ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics

Size: px
Start display at page:

Download "ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics"

Transcription

1 MicroStrategy Analytics: Delivering Secure Enterprise Analytics

2 Copyright Information All Contents Copyright 2015 MicroStrategy Incorporated. All Rights Reserved. Trademark Information MicroStrategy, MicroStrategy 6, MicroStrategy 7, MicroStrategy 7i, MicroStrategy 7i Evaluation Edition, MicroStrategy 7i Olap Services, MicroStrategy 8, MicroStrategy 9, MicroStrategy Distribution Services, MicroStrategy MultiSource Option, MicroStrategy Command Manager, MicroStrategy Enterprise Manager, MicroStrategy Object Manager, MicroStrategy Reporting Suite, MicroStrategy Power User, MicroStrategy Analyst, MicroStrategy Consumer, MicroStrategy Delivery, MicroStrategy BI Author, MicroStrategy BI Modeler, MicroStrategy Evaluation Edition, MicroStrategy Administrator, MicroStrategy Agent, MicroStrategy Architect, MicroStrategy BI Developer Kit, MicroStrategy Broadcast Server, MicroStrategy Broadcaster, MicroStrategy Broadcaster Server, MicroStrategy Business Intelligence Platform, MicroStrategy Consulting, MicroStrategy CRM Applications, MicroStrategy Customer Analyzer, MicroStrategy Desktop, MicroStrategy Desktop Analyst, MicroStrategy Desktop Designer, MicroStrategy ecrm 7, MicroStrategy Education, MicroStrategy etrainer, MicroStrategy Executive, MicroStrategy Infocenter, MicroStrategy Intelligence Server, MicroStrategy Intelligence Server Universal Edition, MicroStrategy MDX Adapter, MicroStrategy Narrowcast Server, MicroStrategy Objects, MicroStrategy OLAP Provider, MicroStrategy SDK, MicroStrategy Support, MicroStrategy Telecaster, MicroStrategy Transactor, MicroStrategy Web, MicroStrategy Web Business Analyzer, MicroStrategy World, Application Development and Sophisticated Analysis, Best In Business Intelligence, Centralized Application Management, Information Like Water, Intelligence Through Every Phone, Intelligence To Every Decision Maker, Intelligent E-Business, Personalized Intelligence Portal, Query Tone, Rapid Application Development, MicroStrategy Intelligent Cubes, The Foundation For Intelligent E-Business, The Integrated Business Intelligence Platform Built For The Enterprise, The Platform For Intelligent E-Business, The Scalable Business Intelligence Platform Built For The Internet, Office Intelligence, MicroStrategy Office, MicroStrategy Report Services, MicroStrategy Web MMT, MicroStrategy Web Services, Pixel Perfect, Pixel-Perfect, MicroStrategy Mobile, MicroStrategy Integrity Manager and MicroStrategy Data Mining Services are all registered trademarks or trademarks of MicroStrategy Incorporated. All other company and product names may be trademarks of the respective companies with which they are associated. Specifications subject to change without notice. MicroStrategy is not responsible for errors or omissions. MicroStrategy makes no warranties or commitments concerning the availability of future products or versions that may be planned or under development. Patent Information This product is patented. One or more of the following patents may apply to the product sold herein: U.S. Patent Nos. 6,154,766, 6,173,310, 6,260,050, 6,263,051, 6,269,393, 6,279,033, 6,567,796, 6,587,547, 6,606,596, 6,658,093, 6,658,432, 6,662,195, 6,671,715, 6,691,100, 6,694,316, 6,697,808, 6,704,723, 6,741,980, 6,765,997, 6,768,788, 6,772,137, 6,788,768, 6,798,867, 6,801,910, 6,820,073, 6,829,334, 6,836,537, 6,850,603, 6,859,798, 6,873,693, 6,885,734, 6,940,953, 6,964,012, 6,977,992, 6,996,568, 6,996,569, 7,003,512, 7,010,518, 7,016,480, 7,020,251, 7,039,165, 7,082,422, 7,113,993, 7,127,403, 7,174,349, 7,181,417, 7,194,457, 7,197,461, 7,228,303, 7,260,577, 7,266,181, 7,272,212, 7,302,639, 7,324,942, 7,330,847, 7,340,040, 7,356,758, 7,356,840, 7,415,438, 7,428,302, 7,430,562, 7,440,898, 7,486,780, 7,509,671, 7,516,181, 7,559,048, 7,574,376, 7,617,201, 7,725,811, 7,801,967, 7,836,178, 7,861,161, 7,861,253, 7,881,443, 7,925,616, 7,945,584, 7,970,782, 8,005,870, 8,051,168, 8,051,369, 8,094,788, 8,130,918 and 8,296,287. Other patent applications are pending.

3 Introduction An organization s most precious asset is information. The past, present, and future of a company is captured and stored in its data, holding both lessons learned and the path forward. Information has truly become the fuel that drives business, and ensuring its accuracy and integrity must be a top priority for all organizations. Yet many organizations try to protect their systems with antiquated, 20th century technology. As the rate of cyber-attacks continues to rise, reaching one every 18 seconds, companies are losing time, money, and peace of mind. Cybercrime costs up to $114B per year globally, and no organization is immune. In fact, an estimated 21% of companies are affected by information theft, and 60% of US companies are affected by fraud at least once per year. Information security is a vital concern that every major corporation must take seriously and seek to fully understand. In an effort to capitalize on ballooning amounts of data, organizations are placing it in the hands of more users through more channels than ever before. While this enables data-driven decision making and provides better insight into enterprise activity, it also can make sensitive data more vulnerable. Given recent data breaches across multiple organizations, it s clear that reports, dashboards, and applications containing sensitive information need to be proactively and adequately safeguarded. And with the proliferation of mobile devices in the enterprise, it is critical to ensure the security of these applications, as an unlocked tablet or laptop can expose vital sales pipeline reports or financial statements. In the space of business intelligence (BI) and analytics, the term security is applied broadly to characterize many different features, functions, and practices. This paper will address critical capabilities needed to secure BI and analytics applications and how these are addressed by the MicroStrategy Analytics Platform. It will also describe the need for security via digital authentication and verification, and how MicroStrategy Usher delivers these benefits. The integration of the MicroStrategy Analytics Platform with MicroStrategy Usher, a sophisticated enterprise security platform, offers a real solution to information security threats by adding a layer of identity management to the robust security capabilities already present in MicroStrategy. MicroStrategy Usher replaces traditional physical badges, tokens, and passwords with secure mobile badges. These digital identity badges are stored on a smartphone and allow users to securely access sensitive corporate information and systems at the touch of a button while preventing security breaches commonly associated with password theft. MicroStrategy Analytics Platform Security Designed to ensure the security of valuable enterprise information, MicroStrategy builds on its already-robust security model by adding a layer of identity management. Uniquely positioned at the nexus of analytics, security, and mobility, it addresses a wide variety of security concerns and vulnerabilities that exist in many existing enterprise systems, such as weak authentication capabilities and static access restrictions. MicroStrategy is a comprehensive platform that combines the power of the MicroStrategy Analytics Platform with the security and convenience of MicroStrategy Usher. Figure 1: An Usher Mobile identity badge The MicroStrategy Analytics Platform security model enables the creation of users and groups, giving administrators granular control over the data they can see, the objects they can use, and more. Like most security architectures, the MicroStrategy security model is built around the concept of the user, requiring unique user credentials to access, analyze, and manipulate information. Once logged in, users can perform tasks such as creating objects or executing reports and microstrategy.com 3

4 documents, and can take advantage of all the features they have permission to access. All users created in the MicroStrategy environment are assigned a customizable set of privileges, determining the ability to access and work with various features present in the software. These are they key security features in the MicroStrategy Analytics Platform: Privileges and Permissions. Administrators need to have the ability to specify object-level permissions and privileges. Privileges define the degree of control users have over individual objects in the system, ranging from read-only to full editing control. In the case of a business report containing five columns, Region, City, Revenue, Profit, Cost, a regional analyst may have permission to view only the overview data presented at Region and Revenue level, while the national director can view and modify all five fields in the report, on the basis of their individual permissions. While privileges are assigned to users, permissions are assigned to objects. More precisely, each object has an Access Control List (ACL) that specifies the permissions for different sets of users in relation to that object. This allows organizations to create a single dashboard or report that will present a different view of the data depending on the permissions assigned to the group to which the user accessing it belongs. This is also reflected in capabilities such as drilling across pre-determined paths, sharing content, accessing a data source, and modifying a report. Data View Restrictions. Security filters enable control over the specific subset of rows within a column (such as United States within Country) that users are able to view whenever that column is used. A security filter can be assigned to a user or group, narrowing down the set of results displayed when they execute reports or browse the available objects. The security filter applies to all reports and dashboards, including when filtering on specific attributes. For example, two national brand managers of an international corporation can have different security filters assigned to them: one has a security filter that only shows the data regarding France when the Country column is displayed, while the other only sees data for Germany. If these two national managers run the same report, they will see the same analysis, but display different results based on the subset of Country data to which they have access. Key Benefits of Privileges, Permissions, and Data Views in MicroStrategy: Reusability. All the privileges and permissions created for a user or an ACL are reusable across the analytics environment, significantly cutting down the setup time for each dashboard, document, or report that is developed. Global Application. The security permissions and privileges are global in the MicroStrategy environment, regardless of the access point. This means that any time an administrator makes a change to the permissions and privileges, that change will be immediately reflected in every dashboard, document, or report where those permissions have previously been applied. Database Security. Databases have their own security architectures that provide authentication, access control, and auditing. Users may choose to use these native features to manage access to data, use mechanisms in the MicroStrategy application to manage access to data, or a combination of the two. In addition to the security features that different database management systems offer, MicroStrategy is designed to work with general database security techniques, such as security views and splitting fact tables by rows and columns. Key Benefits of Database Security in MicroStrategy: Reducing Redundancy. The optimization of settings in the database allows administrators to reduce redundancies in how users view data. Restricting access to certain tables or columns in the database means users won t ever have them as an available option, thus preventing the need to create other permissions and privileges in the analytics environment at a later stage. Seamless Integration. MicroStrategy enables administrators to successfully implement general database security techniques, without having to learn and implement a whole new array of methods. Mobile Security. Advancing mobile technology has made mobile device security a vital concern for every organization. Today, companies leverage mobile apps to distribute relevant, critical data to their workforce, partners, and customers. In order to provide an industry-leading, secure mobile app platform, an additional set of capabilities are necessary, including: microstrategy.com 4

5 The encryption of data in transit and at rest. Remote access revocation. Support for certificate server, single sign-on, and credential management. User-level security controls across data and objects. MicroStrategy has invested heavily in developing those features, also extending to native applications and device capabilities including MicroStrategy-designed app-level protection code for Android, Touch ID integration for ios, and several layers of authentication control, providing enterprises with a flexible security architecture strong enough to protect even the most confidential business information. Authentication security User authentication is the gateway to your information and, as such, is often targeted by security threats. As cybersecurity threats become more advanced, traditional authentication tools like usernames and passwords have become increasingly vulnerable. Recently, many of the most publicized data breaches at leading organizations involved the theft of large quantities of user identities, which effectively compromised the integrity of valuable information systems. Key Benefits of Mobile Security in MicroStrategy: Security Continuity. The seamless development of MicroStrategy Analytics and MicroStrategy Mobile means that all the security settings enabled for web access in the analytics environment will also be reflected when users access content on their mobile devices. Device Capabilities. Native device features allow organizations to further enhance the security of their mobile analytics. For example, Touch ID functionality on ios devices allows for biometric-grade access to documents and reports. For more information on MicroStrategy Mobile security, please read the dedicated white paper: MicroStrategy Usher - authentication and access restrictions By integrating tightly with MicroStrategy Usher, the MicroStrategy Analytics Platform introduces a new set of enterprise security features to further protect information and data. Built to address the wide range of vulnerabilities and challenges that have developed in the cybersecurity space, Usher offers features aimed at optimizing the security of user authentication, access restrictions, and information transfer. The user authentication capabilities introduced include: password-free user validation, multi-factor authentication, and Touch ID access. Additionally, MicroStrategy Usher enables administrators to create geographic and time-based restrictions to user access, as well as robust AES-128 GCM Encryption. Usernames and passwords are an antiquated way of securing information in today s rapidly evolving age of information and technology. In an effort to strike a balance between security and user convenience, many organizations only require their employees to change passwords at monthly or quarterly intervals, leaving these credentials as a standing target for long periods of time. Static usernames and passwords represent security vulnerabilities for a number of other reasons too, including users tendency to write down their credentials or share them via . Implementing Usher authentication in a MicroStrategy Analytics environment allows enterprises to remove or reduce the use of static usernames and passwords. MicroStrategy Usher allows administrators to manage user credentials seamlessly across enterprise systems, while eliminating the static element of traditional authentication. A user s identity is stored in their mobile Usher badge, protecting it from the exchange of keys normally experienced in login methods that require users to type out credentials. An alternative factor of authentication, or identity verification method, is used to either substitute or complement the use of usernames and passwords, adding layers of security to information access. microstrategy.com 5

6 The following authentication factors are supported by MicroStrategy: Primary Factor of authentication - QR Code. The primary factor of authentication utilized with the Usher integration is the QR, or Quick Response, code. This type of barcode is a machine-readable optical label, which contains encoded information that can be easily scanned with a mobile device. When attempting to gain access to the MicroStrategy Analytics environment through a web browser, users are presented with a dynamically generated QR code that, when scanned by the Usher Mobile app, will verify a user s identity. The digital Usher badge is used to authenticate access permissions on the Usher Server and will either grant access to the system or deny it. The QR codes are set to expire at 60-second intervals and are subsequently replaced by new ones, protecting the access point from cyber threats. Secondary Factor of Authentication - Dynamic Code. An additional factor of authentication, dynamic codes, can be implemented with MicroStrategy Usher. In order to authenticate their identity, users are prompted to enter a code. These Usher Codes are time-bound, valid only for a preset, configurable time period, with a default setting of 30 seconds, providing unique credentials for any point in time that are associated individually with that badge. After the preset time period expires, each code is refreshed and replaced with a newly generated code. The previous code is rendered invalid and can no longer be used. All Usher Codes are linked to a specific device, enabling the Usher Server to precisely identify the device being used. This architectural design ensures that the security risk associated with stolen Usher Codes is minimal, preventing replay attacks. Biometric Authentication. Biometric capabilities built into Usher Mobile App ensure that only the true owner can use a mobile badge. Various biometric factors are used for identity verification, while sophisticated algorithms are integrated into the security architecture to precisely detect fraudulent techniques, ensuring that mobile identity is always secure. The different authentication factors can be combined to create a multi-factor authentication process for your MicroStrategy Analytics environment. This allows for more checkpoints or verification systems, increasing the overall security and integrity of the MicroStrategy Analytics environment and all the information assets it contains. Mobile Authentication. The benefits of the enhanced user authentication features introduced in the MicroStrategy Analytics Platform via the MicroStrategy Usher integration are also reflected in MicroStrategy Mobile. The authentication methods in mobile access differ slightly from web access of the analytics environment. For example, instead of scanning a QR code, mobile authentication is achieved with the app-switching capability. When a user is presented with an Usher QR code on their mobile device, the smartphone will automatically switch to and then back from the microstrategy.com 6

7 am pm Figure 2: Geographic and time-based access restrictions using Usher with MicroStrategy Analytics Usher app that holds the digital badge once the user identity is verified. Touch ID can also be deployed at the application level and document level with MicroStrategy Mobile. Users are able to authenticate their identity using their verified and stored fingerprint. For example, confidential reports on an executive s MicroStrategy application could be secured by requiring Touch ID verification. Access restrictions Authentication activities that fall outside of predefined and observed patterns can be a sign of occurring or impending fraudulent access to your MicroStrategy environment. Integration with MicroStrategy Usher allows organizations to increase the security of their assets by adding access restrictions that prevent activity outside of expected usage patterns. Access restrictions can be geographic or time-based, only granting access to authorized users attempting to verify their identity if it falls within the accepted time or geographic range. Geo-fencing and time-fencing. Using the MicroStrategy Usher integration, organizations are able to geo-fence assets in the MicroStrategy Analytics Platform, effectively creating a virtual access boundary around a defined real-world geographic area. By setting geographic parameters defining locations in which an asset can be accessed, anomalies and other abnormal authentication requests can be identified and blocked. For example, sensitive sales reports may only be available to senior management while working at headquarters and should not be made available to them on the road. Using the geo-fencing capabilities allows for the creation of a virtual perimeter, set as a radius around the headquarters GPS location, thus limiting access to users that have the correct permissions and are requesting access from within that area. In addition to setting a geographic limit to user access for assets and systems, time-based restrictions are also supported. Much like creating a geographic radius around a specific GPS point, administrators can add a specific time frame for authorized access. For example, a given report might be confidential in nature and should only need to be accessed during official work hours. Timefencing allows the addition of a 9am to 6pm restriction for that specific report, automatically denying any attempts to access it after work hours. The two restriction types, geographic and time-based, can also be combined to limit access to both specific times and locations, establishing an additional security condition that has to be met to gain authorized access. microstrategy.com 7

8 For more information on the security capabilities of the MicroStrategy Usher platform, read the Usher security white paper: microstrategy.com/us/go/usher-security-white-paper. More information on the cybercrime statistics provided in this paper can be found here: More information on the cybercrime statistics provided in this paper can be found here: Frequency of Cyber Attacks: nh.gov/doit/cybersecurity/resources/documents/nl1210-stayingsafe-online.pdf Cost of Global Cybercrime: symantec.com/about/news/release/article.jsp?prid= _02 Percentage of US companies affected by information theft: krolladvisory.com/library/ _global_fraud_report_ Executive_Summary_FINAL.pdf Percentage of US companies hit by at least one fraud a year: krolladvisory.com/library/ _global_fraud_report_ Executive_Summary_FINAL.pdf 1850 Towers Crescent Plaza Tysons Corner, VA Copyright All Rights Reserved. microstrategy.com COLL

MicroStrategy Cloud Reduces the Barriers to Enterprise BI...

MicroStrategy Cloud Reduces the Barriers to Enterprise BI... MicroStrategy Cloud Reduces the Barriers to Enterprise BI... MicroStrategy Cloud reduces the traditional barriers that organizations face when implementing enterprise business intelligence solutions. MicroStrategy

More information

WHITE PAPER Unlock the value of your SFA/CRM system

WHITE PAPER Unlock the value of your SFA/CRM system WHITE PAPER Unlock the value of your SFA/CRM system Leverage analytics and mobile apps to boost sales productivity Table of contents Executive summary Page 4 The four challenges of SFA and CRM systems

More information

Frequently asked questions

Frequently asked questions Frequently asked questions FAQ: MicroStrategy 9s/9.5 General What is MicroStrategy 9s? MicroStrategy 9s combines the world s most sophisticated analytics platform with Usher, a revolutionary security platform.

More information

Enable and Turn on MicroStrategy 9s for Existing Projects. Mox Weber, Suhrud Atre, and Rakesh Arora

Enable and Turn on MicroStrategy 9s for Existing Projects. Mox Weber, Suhrud Atre, and Rakesh Arora Enable and Turn on MicroStrategy 9s for Existing Projects Mox Weber, Suhrud Atre, and Rakesh Arora MicroStrategy World Tracks This Session is Part of MicroStrategy World Track 06: Enterprise BI I Forward-Looking

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

Powerful analytics. and enterprise security. in a single platform. microstrategy.com 1

Powerful analytics. and enterprise security. in a single platform. microstrategy.com 1 Powerful analytics and enterprise security in a single platform microstrategy.com 1 Make faster, better business decisions with easy, powerful, and secure tools to explore data and share insights. Enterprise-grade

More information

WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices

WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices MicroStrategy Mobile App Platform Copyright Information All Contents Copyright 2014 MicroStrategy Incorporated.

More information

Five Keys to Successful Mobile Apps in Wealth Management. Advisors Want An App for That : Helping Them Go Further with Tablets and Smart Phones

Five Keys to Successful Mobile Apps in Wealth Management. Advisors Want An App for That : Helping Them Go Further with Tablets and Smart Phones Five Keys to Successful Mobile Apps in Wealth Management Advisors Want An App for That : Helping Them Go Further with Tablets and Smart Phones The scenario is a familiar one: A financial advisor is meeting

More information

The best platform for enterprise mobile apps. MOBILE WHITE PAPER

The best platform for enterprise mobile apps. MOBILE WHITE PAPER The best platform for enterprise mobile apps. MOBILE WHITE PAPER Copyright Information All Contents Copyright 2015 MicroStrategy Incorporated. All Rights Reserved. Trademark Information MicroStrategy,

More information

MicroStrategy Professional Services

MicroStrategy Professional Services MicroStrategy Professional Services GET THE MOST FROM WHAT YOU OWN. We help businesses unleash the value of their MicroStrategy technology. MicroStrategy Professional Services works with you to set up,

More information

MicroStrategy Course Catalog

MicroStrategy Course Catalog MicroStrategy Course Catalog 1 microstrategy.com/education 3 MicroStrategy course matrix 4 MicroStrategy 9 8 MicroStrategy 10 table of contents MicroStrategy course matrix MICROSTRATEGY 9 MICROSTRATEGY

More information

MicroStrategy Express: Security Framework

MicroStrategy Express: Security Framework MicroStrategy Express: Security Framework I. Introduction... 2 II. Employing Best Practices... 2 Expertise... 2 Certifications and Compliance... 2 III. Application, Platform, and Physical Security... 3

More information

WHITE PAPER Checklist to implement governed self-service

WHITE PAPER Checklist to implement governed self-service WHITE PAPER Checklist to implement governed self-service Best practices to deploy secure, governed self-service analytics to business users with MicroStrategy Copyright Information All Contents Copyright

More information

Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy

Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy Usher Mobile Identity for Higher Education Institutions Rebecca Parks Associate Product Manager, MicroStrategy Agenda Overview of Mobile Identity Verify Personal ID Login to University Systems Unlock Doors

More information

Frequently asked questions

Frequently asked questions Frequently asked questions For more information, visit Usher.com info@ Toll Free (US ONLY): 888.656.4464 Direct Dial: 703.848.8710 1 What is Usher? Usher is a mobile identity platform designed to provide

More information

MicroStrategy Enterprise Security. Secure your enterprise with MicroStrategy Usher, the revolutionary new enterprise security platform

MicroStrategy Enterprise Security. Secure your enterprise with MicroStrategy Usher, the revolutionary new enterprise security platform MicroStrategy Enterprise Security Secure your enterprise with MicroStrategy Usher, the revolutionary new enterprise security platform Nearly 90% of IT Security Professionals Are Concerned About A Data

More information

MicroStrategy Enterprise Cloud: Security Framework

MicroStrategy Enterprise Cloud: Security Framework MicroStrategy Enterprise Cloud: Security Framework Copyright Information All Contents Copyright 2012 MicroStrategy Incorporated. All Rights Reserved. MicroStrategy, MicroStrategy 6, MicroStrategy 7, MicroStrategy

More information

Why does Location Analytics give you a competitive advantage? WHITE PAPER

Why does Location Analytics give you a competitive advantage? WHITE PAPER Why does Location Analytics give you a competitive advantage? WHITE PAPER Table of contents Executive Summary Page 3 The Power of the Map Page 3 Meshing Geographical Data Sources Page 4 Ensuring a High

More information

WHITE PAPER The state of mobility in the enterprise

WHITE PAPER The state of mobility in the enterprise The state of mobility in the enterprise Findings from 2014 survey Copyright Information All Contents Copyright 2014 MicroStrategy Incorporated. All Rights Reserved. Trademark Information MicroStrategy,

More information

Business Intelligence and Insurance. Major applications of business intelligence software in the insurance industry

Business Intelligence and Insurance. Major applications of business intelligence software in the insurance industry Business Intelligence and Insurance Major applications of business intelligence software in the insurance industry Business Intelligence and Insurance 1. Introduction...2 2. The Insurance Industry: Increasing

More information

Secure Business Intelligence on Apple Mobile Devices

Secure Business Intelligence on Apple Mobile Devices Secure Business Intelligence on Apple Mobile Devices MicroStrategy Mobile for iphone and ipad MOBILE INTELLIGENCE Copyright Information All Contents Copyright 2011 MicroStrategy Incorporated. All Rights

More information

Secure Your Enterprise with Usher Mobile Identity

Secure Your Enterprise with Usher Mobile Identity Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize

More information

Secure enough for any data.

Secure enough for any data. Mobile apps powerful enough for any job. Secure enough for any data. 1 microstrategy.com Enterprise mobility is changing the way that people work. Increase productivity and get a competitive edge. In less

More information

WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices

WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices Mobile App Platform Copyright Information All Contents Copyright 2014 Incorporated. All Rights Reserved.

More information

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime

More information

Harnessing the Power of Facebook Data

Harnessing the Power of Facebook Data Harnessing the Power of Facebook Data MicroStrategy Gateway TM for Facebook Companies Must Embrace the Social Network Phenomenon The emergence of social networks has not just changed how people communicate

More information

Business Intelligence and Pharmaceuticals. Major applications of business intelligence software in the pharmaceuticals industry

Business Intelligence and Pharmaceuticals. Major applications of business intelligence software in the pharmaceuticals industry Business Intelligence and Pharmaceuticals Major applications of business intelligence software in the pharmaceuticals industry Business Intelligence and Pharmaceuticals 1. Introduction...2 2. The Pharmaceuticals

More information

Business Intelligence and Financial Services. Major applications of business intelligence software in the financial services industry

Business Intelligence and Financial Services. Major applications of business intelligence software in the financial services industry Business Intelligence and Financial Services Major applications of business intelligence software in the financial services industry Business Intelligence and Financial Services 1. Introduction...2 2.

More information

WHITE PAPER The best platform for enterprise apps

WHITE PAPER The best platform for enterprise apps WHITE PAPER The best platform for enterprise apps MicroStrategy Mobile App Platform Copyright Information All Contents Copyright 2014 MicroStrategy Incorporated. All Rights Reserved. Trademark Information

More information

MicroStrategy Reporting Suite:

MicroStrategy Reporting Suite: MicroStrategy Reporting Suite: Quick Start Guide Version: 9.2.1 Document Number: 09570921 Seventh Edition, June 2011, version 9.2.1 To ensure that you are using the documentation that corresponds to the

More information

Course Guide Version: DOCESS-921-Oct11-CG MICROSTRATEGY REPORT SERVICES: DOCUMENT ESSENTIALS

Course Guide Version: DOCESS-921-Oct11-CG MICROSTRATEGY REPORT SERVICES: DOCUMENT ESSENTIALS Course Guide Version: DOCESS-921-Oct11-CG MICROSTRATEGY REPORT SERVICES: DOCUMENT ESSENTIALS 2000 2011 MicroStrategy Incorporated. All rights reserved. This Course (course and course materials) and any

More information

MicroStrategy Desktop 10.2. MicroStrategy 10.2: New features overview. microstrategy.com 1

MicroStrategy Desktop 10.2. MicroStrategy 10.2: New features overview. microstrategy.com 1 MicroStrategy Desktop 10.2 MicroStrategy 10.2: New features overview. microstrategy.com 1 TABLE OF CONTENTS MicroStrategy Desktop 10.2 Easier integration of custom visualizations 3 BETA Dashboard annotation

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

AWS Account Management Guidance

AWS Account Management Guidance AWS Account Management Guidance Introduction Security is a top priority at AWS. Every service that is offered is tightly controlled and adheres to a strict security standard. This is evident in the security

More information

MicroStrategy Products

MicroStrategy Products MicroStrategy Products Bringing MicroStrategy Reporting, Analysis, and Monitoring to Microsoft Excel, PowerPoint, and Word With MicroStrategy Office, business users can create and run MicroStrategy reports

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single

More information

Improving Online Security with Strong, Personalized User Authentication

Improving Online Security with Strong, Personalized User Authentication Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware

More information

Secure Business Intelligence on Apple Mobile Devices

Secure Business Intelligence on Apple Mobile Devices Secure Business Intelligence on Apple Mobile Devices MicroStrategy Mobile for iphone and ipad MOBILE INTELLIGENCE Copyright Information All Contents Copyright 2010 MicroStrategy Incorporated. All Rights

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

SAS Mobile BI Security and the Mobile Device

SAS Mobile BI Security and the Mobile Device SAS Mobile BI Security and the Mobile Device Version 1.0 April 24, 2015 Contents Introduction...1 Security Features Provided by SAS Mobile BI and SAS Visual Analytics...2 Introduction... 2 Lock the SAS

More information

Top 5 Analytics Applications in Financial Services

Top 5 Analytics Applications in Financial Services Top 5 Analytics Applications in Financial Services Learn how you can boost your bottom line, manage risk, and take action on your insights with the world s most comprehensive analytics platform. 5 game-changing

More information

Authentication Strategy: Balancing Security and Convenience

Authentication Strategy: Balancing Security and Convenience Authentication Strategy: Balancing Security and Convenience Today s Identity and Access Security Strategies Are Being Driven by Two Critical Imperatives: Enable business growth by: Quickly deploying new

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

Salesforce1 Mobile Security Guide

Salesforce1 Mobile Security Guide Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

expanding web single sign-on to cloud and mobile environments agility made possible

expanding web single sign-on to cloud and mobile environments agility made possible expanding web single sign-on to cloud and mobile environments agility made possible the world of online business is rapidly evolving In years past, customers once tiptoed cautiously into the realm of online

More information

Back to the Future: Securing your Unwired Enterprise

Back to the Future: Securing your Unwired Enterprise Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover

Sound Business Practices for Businesses to Mitigate Corporate Account Takeover Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.

More information

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile

More information

Two-Factor Authentication over Mobile: Simplifying Security and Authentication

Two-Factor Authentication over Mobile: Simplifying Security and Authentication SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table

More information

Apps for every employee

Apps for every employee Apps for every employee ipad 12:30 PM 100% Apps for every employee Mobilize everyday processes, remove costly bottlenecks, and accelerate the business. 12:30 PM 100% Apps for expense submission, corporate

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

A strategic approach to fraud

A strategic approach to fraud A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for

More information

Solutions for Insurance Companies. MicroStrategy Business Intelligence: Solutions for Maximizing Policyholder Profitability

Solutions for Insurance Companies. MicroStrategy Business Intelligence: Solutions for Maximizing Policyholder Profitability Solutions for Insurance Companies MicroStrategy Business Intelligence: Solutions for Maximizing Policyholder Profitability Business Intelligence and Insurance I. II. Introduction: Increasing Underwriting

More information

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management Multi-Factor Authentication for your Analytics Implementation Siamak Ziraknejad VP, Product Management 1 Agenda What is Multi-Factor Authentication & Why is it important The Usher Security Badge Badge

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

PrinterOn Mobile Applications for ios and Android

PrinterOn Mobile Applications for ios and Android PrinterOn Mobile Applications for ios and Android Table of Contents 1. Key Features & Functionality... 4 1.1. Printer Discovery... 4 1.1.1. Location-Based Search... 4 1.1.2. Keyword Search... 5 1.1.3.

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

RSA Authentication Manager 8.1 Help Desk Administrator s Guide. Revision 1

RSA Authentication Manager 8.1 Help Desk Administrator s Guide. Revision 1 RSA Authentication Manager 8.1 Help Desk Administrator s Guide Revision 1 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

RSA SecurID Two-factor Authentication

RSA SecurID Two-factor Authentication RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial

More information

Designing a CA Single Sign-On Architecture for Enhanced Security

Designing a CA Single Sign-On Architecture for Enhanced Security WHITE PAPER FEBRUARY 2015 Designing a CA Single Sign-On Architecture for Enhanced Security Using existing settings for a higher-security architecture 2 WHITE PAPER: DESIGNING A CA SSO ARCHITECTURE FOR

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

WHITE PAPER Mobility Won't Wait for Your Sales Force

WHITE PAPER Mobility Won't Wait for Your Sales Force WHITE PAPER Mobility Won't Wait for Your Sales Force Urgent first steps in developing a Mobile strategy Copyright Information All Contents Copyright 2013 MicroStrategy Incorporated. All Rights Reserved.

More information

CA SiteMinder SSO Agents for ERP Systems

CA SiteMinder SSO Agents for ERP Systems PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security

More information

SAP Business Objects Security

SAP Business Objects Security SAP Business Objects Security Pal Alagarsamy President Business Intelligence Practice GloWiz Inc 1 GloWiz Inc GloWiz is an IT Staffing and Consulting company since 2005 We focus on Business Intelligence,

More information

Using a VPN with Niagara Systems. v0.3 6, July 2013

Using a VPN with Niagara Systems. v0.3 6, July 2013 v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel

More information

Executive Summary P 1. ActivIdentity

Executive Summary P 1. ActivIdentity WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

Business Intelligence and Manufacturing. Major applications of business intelligence software in the manufacturing industry

Business Intelligence and Manufacturing. Major applications of business intelligence software in the manufacturing industry Business Intelligence and Manufacturing Major applications of business intelligence software in the manufacturing industry Business Intelligence and Manufacturing 1. Introduction...2 2. The Manufacturing

More information

CellCast Solution for BlackBerry Smartphones. Security Overview. Revised: June 2010. www.mlearning.com

CellCast Solution for BlackBerry Smartphones. Security Overview. Revised: June 2010. www.mlearning.com CellCast Solution for BlackBerry Smartphones Security Overview Revised: June 2010 www.mlearning.com Introduction The CellCast Solution for BlackBerry empowers sales, service and other remote teams to distribute

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Remote Access Platform. Architecture and Security Overview

Remote Access Platform. Architecture and Security Overview Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards

More information

MicroStrategy Analytics Platform

MicroStrategy Analytics Platform Enterprise-grade business intelligence Effortless self-service analytics MicroStrategy Analytics Platform One comprehensive solution. No compromises. No limits. No dead ends. Advanced big data analytics

More information

CA Enterprise Mobility Management MSO

CA Enterprise Mobility Management MSO SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.

More information

Insight to Action MOBILE INTELLIGENCE

Insight to Action MOBILE INTELLIGENCE Insight to Action MOBILE INTELLIGENCE Our Design Philosophy Your app mat ters yôr ap matərs noun The MicroStrategy philosophy that our company, technology, people, and ideas are singularly focused and

More information

Multi Factor Authentication API

Multi Factor Authentication API GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...

More information

Security Architecture Whitepaper

Security Architecture Whitepaper Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer

More information

SCADA SYSTEMS AND SECURITY WHITEPAPER

SCADA SYSTEMS AND SECURITY WHITEPAPER SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of

More information

Multi-factor authentication

Multi-factor authentication CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL

More information

CA Technologies Empowers Employees with Better Access to Applications via OneAccess Mobile App

CA Technologies Empowers Employees with Better Access to Applications via OneAccess Mobile App CUSTOMER SUCCESS STORY SEPTEMBER 2014 CA Technologies Empowers Employees with Better Access to Applications via OneAccess Mobile App CLIENT PROFILE Industry: IT Company: CA Technologies Employees: 13,000

More information

Dramatically increase sales productivity Sales analytics and mobile enablement solutions.

Dramatically increase sales productivity Sales analytics and mobile enablement solutions. Dramatically increase sales productivity Sales analytics and mobile enablement solutions. Bring your sales data to life Sales Force Automation (SFA) and Customer Relationship Management (CRM) tools, such

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Securing Mobile Apps in a BYOD World

Securing Mobile Apps in a BYOD World SAP Thought Leadership Paper Mobile App Security Securing Mobile Apps in a BYOD World Protecting Apps Makes You More Responsive to Demands for Enterprise Mobility Table of Contents 4 The Mobile App Tsunami

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication This document serves as a How To reference guide for employees to execute the following MFA tasks: 1.

More information

Apps for oil and gas

Apps for oil and gas Apps for oil and gas 12:30 PM 100% ipad 12:30 PM 100% ipad 12:30 PM 100% Apps for oil and gas Mobile apps that help oil and gas companies transform operations and keep up with the pace of industry change.

More information

CA Arcot RiskFort. Overview. Benefits

CA Arcot RiskFort. Overview. Benefits PRODUCT SHEET: CA Arcot RiskFort CA Arcot RiskFort CA Arcot RiskFort provides real-time protection against identity theft and online fraud via risk based, adaptive authentication. It evaluates the fraud

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

RSA Authentication Manager 8.1 Help Desk Administrator s Guide

RSA Authentication Manager 8.1 Help Desk Administrator s Guide RSA Authentication Manager 8.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat. Defeating cybercriminals Protecting online banking clients in a rapidly evolving online environment The threat As the pace of technological change accelerates, so does the resourcefulness and ingenuity

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security

More information

Upgrade Guide. Upgrading your MicroStrategy Enterprise Software. Version 10.3 Document Number: 09321030

Upgrade Guide. Upgrading your MicroStrategy Enterprise Software. Version 10.3 Document Number: 09321030 Upgrading your MicroStrategy Enterprise Software Version 10.3 Document Number: 09321030 10.3, March 2016 Document Number: 09321030 Copyright 2016 by MicroStrategy Incorporated. All rights reserved. If

More information

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

defending against advanced persistent threats: strategies for a new era of attacks agility made possible defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been

More information

Stay ahead of insiderthreats with predictive,intelligent security

Stay ahead of insiderthreats with predictive,intelligent security Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz sarah.cucuz@spyders.ca IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent

More information

Okta/Dropbox Active Directory Integration Guide

Okta/Dropbox Active Directory Integration Guide Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for

More information