How To Protect Freespeech From Attack From A Hacker Attack
|
|
- Bartholomew Barrett
- 3 years ago
- Views:
Transcription
1 customer care solutions from Nuance enterprise white paper :: Nuance FreeSpeech Security Overview Version 7.0
2 NUANCE :: customer care solutions Contents About this Document...3 Nuance FreeSpeech Security Overview...3 Architecture & System Components...3 System Components...4 Product infrastructure...6 Authentication...7 Web Server Access...7 Database Access...7 LDAP Server Access...7 File System Access...7 Authorization...7 System Authorization...7 Audit...8 Audit levels...8 Audit Protection...9 Audited operations and entities...9 Log viewer...10 Administration...10 Web based administration applications...10 FSMCLI...13 SNMP...14 Data Security Data manipulation...14 Data Integrity & Encryption...14 Custom Encryption Plug-in...14 Multi-tenancy...14 Network Security...15 Interface protection...15 Inter-Process Communication security...15 About Nuance
3 About this Document Nuance FreeSpeech is a unique biometric speaker verification system that transparently verifies speakers and/or identifies known fraudsters in the background of a natural conversation. FreeSpeech is the most comprehensive, natural language speaker verification system available today, enabling customers to utilize the biometric power of voice to provide secure, efficient and convenient access to contact centers. New features available in FreeSpeech 7.0 ensure end-to-end security, meeting the most stringent IT security requirements. This document provides an overview of FreeSpeech product security. As an authentication product, FreeSpeech implements a wide range of security measures to protect its resources against diversified threats. This document is intended for sales engineers and for IT security personnel who need to evaluate the use FreeSpeech in their protected IT environments. Nuance FreeSpeech Security Overview FreeSpeech is a voice biometrics system which is implemented in security-sensitive environments. As such, it must adhere to strict security requirements and comply with privacy and additional industry-specific regulations. FreeSpeech is protected at both the application level and the infrastructure level using the standard Four A s of enterprise security: Administration, Authentication, Authorization, and Audit. FreeSpeech s security design is based on the Common Criteria Protection Profile for biometric speaker verification systems and has successfully passed third-party security audits and penetration attacks performed by customers. FreeSpeech supports integrated Windows security and role based authorization (RBA). Together with the security mechanisms provided by the system infrastructure, the system can be configured to meet the security requirement of financial services, government agencies, healthcare service providers and other securitysensitive organizations. The following diagram provides an overview of FreeSpeech security architecture and mechanisms. Integrated Windows Security CTI Gateway Web Service SSL Buffer Overflow & SQL Injection Check Admin Apps File System Hashed Audio File Names NTFS IIS FreeSpeech TM Processing Server LDAP Authentication, Authorization, Audit Active Directory/ ADAM.NET Reporting LDAP FreeSpeech TM Processing Server FreeSpeech TM DB Oracle / SQL Server / Sybase / DB2 Full System Audit Authorization Manager Role-Based Authorization 3
4 NUANCE :: customer care solutions Architecture & System Components FreeSpeech includes a set of applications, services and tools that work together in order to provide voice biometrics services. System Components The FreeSpeech system is comprised of three main logical components the Processing Server, the Data Repository Server, and the Audio Acquisition Server. These components can reside on a single machine or be distributed among multiple machines. A system can be comprised of multiple instances of each component. Processing Server The Processing Server is the main processing component of the FreeSpeech system. Multiple Processing Servers can optionally be used in a redundancy scheme for high availability purposes, or in a load balancing scheme for scalability. The Processing Servers run the FreeSpeech application that provides the following functions: Service control The Processing Server exposes a set of Web Services (SOAP/HTTP) which are used by calling applications as well as by the system s administration tools and Web-based GUI Applications. Algorithmic processing This is the core biometric functionality of FreeSpeech. Each Processing Server includes two web applications that run under Microsoft IIS: FreeSpeech Web Services Provides a set of API methods accessed through SOAP and HTTP. FreeSpeech Web Applications These web applications are used by Administrators, IT managers, Security Officers and helpdesk agents. In addition, the FreeSpeech system includes a set of utilities/desktop administration applications. These are typically installed with each Processing Server. Data Repository Server The Data Repository Server is the logical name of the component which is responsible for handling and storing persistent data. Each data repository server contains the following components: SQL Database The Database is used to store audit information, log messages and other information used for reports. FreeSpeech supports most of the leading Databases. LDAP Directory LDAP directory is used to securely store sensitive persistent data related to speakers, groups, voiceprints, and configurations. FreeSpeech supports multiple LDAP directories. Audio Files folder A shared folder used for storing audio files. Persistent Data Replicator (PDR) Nuance s replication service, responsible for duplicating database records and audio files between two data repository servers (Optional). Logger Service This service queues log messages and saves them in the background to the database. A FreeSpeech system must include at least one Data Repository Server. Two Data Repository Servers can be used in an active-active configuration for redundancy. 4
5 Audio Acquisition Server The FreeSpeech Audio Acquisition Server acquires audio for processing and streams it to the Processing Server. The Audio Acquisition Server can be one of two types: The Time Division Multiplexing Acquisition Server (TAS), or the VoIP Acquisition Server (VAS). The TAS is physically connected to the telephony trunks or extensions and acquires audio directly from them. This solution requires telephony cards. The VAS acquires audio by sniffing RTP packets which are directed to a known IP through standard network cards. This solution is totally software based. The following diagram outlines FreeSpeech components and architecture. FreeSpeech Web Applications FreeSpeech Native Web Service API s Technical Management Platform Admin Voiceprint Helpdesk Security Console Processing Server (FreeSpeech Application Pool) Biometric Engines Text Dependent Utterance Validation Processing Server (N+1) IIS Algorithmic Engines Voice/ DTMF/Tone Detection Liveness Detection FreeSpeech Web Applications Enrollment Consistency Check Playback Detection Crosstalk Cancelation ASR (Optional) Tools and Services Logger Service SNMP Agent Custom Encryption Hooks Authorization Manager Bit (Quick Test) Calibration Wizard Management Command Line Interface (MCLI) Hashed Audio Files File system Data Repository Server (1+1) User Group Database LDAP Directory Audit, Reports,Logs (Oracle, SQL Server, DB2 Voiceprint, Speakers MySQL, Sybase,Informix) Configuration, Roles, Scopes (Microsoft, AD, IBM Tivoli TDS) Tools and Services PDR - Nuance Data Replicator DB/Audio Sync Logger Service SNMP Agent TAS TDM Acquisition Server (N+1) Technical Monitoring Speaker Separation Audio Acquisition Boards VAS VOIP Acquisition Server (N+1) Technical Monitoring Speaker Separation VOIP Sniffing and Port Tracking 5
6 NUANCE :: customer care solutions Product infrastructure Operation System FreeSpeech is based on.net framework 4.0 and as such it can run only on Windows machines. Currently the product supports the following OS: Windows XP Windows 2003 Server Windows 2008 Server Windows7 Database A Database is used to store audit information and log messages. The database may be installed on the same machine as the Data Repository or on a remote machine. FreeSpeech utilizes common ADO.NET infrastructure to access the database. FreeSpeech supports the following databases: Microsoft SQL Server 2005 Microsoft SQL server 2000 Oracle 10g with RAC support Oracle 11g with RAC support DB2 MySQL 5.5 SQL Express LDAP Directory LDAP is an application protocol for reading and editing directories over an IP network. The LDAP Directory is used to securely store the application s persistent data entities such as speakers, voiceprints, and configuration. The supported LDAP Directories are: ADAM Active Directory Application Mode - This lightweight version of Microsoft Active Directory runs as a service on the data repository server - this is the default directory for installations on Windows XP and Win2003 Server operating systems. AD LDS Active Directory Lightweight Directory Services - This lightweight version of Microsoft Active Directory runs as a service on the data repository server - this is the default directory for installations on Windows 7 and Win2008 Server operating systems. Active Directory Microsoft s Directory Services product - The domain s active directory can be used as the LDAP directory. When used, an extension of the Active Directory Schema is required in order to support FreeSpeech entities. TDS IBM Tivoli Directory Server. Web Server The FreeSpeech system uses IIS (Internet Information Services) as its web server and is based on the IIS ASP.NET 4.0 extension. FreeSpeech 7.0 offers an enhanced, open, and flexible Web service APIs, ensuring smooth, platform-independent integration using any programming environment. In addition, the FreeSpeech 6
7 Web Applications enable easy access to tools and information needed for successful deployment. FreeSpeech utilizes IIS web server security mechanisms (i.e. application session timeout, limiting access to specific IPs etc. are supported). Authentication Web Server Access FreeSpeech authenticates users based on Windows Integrated Security. This ensures that system policies regarding passwords are handled according to the local domain policies (enforced by the Domain Controller). FreeSpeech does not store passwords in its database or in any other application s data store. Users accessing the system, whether by programmatically calling the system s web service API, by using one of the administration applications, or by accessing a web page, are authenticated by the IIS using the Domain Controller. By setting a designated configuration parameter, the system can ensure exclusive log-in to the web applications. Note: Authentication policies supported by Microsoft IIS, such as certificates and passports are also supported by FreeSpeech. The FreeSpeech Web Applications can be configured to enable Single Sign On which eliminates the need to re-enter user-name and password when accessing the application. Database Access Credentials to the system s database are provided as part of the connection string used by FreeSpeech. By default, FreeSpeech uses Windows integrated security as the database authentication method. This means that the application s identity is used when accessing the database. Another alternative is to specify a username and password in the connection string. When this is done, this identity is used by all components accessing the database and must be managed manually. When this option is used, the password is saved encrypted in the system s configuration file. LDAP Server Access The applications access the LDAP Server using Windows Integrated Security. Note that the application s identity is used when accessing the LDAP Server. File System Access File system access is controlled by the operating system. Every access to the file system by the FreeSpeech application will be performed under the credentials of the application user. Authorization System Authorization Role-based Authorization (RBA) FreeSpeech utilizes Microsoft Authorization Manager (AZMAN) for managing roles and operations. AZMAN is general-purpose role-based security architecture for Windows. Using roles, the operating system determines whether a process or a user is privileged to perform an operation. 7
8 NUANCE :: customer care solutions Roles are defined in the Authorization Store of FreeSpeech s LDAP Directory. Each role can be granted permission to perform operations (a basic activity unit that the system performs). Every API method has a corresponding operation. Windows users and groups can be assigned a role, and be authorized to perform operations according to the role s definition. The system is installed with the following predefined roles. These roles can be customized and additional roles can be defined. ClientApplication HelpDesk PlatformAdmin MainScope Security Every access to the Database, the LDAP Server, or the file system by the FreeSpeech application is performed using the credentials of the application user. Once the application validates that the network user is permitted to perform a certain operation, the application user serves as a delegate for the network user. This means that in order to allow an application user to perform an operation that will delete a file from the file system for example, it is not required to add write privileges to the network user. Audit FreeSpeech Audit is composed of the following elements: Every API method is logged in the system s database. Other standard system infrastructure components (such as the OS, IIS, DB) have their own auditing tools and capabilities that needs to be enabled. Audio files used for Enrollment/Verification may be saved for Audit purposes. Audit levels FreeSpeech allows the system administrator to control the level of audit info detail that will be saved by the system. There are three audit levels: Alg Debug Specifies whether to audit detailed algorithmic outputs (mainly used for algorithmic troubleshooting). Operational Specifies whether to save operation level audit information (such as Enroll/Verify/Identify/ Fraudsters detection etc.). There are three options of saving operational level audit information: Always the system saves all audit information. Conditional the system saves audit information only for delete operations and in case of an error in other operations. Never the system does not save operational-level audit information. System Specifies whether to save system level audit information. There are three options of saving system level audit information: Always the system saves all system level audit information. Conditional the system saves audit information only for system level write operations and in case of an error in read operations. Never the system does not save system-level audit information. 8
9 In addition, a configuration parameter named log level enables selecting the desired log level, enabling the system to keep different levels of log messages for different applications, services or scopes. Audit Protection FreeSpeech audit information is stored securely in the system s database. Besides the system specific audit trail, FreeSpeech system infrastructure (IIS, LDAP Directory, Database) logs are protected in diversified (standard) ways. Audited operations and entities Auditing Audio Files FreeSpeech support auditing audio files used in the system using two configuration parameters: SaveEnrollAudio - Specifies whether to save enrollment audio. Always Enrollment audio is always saved UntilTrained Enrollment audio is saved temporarily and deleted as soon as the voiceprint is trained. Never Enrollment audio is never saved. SaveOperationalAudio Specifies whether to save operational audio (the audio associated with Verify, Identify, and Fraudsters Detection operations). LDAP Server Audit LDAP Server supports audit capabilities and enables flexible audit configuration. For more information refer to API Audit Every call to an API method is logged in the system s database. The API record includes the following details: Request ID A 64bit unique identifier assigned to each API call. This ID is unique across all the system s servers and can be used to reference other details stored in the database about the request such as verification score, or failure details. Method Name The API method name. Input Parameters The values of the API method parameters. Finish Status An error or success code. Timestamp The exact time of the request execution. Server name The name of the processing server that handled the request. Client ID The IP address of the client. User name The windows username of the client. Data repository server name The name of the data repository server on which the data was originally stored. Session ID A token which is received from the StartSession command that launched the current session. Scope The scope which is the context of the current API operation. 9
10 NUANCE :: customer care solutions Log viewer FreeSpeech saves log messages in the database based on the LogLevel parameter in the system configuration. Log messages can be accessed using the Log Viewer which enables online or offline viewing of an application s log messages. The Log Viewer is available as a Windows application or as a Web page in the Technical Management application. Use the Log functionality to troubleshoot the system or analyze past system activity. The log section is divided into two views: History Log View which enables auditing past system activities. Log information retrieval can be controlled by dates and log level. Once retrieved, log information can be saved, sorted, filtered or saved to a file. Online Log View is used to monitor system activities in real time. The Online Log View displays systemwide log messages as they are recorded in the FreeSpeech data base, enabling isolating faults and communicating them with the vendor. Log messages can be saved to a file. Administration Web based administration applications FreeSpeech provides a set of web-based administration applications allowing management of all system aspects. The following applications are provided out-of-the-box: Technical Management Platform Admin FreeSpeech Platform Admin is a web based Application that provides a variety of tools for properly setting up the system and its biometric functionality as well as managing speakers, voiceprints and groups. Use this application to configure FreeSpeech, perform queries and reports, and monitor the system usage. Voiceprint Helpdesk FreeSpeech Voiceprint Helpdesk provides a set of tools enabling auditing and reviewing a speaker s interactions with the system. Use the Helpdesk functions to audit verification results and decisions, edit speaker information, delete a speaker, edit a voiceprint and more. Security Console The FreeSpeech Security Console enables security personnel to audit FreeSpeech operation and analyze specific verification and identification processes. The application provides tools for managing fraudsters voiceprints and groups. In addition, the security console collects and presents diversified security alerts. FreeSpeech Technical Management Application enables technical personnel, who are in charge of the systems health, to monitor FreeSpeech system s component status, audit system-wide logs, schedule administrative tasks such as audio purging, upload and view system licenses, and more. Access to these applications is controlled by Windows Integrated Security and FreeSpeech s role based authorization. 10
11 The Web-based Security Console Application The FreeSpeech Security Console Application enables security personnel to audit FreeSpeech operation and analyze specific verification and identification processes. The application provides tools for managing voiceprints as well as all aspects of user authorization. The Security Console Application is divided into four functionalities: Authorization Manager, Voiceprint Helpdesk, Configuration, and Log. The following screenshot presents this functionality: 1. Authorization Manager Functionality Allows managing all aspects of User Authorization. Using roles, the system can make determinations, such as whether a process is privileged to perform an action. FreeSpeech utilizes Microsoft s Authorization Manager Infrastructure to manage user authorization in the system. Authorization Manager functionality is divided into three sections: a. Scope Management Used adding scopes (tenancies) in a multi-tenant system b. User Management Used for assigning roles to users and groups c. Role Management Used for defining, creating and customizing roles The following screenshots depict the User Management page and the role customization functionality of the Security Console. 11
12 NUANCE :: customer care solutions 2. Voiceprint Helpdesk Functionality Provides a set of tools enabling auditing and reviewing of a speaker s interactions with the system, editing voiceprint audio and adapting voiceprints with audio used for verification. Voiceprint Helpdesk is divided into two section: a. Audit Speaker Interactions Used for reviewing a specific speaker s interactions with the system. Information available includes session information as well as information regarding each and every operation within the session (i.e. Enrolment, Verification etc.). Verification statistics and scores are displayed including decision reasons and extended scoring information. Speaker audit information can be filtered, sorted and grouped for better analysis. Audit information also includes the speaker s audio. This audio can be played back and/or downloaded assuming the system audit configuration is set to store it and the proper security privileges are set. b. Review Voiceprint Enables reviewing of a speaker s voiceprints. This is used to listen to audio used for enrollment, and edit it if necessary, removing unrelated or faulty audio. The Edit Voiceprint page enables removing and adding audio segments from/to a speaker s voiceprint and adapting 12
13 it with verification audio segments if available. Use the Edit Voiceprint page to fix problematic voiceprints that deliver high false rejection rate as well as to enhance the quality of existing voiceprints via manual adaptation. 3. Configuration Functionality - Enables the system administrator to control and manipulate the system configuration and operation. The FreeSpeech system supports multiple concurrent configurations that are used to control the system s diversified functionality and multi-engine infrastructure. Use the configuration functionality to comply with diversified requirements (i.e. Security, Audit), optimize the system performance, and adjust its functionality to accommodate for a specific call/verification flow. Configuration is divided into two sections: a. Edit Configuration Sets Enables creating, editing, uploading, downloading, and comparing Configuration Sets. A Configuration Set is a set of parameters and their corresponding values that controls the operation of FreeSpeech in a specific context which can be an application or a specific operation. Configuration Sets inherit parameters values from the system s Default configuration set and enable the user to overwrite specific ones as necessary. b. Configuration Audit Used to track all of the system s configuration changes. Use this page to review configuration changes and filter them by dates, parameter category, and more. Information retrieved includes parameters values, timestamp, change initiator, IP and host name. The Configuration Audit page can be used by the system administrator as well as by Nuance support to isolate system problems caused by configuration errors. 13
14 NUANCE :: customer care solutions 4. Log functionality Enables viewing history and on-line system log information. Use the Log functionality to troubleshoot the system or analyze past system activity. Log is divided into two sections: a. The History Log View is used to audit past system activities. Log information retrieval can be controlled by dates and log level. Once retrieved, log information can be saved, sorted or filtered. b. The Online Log View is used to monitor system activities in real time. The Online Log View displays system-wide log messages as they are recorded in the FreeSpeech data base, enabling isolating faults and communicating them to the vendor. Log messages can be saved to a file. FSMCLI FreeSpeech includes a command line utility that enables administrators to perform various administration tasks such as: retraining voiceprints or deleting history records from the database. A system administrator using the FSMCLI must have the proper credentials and authorization to use the various functionality provided by this utility. SNMP FreeSpeech s SNMP agent receives SNMP requests and sends SNMP traps to standard network monitoring consoles complying with SNMPv2 standard. Each Processing Server has an SNMP agent service that handles SNMP Get/Set requests and sends SNMP traps when important system events occur. FreeSpeech monitoring can be easily added to standard SNMP-based consoles. Data Security Data manipulation FreeSpeech checks every input against data manipulations such as: SQL injection, LDAP injection, Buffer overflow and Cross-Site Scripting (XSS). Data Integrity & Encryption Voiceprints are stored in a proprietary format in the system s LDAP directory and cannot be reverse engineered. Voiceprints are signed with the speaker ID and the customer ID (system ID) which is a unique key assigned to each installation. This signing protects the system voiceprints from being manipulated by authorized users. Voiceprints cannot be used outside the specific system as well as in other FreeSpeech systems. Customer Related Information (Speaker IDs, Group IDs), is encrypted by FreeSpeech by default using 128 bit encryption mechanism (Rijndel). Customer-specific encryption mechanisms are supported. Audio Files stored in the files system can be encrypted using standard OS encryption mechanisms. The names of the saved audio files are hashed so that they cannot be associated directly with a specific speaker. LDAP Directory Store is used by FreeSpeech (Provided by Microsoft/IBM) and encrypted by default using proprietary encryption mechanisms. Database is used by FreeSpeech and can be configured to encrypt stored information. 14
15 Custom Encryption Plug-in Nuance supplies a built in encryption mechanism which uses Rijndael symmetric encryption (AES) 128bit. In case the customer wishes to control the system s encryption method, he may do so through the encryption plug-in. The encryption plug-in enables customized encryption, giving the customer full control over the encryption algorithm and key. A configuration parameter which points to the encryption software must be set to enable custom encryption. Multi-tenancy Multi-tenancy enables logical partitioning of the entire system in an effortless manner through the use of scopes. This allows a clear cut separation of the system s data, configuration, audit, roles, etc. within an organization, enabling a single enterprise to use FreeSpeech for multiple/distinct applications in different business units. Multi-tenancy is ideal for a hosted solution, enabling a service provider to offer FreeSpeech as a service to multiple enterprises. The benefits are both from a practical aspect and from a security aspect. Regardless of what system tool is used or what API method is called, everything is performed in the context of a specific scope. Scopes are assigned to users by the system security administrator. Each session is associated with a certain scope, the configuration set specified when calling an API method is used to determine the desired scope. Network Security Interface protection FreeSpeech web service interface access is controlled using IIS6 or IIS7 security supporting SSL encryption. All authentication schemes are supported: Integrated, Basic, Digest, and Certificates. Inter-Process Communication security FreeSpeech Processes The different components which compose the FreeSpeech system communicate with each other over TCP using WCF (Windows Communication Foundation). Windows Communication Foundation is the technology used for inter-process communication between different components of FreeSpeech. More information regarding WCF refer to All ports used for inter-process communication are configurable. This allows System Administrators to specify which ports will be used in their specific site. The component used for inter-process communications is NET. TCP. This standard component secures TCP communications in various ways. Processing Server LDAP Directory Communication Security FreeSpeech communicates with the LDAP directory via a.net component (Microsoft Directory Entry) as part of Microsoft Directory Services which is part of.net Framework. The component supports LDAPS for secure LDAP communication. Processing Server SQL Database Communication Security FreeSpeech communicates with the SQL Server using a database-specific ADO.Net provider. The provider communication security is proprietary and database-specific. 15
16 NUANCE :: customer care solutions About Nuance Communications, Inc. Nuance is a leading provider of speech and imaging solutions for businesses and consumers around the world. Its technologies, applications and services make the user experience more compelling by transforming the way people interact with information and how they create, share and use documents. Every day, millions of users and thousands of businesses experience Nuance s proven applications and professional services. For more information, please visit: Nuance Communications, Inc. All rights reserved. Nuance, the Nuance logo, The experience speaks for itself, SpeakFreely, and FreeSpeech are trademarks and/or registered trademarks of Nuance Communications, Inc., and/or its subsidiaries in the United States and/or other countries. All other trademarks are the properties of their respective owners. WP NUCC1094 NUANCE COMMUNICATIONS, INC. one wayside road burlington ma nuance.com
customer care solutions
customer care solutions from Nuance enterprise white paper :: Nuance VocalPassword Security Overview Version 7.0 NUANCE :: customer care solutions Contents About this Document...3 Nuance VocalPassword
More informationNuance FreeSpeech 8.2 :: Product Description
Nuance FreeSpeech 8.2 :: Product Description 8.2 About Nuance FreeSpeech Nuance is proud to present FreeSpeech 8.2, a unique biometric speaker verification system that transparently verifies speakers in
More informationNuance VocalPassword 8.2 :: Product Description
Nuance VocalPassword 8.2 :: Product Description About Nuance VocalPassword Nuance is proud to present VocalPassword 8.2, the most secure, accurate, flexible, and easily deployed biometric speaker verification
More informationFreeSpeech : caller identity verification.
FreeSpeech : caller identity verification. Real-time validation of caller identity and detection of known fraudsters. 1 FreeSpeech for passive caller authentication. 9 FreeSpeech enables fully transparent
More informationVocalPassword : voice biometrics authentication.
VocalPassword : authentication. Friendly voice authentication across web, IVR, call center, or mobile. 1 VocalPassword for easy and secure authentication. VocalPassword, the world s most widely deployed
More informationNuance VocalPassword v9 :: Product Description
Nuance VocalPassword v9 :: Product Description Solution Overview VocalPassword, the world s most widely deployed voice biometric solution, enables easy and secure authentication by analyzing a person s
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationSecret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
More informationData Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
More informationTenable for CyberArk
HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationNetop Remote Control Security Server
A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days
More informationWebEx Security Overview Security Documentation
WebEx Security Overview Security Documentation 8/1/2003: WebEx Communications Inc. WebEx Security Overview WebEx Security Overview Introduction WebEx Communications, Inc. provides real-time communication
More informationIntroduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
More informationCopyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
More informationInstallation Guide ARGUS Symphony 1.6 and Business App Toolkit. 6/13/2014 2014 ARGUS Software, Inc.
ARGUS Symphony 1.6 and Business App Toolkit 6/13/2014 2014 ARGUS Software, Inc. Installation Guide for ARGUS Symphony 1.600.0 6/13/2014 Published by: ARGUS Software, Inc. 3050 Post Oak Boulevard Suite
More informationInterworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
More informationInterwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
More informationSecurity FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
More informationConfiguring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
More informationMediasite EX server deployment guide
Mediasite EX server deployment guide 2008 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc. Additional copies
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationMySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationPre Sales Communications
Pre Sales Communications OmniVista 4760 from R4.1 & OmniPCX Enterprise R7.1 IP Protocols and Ports All rights reserved 2006, Alcatel Table of contents 1. Objectives...3 2. IP protocols...3 2.1. Global
More informationRSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
More informationWhite Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
More informationHYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2
HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and
More informationTrueSight Operations Management Monitoring Studio
USER DOCUMENTATION APPLICATIONS MONITORING TrueSight Operations Management Monitoring Studio Version 9.0.00 June 2015 Contacting BMC Software You can access the BMC Software Web site at http://www.bmc.com.
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
More informationHow To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2
DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...
More information000-596. IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam. http://www.examskey.com/000-596.html
IBM 000-596 IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam TYPE: DEMO http://www.examskey.com/000-596.html Examskey IBM 000-596 exam demo product is here for you to
More informationIBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM
IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product
More informationThick Client Application Security
Thick Client Application Security Arindam Mandal (arindam.mandal@paladion.net) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
More informationCrestron Fusion Version 9.3 Enterprise Management Platform Installation Guide
Crestron Fusion Version 9.3 Enterprise Management Platform Installation Guide The specific patents that cover Crestron products are listed at patents.crestron.com. Crestron, the Crestron logo, Capture
More informationOracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01
Oracle Enterprise Single Sign-on Provisioning Gateway Administrator Guide Release 10.1.4.1.0 E12613-01 March 2009 Oracle Enterprise Single Sign-on Provisioning Gateway, Administrator Guide, Release 10.1.4.1.0
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More informationApplication Note: Cisco Integration with Onsight Connect
Application Note: Cisco Integration with Onsight Connect Table of Contents Application Note:... 1 Cisco Integration with Onsight Connect... 3 Direct Onsight Device to Cisco Endpoint Calls... 3 Cisco Unified
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationOnCommand Unified Manager
OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501
More informationOwner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this
More informationProduct Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
More informationManagement, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
More informationSetting up an MS SQL Server for IGSS
Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3
More informationSecurity Specifications
Security Specifications Overview Password Manager Pro deals with administrative passwords that offer secure access to enterprise credentials and devices. Any compromise on the security of these passwords
More informationRequirement Priority Name Requirement Text Response Comment
N-Tiered Architecture Accessibility Application architecture shall consist of a minimum of four tiers: proxy, presentation, application, and data [base]. Each of the fours tiers shall be separated with
More informationCitrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3
Citrix EdgeSight Administrator s Guide Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for enapp 5.3 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior
More informationenicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
More informationLast Updated: July 2011. STATISTICA Enterprise Server Security
Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...
More informationStreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
More informationBlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
More informationIntegrating CoroSoft Datacenter Automation Suite with F5 Networks BIG-IP
Integrating CoroSoft Datacenter Automation Suite with F5 Networks BIG-IP Introducing the CoroSoft BIG-IP Solution Configuring the CoroSoft BIG-IP Solution Optimizing the BIG-IP configuration Introducing
More informationConfiguring and Monitoring SiteMinder Policy Servers
Configuring and Monitoring SiteMinder Policy Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part
More informationRingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.
RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...
More informationowncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
More informationXerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
More informationwww.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
More informationPreparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
More informationIntegrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
More informationIntroduction to the HP Server Automation system security architecture
Introduction to the HP Server Automation system security architecture Technical white paper Table of contents Introduction to the HP Server Automation system security architecture... 2 Enforcing strict
More informationSystem Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
More informationInstallation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
More informationContents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7
Directory Connector SonicWALL Directory Services Connector 3.1.7 Contents Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Issues... 4 Overview... 7 About SonicWALL Single Sign-On
More informationSynchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
More informationAradial Installation Guide
Aradial Technologies Ltd. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document
More informationApplication Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Abstract These Application Notes describe the
More informationFINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationUse Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
More informationUsers Guide. SelenioFlex File. Version 2.10.0
SelenioFlex File Version 2.10.0 August 2015 Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers this document and its contents to be
More informationCrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
More informationSecurity Features in Password Manager
Security Features in Written by Einar Mykletun, Ph.D. security and compliance architect for research and development at Dell Introduction Information system security is a priority for every organization,
More informationDefender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
More informationUnicenter Remote Control r11
Data Sheet Unicenter Remote Control r11 Unicenter Remote Control TM is a highly reliable and secure application for controlling and supporting remote Windows and Linux systems. It delivers all of the features
More informationBentley CONNECT Dynamic Rights Management Service
v1.0 Implementation Guide Last Updated: March 20, 2013 Table of Contents Notices...5 Chapter 1: Introduction to Management Service...7 Chapter 2: Configuring Bentley Dynamic Rights...9 Adding Role Services
More informationIceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
More informationWeb Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
More informationBlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
More informationLifeSize Control TM Deployment Guide
LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications
More informationConfiguration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
More informationWebsense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
More informationHow To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
More informationFileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
More informationFileMaker Server 12. FileMaker Server Help
FileMaker Server 12 FileMaker Server Help 2010-2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc.
More informationDell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
More information7750 SR OS System Management Guide
7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted
More informationHow To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
More informationCNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills
More informationNETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationOnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
More informationFileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
More informationServer Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
More informationIBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide
IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks
More informationMonitor Print Popup for Mac. Product Manual. www.monitorbm.com
Monitor Print Popup for Mac Product Manual www.monitorbm.com Monitor Print Popup for Mac Product Manual Copyright 2013 Monitor Business Machines Ltd The software contains proprietary information of Monitor
More informationInstalling and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management
IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo
More informationData Security and Governance with Enterprise Enabler
Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date
More informationRSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
More informationAn Analysis of Propalms TSE and Microsoft Remote Desktop Services
An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management
More informationBlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
More informationMicrosoftDynam ics GP 2015. TenantServices Installation and Adm inistration Guide
MicrosoftDynam ics GP 2015 TenantServices Installation and Adm inistration Guide Copyright Copyright 2014 Microsoft Corporation. All rights reserved. Limitation of liability This document is provided as-is.
More informationFramework 8.1. External Authentication. Reference Manual
Framework 8.1 External Authentication Reference Manual The information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys
More information