How To Protect Freespeech From Attack From A Hacker Attack

Size: px
Start display at page:

Download "How To Protect Freespeech From Attack From A Hacker Attack"

Transcription

1 customer care solutions from Nuance enterprise white paper :: Nuance FreeSpeech Security Overview Version 7.0

2 NUANCE :: customer care solutions Contents About this Document...3 Nuance FreeSpeech Security Overview...3 Architecture & System Components...3 System Components...4 Product infrastructure...6 Authentication...7 Web Server Access...7 Database Access...7 LDAP Server Access...7 File System Access...7 Authorization...7 System Authorization...7 Audit...8 Audit levels...8 Audit Protection...9 Audited operations and entities...9 Log viewer...10 Administration...10 Web based administration applications...10 FSMCLI...13 SNMP...14 Data Security Data manipulation...14 Data Integrity & Encryption...14 Custom Encryption Plug-in...14 Multi-tenancy...14 Network Security...15 Interface protection...15 Inter-Process Communication security...15 About Nuance

3 About this Document Nuance FreeSpeech is a unique biometric speaker verification system that transparently verifies speakers and/or identifies known fraudsters in the background of a natural conversation. FreeSpeech is the most comprehensive, natural language speaker verification system available today, enabling customers to utilize the biometric power of voice to provide secure, efficient and convenient access to contact centers. New features available in FreeSpeech 7.0 ensure end-to-end security, meeting the most stringent IT security requirements. This document provides an overview of FreeSpeech product security. As an authentication product, FreeSpeech implements a wide range of security measures to protect its resources against diversified threats. This document is intended for sales engineers and for IT security personnel who need to evaluate the use FreeSpeech in their protected IT environments. Nuance FreeSpeech Security Overview FreeSpeech is a voice biometrics system which is implemented in security-sensitive environments. As such, it must adhere to strict security requirements and comply with privacy and additional industry-specific regulations. FreeSpeech is protected at both the application level and the infrastructure level using the standard Four A s of enterprise security: Administration, Authentication, Authorization, and Audit. FreeSpeech s security design is based on the Common Criteria Protection Profile for biometric speaker verification systems and has successfully passed third-party security audits and penetration attacks performed by customers. FreeSpeech supports integrated Windows security and role based authorization (RBA). Together with the security mechanisms provided by the system infrastructure, the system can be configured to meet the security requirement of financial services, government agencies, healthcare service providers and other securitysensitive organizations. The following diagram provides an overview of FreeSpeech security architecture and mechanisms. Integrated Windows Security CTI Gateway Web Service SSL Buffer Overflow & SQL Injection Check Admin Apps File System Hashed Audio File Names NTFS IIS FreeSpeech TM Processing Server LDAP Authentication, Authorization, Audit Active Directory/ ADAM.NET Reporting LDAP FreeSpeech TM Processing Server FreeSpeech TM DB Oracle / SQL Server / Sybase / DB2 Full System Audit Authorization Manager Role-Based Authorization 3

4 NUANCE :: customer care solutions Architecture & System Components FreeSpeech includes a set of applications, services and tools that work together in order to provide voice biometrics services. System Components The FreeSpeech system is comprised of three main logical components the Processing Server, the Data Repository Server, and the Audio Acquisition Server. These components can reside on a single machine or be distributed among multiple machines. A system can be comprised of multiple instances of each component. Processing Server The Processing Server is the main processing component of the FreeSpeech system. Multiple Processing Servers can optionally be used in a redundancy scheme for high availability purposes, or in a load balancing scheme for scalability. The Processing Servers run the FreeSpeech application that provides the following functions: Service control The Processing Server exposes a set of Web Services (SOAP/HTTP) which are used by calling applications as well as by the system s administration tools and Web-based GUI Applications. Algorithmic processing This is the core biometric functionality of FreeSpeech. Each Processing Server includes two web applications that run under Microsoft IIS: FreeSpeech Web Services Provides a set of API methods accessed through SOAP and HTTP. FreeSpeech Web Applications These web applications are used by Administrators, IT managers, Security Officers and helpdesk agents. In addition, the FreeSpeech system includes a set of utilities/desktop administration applications. These are typically installed with each Processing Server. Data Repository Server The Data Repository Server is the logical name of the component which is responsible for handling and storing persistent data. Each data repository server contains the following components: SQL Database The Database is used to store audit information, log messages and other information used for reports. FreeSpeech supports most of the leading Databases. LDAP Directory LDAP directory is used to securely store sensitive persistent data related to speakers, groups, voiceprints, and configurations. FreeSpeech supports multiple LDAP directories. Audio Files folder A shared folder used for storing audio files. Persistent Data Replicator (PDR) Nuance s replication service, responsible for duplicating database records and audio files between two data repository servers (Optional). Logger Service This service queues log messages and saves them in the background to the database. A FreeSpeech system must include at least one Data Repository Server. Two Data Repository Servers can be used in an active-active configuration for redundancy. 4

5 Audio Acquisition Server The FreeSpeech Audio Acquisition Server acquires audio for processing and streams it to the Processing Server. The Audio Acquisition Server can be one of two types: The Time Division Multiplexing Acquisition Server (TAS), or the VoIP Acquisition Server (VAS). The TAS is physically connected to the telephony trunks or extensions and acquires audio directly from them. This solution requires telephony cards. The VAS acquires audio by sniffing RTP packets which are directed to a known IP through standard network cards. This solution is totally software based. The following diagram outlines FreeSpeech components and architecture. FreeSpeech Web Applications FreeSpeech Native Web Service API s Technical Management Platform Admin Voiceprint Helpdesk Security Console Processing Server (FreeSpeech Application Pool) Biometric Engines Text Dependent Utterance Validation Processing Server (N+1) IIS Algorithmic Engines Voice/ DTMF/Tone Detection Liveness Detection FreeSpeech Web Applications Enrollment Consistency Check Playback Detection Crosstalk Cancelation ASR (Optional) Tools and Services Logger Service SNMP Agent Custom Encryption Hooks Authorization Manager Bit (Quick Test) Calibration Wizard Management Command Line Interface (MCLI) Hashed Audio Files File system Data Repository Server (1+1) User Group Database LDAP Directory Audit, Reports,Logs (Oracle, SQL Server, DB2 Voiceprint, Speakers MySQL, Sybase,Informix) Configuration, Roles, Scopes (Microsoft, AD, IBM Tivoli TDS) Tools and Services PDR - Nuance Data Replicator DB/Audio Sync Logger Service SNMP Agent TAS TDM Acquisition Server (N+1) Technical Monitoring Speaker Separation Audio Acquisition Boards VAS VOIP Acquisition Server (N+1) Technical Monitoring Speaker Separation VOIP Sniffing and Port Tracking 5

6 NUANCE :: customer care solutions Product infrastructure Operation System FreeSpeech is based on.net framework 4.0 and as such it can run only on Windows machines. Currently the product supports the following OS: Windows XP Windows 2003 Server Windows 2008 Server Windows7 Database A Database is used to store audit information and log messages. The database may be installed on the same machine as the Data Repository or on a remote machine. FreeSpeech utilizes common ADO.NET infrastructure to access the database. FreeSpeech supports the following databases: Microsoft SQL Server 2005 Microsoft SQL server 2000 Oracle 10g with RAC support Oracle 11g with RAC support DB2 MySQL 5.5 SQL Express LDAP Directory LDAP is an application protocol for reading and editing directories over an IP network. The LDAP Directory is used to securely store the application s persistent data entities such as speakers, voiceprints, and configuration. The supported LDAP Directories are: ADAM Active Directory Application Mode - This lightweight version of Microsoft Active Directory runs as a service on the data repository server - this is the default directory for installations on Windows XP and Win2003 Server operating systems. AD LDS Active Directory Lightweight Directory Services - This lightweight version of Microsoft Active Directory runs as a service on the data repository server - this is the default directory for installations on Windows 7 and Win2008 Server operating systems. Active Directory Microsoft s Directory Services product - The domain s active directory can be used as the LDAP directory. When used, an extension of the Active Directory Schema is required in order to support FreeSpeech entities. TDS IBM Tivoli Directory Server. Web Server The FreeSpeech system uses IIS (Internet Information Services) as its web server and is based on the IIS ASP.NET 4.0 extension. FreeSpeech 7.0 offers an enhanced, open, and flexible Web service APIs, ensuring smooth, platform-independent integration using any programming environment. In addition, the FreeSpeech 6

7 Web Applications enable easy access to tools and information needed for successful deployment. FreeSpeech utilizes IIS web server security mechanisms (i.e. application session timeout, limiting access to specific IPs etc. are supported). Authentication Web Server Access FreeSpeech authenticates users based on Windows Integrated Security. This ensures that system policies regarding passwords are handled according to the local domain policies (enforced by the Domain Controller). FreeSpeech does not store passwords in its database or in any other application s data store. Users accessing the system, whether by programmatically calling the system s web service API, by using one of the administration applications, or by accessing a web page, are authenticated by the IIS using the Domain Controller. By setting a designated configuration parameter, the system can ensure exclusive log-in to the web applications. Note: Authentication policies supported by Microsoft IIS, such as certificates and passports are also supported by FreeSpeech. The FreeSpeech Web Applications can be configured to enable Single Sign On which eliminates the need to re-enter user-name and password when accessing the application. Database Access Credentials to the system s database are provided as part of the connection string used by FreeSpeech. By default, FreeSpeech uses Windows integrated security as the database authentication method. This means that the application s identity is used when accessing the database. Another alternative is to specify a username and password in the connection string. When this is done, this identity is used by all components accessing the database and must be managed manually. When this option is used, the password is saved encrypted in the system s configuration file. LDAP Server Access The applications access the LDAP Server using Windows Integrated Security. Note that the application s identity is used when accessing the LDAP Server. File System Access File system access is controlled by the operating system. Every access to the file system by the FreeSpeech application will be performed under the credentials of the application user. Authorization System Authorization Role-based Authorization (RBA) FreeSpeech utilizes Microsoft Authorization Manager (AZMAN) for managing roles and operations. AZMAN is general-purpose role-based security architecture for Windows. Using roles, the operating system determines whether a process or a user is privileged to perform an operation. 7

8 NUANCE :: customer care solutions Roles are defined in the Authorization Store of FreeSpeech s LDAP Directory. Each role can be granted permission to perform operations (a basic activity unit that the system performs). Every API method has a corresponding operation. Windows users and groups can be assigned a role, and be authorized to perform operations according to the role s definition. The system is installed with the following predefined roles. These roles can be customized and additional roles can be defined. ClientApplication HelpDesk PlatformAdmin MainScope Security Every access to the Database, the LDAP Server, or the file system by the FreeSpeech application is performed using the credentials of the application user. Once the application validates that the network user is permitted to perform a certain operation, the application user serves as a delegate for the network user. This means that in order to allow an application user to perform an operation that will delete a file from the file system for example, it is not required to add write privileges to the network user. Audit FreeSpeech Audit is composed of the following elements: Every API method is logged in the system s database. Other standard system infrastructure components (such as the OS, IIS, DB) have their own auditing tools and capabilities that needs to be enabled. Audio files used for Enrollment/Verification may be saved for Audit purposes. Audit levels FreeSpeech allows the system administrator to control the level of audit info detail that will be saved by the system. There are three audit levels: Alg Debug Specifies whether to audit detailed algorithmic outputs (mainly used for algorithmic troubleshooting). Operational Specifies whether to save operation level audit information (such as Enroll/Verify/Identify/ Fraudsters detection etc.). There are three options of saving operational level audit information: Always the system saves all audit information. Conditional the system saves audit information only for delete operations and in case of an error in other operations. Never the system does not save operational-level audit information. System Specifies whether to save system level audit information. There are three options of saving system level audit information: Always the system saves all system level audit information. Conditional the system saves audit information only for system level write operations and in case of an error in read operations. Never the system does not save system-level audit information. 8

9 In addition, a configuration parameter named log level enables selecting the desired log level, enabling the system to keep different levels of log messages for different applications, services or scopes. Audit Protection FreeSpeech audit information is stored securely in the system s database. Besides the system specific audit trail, FreeSpeech system infrastructure (IIS, LDAP Directory, Database) logs are protected in diversified (standard) ways. Audited operations and entities Auditing Audio Files FreeSpeech support auditing audio files used in the system using two configuration parameters: SaveEnrollAudio - Specifies whether to save enrollment audio. Always Enrollment audio is always saved UntilTrained Enrollment audio is saved temporarily and deleted as soon as the voiceprint is trained. Never Enrollment audio is never saved. SaveOperationalAudio Specifies whether to save operational audio (the audio associated with Verify, Identify, and Fraudsters Detection operations). LDAP Server Audit LDAP Server supports audit capabilities and enables flexible audit configuration. For more information refer to API Audit Every call to an API method is logged in the system s database. The API record includes the following details: Request ID A 64bit unique identifier assigned to each API call. This ID is unique across all the system s servers and can be used to reference other details stored in the database about the request such as verification score, or failure details. Method Name The API method name. Input Parameters The values of the API method parameters. Finish Status An error or success code. Timestamp The exact time of the request execution. Server name The name of the processing server that handled the request. Client ID The IP address of the client. User name The windows username of the client. Data repository server name The name of the data repository server on which the data was originally stored. Session ID A token which is received from the StartSession command that launched the current session. Scope The scope which is the context of the current API operation. 9

10 NUANCE :: customer care solutions Log viewer FreeSpeech saves log messages in the database based on the LogLevel parameter in the system configuration. Log messages can be accessed using the Log Viewer which enables online or offline viewing of an application s log messages. The Log Viewer is available as a Windows application or as a Web page in the Technical Management application. Use the Log functionality to troubleshoot the system or analyze past system activity. The log section is divided into two views: History Log View which enables auditing past system activities. Log information retrieval can be controlled by dates and log level. Once retrieved, log information can be saved, sorted, filtered or saved to a file. Online Log View is used to monitor system activities in real time. The Online Log View displays systemwide log messages as they are recorded in the FreeSpeech data base, enabling isolating faults and communicating them with the vendor. Log messages can be saved to a file. Administration Web based administration applications FreeSpeech provides a set of web-based administration applications allowing management of all system aspects. The following applications are provided out-of-the-box: Technical Management Platform Admin FreeSpeech Platform Admin is a web based Application that provides a variety of tools for properly setting up the system and its biometric functionality as well as managing speakers, voiceprints and groups. Use this application to configure FreeSpeech, perform queries and reports, and monitor the system usage. Voiceprint Helpdesk FreeSpeech Voiceprint Helpdesk provides a set of tools enabling auditing and reviewing a speaker s interactions with the system. Use the Helpdesk functions to audit verification results and decisions, edit speaker information, delete a speaker, edit a voiceprint and more. Security Console The FreeSpeech Security Console enables security personnel to audit FreeSpeech operation and analyze specific verification and identification processes. The application provides tools for managing fraudsters voiceprints and groups. In addition, the security console collects and presents diversified security alerts. FreeSpeech Technical Management Application enables technical personnel, who are in charge of the systems health, to monitor FreeSpeech system s component status, audit system-wide logs, schedule administrative tasks such as audio purging, upload and view system licenses, and more. Access to these applications is controlled by Windows Integrated Security and FreeSpeech s role based authorization. 10

11 The Web-based Security Console Application The FreeSpeech Security Console Application enables security personnel to audit FreeSpeech operation and analyze specific verification and identification processes. The application provides tools for managing voiceprints as well as all aspects of user authorization. The Security Console Application is divided into four functionalities: Authorization Manager, Voiceprint Helpdesk, Configuration, and Log. The following screenshot presents this functionality: 1. Authorization Manager Functionality Allows managing all aspects of User Authorization. Using roles, the system can make determinations, such as whether a process is privileged to perform an action. FreeSpeech utilizes Microsoft s Authorization Manager Infrastructure to manage user authorization in the system. Authorization Manager functionality is divided into three sections: a. Scope Management Used adding scopes (tenancies) in a multi-tenant system b. User Management Used for assigning roles to users and groups c. Role Management Used for defining, creating and customizing roles The following screenshots depict the User Management page and the role customization functionality of the Security Console. 11

12 NUANCE :: customer care solutions 2. Voiceprint Helpdesk Functionality Provides a set of tools enabling auditing and reviewing of a speaker s interactions with the system, editing voiceprint audio and adapting voiceprints with audio used for verification. Voiceprint Helpdesk is divided into two section: a. Audit Speaker Interactions Used for reviewing a specific speaker s interactions with the system. Information available includes session information as well as information regarding each and every operation within the session (i.e. Enrolment, Verification etc.). Verification statistics and scores are displayed including decision reasons and extended scoring information. Speaker audit information can be filtered, sorted and grouped for better analysis. Audit information also includes the speaker s audio. This audio can be played back and/or downloaded assuming the system audit configuration is set to store it and the proper security privileges are set. b. Review Voiceprint Enables reviewing of a speaker s voiceprints. This is used to listen to audio used for enrollment, and edit it if necessary, removing unrelated or faulty audio. The Edit Voiceprint page enables removing and adding audio segments from/to a speaker s voiceprint and adapting 12

13 it with verification audio segments if available. Use the Edit Voiceprint page to fix problematic voiceprints that deliver high false rejection rate as well as to enhance the quality of existing voiceprints via manual adaptation. 3. Configuration Functionality - Enables the system administrator to control and manipulate the system configuration and operation. The FreeSpeech system supports multiple concurrent configurations that are used to control the system s diversified functionality and multi-engine infrastructure. Use the configuration functionality to comply with diversified requirements (i.e. Security, Audit), optimize the system performance, and adjust its functionality to accommodate for a specific call/verification flow. Configuration is divided into two sections: a. Edit Configuration Sets Enables creating, editing, uploading, downloading, and comparing Configuration Sets. A Configuration Set is a set of parameters and their corresponding values that controls the operation of FreeSpeech in a specific context which can be an application or a specific operation. Configuration Sets inherit parameters values from the system s Default configuration set and enable the user to overwrite specific ones as necessary. b. Configuration Audit Used to track all of the system s configuration changes. Use this page to review configuration changes and filter them by dates, parameter category, and more. Information retrieved includes parameters values, timestamp, change initiator, IP and host name. The Configuration Audit page can be used by the system administrator as well as by Nuance support to isolate system problems caused by configuration errors. 13

14 NUANCE :: customer care solutions 4. Log functionality Enables viewing history and on-line system log information. Use the Log functionality to troubleshoot the system or analyze past system activity. Log is divided into two sections: a. The History Log View is used to audit past system activities. Log information retrieval can be controlled by dates and log level. Once retrieved, log information can be saved, sorted or filtered. b. The Online Log View is used to monitor system activities in real time. The Online Log View displays system-wide log messages as they are recorded in the FreeSpeech data base, enabling isolating faults and communicating them to the vendor. Log messages can be saved to a file. FSMCLI FreeSpeech includes a command line utility that enables administrators to perform various administration tasks such as: retraining voiceprints or deleting history records from the database. A system administrator using the FSMCLI must have the proper credentials and authorization to use the various functionality provided by this utility. SNMP FreeSpeech s SNMP agent receives SNMP requests and sends SNMP traps to standard network monitoring consoles complying with SNMPv2 standard. Each Processing Server has an SNMP agent service that handles SNMP Get/Set requests and sends SNMP traps when important system events occur. FreeSpeech monitoring can be easily added to standard SNMP-based consoles. Data Security Data manipulation FreeSpeech checks every input against data manipulations such as: SQL injection, LDAP injection, Buffer overflow and Cross-Site Scripting (XSS). Data Integrity & Encryption Voiceprints are stored in a proprietary format in the system s LDAP directory and cannot be reverse engineered. Voiceprints are signed with the speaker ID and the customer ID (system ID) which is a unique key assigned to each installation. This signing protects the system voiceprints from being manipulated by authorized users. Voiceprints cannot be used outside the specific system as well as in other FreeSpeech systems. Customer Related Information (Speaker IDs, Group IDs), is encrypted by FreeSpeech by default using 128 bit encryption mechanism (Rijndel). Customer-specific encryption mechanisms are supported. Audio Files stored in the files system can be encrypted using standard OS encryption mechanisms. The names of the saved audio files are hashed so that they cannot be associated directly with a specific speaker. LDAP Directory Store is used by FreeSpeech (Provided by Microsoft/IBM) and encrypted by default using proprietary encryption mechanisms. Database is used by FreeSpeech and can be configured to encrypt stored information. 14

15 Custom Encryption Plug-in Nuance supplies a built in encryption mechanism which uses Rijndael symmetric encryption (AES) 128bit. In case the customer wishes to control the system s encryption method, he may do so through the encryption plug-in. The encryption plug-in enables customized encryption, giving the customer full control over the encryption algorithm and key. A configuration parameter which points to the encryption software must be set to enable custom encryption. Multi-tenancy Multi-tenancy enables logical partitioning of the entire system in an effortless manner through the use of scopes. This allows a clear cut separation of the system s data, configuration, audit, roles, etc. within an organization, enabling a single enterprise to use FreeSpeech for multiple/distinct applications in different business units. Multi-tenancy is ideal for a hosted solution, enabling a service provider to offer FreeSpeech as a service to multiple enterprises. The benefits are both from a practical aspect and from a security aspect. Regardless of what system tool is used or what API method is called, everything is performed in the context of a specific scope. Scopes are assigned to users by the system security administrator. Each session is associated with a certain scope, the configuration set specified when calling an API method is used to determine the desired scope. Network Security Interface protection FreeSpeech web service interface access is controlled using IIS6 or IIS7 security supporting SSL encryption. All authentication schemes are supported: Integrated, Basic, Digest, and Certificates. Inter-Process Communication security FreeSpeech Processes The different components which compose the FreeSpeech system communicate with each other over TCP using WCF (Windows Communication Foundation). Windows Communication Foundation is the technology used for inter-process communication between different components of FreeSpeech. More information regarding WCF refer to All ports used for inter-process communication are configurable. This allows System Administrators to specify which ports will be used in their specific site. The component used for inter-process communications is NET. TCP. This standard component secures TCP communications in various ways. Processing Server LDAP Directory Communication Security FreeSpeech communicates with the LDAP directory via a.net component (Microsoft Directory Entry) as part of Microsoft Directory Services which is part of.net Framework. The component supports LDAPS for secure LDAP communication. Processing Server SQL Database Communication Security FreeSpeech communicates with the SQL Server using a database-specific ADO.Net provider. The provider communication security is proprietary and database-specific. 15

16 NUANCE :: customer care solutions About Nuance Communications, Inc. Nuance is a leading provider of speech and imaging solutions for businesses and consumers around the world. Its technologies, applications and services make the user experience more compelling by transforming the way people interact with information and how they create, share and use documents. Every day, millions of users and thousands of businesses experience Nuance s proven applications and professional services. For more information, please visit: Nuance Communications, Inc. All rights reserved. Nuance, the Nuance logo, The experience speaks for itself, SpeakFreely, and FreeSpeech are trademarks and/or registered trademarks of Nuance Communications, Inc., and/or its subsidiaries in the United States and/or other countries. All other trademarks are the properties of their respective owners. WP NUCC1094 NUANCE COMMUNICATIONS, INC. one wayside road burlington ma nuance.com

customer care solutions

customer care solutions customer care solutions from Nuance enterprise white paper :: Nuance VocalPassword Security Overview Version 7.0 NUANCE :: customer care solutions Contents About this Document...3 Nuance VocalPassword

More information

Nuance FreeSpeech 8.2 :: Product Description

Nuance FreeSpeech 8.2 :: Product Description Nuance FreeSpeech 8.2 :: Product Description 8.2 About Nuance FreeSpeech Nuance is proud to present FreeSpeech 8.2, a unique biometric speaker verification system that transparently verifies speakers in

More information

Nuance VocalPassword 8.2 :: Product Description

Nuance VocalPassword 8.2 :: Product Description Nuance VocalPassword 8.2 :: Product Description About Nuance VocalPassword Nuance is proud to present VocalPassword 8.2, the most secure, accurate, flexible, and easily deployed biometric speaker verification

More information

FreeSpeech : caller identity verification.

FreeSpeech : caller identity verification. FreeSpeech : caller identity verification. Real-time validation of caller identity and detection of known fraudsters. 1 FreeSpeech for passive caller authentication. 9 FreeSpeech enables fully transparent

More information

VocalPassword : voice biometrics authentication.

VocalPassword : voice biometrics authentication. VocalPassword : authentication. Friendly voice authentication across web, IVR, call center, or mobile. 1 VocalPassword for easy and secure authentication. VocalPassword, the world s most widely deployed

More information

Nuance VocalPassword v9 :: Product Description

Nuance VocalPassword v9 :: Product Description Nuance VocalPassword v9 :: Product Description Solution Overview VocalPassword, the world s most widely deployed voice biometric solution, enables easy and secure authentication by analyzing a person s

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Tenable for CyberArk

Tenable for CyberArk HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Netop Remote Control Security Server

Netop Remote Control Security Server A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days

More information

WebEx Security Overview Security Documentation

WebEx Security Overview Security Documentation WebEx Security Overview Security Documentation 8/1/2003: WebEx Communications Inc. WebEx Security Overview WebEx Security Overview Introduction WebEx Communications, Inc. provides real-time communication

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft 5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft

More information

Installation Guide ARGUS Symphony 1.6 and Business App Toolkit. 6/13/2014 2014 ARGUS Software, Inc.

Installation Guide ARGUS Symphony 1.6 and Business App Toolkit. 6/13/2014 2014 ARGUS Software, Inc. ARGUS Symphony 1.6 and Business App Toolkit 6/13/2014 2014 ARGUS Software, Inc. Installation Guide for ARGUS Symphony 1.600.0 6/13/2014 Published by: ARGUS Software, Inc. 3050 Post Oak Boulevard Suite

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

Mediasite EX server deployment guide

Mediasite EX server deployment guide Mediasite EX server deployment guide 2008 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc. Additional copies

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Pre Sales Communications

Pre Sales Communications Pre Sales Communications OmniVista 4760 from R4.1 & OmniPCX Enterprise R7.1 IP Protocols and Ports All rights reserved 2006, Alcatel Table of contents 1. Objectives...3 2. IP protocols...3 2.1. Global

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

White Paper BMC Remedy Action Request System Security

White Paper BMC Remedy Action Request System Security White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information

More information

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2 HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and

More information

TrueSight Operations Management Monitoring Studio

TrueSight Operations Management Monitoring Studio USER DOCUMENTATION APPLICATIONS MONITORING TrueSight Operations Management Monitoring Studio Version 9.0.00 June 2015 Contacting BMC Software You can access the BMC Software Web site at http://www.bmc.com.

More information

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise

More information

How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2

How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2 DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...

More information

000-596. IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam. http://www.examskey.com/000-596.html

000-596. IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam. http://www.examskey.com/000-596.html IBM 000-596 IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam TYPE: DEMO http://www.examskey.com/000-596.html Examskey IBM 000-596 exam demo product is here for you to

More information

IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM

IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product

More information

Thick Client Application Security

Thick Client Application Security Thick Client Application Security Arindam Mandal (arindam.mandal@paladion.net) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two

More information

Crestron Fusion Version 9.3 Enterprise Management Platform Installation Guide

Crestron Fusion Version 9.3 Enterprise Management Platform Installation Guide Crestron Fusion Version 9.3 Enterprise Management Platform Installation Guide The specific patents that cover Crestron products are listed at patents.crestron.com. Crestron, the Crestron logo, Capture

More information

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01 Oracle Enterprise Single Sign-on Provisioning Gateway Administrator Guide Release 10.1.4.1.0 E12613-01 March 2009 Oracle Enterprise Single Sign-on Provisioning Gateway, Administrator Guide, Release 10.1.4.1.0

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Application Note: Cisco Integration with Onsight Connect

Application Note: Cisco Integration with Onsight Connect Application Note: Cisco Integration with Onsight Connect Table of Contents Application Note:... 1 Cisco Integration with Onsight Connect... 3 Direct Onsight Device to Cisco Endpoint Calls... 3 Cisco Unified

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

OnCommand Unified Manager

OnCommand Unified Manager OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

Setting up an MS SQL Server for IGSS

Setting up an MS SQL Server for IGSS Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3

More information

Security Specifications

Security Specifications Security Specifications Overview Password Manager Pro deals with administrative passwords that offer secure access to enterprise credentials and devices. Any compromise on the security of these passwords

More information

Requirement Priority Name Requirement Text Response Comment

Requirement Priority Name Requirement Text Response Comment N-Tiered Architecture Accessibility Application architecture shall consist of a minimum of four tiers: proxy, presentation, application, and data [base]. Each of the fours tiers shall be separated with

More information

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3 Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

Last Updated: July 2011. STATISTICA Enterprise Server Security

Last Updated: July 2011. STATISTICA Enterprise Server Security Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...

More information

StreamServe Persuasion SP5 StreamStudio

StreamServe Persuasion SP5 StreamStudio StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

Integrating CoroSoft Datacenter Automation Suite with F5 Networks BIG-IP

Integrating CoroSoft Datacenter Automation Suite with F5 Networks BIG-IP Integrating CoroSoft Datacenter Automation Suite with F5 Networks BIG-IP Introducing the CoroSoft BIG-IP Solution Configuring the CoroSoft BIG-IP Solution Optimizing the BIG-IP configuration Introducing

More information

Configuring and Monitoring SiteMinder Policy Servers

Configuring and Monitoring SiteMinder Policy Servers Configuring and Monitoring SiteMinder Policy Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part

More information

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816. RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Introduction to the HP Server Automation system security architecture

Introduction to the HP Server Automation system security architecture Introduction to the HP Server Automation system security architecture Technical white paper Table of contents Introduction to the HP Server Automation system security architecture... 2 Enforcing strict

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Installation and configuration guide

Installation and configuration guide Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for

More information

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7

Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7 Directory Connector SonicWALL Directory Services Connector 3.1.7 Contents Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Issues... 4 Overview... 7 About SonicWALL Single Sign-On

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property

More information

Aradial Installation Guide

Aradial Installation Guide Aradial Technologies Ltd. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document

More information

Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1

Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Avaya Solution & Interoperability Test Lab Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Abstract These Application Notes describe the

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Use Enterprise SSO as the Credential Server for Protected Sites

Use Enterprise SSO as the Credential Server for Protected Sites Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured

More information

Users Guide. SelenioFlex File. Version 2.10.0

Users Guide. SelenioFlex File. Version 2.10.0 SelenioFlex File Version 2.10.0 August 2015 Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document and its contents to be

More information

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

CrashPlan Security SECURITY CONTEXT TECHNOLOGY TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops

More information

Security Features in Password Manager

Security Features in Password Manager Security Features in Written by Einar Mykletun, Ph.D. security and compliance architect for research and development at Dell Introduction Information system security is a priority for every organization,

More information

Defender 5.7 - Token Deployment System Quick Start Guide

Defender 5.7 - Token Deployment System Quick Start Guide Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register

More information

Unicenter Remote Control r11

Unicenter Remote Control r11 Data Sheet Unicenter Remote Control r11 Unicenter Remote Control TM is a highly reliable and secure application for controlling and supporting remote Windows and Linux systems. It delivers all of the features

More information

Bentley CONNECT Dynamic Rights Management Service

Bentley CONNECT Dynamic Rights Management Service v1.0 Implementation Guide Last Updated: March 20, 2013 Table of Contents Notices...5 Chapter 1: Introduction to Management Service...7 Chapter 2: Configuring Bentley Dynamic Rights...9 Adding Role Services

More information

IceWarp to IceWarp Server Migration

IceWarp to IceWarp Server Migration IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone

More information

Web Plus Security Features and Recommendations

Web Plus Security Features and Recommendations Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

LifeSize Control TM Deployment Guide

LifeSize Control TM Deployment Guide LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Websense Support Webinar: Questions and Answers

Websense Support Webinar: Questions and Answers Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

FileMaker Server 14. FileMaker Server Help

FileMaker Server 14. FileMaker Server Help FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks

More information

FileMaker Server 12. FileMaker Server Help

FileMaker Server 12. FileMaker Server Help FileMaker Server 12 FileMaker Server Help 2010-2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc.

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

7750 SR OS System Management Guide

7750 SR OS System Management Guide 7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted

More information

How To Secure Your Data Center From Hackers

How To Secure Your Data Center From Hackers Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

FileMaker Server 11. FileMaker Server Help

FileMaker Server 11. FileMaker Server Help FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks

More information

Monitor Print Popup for Mac. Product Manual. www.monitorbm.com

Monitor Print Popup for Mac. Product Manual. www.monitorbm.com Monitor Print Popup for Mac Product Manual www.monitorbm.com Monitor Print Popup for Mac Product Manual Copyright 2013 Monitor Business Machines Ltd The software contains proprietary information of Monitor

More information

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo

More information

Data Security and Governance with Enterprise Enabler

Data Security and Governance with Enterprise Enabler Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

An Analysis of Propalms TSE and Microsoft Remote Desktop Services An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

MicrosoftDynam ics GP 2015. TenantServices Installation and Adm inistration Guide

MicrosoftDynam ics GP 2015. TenantServices Installation and Adm inistration Guide MicrosoftDynam ics GP 2015 TenantServices Installation and Adm inistration Guide Copyright Copyright 2014 Microsoft Corporation. All rights reserved. Limitation of liability This document is provided as-is.

More information

Framework 8.1. External Authentication. Reference Manual

Framework 8.1. External Authentication. Reference Manual Framework 8.1 External Authentication Reference Manual The information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys

More information