Security Workshop 2013 Improving Security in a Hacker s World
|
|
|
- Noreen Grant
- 10 years ago
- Views:
Transcription
1 Security Workshop 2013 Improving Security in a Hacker s World Workshop Steve, Roy, Rob, Brian, Peter Progress Software Today
2 Agenda and Timeframes Topic Type Presenter Approx. Length (Minutes) Introductions / Opening Lecture Brian Bowman 10 A Wide Open World Lab 10 Data In Motion Lecture Steve Boucher 15 Enabling SSL Lab 15 Application Protection Lecture Rob Marshall 15 Client Principle Lab 30 External Security Lecture Brian Bowman & Roy Ellis 10 LDAP Authentication Lab 15 Physical Security Lecture Brian & Roy 10 TDE Lab 15 Misc. Topics Lecture Rob & Brian 10 Tying it all together Lecture Peter Judge 30 2
3 Agenda Everything Else!! Physical Security Application Protection Data in Motion Not a Single Solution Why Security? 3
4 Lab # 1 Introduction to Security 4
5 Why Security? The need to provide Security for data continues to increase Affects many Market segments Finance Retail Healthcare and more Governments have enacted legislation to enforce Compliance of data Protecting intellectual property (i.e. your application code) Mobile computing greatly increases security risks Laptops with sensitive data Mobile devices (phones and tablets) with passwords stored on them 5
6 Compliance Legislation Examples Payment Card Industry (PCI) Health Insurance Portability & Accountability Act (HIPPA) Sarbanes-Oxley Act (SOX) Public company accounting reform and investor protection European Union Data Protection Directive Must Have Conformance to do Business 6
7 Agenda Everything Else!! Physical Security Application Protection Data in Motion Not a Single Solution Why Security? 7
8 Security is Not a Solution Security is not a solution, but a process Requires a set of defined goals and exclusions Requires monitoring Requires updating as technology and system access evolve Protecting vital data via security is a multiple step approach using: Environment Process Hardware Software 8
9 Agenda Everything Else!! Physical Security Application Protection Data in Motion Not a Single Solution Why Security? 9
10 Data in Motion Internet Firewall/DMZ configuration Network Security Quick Notes 10
11 The Internet 11
12 The Internet 12
13 The Internet DMZ 13
14 The Internet DMZ WEB SERVER 14
15 Network Security HTTPS SSL For web communication Part of the Web Server For web communication from client to AppServer Needed elsewhere? It s your setup It s your call Performance latency? Using HTTPS/SSL will cause performance degradation Only encrypt information that is sensitive Use different AppServers w/ssl for sensitive data 15
16 The Internet and Intranet HTTPS SSL SSL Browser SSL OpenEdge/ OpenClient 16
17 Quick Notes Remember! Run in Production Mode Don t allow ABL compile Don t allow debug Disable WebSpeed Workshop Never use defaults! Ports: 20931, 5162, 3055, 3090 Broker names: wsbroker, asbroker1, NS1 Messenger, AIA, WSA names: wspd_cgi.sh, cgiip.exe, Aia, wsa1 17
18 Lab # 2 Enabling SSL 18
19 Agenda Everything Else!! Physical Security Application Protection Data in Motion Not a Single Solution Why Security? 19
20 Application Protection ABL Client Principal 3rd Party Authentication 20
21 The Basic Client Principal Login Finish Authenticate Logout Clear CP Logged In Do Work in Application 21
22 The Basic Client Principal What is needed: DEFINE VARIABLE hclientprincipal AS HANDLE NO-UNDO. CREATE CLIENT-PRINCIPAL hclientprincipal. hclientprincipal:initialize( ). hclientprincipal:seal( bedford ). 22
23 Basic Client Principal Authentication Authentication is not just verifying that you can login Authentication needs to have an expiry 24
24 Basic Client Principal Authentication 1 - Login 5 - Client Accesses Application 3 - Authenticate 2 - Create C-P C-P Expired? 6 - Logout 4 - Logged In Normal Activity 7 - Finish 25
25 Basic Client Principal Authentication 1 - Login 2 - Create C-P 3 - Authenticate 4 - Logged In 5 - Client Accesses Application User enters information required for the domain e.g. User Name Password C-P Expired? Company Name Normal Activity 6 - Logout 7 - Finish 26
26 Basic Client Principal Authentication 1 - Login 2 - Create C-P 3 - Authenticate 5 - Client Accesses Application Client-Principal object is created from the user claims Mandatory Attributes are set C-P Expired? 6 - Logout 4 - Logged In Normal Activity 7 - Finish 27
27 Basic Client Principal Authentication 1 - Login 2 - Create C-P User domain configurations _sec-authentication* tables 3 - Authenticate 5 - Client Accesses Application Managed through Data Administration -domain 4 - Logged In C-P Expired? -system _Domain-name _Domain-type = _Domain-type _Domain-description _Domain-access-code _Domain-runtime-options _oeusertable _oslocal User defined Normal Activity 6 - Logout 7 - Finish 28
28 Application Authentication ABL Client-Principal Current and future OpenEdge products rely on Client-Principal (multi-tenancy, auditing) A cryptographically sealed security token Container for authenticated credentials User, password, domain info, etc. Once sealed the client-principal is read-only Can be used by all ABL application components ABL Session, DB connection Some 3 rd party authentication recommendations LDAP Active Directories Kerberos Multi-Factor Authentication Require complex passwords! 29
29 Securing Your Application Protect your intellectual property (application code) Employ encryption (file or file system level) Utilize O/S and user access limitation The basics of runtime DBAuthkey (RCODEKEY)- ensure code running against the DB was compiled to use that DB Runtime table and column access controls Operating system file security settings, etc. 30
30 Lab # 3 Client Principal Programming 31
31 ABL Accessing LDAP AuthWP.zip is available on Communities The code is not perfect But it is a great place to start! AuthWP.zip LDAPAuthenticationWP.doc We will be using Apache Directory Studio It has a developer IDE for easy use (not what you will see in production) Shows you what you need to change in the sample code 32
32 Lab # 4 LDAP Integration 33
33 Agenda Everything Else!! Physical Security Application Protection Data in Motion Not a Single Solution Why Security? 34
34 Physical Security Physical Security Transparent Data Encryption 35
35 The Real Physical Aspect Limit access to your building Discourage tailgating Second level security on your Server Room 36
36 Process Security Security Policies Monitoring tools Secure installations (protect code and db) 37
37 User Security Lock, timeout/lock unattended machines Control expired user accounts and files 38
38 System Security Don t forget O/S security! Directory & File Permissions User Permissions Separation of Responsibilities 39
39 OpenEdge 10.2B Transparent Data Encryption Option for Enterprise Database: At-Rest Data Encryption Data secure on-disk, backup, and binary dump Data is unencrypted In-Memory = (up to) normal speed Secure Key Store and Key Management Change keys on-line Policies control use of utilities Industry standard encryptions AES, DES, triple DES, etc. Encrypt on the fly As data changes or As an online process No application changes for TDE! 41
40 Securing Your Data A High Level View Client <SSL> Encrypted Messages Server Shared Memory Backups Encrypted Data Dump/Load Encrypted Data Database on Disk Encrypted Data 42
41 Securing Your Data OpenEdge Database Encryptable Objects Type I Database Storage Area Entire area encrypted Type II Database Storage Area Object-level encryption Tables Indexes LOBs Table Index Index Index LOB Table LOB Table LOB Index LOB Table LOB Table Index 43
42 Database Key Store Independent and Secure Entity Not part of the database One for each encrypted database Managed by the DB Administrator (a separate and distinct role) Stores DB Master Key (DMK) Each TDE-enabled database has one unique DMK- required to connect to the DB (via a passphrase) Only one database is accessible if the DMK is compromised Each DB Object Has One or More Unique Virtual Data Encryption Keys Generated by the key store service based on the DMK- no DBA action required If key is cracked, intruder only has access to that one database object Ability to change keys online 44
43 How Does It Work? Database Storage Engine Key Store Write I/O Encrypted Data Shared Memory Buffer Pool & Encrypt Database Files (plain text block) Decrypt Policy Area Read I/O Key Store Database Master Key (DMK) DMK Admin/User Passphrase Manual/Automatic Authentication on DB start Encryption Policy Area Encryption Policies - What (object) & how (cipher) 45
44 Why TDE from OpenEdge? Easy to use No Application changes needed for TDE! Add Encryption Policy Area, Enable, Add Policies, Encrypt! Protects data even when not in database Data encrypted in backup files Data encrypted in binary dump files Very fast performance Little to no performance impact! We always try to improve our performance and get things to run faster. We tested a fully encrypted database and there was only a 4% decrease in performance versus an unencrypted database. We tested that with alternative data pools, we actually gained back almost 2% of that initial performance degradation. We believe with additional fine tuning the performance will continue to improve. (A TDE user) 46
45 Lab # 5 Transparent Data Encryption (TDE) 47
46 Agenda Everything Else!! Physical Security Application Protection Data in Motion Not a Single Solution Why Security? 48
47 Miscellaneous Disaster Recovery Management Multi-Tenancy 49
48 Securing Your Data Other considerations Disaster Recovery Securing your data from catastrophic loss (soft and hard failures) Off-site backup storage Cloud storage is quickly growing in popularity Database Replication & Replication Plus Replicate to up to 2 databases at the same time Quick failover to backup databases Some customers have on-premise DB and Cloud Replication 50
49 Securely Managing Your Application OpenEdge Explorer and OpenEdge Management Has its own user authentication The AdminServer has security settings Require Username and Admin Groups Separation of Development and Production The internal developer threat to your production system Different machines, networks, ports, everything Keep your operating system up-to-date Download and install critical system updates Install and configure system firewall 51
50 Multi-Tenancy Securing Tenant Data Isolated Tenancy Infrastructure Tenancy Application Tenancy Shared Tenancy Tenant1 Tenant2 Tenant3 Tenant1 Tenant2 Tenant3 Tenant1 Tenant2 Tenant3 Tenant1 Tenant2 Tenant3 App App App App App App App App DB DB DB DB DB DB DB DB DB DB Infra. Infra. Infra. Infrastructure Infrastructure Infrastructure Isolating Sharing Easier customization, security Simpler throttling control Target dissimilar customers No transformation Better economy of scale Simpler management Target like-customers Least cost to serve 52
51 ODBC / JDBC Security By default there are 2 accounts with DBA rights The account that originally CREATED the database The sysprogress account (not enabled by default) Best practices are to create a DBA user and NOT USE the root/sysprogress account You can use any SQL tool of choice to connect to the OpenEdge database, for purposes of the labs we will use the command line tool sqlexp (SQL Explorer) Security rights can be changed while the database is online. 53
52 ODBC / JDBC Security It is a good idea to have separate brokers for SQL vs ABL clients When creating new SQL users, the ONLY thing they have rights to is the catalog (look at the db schema information) Remember that any ABL triggers WILL NOT FIRE when data is changed via SQL Give users access to only what they need and remember what database they are going against (you cannot change data on a replication target) Keep all SQL scripts in your source control 54
53 Lab # 6 Optional Lab - ODBC / JDBC 55
54 Tying It All Together Client Principal and Application Theory (Peter Judge) 56
55 Defense in Depth Physical Security Operating System Network AppServer Activate Procedure Service Interface Business Logic Language & Database Doors, locks, guards Login, ACL, SELinux Firewalls, SSH/TLS SESSION:EXPORT Service name Operation name Roles Multi-tenancy, CAN-*, TDE 57
56 Application Flow: Login User Interface Claims / Assertions Security Token Security Token Service Authentication Systems & Domains 58
57 Application Flow: Business Logic User Interface Security Token Authentication Authorisation Auditing Application Business Logic 59
58 Separate AppServers for STS & Business Logic Separate svr UI Client Firewall Security Token Service AppServer ssl Connection Restricted Access Creds Business Logic AppServer Activate Extra Layers tde 60
59 Separate AppServers for STS & Business Logic UI Client Security Token Service AppServer Security/Startup.p session:export( 'Security/Login.p' 'Security/LoginSSO.p' + ',' + 'Security/Logout.p' + ',' + 'Security/GetClientPrincipal.p' + ',' + Business Logic AppServer 'Security/ValidateToken.p' + ',' + 'Security/ValidateClientPrincipal.p' + ',' + 'Security/RegisterServer.p' + ',' + 'Security/DeregisterServer.p'). Activate 61
60 Separate AppServers for STS & Business Logic UI Client login.p Security Token Service AppServer LoginUser() Business Logic AppServer Activate 62
61 Separate AppServers for STS & Business Logic UI Client Security Token Service AppServer ValidateToken() getcustomer.p GetClientPrincipal() Business Logic AppServer Activate 63
62 Separate AppServers for STS & Business Logic UI Client Security Token Service AppServer getcustomer.p Business Logic AppServer Domain name, Access code Activate security-policy:set-client( ) 64
63 _sec-authentication-system & -domain Security Token Service Business Logic Service Common create _sec-authentication-system. _Domain-type = 'DBTABLE-Identity'. _PAM-plug-in = true. _PAM-callback-procedure = 'IdentityTableAuthenticate.p'. create _sec-authentication-system. _Domain-type = 'DBTABLE-Identity'. _PAM-plug-in = true. _PAM-callback-procedure = 'nologinauthenticate.p'. create _sec-authentication-domain. _Domain-name = 'employee'. _Domain-type = 'DBTABLE-Identity'. _Domain-access-code = audit-policy:encrypt-audit-mac-key( s00persecr1tk3y4employee'). _Domain-enabled = true. 65
64 _PAM-callback-procedure Security Token Service Business Logic Service procedure AuthenticateUser: /* snipped parameters*/ find ApplicationUser where ApplicationUser.LoginName eq phcp:user-id and ApplicationUser.LoginDomain eq phcp:domain-name no-lock no-error. if not available ApplicationUser then pipamstatus = Progress.Lang.PAMStatus:UnknownUser. else if ApplicationUser.Password ne encode(phcp:primary-passphrase) then pipamstatus = Progress.Lang.PAMStatus:AuthenticationFailed. else /* we're good to go */ pipamstatus = Progress.Lang.PAMStatus:Success. return. end procedure. procedure AuthenticateUser: /* snipped parameters*/ /* we're not allowed to do any logins here */ pipamstatus = PAMStatus:InvalidConfiguration. return. end. 66
65 Separate AppServers for STS & Business Logic UI Client Security Token Service AppServer getcustomer.p Business Logic AppServer Activate security-policy:set-client( ) AuthoriseOperation("getcust") CustomerBE:GetData( ) 67
66 Separate AppServers for STS & Business Logic UI Client logout.p Security Token Service AppServer LogoutUser() Business Logic AppServer Activate 68
67 Separate AppServers for STS & Business Logic UI Client Security Token Service AppServer ValidateToken() getcustomer.p Business Logic AppServer Activate 69
68 Application Security Principles Applications must have security designed in. Some proven application security principles 1. Identify and secure the weakest link 2. Practice defense in depth 3. Be reluctant to trust 4. Remember that hiding secrets is hard 5. Follow the principle of least privilege 6. Fail and recover securely 7. Compartmentalize 8. Keep it simple, stupid 9. Keep trust to yourself 10. Assume nothing Gary McGraw's 10 steps to secure software 70
69 Lather, Rinse, Repeat Think of security as a continuous improvement project. You are never done! Keep informed of the latest security tools and threats Progress will continue to give you tools to help secure your Application and valuable data Want more information on any of the topics in this presentation? Look in the briefcase available after this this talk Go to 71
70 Summary Security is a complex issue that is constantly changing There are many options for you to choose from today you experience some options Start Simple, identify what is important, and don t stop evolving 72
71
72 Reference Materials - Apache Directory Studio - Smart Sniffer - OpenLDAP - AuthWP.zip for LDAP - Security Webinar Briefcase Steps to Secure Software 74
73 Other Exchange Security Sessions Identity Management Basics (Part 1) Peter Judge Coding with Identity Management & Security (Part 2) Peter Judge Transparent Data Encryption Doug Vanek Introduction to Multi-tenancy Gus Bjorklund Security and Session Management with Mobile Devices Mike Jacobs & Wayne Henshaw 75
activecho Driving Secure Enterprise File Sharing and Syncing
activecho Driving Secure Enterprise File Sharing and Syncing activecho Overview In today s enterprise workplace, employees are increasingly demanding mobile and collaborative solutions in order to get
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
Training module 2 Installing VMware View
Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and
Authenticating REST services in OpenEdge
Authenticating REST services in OpenEdge Controlling business logic access via OE Realm & LDAP Peter Judge, Progress Software [email protected] Abstract Slides-only précis of the REST Security Workshop
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Data Security and Governance with Enterprise Enabler
Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
SQL Server Encryption Overview. September 2, 2015
SQL Server Encryption Overview September 2, 2015 ABOUT ME Edmund Poillion Data Platform Systems Engineer Skyline Associate since 1999 Started in App Dev, changed focus to SQL Server in 2012 Email: [email protected]
Backup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
FileMaker Security Guide The Key to Securing Your Apps
FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account
Installation Guide ARGUS Symphony 1.6 and Business App Toolkit. 6/13/2014 2014 ARGUS Software, Inc.
ARGUS Symphony 1.6 and Business App Toolkit 6/13/2014 2014 ARGUS Software, Inc. Installation Guide for ARGUS Symphony 1.600.0 6/13/2014 Published by: ARGUS Software, Inc. 3050 Post Oak Boulevard Suite
FileMaker Security Guide
TECH BRIEF FileMaker Security Guide The Key to Securing Your Solutions Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
Security Best Practices for Microsoft Azure Applications
Security Best Practices for Microsoft Azure Applications Varun Sharma Principal Security Engineer, Information Security & Risk Management (ISRM), Microsoft IT Service Lines Application Security Infrastructure
1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
Cloud Services for Backup Exec. Planning and Deployment Guide
Cloud Services for Backup Exec Planning and Deployment Guide Chapter 1 Introducing Cloud Services for Backup Exec This chapter includes the following topics: About Cloud Services for Backup Exec Security
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
How To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
Online Transaction Processing in SQL Server 2008
Online Transaction Processing in SQL Server 2008 White Paper Published: August 2007 Updated: July 2008 Summary: Microsoft SQL Server 2008 provides a database platform that is optimized for today s applications,
Oracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Mobile Security Jump Start. Wayne Henshaw & Mike Jacobs Progress OpenEdge October 8, 2013
Mobile Security Jump Start Wayne Henshaw & Mike Jacobs Progress OpenEdge October 8, 2013 Agenda Architectural basics REST service Mobile client Making required choices Authentication model User sessions
Cloud Security Best Practices
Cloud Security Best Practices Cohesive Networks - your applications secured VNS3 security and connectivity solutions protect cloud-based applications from exploitation by hackers, criminal gangs, and foreign
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
D50323GC20 Oracle Database 11g: Security Release 2
D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their
Securing Oracle E-Business Suite in the Cloud
Securing Oracle E-Business Suite in the Cloud November 18, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda The
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
IIS SECURE ACCESS FILTER 1.3
OTP SERVER INTEGRATION MODULE IIS SECURE ACCESS FILTER 1.3 Copyright, NordicEdge, 2006 www.nordicedge.se Copyright, 2006, Nordic Edge AB Page 1 of 14 1 Introduction 1.1 Overview Nordic Edge One Time Password
Securing Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
Microsoft SQL Server Security and Auditing Clay Risenhoover ISACA North Texas April 14, 2016 http://tinyurl.com/isacaclay
Microsoft SQL Server Security and Auditing Clay Risenhoover ISACA North Texas April 14, 2016 http://tinyurl.com/isacaclay 2016, Risenhoover Consulting, Inc. All Rights Reserved 1 Goals Understand new and
SQL Server 2008 Designing, Optimizing, and Maintaining a Database Session 1
SQL Server 2008 Designing, Optimizing, and Maintaining a Database Course The SQL Server 2008 Designing, Optimizing, and Maintaining a Database course will help you prepare for 70-450 exam from Microsoft.
Oracle Database 11g: Security. What you will learn:
Oracle Database 11g: Security What you will learn: In Oracle Database 11g: Security course students learn how they can use Oracle database features to meet the security, privacy and compliance requirements
BlackBerry Enterprise Server Version: 5.0. Upgrade Planning Guide
BlackBerry Enterprise Server Version: 5.0 Upgrade Planning Guide SWDT577232-577232-0327090551-001 Contents 1 Overview: BlackBerry Enterprise Server... 3 2 Upgrading a BlackBerry Enterprise Server environment...
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
Security for Cloud- and On Premise Deployment. Mendix App Platform Technical Whitepaper
Security for Cloud- and On Premise Deployment Mendix App Platform Technical Whitepaper Security for Cloud- and On Premise Deployment EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 THE MENDIX APP PLATFORM...
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Architecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture
Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture Mat Keep MongoDB Product Management & Marketing [email protected] @matkeep Agenda Data Security Landscape and Challenges
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
MS-55096: Securing Data on Microsoft SQL Server 2012
MS-55096: Securing Data on Microsoft SQL Server 2012 Description The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary
Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
Central Administration QuickStart Guide
Central Administration QuickStart Guide Contents 1. Overview... 2 Licensing... 2 Documentation... 2 2. Configuring Central Administration... 3 3. Using the Central Administration web console... 4 Managing
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
INTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation
ADVANTAGES OF RUNNING ORACLE11G ON MICROSOFT WINDOWS SERVER X64 Edward Whalen, Performance Tuning Corporation INTRODUCTION Microsoft Windows has long been an ideal platform for the Oracle database server.
Server Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
Eylean server deployment guide
Eylean server deployment guide Contents 1 Minimum software and hardware requirements... 2 2 Setting up the server using Eylean.Server.Setup.exe wizard... 2 3 Manual setup with Windows authentication -
Enterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
Entrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
VMware Horizon Workspace Security Features WHITE PAPER
VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon
Security & Cloud Services IAN KAYNE
Security & Cloud Services IAN KAYNE CloudComponents CLOUD SERVICES Dynamically scalable infrastructure, services and software based on broad network accessibility NETWORK ACCESS INTERNAL ESTATE CloudComponents
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
Progress OpenEdge REST
Progress OpenEdge REST Deploying, Managing, and Troubleshooting your REST Web Application Kumar Navneet Principal Software Engineer Progress Software October 8, 2013 David Cleary Principal Software Engineer
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
efolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Take Control of Identities & Data Loss. Vipul Kumra
Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees
RemotelyAnywhere. Security Considerations
RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP
To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server 2008.
Znode Multifront - Installation Guide Version 6.2 1 System Requirements To install Multifront you need to have familiarity with Internet Information Services (IIS), Microsoft.NET Framework and SQL Server
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
NovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Oracle Database 11g: Security Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,
Installation and Configuration Guide
Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Easily Managing User Accounts on Your Cloud Servers. How modern IT and ops teams leverage their existing LDAP/Active Directory for their IaaS
Easily Managing User Accounts on Your Cloud Servers How modern IT and ops teams leverage their existing LDAP/Active Directory for their IaaS How Did We Get Here? How the move to IaaS has created problems
BM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
EMC Data Protection Search
EMC Data Protection Search Version 1.0 Security Configuration Guide 302-001-611 REV 01 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published April 20, 2015 EMC believes
Centrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
Design Principles for Protection Mechanisms. Security Principles. Economy of Mechanism. Least Privilege. Complete Mediation. Economy of Mechanism (2)
Security Principles Design Principles for Protection Mechanisms Security is a system requirement just like performance, capability, cost, etc. Therefore, it may be necessary to trade off certain security
General DBA Best Practices
General DBA Best Practices An Accelerated Technology Laboratories, Inc. White Paper 496 Holly Grove School Road West End, NC 27376 1 (800) 565-LIMS (5467) / 1 (910) 673-8165 1 (910) 673-8166 (FAX) E-mail:
vsphere Security ESXi 6.0 vcenter Server 6.0 EN-001466-04
ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
inforouter V8.0 Server Migration Guide.
inforouter V8.0 Server Migration Guide. 1 Copyright 1998-2015 inforouter Migration Guide I f for any reason, you wish to move the entire inforouter installation to another machine, please follow the instructions
Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
Dell SonicWALL and SecurEnvoy Integration Guide. Authenticating Users Using SecurAccess Server by SecurEnvoy
Dell SonicWALL and SecurEnvoy Integration Guide Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
SAP HANA Security Guide
PUBLIC SAP HANA Platform SPS 12 Document Version: 1.0 2016-05-11 Content 1 Important Critical Configurations.... 6 2 Introduction to SAP HANA Security....7 3 SAP HANA Security Patches....11 4 SAP HANA
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
NovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
SaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
$99.95 per user. SQL Server 2005 Database Administration CourseId: 152 Skill level: 200-500 Run Time: 30+ hours (158 videos)
Course Description This popular LearnItFirst.com course is a soup-to-nuts course that will teach you how to choose your edition, install, configure and manage any edition of. You ll learn the details of
