Protecting Your Zimbra Collaboration Environment. Zimbra Security and Privacy White Paper
|
|
|
- Oswin Ferguson
- 10 years ago
- Views:
Transcription
1 Protecting Your Zimbra Collaboration Environment Zimbra Security and Privacy White Paper
2 Table of Contents The Zimbra Approach to Security and Data Privacy Open Source Commitment Adherence to Open Standards Flexible, Open Architecture Tour of the Security Life Cycle Identity and Access Management Information Security and Privacy Administration Zimbra Partner Ecosystem MTA-Level Integration Zimlets Conclusion Acronyms
3 The Zimbra Approach to Security and Data Privacy With the rise of mobile and cloud computing, sacrificing user experience for improvements to security is no longer an option. Normal modes of business communication have shifted from personal computers to mobile devices. With this shift, organizations must update legacy messaging and collaboration systems to better address the changing threat and technology landscape. As a messaging and collaboration platform, Zimbra Collaboration is at the core of business communication, a mission-critical component of the organization s information infrastructure. Since no two organizations are the same, the need for flexible, extensible software is critical to the success of any information security and technology program. This paper explores the native security and privacy features of Zimbra Collaboration. As organizations look to create comprehensive compliance and governance practices, and proactively mitigate malicious activity, Zimbra s approach to security and privacy will help guide evaluations of Zimbra Collaboration as a cornerstone of your information infrastructure. Open Source Commitment As a commercial open source vendor, Zimbra offers customers and partners accountability as well as transparency. The open source community reinforces visibility into the software code, while Zimbra ensures that the software meets ongoing requirements for deployments within enterprise and service provider infrastructure environments. This combination results in joint innovation that benefits user experience, security and data privacy. What is open source software? Software licensed with a copyright license compliant with the Open Source Definition. Software is distributed with its source code in a human readable format. Software is developed in an open and collaborative way by groups of developers. Source: Open Software Initiative Zimbra Collaboration is built on established and trusted open source components, including the Linux file system (message store), Jetty (Web server and Java servlet container), MariaDB (database), Postfix (mail transfer agent), OpenLDAP (configuration data and user directory) and others. Each draws from its own open source community, which further improves software quality and thus software security. 1
4 As an active participant in the open source community, Zimbra contributes code to open source projects. Not only does this give back to the community that provides so much value it helps Zimbra Collaboration by validating, enhancing and streamlining the architecture through community input. Commitment to open source provides business continuity, which protects your messaging and collaboration technology investment by ensuring that the core product has a strong, diverse and developer-led open source community. Adherence to Open Standards Zimbra Collaboration uses widely adopted industry standards: Lightweight Directory Access Protocol (LDAP) Secure Sockets Layer/Transport Layer Security (SSL/TLS) Simple Mail Transfer Protocol (SMTP) Secure/Multipurpose Internet Mail Extensions (S/MIME) Security Assertion Markup Language (SAML) 2.0 Commitment to standards improves interoperability across mobile, desktop and cloud environments, as well as ensures partners are making calls into a consistent set of APIs. By using open standards, sophisticated users can create their own security and privacy tools or layer in a thirdparty solution. An open standard is a standard that is publicly available and has various rights to use associated with it, and may also have various properties of how it was designed (e.g. open process) There is no single definition and interpretations vary with usage. Source: Wikipedia 2
5 Flexible, Open Architecture Zimbra Collaboration uses a modular architecture that supports flexible, secure deployments and helps organizations easily fit the software into their unique information infrastructure. Additionally, the use of a modular platform allows organizations to use existing components of their infrastructure, limiting the need to rip and replace. Web Client Protocols HTTPS IMAPS/IMAP+STARTTLS POP3S/POP3+STARTTLS Proxy Clients Non-W eb Clients DNS MTA Proxy Non-Web Client Protocols SMTP LMTP+STARTTLS MTA Components AS/AV DKIM DMARC External LDAP Zimbra Collaboration Server (ZCS) ZCS Components ActiveSync Databases Message Store OpenLDAP Zimbra Web Clients (ZWC) APIs Admin UI REST/SOAP/DAV Extensions Zimlets 3
6 Tour of the Security Life Cycle Defense in depth, the coordinated use of multiple security measures to increase the security of the system as a whole, is still considered one of the best approaches to securing your information infrastructure. Identity and information security are central to Zimbra Collaboration, and by exposing rich interfaces to administrators, organizations can dramatically improve their security posture. Identity and Access Management Identity Lifecycle Management The first step to ensuring organizational security is understanding your users and their rights and privileges. Zimbra Collaboration leverages a native Lightweight Directory Access Protocol (LDAP) Directory for all Create, Read, Update and Delete (CRUD) functionality related to user administration specific to Zimbra Collaboration. The use of an external LDAP Directory is optional; however, all attributes specific to Zimbra Collaboration are stored and managed through the native LDAP Directory. The Lightweight Directory Access Protocol (LDAP) is an Internet protocol for accessing distributed directory services that act in accordance with X.500 data and service models. Source: IETF First-factor Authentication The primary authentication method into mail clients (Zimbra Collaboration or third-party) is username and password. The user store, whether Zimbra Collaboration or external, is used to store the appropriate login credentials. When the native directory is leveraged, all authentication takes place within Zimbra Collaboration, which ships with OpenLDAP. Zimbra Collaboration automatically stores a salted hash of the password. The hash is used for comparison against the entered password s salted hash, which is then rejected or accepted for login. If an external directory (LDAP or Active Directory) is preferred, the appropriate login credentials can be stored within this external LDAP directory, or similar. Additional attributes, specific to Zimbra Collaboration, are maintained within the native OpenLDAP Directory. For setting up external user stores or customer external authentication, refer to Section 5 (Zimbra LDAP Service) of the Zimbra Collaboration Administrator Guide. 4
7 Mobile Device Authentication For certain mobile devices, Zimbra Collaboration can ensure that the device complies with ActiveSync mobile security policies before allowing access. These policies might include timeouts, personal identification numbers (PINs) and local device wipe. For example, the user must enter a PIN to unlock the device; if a preconfigured number of incorrect PINs are entered, the device performs a local wipe. Identity Federation and Single Sign-On (SSO) To help organizations reduce user identity proliferation, Zimbra Collaboration can be set up as a Relying Party (RP) in a federated identity ecosystem, as well as streamline the user login process through SSO. As an RP, Zimbra Collaboration can consume identity assertions from SAML (including Shibboleth), OAuth and Connect ID Identity Providers (IDP). The IDP and Zimbra Collaboration mutually authenticate. Once a secure, trusted connection is established, the IDP will pass an identity assertion through to Zimbra Collaboration, which will allow or reject access. To reduce friction for users, Zimbra Collaboration can pass through authenticated credentials to connected services that rely on the same credentials. To achieve SSO, Zimbra Collaboration uses Kerberos (and an associated Kerberos5 service) or an LDAP pre-authentication key. For setting up a Kerberos service or becoming an RP (custom authentication), refer to Section 5 (Zimbra LDAP Service) of the Zimbra Collaboration Administrator Guide. Federated identity management enables identity information to be developed and shared among several entities and across trust domains. Tools and standards permit identity attributes to be transferred from one trusted identifying and authenticating entity to another for authentication, authorization and other purposes, thus providing single sign-on convenience and efficiencies to identified individuals, identity providers and relying parties. Source: Gartner, Inc. Two-factor Authentication For organizations looking to augment their security, an additional layer of identity security can be overlaid onto Zimbra Collaboration via custom authentication. In this scheme, the username and password act as the something you know with the second factor performing the function of a something you have, which is the traditional approach in a two-factor scheme. Authorized Access After users connect to Zimbra Collaboration, authorization processes control what data they can see and which functions they can perform. For example, most users can use their own and calendars, while some may be able to check someone else s calendar. 5
8 Zimbra Collaboration supports highly granular authorization frameworks. Attributes, permissions and policies drive everything in Zimbra (including accounts, domains, mail folder, contacts, calendar, tasks and briefcase folder). Administrators can easily create groups and assign access permissions to support specific business objectives. Permissions Zimbra Collaboration offers flexible permissions for shared mail folders, contacts, calendars, tasks lists and briefcase folders. You can grant internal users or groups permission to view, edit or share folders. You can also grant external users read-only or password-based access to shared objects. For example, you might give a colleague the permission to create, accept or delete meetings for your calendar but not to share your calendar with other users. Delegated, Role-Based Administration Zimbra Collaboration lets you delegate administrative tasks with highly configurable permissions. An administrator s role can be as simple as managing a distribution list or resetting forgotten passwords for a specific group of users. You can create roles from a plethora of attributes and for a number of tasks in Zimbra Collaboration. It also provides predefined roles for domain administrators and distribution-list managers. Information Security and Privacy The next layer to our defense-in-depth approach is to ensure that the information generated by users remains secure and private. Zimbra has taken several steps to ensure the privacy and security of user information, including shipping the product with security and privacy-enhancing mechanisms and protocols enabled as the default. Message Security, Integrity and Privacy By using cryptographic services, specifically public key or asymmetric cryptography, users can ensure message security, integrity and privacy, as well as sender authentication. To perform these functions, Zimbra Collaboration supports the use of S/MIME certificates, which can be provided by a publicly trusted Certification Authority (CA). Alternatively, an internal PKI may be used if public trust is not required. Cryptography Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). Public Key Cryptography Public key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms, which requires two separate keys, one of which is secret (or private) and one of which is public. Although different, the two parts of this key pair are mathematically linked. The public key is used to encrypt plaintext or to verify a digital signature, whereas the private key is used to decrypt ciphertext or to create a digital signature. Source: Wikipedia 6
9 An S/MIME certificate can provide message authentication, integrity and non repudiation through a digital signature, as well as message confidentiality through encryption. In addition, many nations have digital signature laws, which equate a digital signature to a physical signature and provide non-repudiation for digitally signed s, transactions or documents. Additional message authenticity methods available in Zimbra Collaboration: DomainKeys Identified Mail (DKIM) signatures can be added to headers to verify the sender s domain. Domain-based Message Authentication, Reporting and Conformance (DMARC) expands on DKIM capabilities to provide message authentication and includes explicit guidance on message handling if DKIM signatures aren t present. Amavisd-new leverages the integration with the Zimbra Collaboration OpenLDAP directory for domain attribute validation, including DKIM keys. Amavisd-new is housed in the Mail Transfer Agent (MTA) and manages the incoming and outgoing DMARC policies. In-Transit Encryption Zimbra recommends the use of, and defaults to, secure alternatives of all mail protocols and communications channels between Zimbra Collaboration services and endpoints. In fact, to further improve security and privacy, Zimbra provides the option to use opportunistic TLS or to require encrypted communications. For supported versions of Zimbra Collaboration, OpenSSL s cryptographic library is embedded into the product. S/MIME (Secure/Multipurpose Internet Mail Extensions) provides a consistent way to send and receive secure MIME data. Based on the popular Internet MIME standard, S/MIME provides the following cryptographic security services for electronic messaging applications: authentication, message integrity and non-repudiation of origin (using digital signatures), and data confidentiality (using encryption). As a supplementary service, S/MIME provides for message compression. Source: IETF Secure connections between endpoints/services use TLS; additional security is protocol specific: SMTP LMTP+STARTTLS HTTPS IMAPS/IMAP+STARTTLS POP3S/POP3+STARTTLS 7
10 At-Rest Encryption When S/MIME is used for end-to-end encryption, the data stored in the Zimbra Collaboration message store is encrypted until decryption takes place with the appropriate private key. Antivirus and Antispam -based malware remains a prominent threat for businesses, and while usually not as insidious, spam clogs systems and increases user frustration. Zimbra addresses malware and spam through both native functionality and third-party plugins. Amavisd-new is the interface for information exchange between MTA, ClamAV and SpamAssassin. ClamAV is open source antivirus software with traditional signature-based matching and heuristics. The rules and signatures are updated daily. SpamAssassin is open source antispam software that supports ongoing spam-filter training (i.e., teaching the filter what is spam and what isn t), enabling organizations to optimize performance in their own environments. Users can train spam filters by moving messages in and out of their junk folders. According to the AV-TEST Institute, over 390,000 new malicious programs are registered by their systems daily. By the end of 2014, there were over 300 million malicious programs (total), with 140 million of those being new malware as of Source: AV-TEST Institute Disaster Recovery and High Availability Though disaster recovery is not often considered a security feature, the assurance that your data is intact is beneficial for organizations. Also, as your user base grows, the need to ensure uptime and the timely delivery of data will increasingly put demands on the infrastructure. Zimbra is developing an active-active architecture to help ensure your information is delivered on time, every time. 8
11 Administration While the user is busy sending and receiving , scheduling appointments and collaborating with others, Zimbra Collaboration is logging activity. Based on your audit and compliance needs, you can set different levels of logging. Zimbra Collaboration logs a wide range of activities: User and administrator activity Login failures Slow queries Mailbox activity Mobile synchronization activity Database errors Zimbra Collaboration supports the syslog format and Simple Network Management Protocol (SNMP). Log events, alerts and traps can be forwarded to log-management and event correlation systems to create centralized policies and notifications based on your security and compliance requirements. These logs can support forensic analysis, which is useful for our next step: incident response. Zimbra Collaboration uses log4j, a Java logging package, as the log manager for mailboxd. By default, the Zimbra Collaboration server has log4j configured to log to the local file system, but log4j can be configured to direct output to a variety of other locations. For more, visit the Zimbra Wiki. Visit the Zimbra Wiki Incident Response Even with the layers of security we ve defined so far, you may need to take action to respond to a problem or mitigate risk. For example: A user s account credentials have been stolen. An executive left his or her smartphone in a taxicab. Log analysis reveals problematic activity on an administrator account. Zimbra supports incident response in several ways. 9
12 Remote Device Wiping If a tablet or smartphone that uses Zimbra Collaboration is lost or stolen, the administrator can wipe the data from the device remotely. This mitigates the risk of someone accessing the Zimbra Collaboration data remotely. It also reduces the risk of the data on the device being compromised. Account Lockout You can configure a policy that automatically locks an account after a specific number of failed login attempts. The administrator can also immediately disable any account at any time. An administrator with appropriate access privileges can also view the messages of the suspect account to help determine if the account has been compromised. If you are using a federated identity management solution or an internal directory with Zimbra Collaboration to implement SSO, you can disable access from the central directory or identity store to prevent authentication to the Zimbra Collaboration account. Archiving and Discovery Zimbra Archiving and Discovery is an optional feature of Zimbra Collaboration. With this integrated solution, you can select which users messages to archive and set retention policies for both archived and live mailboxes. Zimbra Archiving and Discovery offers powerful search indexing in a simple, cost-effective platform. You can also integrate thirdparty archiving solutions with Zimbra Collaboration. Zimbra partners with hosting providers to provide in-region hosting of Zimbra Collaboration. By relying on in-region hosting, customers and end users are ensured their data is under the auspices of only the most directly applicable regulations, legislations and jurisdictions. Zimbra Partner Ecosystem As part of a broader information and identity security infrastructure, Zimbra Collaboration can integrate with additional security and privacy solutions. Zimbra s reliance on open-based standards helps make integrations and inter-application communications easy. Zimbra Collaboration supports two types of third-party integrations: MTA-level integration Zimlets 10
13 MTA-Level Integration Through its support for SMTP protocols, Zimbra Collaboration offers gateway-level integration with a wide range of third-party solutions. For example, Zimbra Collaboration can be configured to send all messages to an SMTP-enabled gateway, which can then provide archiving, content filtering, data-loss prevention, etc. Zimlets Zimlets makes it easy to customize and extend Zimbra Collaboration to suit your needs, allowing you to add new features to suit your particular requirements. Zimlets are a mechanism for integrating with and extending the functionality of Zimbra Collaboration. Zimlets enable the mash-up of web-based technologies with enterprise messaging (e.g. , IM, voice) and collaboration systems. With Zimlets, message content and collaboration objects can be made live by dynamically linking to web content and third-party services. Visit Zimbra.com to view the Zimbra Gallery of community-contributed Zimlets. Please note that this is not an exhaustive list of available Zimlets, as many Zimbra partners create and deploy their own. Conclusion Messaging and collaboration solutions are business-critical applications and should be put through the same risk assessments and considerations as other critical applications. The best defense remains defense in depth, which has multiple layers of security. This approach should properly balance the needs for administrative control, information and identity security, privacy and the user experience. If you are interested in more information on the Zimbra Security Vulnerability Disclosure and Response Program, visit the below links. Security Center Security Response Policy Vulnerability Rating Classification Responsible Disclosure Policy Reporting Vulnerabilities to Zimbra As security paradigms shift and the threat landscape evolves, leveraging open source and open standards will define best-in-class software. Community-driven innovation will ensure that Zimbra Collaboration meets the constantly changing business needs of organizations. By building around an open source core, Zimbra Collaboration provides a robust platform for organizations to offer secure, private messaging and collaboration, whether mobile, desktop or in the cloud. 11
14 Acronyms AS AV DKIM Antispam Antivirus Domain Keys Identified Mail DMARC IDP LDAP Domain-based Message Authentication, Reporting and Conformance Identity Provider Lightweight Directory Access Protocol MTA RP SAML Message Transfer Agent Relying Party Security Assertion Markup Language S/MIME SMTP SSL Secure Multipurpose Internet Mail Extensions Simple Mail Transfer Protocol Secure Socket Layer SSO TLS Single Sign-On Transport Layer Security Copyright 2015 Zimbra. All rights reserved. 12
15 Zimbra 3000 Internet Blvd., Suite 200 Frisco, Texas Tel +1 (972) This product is protected by U.S. and international copyright and intellectual property laws. Zimbra is a registered trademark or trademark of Synacor in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
VMware Zimbra Security. Protecting Your VMware Zimbra Email and Collaboration Environment
Protecting Your VMware Zimbra Email and Collaboration Environment Technical WHITE PAPER Table of Contents VMware Zimbra Approach to Security... 3 Open-Source Commitment.... 3 Flexible, Object-Based Design....
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
THE COMPLETE GUIDE TO GOOGLE APPS SECURITY. Building a comprehensive Google Apps security plan
THE COMPLETE GUIDE TO GOOGLE APPS SECURITY Building a comprehensive Google Apps security plan Contents Introduction................................ 3 1. Secure the core.............................4 Google
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
TrustedX - PKI Authentication. Whitepaper
TrustedX - PKI Authentication Whitepaper CONTENTS Introduction... 3 1... 4 Use Scenarios... 5 Operation... 5 Architecture and Integration... 6 SAML and OAuth 7 RESTful Web Services 8 Monitoring and Auditing...
Securing Corporate Email on Personal Mobile Devices
Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
Zimbra Collaboration Suite Administrator s Guide. Release 6.0
Zimbra Collaboration Suite Administrator s Guide Release 6.0 Network Edition Rev: July 2010 Legal Notices Copyright 2005-2010 Zimbra. All rights reserved. No part of this document may be reproduced, in
Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery
Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
Service management White paper. Manage access control effectively across the enterprise with IBM solutions.
Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
Administering Google Apps & Chromebooks for Education
Administering Google Apps & Chromebooks for Education February 4, 2016 Edward Doan @edwardd / google.com/+edwarddoan customer quotes and snippets It s almost this easy. also highlight customer map? Google
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW
NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW INTRODUCTION As businesses adopt new technologies that touch or leverage critical company data, maintaining the highest level of security is their
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
How Reflection Software Facilitates PCI DSS Compliance
Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit
How To Secure Mail Delivery
FortiMail Identity Based Encryption A Business Enabler WHITE PAPER FORTINET FortiMail Identity Based Encryption - A Business Enabler PAGE 2 Contents Business Need Secure Mail Delivery... 3 Challenges with
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
ShareFile Security Overview
ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The
MDaemon Vs. Microsoft Exchange Server 2013 Standard
Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS
DKIM Enabled Two Factor Authenticated Secure Mail Client
DKIM Enabled Two Factor Authenticated Secure Mail Client Saritha P, Nitty Sarah Alex M.Tech Student[Software Engineering], New Horizon College of Engineering, Bangalore, India Sr. Asst Prof, Department
An Overview of Samsung KNOX Active Directory-based Single Sign-On
C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
Integrating Single Sign-on Across the Cloud By David Strom
Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio
The Essential Security Checklist. for Enterprise Endpoint Backup
The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing
FortiMail Email Filtering. Course 221 (for FortiMail v5.0) Course Overview
FortiMail Email Filtering Course 221 (for FortiMail v5.0) Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed
Feature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
GlobalSign Enterprise Solutions
GlobalSign Enterprise Solutions Secure Email & Key Recovery Using GlobalSign s Auto Enrollment Gateway (AEG) 1 v.1.2 Table of Contents Table of Contents... 2 Introduction... 3 The Benefits of Secure Email...
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
Security Features in Password Manager
Security Features in Written by Einar Mykletun, Ph.D. security and compliance architect for research and development at Dell Introduction Information system security is a priority for every organization,
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Symantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
Cybersecurity and Secure Authentication with SAP Single Sign-On
Solution in Detail SAP NetWeaver SAP Single Sign-On Cybersecurity and Secure Authentication with SAP Single Sign-On Table of Contents 3 Quick Facts 4 Remember One Password Only 6 Log In Once to Handle
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
Zimbra Connector for Outlook User Guide. Release 6.0
Zimbra Connector for Outlook User Guide Release 6.0 Network Edition August 2010 Legal Notices Copyright 2005-2010 Zimbra, Inc. All rights reserved. Zimbra and the Zimbra logo are trademarks of Zimbra.
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
Mail Services. Easy-to-manage Internet mail solutions featuring best-in-class open source technologies. Features
Mail Services Easy-to-manage Internet mail solutions featuring best-in-class open source technologies. Features Enterprise-class mail server High-performance Postfix SMTP services Scalable Cyrus IMAP and
Zimbra Connector for Microsoft Outlook User Guide 7.1
Zimbra Connector for Microsoft Outlook User Guide 7.1 March 2011 Legal Notices Copyright 2005-2011 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual
SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions
SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
TFS ApplicationControl White Paper
White Paper Transparent, Encrypted Access to Networked Applications TFS Technology www.tfstech.com Table of Contents Overview 3 User Friendliness Saves Time 3 Enhanced Security Saves Worry 3 Software Componenets
Introduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
VMware Zimbra Collaboration Server Administrator s Guide
VMware Zimbra Collaboration Server Administrator s Guide ZCS 8.0 Open Source Edition August 2012 Legal Notices Copyright 2005-2012 VMware, Inc. All rights reserved. This product is protected by U.S. and
Zimbra Connector for Outlook User Guide. Release 6.0
Zimbra Connector for Outlook User Guide Release 6.0 Network Edition August 2009 Legal Notices Copyright 2009. Yahoo! Inc. All rights reserved. Zimbra is a trademark of Yahoo!. No part of this document
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
The governance IT needs Easy user adoption Trusted Managed File Transfer solutions
Product Datasheet The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Full-featured Enterprise-class IT Solution for Managed File Transfer Organizations today must effectively
Catapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
