 with 256-bit encryption to the customer federation services, which look up the user. The response is then passed to the portal with an allow/deny message. Both authentication methods were tested manually and automatically for security weaknesses using tools such as Burp Suite and AppScan. The following diagram is an overview of the SSO message flow in RealAccess. RealAccess SSO message flow Contact Information For more information, contact your Polycom Representative. Polycom, Inc. 4
5 Copyright 2015, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of Polycom, Inc America Center Drive San Jose, CA USA Polycom, the Polycom logo and the names and marks associated with Polycom products are trademarks and/or service marks of Polycom, Inc. and are registered and/or common law marks in the United States and various other countries. All other trademarks are property of their respective owners. No portion hereof may be reproduced or transmitted in any form or by any means, for any purpose other than the recipient's personal use, without the express written permission of Polycom. End User License Agreement By installing, copying, or otherwise using this product, you acknowledge that you have read, understand and agree to be bound by the terms and conditions of the End User License Agreement for this product. Patent Information The accompanying product may be protected by one or more U.S. and foreign patents and/or pending patent applications held by Polycom, Inc. Open Source Software Used in this Product This product may contain open source software. You may receive the open source software from Polycom up to three (3) years after the distribution date of the applicable product or software at a charge not greater than the cost to Polycom of shipping or distributing the software to you. To receive software information, as well as the open source software code used in this product, contact Polycom by at OpenSourceVideo@polycom.com. Disclaimer While Polycom uses reasonable efforts to include accurate and up-to-date information in this document, Polycom makes no warranties or representations as to its accuracy. Polycom assumes no liability or responsibility for any typographical or other errors or omissions in the content of this document. Limitation of Liability Polycom and/or its respective suppliers make no representations about the suitability of the information contained in this document for any purpose. Information is provided as is without warranty of any kind and is subject to change without notice. The entire risk arising out of its use remains with the recipient. In no event shall Polycom and/or its respective suppliers be liable for any direct, consequential, incidental, special, punitive or other damages whatsoever (including without limitation, damages for loss of business profits, business interruption, or loss of business information), even if Polycom has been advised of the possibility of such damages. Customer Feedback We are striving to improve our documentation quality and we appreciate your feedback. your opinions and comments to DocumentationFeedback@polycom.com. Visit the Polycom Support Center for End User License Agreements, software downloads, product documents, product licenses, troubleshooting tips, service requests, and more. Polycom, Inc. 5
Software 1.1 May 2015 3725-10306-001B SERVICE PORTAL OVERVIEW. RealAccess. Polycom, Inc. 1
SERVICE PORTAL OVERVIEW Software 1.1 May 2015 3725-10306-001B RealAccess Polycom, Inc. 1 Copyright 2015, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another
More informationRealPresence Platform Director
RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director
More informationPolycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6
INTEGRATION GUIDE May 2014 3725-75304-001 Rev B Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved.
More informationGETTING STARTED GUIDE. 1.3 September 2015 3725-10306-001D. Polycom RealAccess
GETTING STARTED GUIDE 1.3 September 2015 3725-10306-001D Polycom RealAccess Copyright 2015, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language
More informationWHITEPAPER. February 2014 3725-77704-001A. RealPresence One. Product Definition and Licensing. Polycom, Inc. 0
WHITEPAPER February 2014 3725-77704-001A RealPresence One Product Definition and Licensing Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced,
More informationPolycom RealPresence DMA 7000 System, Virtual Edition
Getting Started Guide v. 6.1.2 October 2014 3725-76312-001B Polycom RealPresence DMA 7000 System, Virtual Edition The Polycom RealPresence DMA 7000 System is also known and certified as the DMA System.
More informationPolycom RealPresence DMA 7000 System, Virtual Edition
Getting Started Guide v. 6.1 June 2014 3725-76312-001A Polycom RealPresence DMA 7000 System, Virtual Edition Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced,
More informationBroadcasting Audio Messages with Group Paging and Push-to-Talk
Broadcasting Audio Messages with Group Paging and Push-to-Talk Feature Profile 62337 Group Paging enables you to broadcast one-way audio announcements to users who are subscribed to a specific page group.
More informationRealPresence Resource Manager System
RELEASE NOTES 8.3.2 March 2015 3725-72100-001 Rev L2 RealPresence Resource Manager System Polycom, Inc. 1 Contents What s New in Release 8.3.2... 3 Release History... 3 Products Tested with this Release...
More informationPortSIP Encryption Relay Server Deployment Guide
SOLUTION GUIDE Wave 3 Nov 2015 2998-000606-003 Rev A PortSIP Encryption Relay Server Deployment Guide 1 Copyright 2015, All rights reserved. No part of this document may be reproduced, translated into
More informationSyslog on Polycom Phones
Syslog on Polycom Phones Syslog is a standard for logging data and forwarding log messages in an IP network. You can use syslog to manage and secure devices, and to generate informational, analytic, or
More informationRealPresence Media Manager Blackboard Learn 9.1 Learning Management System Integration Guide
INTEGRATION GUIDE Software 6.5 September 2013 3725-75322-002 Rev A RealPresence Media Manager Blackboard Learn 9.1 Learning Management System Integration Guide RealPresence Media Manager Blackboard Learn
More informationDevice Certificates on Polycom Phones
Feature Profile 37148 Device Certificates are an important element in deploying a solution that ensures the integrity and privacy of communications involving Polycom UC Software devices. Device Certificates
More informationUsing Multiple Appearance Directory Number - Single Call Appearance with Polycom Phones
Using Multiple Appearance Directory Number - Single Call Appearance with Polycom Phones Feature Profile 83102 Multiple Appearance Directory Number Single Call Appearance (MADN-SCA) enables multiple phone
More informationInformation on Syslog For more information on syslog, see RFC 5424. Released: December 2006 Interoperability issues: None. Table 1: Syslog at a Glance
Syslog on Spectralink 84-Series Handsets Syslog is a standard for logging data and forwarding log messages in an IP network. You can use syslog to manage and secure devices, and to generate informational,
More informationUsing Premium Automatic Call Distribution for Call Centers
Using Premium Automatic Call Distribution for Call Centers Feature-synchronized Automatic Call Distribution (ACD) enables organizations to manage a large number of phone calls on an individual basis. ACD
More informationPolycom RealPresence Access Director System
RELEASE NOTES Version 4.2 June 25, 2015 3725-78700-001F1 Polycom RealPresence Access Director System Polycom, Inc. 1 Polycom RealPresence Access Director System Release Notes Version 4.2 Contents What
More informationPolycom RealPresence DMA 7000 System
6.1 June 2014 3725-77312-001B Polycom RealPresence DMA 7000 System Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format,
More informationUsing Feature Synchronized Automatic Call Distribution with Polycom Phones
Using Feature Synchronized Automatic Call Distribution with Polycom Phones Feature Profile 57216 Feature synchronized Automatic Call Distribution (ACD) enables organizations to manage a large number of
More informationGetting Started Guide Polycom RealPresence Resource Manager System, Appliance Edition
Getting Started Guide Polycom RealPresence Resource Manager System, Appliance Edition 8.2.0 July 2014 3725-72102-001G Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be
More informationDell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
More informationCustomizing the Display Background on Polycom VVX Business Media Phones
Customizing the Display Background on Polycom VVX Business Media Phones Feature Profile 62470 This feature profile provides users, system administrators, and service providers with step-by-step instructions
More informationDeploying Polycom SoundStation IP Conference Phones with Cisco Unified Communications Manager (CUCM)
Document Title Version SOLUTION GUIDE October 2013 1725-40120-002 Rev A Deploying Polycom SoundStation IP Conference Phones with Cisco Unified Communications Manager (CUCM) Polycom, Inc. 1 Copyright 2013,
More informationSecurity Slots on Polycom SoundPoint IP, SoundStation IP, SoundStation Duo and VVX Series Phones
Security Slots on Polycom SoundPoint IP, SoundStation IP, SoundStation Duo and VVX Series Phones Have you ever needed to lock a phone down so it couldn t be removed? On certain Polycom phone models, you
More informationDeploying and Configuring Polycom Phones in 802.1X Environments
Deploying and Configuring Polycom Phones in 802.1X Environments This document provides system administrators with the procedures and reference information needed to successfully deploy and configure Polycom
More informationSupporting the Calendar, Instant Messaging, and Presence Features on Polycom Phones
Supporting the Calendar, Instant Messaging, and Presence Features on Polycom Phones This engineering advisory shows you how to integrate Microsoft Outlook, Microsoft Office Communication Server 2007 R2,
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
More informationUsing the Unified Call Appearance List
Feature Profile 72634 Using the Unified Call Appearance List Polycom UC Software Update With the release of Polycom UC Software 4.x, Polycom has updated the phones with the unified call appearance list
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
More informationUsing Feature Synchronized Automatic Call Distribution with Polycom Phones
Using Feature Synchronized Automatic Call Distribution with Polycom Phones Feature-synchronized Automatic Call Distribution (ACD) enables organizations to manage a large number of phone calls on an individual
More informationEngineering Advisory 48152 Power Consumption and Management on Polycom Phones
Consumption and Management on Polycom Phones This engineering advisory shows detailed information about the power consumption and management of the Polycom SoundPoint IP desktop phones, Polycom SoundStation
More informationSecurity Advisory Relating to OpenSSL Vulnerability Heartbleed on Various Polycom Products
SECURITY BULLETIN CVE-2014-0160 Version 1.12 Security Advisory Relating to OpenSSL Vulnerability Heartbleed on Various Polycom Products DATE PUBLISHED: This information applies to all Polycom products
More informationDell One Identity Cloud Access Manager 7.0.2. Installation Guide
Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationUsing Enhanced Feature Keys and Configurable Soft Keys on Polycom Phones
Using Enhanced Feature Keys and Configurable Soft Keys on Polycom Phones This feature profile provides detailed information on how to set up Enhanced Feature Keys (EFK) and Configurable Soft Keys on Polycom
More informationCopyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
More informationDell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
More informationUsing custom certificates with Spectralink 8400 Series Handsets
Using custom certificates with Spectralink 8400 Series Handsets This technical bulletin explains how to create and use custom certificates with the Spectralink 8400 Series Handset. This technical bulletin
More informationPolycom Unified Communications in RealPresence Access Director System Environments
Solution Deployment Guide Version 4.1 December 2014 3725-78704-001E Polycom Unified Communications in RealPresence Access Director System Environments Copyright 2014, Polycom, Inc. All rights reserved.
More informationSecurity Advisory Relating to Multiple OpenSSL Vulnerabilities on Various Polycom Products.
SECURITY BULLETIN - Multiple CVEs Relating to OpenSSL Bulletin Version 1.2 Security Advisory Relating to Multiple OpenSSL Vulnerabilities on Various Polycom Products. DATE PUBLISHED: This information applies
More informationHow To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
More informationPolycom Unified Communications in RealPresence Access Director System Environments
Solution Deployment Guide Version 4.0 June 2014 3725-78704-001D Polycom Unified Communications in RealPresence Access Director System Environments Copyright 2014, Polycom, Inc. All rights reserved. No
More informationPolycom RealPresence Resource Manager System
Offer of Source for Open Source Software 8.3.0 December 2014 3725-72108-001D Polycom RealPresence Resource Manager System Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may
More informationManaging for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
More informationPolycom CMA System Upgrade Guide
Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or
More informationPolycom VVX 300, 310, 400 and 410 Business Media Phone
ADMINISTRATORS GUIDE Software 4.1.4 March 2013 1725-49091-401 Rev A Polycom VVX 300, 310, 400 and 410 Business Media Phone Addendum to the Polycom UC Software 4.1.0 Administrators Guide i Polycom VVX 300,
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationHow to Provision a Polycom Phone
Provisioning Guide How to Provision a Polycom Phone This guide shows you how to provision a Polycom phone with the minimum settings required to place and receive Voice over Internet Protocol (VoIP) calls
More informationBroadcasting Audio Messages with Group Paging and Push-to-Talk
Broadcasting Audio Messages with Group Paging and Push-to-Talk Group Paging enables you to broadcast one-way audio announcements to users who are subscribed to a specific page group. Push-to-Talk (PTT)
More informationInstalling Software and Options for Polycom HDX Systems and Accessories. Overview. Polycom HDX System and Options. Polycom Touch Control
Installing Software and Options for Polycom HDX Systems and Accessories By upgrading your Polycom software or by purchasing additional system options, your organization continues to benefit from the latest
More informationPolycom RealPresence Access Director System
Release Notes 3.1 January 2014 3725-78700-001C Polycom RealPresence Access Director System Polycom announces the release of the Polycom RealPresence Access Director system, version 3.1. This document provides
More informationDell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview
Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview May 2015 Overview Functional highlights Functional details Legal notices Overview Support for Dell SonicWALL malware detection
More informationSoftware Development Kit (SDK)
QUICK START GUIDE UC Software 5.3.0 May 2015 3725-49126-001A Software Development Kit (SDK) Polycom, Inc. 1 Copyright 2015, Polycom, Inc. All rights reserved. No part of this document may be reproduced,
More informationUsing Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group
Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott
More informationDell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within
More informationPolycom RealPresence Resource Manager System Getting Started Guide
[Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 8.0 August 2013 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and marks
More informationMobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition
Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED 1 Background Traditionally, security has not been a high priority for e-learning; as such content was hosted and only accessible at the
More informationDell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationSecure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012
Secure Installation and Operation of Your Xerox Multi-Function Device Version 1.0 August 6, 2012 Secure Installation and Operation of Your Xerox Multi-Function Device Purpose and Audience This document
More informationA POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications
Polycom Recommended Best Security Practices for Unified Communications March 2012 Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective,
More informationXerox Mobile Print Cloud
Xerox Mobile Print Cloud Information Assurance Disclosure Software Version 3.0 May 2015 702P03595 2013-2015 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationStrong Authentication for Juniper Networks
Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright
More informationSERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
More informationUsing Polycom VVX Business Media Phones with Microsoft Lync Server 2013
Using Polycom VVX Business Media Phones with Microsoft Lync Server 2013 Feature Profile 84538 Microsoft Lync on Polycom VVX business media phones enables you to communicate with customers, colleagues,
More informationSecurity Advisory Relating to OpenSSL Vulnerability Heartbleed on Various Polycom Products
SECURITY BULLETIN CVE-2014-0160 Version 1.7 Security Advisory Relating to OpenSSL Vulnerability Heartbleed on Various Polycom Products DATE PUBLISHED: This information applies to all Polycom products using
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationIBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
More informationCisco UCS Director Payment Gateway Integration Guide, Release 4.1
First Published: April 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883
More informationIntegration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
More informationHow To Use A Presence Desktop On A Pc Or Mac Or Ipad (For A Non-Profit) For Free
Help 3.3 December 2014 3725-69930-004/A Polycom RealPresence Desktop for Windows Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language
More informationWhite Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
More informationS E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
More informationDell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationTesting and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July
More informationQuick Install Guide. Lumension Endpoint Management and Security Suite 7.1
Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
More informationOVERVIEW. DIGIPASS Authentication for Office 365
OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility
More informationMitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
More informationSecurity FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
More informationXerox Mobile Print Cloud
September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United
More informationCase Study. Microsoft Azure Cloud Migration For Idea Management Tool. Microsoft Azure. www.elegantmicroweb.com
Microsoft Azure www.elegantmicroweb.com ISO 9001:2008 Elegant MicroWeb Technologies Pvt. Ltd. A-305, Shapath - IV, Opp. Karnavati Club, SG Highway, Ahmedabad-380051 India Email: info@elegantmicroweb.com
More informationPolycom RealPresence Cloud
FREQUENTLY ASKED QUESTIONS Software 1.0 July 2015 3725-20316-001A Polycom RealPresence Cloud Copyright 2015, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into
More informationQLIKVIEW MOBILE SECURITY
QLIKVIEW MOBILE SECURITY QlikView Technical Brief Published: March, 2011 qlikview.com QlikView Mobile Security Mobile devices are convenient, versatile and, for many employees, they are indispensable.
More informationPRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
More informationAzure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note
KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies
More informationContents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationTechnical Bulletin 5844
SIP Server Fallback Enhancements on Polycom SoundPoint IP, SoundStation IP, and VVX Phones This technical bulletin provides detailed information on how the SIP software has been enhanced to support SIP
More informationThe Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
More informationIntunex Oy Skillhive Service Description 1 / 6
Intunex Oy Skillhive Service Description 1 / 6 About Skillhive Skillhive is a social business application designed for connecting and sharing expertise within organizations. Skillhive enables employees
More informationIntegration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationOracle Hospitality OPERA Cloud Services Security Guide Release 1.20 Part Number: E69079-01. April 2016
Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 Part Number: E69079-01 April 2016 Copyright 2016, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationOrganized, Hybridized Network Monitoring
Organized, Hybridized Network Monitoring Use a combination of technologies and organizational techniques to master complex network monitoring Abstract In the world of network monitoring, you re basically
More informationXerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations
Xerox FreeFlow Digital Publisher Information Assurance Disclosure Onsite, Cloud and epublishing Configurations May 2016 2016 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks
More informationDell Statistica. Statistica Document Management System (SDMS) Requirements
Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationNew Security Features
New Security Features BlackBerry 10 OS Version 10.3.2 Published: 2015-06-08 SWD-20150608104314635 Contents About this guide... 4 What's new... 4 NFC smart card support... 5 OCSP stapling support in the
More informationQuest Collaboration Services 3.6.1. How it Works Guide
Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationHOTPin Integration Guide: Google Apps with Active Directory Federated Services
HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
More informationRelease Notes for Version 1.5.207
Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4
More informationStrong Authentication for Juniper Networks SSL VPN
Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More information