Keeper Password Manager & Digital Vault
|
|
|
- Horatio Austin Harmon
- 10 years ago
- Views:
Transcription
1 Enterprise Keeper Password Manager & Digital Vault Contact Sales (312) r
2 Enterprise Keeper is the world s most secure digital vault. Contact Sales (312) [email protected] 1
3 Problem 3 in 4 Americans have fallen or will fall victim to hacking 30K websites hacked per day 37% of breached companies were financial firms. $10B cost of changing employee passwords each year Employees Employees tend to use the same or easy-to-remember passwords on multiple sites for quick logins. Many times they also store their passwords on sticky notes at their desk or Excel spreadsheets which can both be easily hacked or stolen. They also often send confidential documents to co-workers using programs that utilize weak passwords. Employees also forget passwords and then must spend valuable time resetting their account. Businesses Businesses utilize numerous cloud applications that have login credentials. These major applications are increasingly vulnerable to hacking and phishing attacks. Businesses also allow employees to access insecure applications through BYOD policies which puts secure information and documents at risk. Keeper serves the growing global market 1.3B devices will have mobile security applications installed by 2018 BYOD market is expected to grow to $181 billion by half of employers will require employees to buy their own devices Source: akuity 2
4 Keeper is a secure and easy-to-use password manager and digital vault. Contact Sales (312) [email protected] 3
5 Our Solution Keeper is a Zero-Knowledge Security Platform Keeper is the most secure password manager and digital vault in the world. Keeper is a zero-knowledge security platform. Zero-knowledge means that only the user has knowledge of and access to their Master Password and the encryption key that is used to encrypt and decrypt their information. The user s Keeper file, in the form of an encrypted binary, is stored in Keeper s Cloud Security Vault which is protected with 256-bit AES encryption. Keeper has no knowledge of or access to a user s master password and cannot decrypt the user s Keeper data. The method of encryption that Keeper uses is a well-known, trusted algorithm called Advanced Encryption Standard (AES) with a 256-bit key length. Additionally, Keeper offers Two-Factor Authentication (2FA) via SMS or Google Authenticator. 2FA is an approach to authentication requiring two or more of the three authentication factors: a knowledge factor, a possession factor and an inherence factor. The Keeper solution has been vetted and certified by the highest level security compliance organizations including SOC 2 (Type I and II), TRUSTe, McAfee, HIPAA, Trustwave and EU Safe Harbor. Keeper never stores or displays plaintext information - user data is always encrypted locally on the device, through the transport process to the Cloud Security Vault and at rest in the vault. Information on Keeper s Security Disclosures can be found at Organize and Access Passwords Attach Files Sync Files Share Records Create Strong Passwords 256-bit AES Encryption Auto-Fill Passwords Secure Cloud Storage Biometric Authentication 24x7 Support 4
6 Enterprise Platform Wide Keeper Works Across All Major Platforms and Device Types Contact Sales (312)
7 We Are Global Keeper Serves the World s Mobile Security Market Demographic Keeper is utilized by a wide demographic of consumers with the average user being between 18 and 60 years old. Everyone can find a use for Keeper, especially students, consumers, employees and trade professionals. Use Cases There are countless areas where the implementation of Keeper can be useful. The most common uses include , online banking, online commerce, social media and secure file storage. + User Benefits Keeper provides numerous benefits to users including the ability to access websites quickly, simple password management, secure file storage, seamless sharing and world-class security. Market Size The global BYOD market is growing at an exponential rate and is expected to be $181 Billion by It is also expected that half of all employers will require their employees to buy their own device by 2017 and 1.3 billion devices will have mobile security applications installed on them by Published Keeper is readily accessible to users across the globe and is published in 18 languages. Global Keeper is implemented and sold in over 80 countries and uses their localized currency. 6
8 Pricing (USD) Base Plan $750/yr + $48/user/yr Admin console Unlimited devices Provisioning Delegated Administration AD and LDAP Integration Policy engine and enforcement Shared folders Auditing and reporting BYOD Integration 24/7 Support Secure File Storage 1TB per Enterprise Account $18/user/yr 7
9 Customers Keeper is Used by Employees and Leading Fortune 1000 Companies 8
10 Strategic Partners Keeper has strong relationships with world-class mobile operators & OEM s. Pre-loaded on Android and Windows Devices 9
11 Differentiation Why Keeper is the Best. 1 The only unified product that offers a comprehensive digital vault for password management and secure file storage 2 Zero-knowledge security platform is highly differentiated from traditional cloud storage providers Encryption key remains with the user and encryption occurs at device level Only the user has full control over the encryption and decryption of their data Keeper cannot decrypt the user s stored data Password Management Keeper protects your employees against hackers with a secure and convenient password manager. All of your employee s passwords, logins, credit card numbers, bank accounts and other personal information are saved in a private digital vault that is encrypted and unbreakable. Keeper s password generator creates high-strength passwords for all websites and third party applications accessed by your employees, which is the best way to protect your company s sensitive login credentials. Secure File Storage With Secure File Storage, users can upload their most important files, photos and videos directly into their Keeper vault. Files can be encrypted and uploaded with the click of a button or using drag-and-drop. Sharing files is easy and secure with full end-to-end encryption from one vault to another. Public sharing links, which are customary with many cloud storage providers, are prohibited with Keeper s secure sharing architecture. Secure images can be taken from a camera-enabled mobile device and images always remain in the Keeper vault, never on the device s camera roll. Secure File Storage is a seamless add-on for all existing Keeper users. Secure File Sharing Without Compromising Security Customers also have the ability to securely share files with fellow Keeper users vault-to-vault, making Secure File Storage the best way to store and transfer sensitive information. Keeper Secure File Sharing builds on Secure File Storage with PKI encryption, enabling customers to share files with other Keeper users, securely and without ever requiring decryption of the file in the sharing process. Once a file has been encrypted and stored in the vault, the user has the ability to securely share the file with one or more Keeper users. Sharing is accomplished using PKI and Keeper uses the well-known RSA PKI to generate Public/Private keys for each user. 10
12 Appendix A Security & System Architecture 11
13 Technical Documentation Permissions Keeper s manifest contains the following permissions: Permission android.permission.access_network_state android.permission.access_wifi_state android.permission.read_phone_state android.permission.internet com.android.vending.billing android.permission.read_contacts android.permission.get_accounts android.permission.read_external_storage android.permission.write_external_storage android.permission.system_alert_window android.permission.receive_boot_completed com.android.browser.permission.read_history_bookmarks android.permission.get_tasks android.permission.write_settings android.permission.write_secure_settings android.permission.authenticate_accounts android.permission.manage_accounts Notes Network and Wi-Fi Access Network and Wi-Fi Access Network and Wi-Fi Access Network and Wi-Fi Access In-App Purchase Password Sharing Features User Signup Optimization Secure File Storage Features Secure File Storage Features Keeper FastFill (native apps) Keeper FastFill (native apps) Keeper FastFill (web apps) Keeper FastFill (native apps) Keeper FastFill (auto-enable) Keeper FastFill (auto-enable) Settings Accounts & Sync Settings Accounts & Sync 12
14 Technical Documentation Data Consumption Details Keeper accesses the network only for short bursts when the user logs in. Keeper does not access the network while the app is idle or in the background. Typical usage and domain endpoint information is listed below: Domain: keepersecurity.com Port: 443 Per Pull Amount: 3.7KB Out of Box Pull Frequency: 0 Signed-In Pull Frequency: 1 Frequency of Pull Options: None Monthly Data Amount: 110KB Domain: keeperapp.com Port: 443 Per Pull Amount (avg.): 13.6KB Out of Box Pull Frequency: 0 Signed-In Pull Frequency: Once per new record created Frequency of Pull Options: Sync can be turned off or on via Settings screen Monthly Data Amount: 1.5MB 13
15 Technical Documentation Technical Architecture Keeper Security, Inc. ( KSI ) is passionate about protecting its customer s information with Keeper mobile and desktop security software. Millions of consumers and businesses trust Keeper to secure and access their passwords and private information. KSI does not have access to a customer s master password nor does KSI have access to the records stored in the Keeper vault. KSI cannot remotely access a customer s device nor can it decrypt the customer s vault. The only information that Keeper Security has access to is a user s address, device type and subscription plan details (e.g. Keeper Backup). If a user s device is lost or stolen, KSI can assist in accessing an encrypted backup file to restore the user s vault once they have replaced their device. Information that is stored and accessed in Keeper is only accessible by the customer because it is instantly encrypted and decrypted on-the-fly on the device that is being used - even when using the Keeper Web App. The method of encryption that Keeper uses is a well-known, trusted algorithm called AES (Advanced Encryption Standard) with a 256-bit key length. Per the Committee on National Security Systems publication CNSSP-15, AES with 256-bit key-length is sufficiently secure to encrypt classified data up to TOP SECRET classification for the U.S. Government. In theory, it would take a petaflop supercomputer approximately 3.31 x 1056 years to brute-force a 256-bit AES encrypted message The cipher keys used to encrypt and decrypt customer records are not stored or transmitted to Keeper s Cloud Security Vault. However, to provide syncing abilities between multiple devices, an encrypted version of this cipher key is stored in the Cloud Security Vault and provided to the devices on a user s account. This encrypted cipher key can only be decrypted on the device for subsequent use as a data cipher key. Data Protection Your Encrypted Data Your Vault Your Decrypted Data Your Private Key 14
16 Technical Documentation Client Encryption Data is encrypted and decrypted on the user s device, not on the Cloud Security Vault. We call this Client Encryption because the client (i.g. iphone, Android Device, Web App, etc.) is doing all of the encryption work. The Cloud Security Vault stores a raw binary which is essentially useless to an intruder. Even if the data is captured when it s transmitted between the client device and Cloud Security Vault, it cannot be decrypted or utilized to attack or compromise the user s private data. Client Encryption Process Cloud Syncing Encryption Decryption Data At Rest Keeper uses PBKDF2 with HMAC-SHA256 to convert a password to a 256-bit encryption key with a minimum of 1,000 rounds. The key generated from the Master Password isn t used directly to encrypt user data, but is instead used to encrypt another key (the Data Key ). The Data Key is used for encrypting data and other keys, such as the RSA private key. Any key that is not generated directly from the user s Master Password is generated by a cryptographically secure random number generator on the user s device. For example, both the data key and the RSA key pair are generated on the device. Because the keys are generated on the device (not on Keeper s Cloud Security Vault), we have no visibility into the user s keys. All secret keys that must be stored (such as each user s RSA private key and the Data Key), are all encrypted prior to storage or transmission. The user s Master Password is required to decrypt any keys. Since Keeper s Cloud Security Vault does NOT have access to the user s Master Password, we cannot decrypt any of your keys or data. 15
17 Technical Documentation Data In Transit To prevent unauthorized vault access, Keeper s Cloud Security Vault must authenticate each user when transmitting data. Authentication is performed by comparing a PBKDF2-generated hash of the Master Password. The user s device uses PBKDF2 to generate the hash from the Master Password and the server compares the hash to a stored hash. By using the PBKDF2 hash instead of the Master Password itself, the Cloud Security Vault authenticates the user without requiring the Master Password. PBKDF2 is also used for generating encryption data keys, but the authentication hash is not used for data encryption. KSI supports 256-bit and 128-bit SSL to encrypt all data transport between the client application and KSI s cloud-based storage. This is the same level of encryption trusted by millions of individuals and businesses everyday for web transactions requiring security, such as online banking, online shopping, trading stocks, accessing medical information and filing tax returns. KSI deploys SSL/TLS certificates signed by Digicert using the SHA2 algorithm, the most secure signature algorithm currently offered by commercial certificate authorities. SHA2 is significantly more secure than the more widely used SHA1, which could be exploited due to mathematical weakness identified in the algorithm. SHA2 helps protect against the issuance of counterfeit certificates that could be used by an attacker to impersonate a website. KSI also supports Certificate Transparency (CT), a new initiative by Google to create a publicly auditable record of certificates signed by certificate authorities. CT helps guard against issuance of certificates by unauthorized entities. CT is currently supported in the latest versions of the Chrome web browser. More information about Certificate Transparency can be found at: KSI utilizes Transport Layer Security (TLS) (versions 1.0, 1.1, and 1.2) to securely transfer encrypted customer data between the client and the Keeper servers. KSI also supports Perfect Forward Secrecy (PFS) key exchanges using Diffie-Hellman (DHE) enabled cipher-suites. KSI currently supports the following cipher suites: TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA 16
18 Enter this verification code when prompted to login. ************** Enterprise Technical Documentation Two-Factor Authentication To protect against unauthorized access to a customer s account, Keeper also offers Two-Factor Authentication. Two-factor authentication is an approach to authentication requiring two or more of the three authentication factors: a knowledge factor, a possession factor, and an inherence factor. Keeper uses something you know (your password) and something you have (the phone in your possession) to provide users extra security in the event your master password or device is compromised. To do this, we generate TOTPs (Time-based One-Time Passwords). Keeper generates a 10-byte secret key using a cryptographically secure random number generator. This code is valid for about a minute, and is sent to the user by SMS. When using the Google Authenticator application on your mobile device, the Keeper server internally generates a QR code containing your secret key, and it is never communicated to a third party. Each time a user deactivates, then reactivates Two-Factor Authentication, a new secret key is generated. Two-Factor Authentication Process Keeper Supports SMS & Google Authenticator Enter this verification code when prompted to login. MASTER PW ************** ENTER CODE Login with Master Password Receive Two-Factor Code Authenticate Accepted 17
19 Technical Documentation Sharing of Records Keeper uses PBKDF2 with HMAC-SHA256 to convert a password to a 256-bit encryption key with a minimum of 1,000 rounds. The key generated from the Master Password isn t used directly to encrypt user data, but is instead used to encrypt another key (the Data Key ). The Data Key is used for encrypting data and other keys, such as the RSA private key. Any key that isn t generated directly from the user s Master Password is generated by a cryptographically secure random number generator on the user s device. For example, both the data key and the RSA key pair are generated on the device. Because the keys are generated on the device (not on Keeper s Cloud Security Vault), we have no visibility into the user s keys. Secure Sharing Process with RSA Encryption User 1 User 2 PW User 1 Creates a Private Keeper Record Record Gets Encrypted with 256-bit AES User 1 Shares Keeper Record with User 2 User 2 Receives Shared Record User 2 Opens and Accesses the Record 18
20 Appendix B Device Screenshots 19
21 Mobile iphone 20
22 Enterprise Mobile Android Contact Sales (312)
23 Enterprise Mobile Windows Phone Contact Sales (312)
24 Enterprise Desktop Mac Contact Sales (312)
25 Enterprise Desktop Windows Contact Sales (312)
26 Tablet ipad 25
27 Enterprise Tablet Android Contact Sales (312)
28 Enterprise Tablet Windows Surface Contact Sales (312)
29 Browser Extension 28
30 Admin Console 29
31 Enterprise Bridge Active Directory / LDAP Integration 30
32 Contact (312)
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
Is Your SSL Website and Mobile App Really Secure?
Is Your SSL Website and Mobile App Really Secure? Agenda What is SSL / TLS SSL Vulnerabilities PC/Server Mobile Advice to the Public Hong Kong Computer Emergency Response Team Coordination Centre 香 港 電
The Security Behind Sticky Password
The Security Behind Sticky Password Technical White Paper version 3, September 16th, 2015 Executive Summary When it comes to password management tools, concerns over secure data storage of passwords and
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
Analyzing the Security Schemes of Various Cloud Storage Services
Analyzing the Security Schemes of Various Cloud Storage Services ECE 646 Project Presentation Fall 2014 12/09/2014 Team Members Ankita Pandey Gagandeep Singh Bamrah Pros and Cons of Cloud Storage Services
Our Key Security Features Are:
September 2014 Version v1.8" Thank you for your interest in PasswordBox. On the following pages, you ll find a technical overview of the comprehensive security measures PasswordBox uses to protect your
Dashlane Security Whitepaper
Dashlane Security Whitepaper November 2014 Protection of User Data in Dashlane Protection of User Data in Dashlane relies on 3 separate secrets: The User Master Password Never stored locally nor remotely.
Cloud Computing for Education Workshop
Cloud Computing for Education Workshop 2012 Copyright REZA CURTMOLA, NJIT Why Should You Learn This? Learn some useful software and services Backup and sync your materials for teaching Data reliability
WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW
NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW INTRODUCTION As businesses adopt new technologies that touch or leverage critical company data, maintaining the highest level of security is their
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Research Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
Remote Desktop Access for the Mobile Workforce
Remote Desktop Access for the Mobile Workforce Security White Paper March 2015 Splashtop Inc. 1/12 Table of Contents Table of Contents... 2 1. Situation Analysis... 3 2. Architecture... 4 2.1. Splashtop
SENSE Security overview 2014
SENSE Security overview 2014 Abstract... 3 Overview... 4 Installation... 6 Device Control... 7 Enrolment Process... 8 Authentication... 9 Network Protection... 12 Local Storage... 13 Conclusion... 15 2
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
USER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------
USER MANUAL v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ 1 Contents At a Glance Troubleshoot 3 About SkyCrypt 23 FAQ 4 About this manual 23 Contact support
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Installation and usage of SSL certificates: Your guide to getting it right
Installation and usage of SSL certificates: Your guide to getting it right So, you ve bought your SSL Certificate(s). Buying your certificate is only the first of many steps involved in securing your website.
Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet
Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
Tresorit s DRM. A New Level of Security for Document Collaboration and Sharing
Tresorit s DRM A New Level of Security for Document Collaboration and Sharing Cloud-based storage has made it easier for business users to share documents, but it has also opened up new vulnerabilities.
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Georgia Institute of Technology Data Protection Safeguards Version: 2.0
Data Protection Safeguards Page 1 Georgia Institute of Technology Data Protection Safeguards Version: 2.0 Purpose: The purpose of the Data Protection Safeguards is to provide guidelines for the appropriate
THE COMPLETE GUIDE TO GOOGLE APPS SECURITY. Building a comprehensive Google Apps security plan
THE COMPLETE GUIDE TO GOOGLE APPS SECURITY Building a comprehensive Google Apps security plan Contents Introduction................................ 3 1. Secure the core.............................4 Google
Introducing Databackup.com Cloud Backup. File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management
Introducing Databackup.com Cloud Backup File Locker File Sharing & Collaboration EndGaurd EndPoint Protection & Device Management Global Explosion of Data The demand for cloud storage is just getting started.
Using the owncloud Android App
Using the owncloud Android App Accessing your files on your owncloud server via the Web interface is easy and convenient, as you can use any Web browser on any operating system without installing special
EasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology
20140115 Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology TABLE OF CONTENTS What s at risk for your organization? 2 Is your business
Egnyte Security Architecture
w w w. e g n y t e. c o m Egnyte Security Architecture White Paper www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised June, 2013 Table of Contents Egnyte Security Introduction 3 Physical Security
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd.
Secure Password Managers and Military-Grade Encryption on Smartphones: Oh, Really? Andrey Belenko and Dmitry Sklyarov Elcomsoft Co. Ltd. Securing Data-at-Rest: PC vs Smartphone Threat Model BlackBerry
Casper Suite. Security Overview
Casper Suite Security Overview JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave S Suite
An Enterprise Approach to Mobile File Access and Sharing
White Paper File and Networking Services An Enterprise Approach to Mobile File Access and Sharing Table of Contents page Anywhere, Any Device File Access with IT in Control...2 Novell Filr Competitive
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
A Guide For Reviewers. A Guide For Reviewers
Table Of Contents WELCOME TO PASSWORD BOSS!.... 2 PASSWORD BOSS: A SMARTER WAY TO STAY SECURE ONLINE....3 HOW PASSWORD BOSS PROTECTS YOUR SECURITY AND PRIVACY.... 5 INSTALLING PASSWORD BOSS AND CREATING
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
SECUREAUTH IDP AND OFFICE 365
WHITEPAPER SECUREAUTH IDP AND OFFICE 365 STRONG AUTHENTICATION AND SINGLE SIGN-ON FOR THE CLOUD-BASED OFFICE SUITE EXECUTIVE OVERVIEW As more and more enterprises move to the cloud, it makes sense that
TeamViewer Security Information
TeamViewer Security Information 2015 TeamViewer GmbH, Last update: 06/2015 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical
ShareFile Security Overview
ShareFile Security Overview ShareFile Company Policy All ShareFile employees undergo full background checks and sign our information security policy prior to beginning employment with the company. The
Performance Analysis of Client Side Encryption Tools
Performance Analysis of Client Side Encryption Tools Subrata Kumar Das 1, Md. Alam Hossain 2, Md. Arifuzzaman Sardar 3, Ramen Kumar Biswas 4, Prolath Dev Nath 5 Abstract Client side encryption tools are
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey
GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With
Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
Online Backup Solution Features
CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
1. Scope of Service. 1.1 About Boxcryptor Classic
Manual for Mac OS X Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 4 2. Installation... 5 2.1 Installing Boxcryptor Classic... 5 2.2 Licensing Boxcryptor Classic
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
Centralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows Desktop Self-service Password Reset Layer v.3.2-007 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
SOOKASA WHITEPAPER SECURITY SOOKASA.COM
SOOKASA WHITEPAPER SECURITY SOOKASA.COM Sookasa Overview Sookasa was founded in 2012 by a team of leading security experts. The company s patented file-level encryption enables enterprises to protect data
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Introduction. Ease-of-Use
Remote Data Backup Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and expensive method for
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Installation Guide Version 3.0
SIMS Teacher app Installation Guide Version 3.0 Step-by-step guide needed to install and configure the SIMS Teacher app service for a school Version 3.0 Information use and disclaimer The information contained
User Manual for Version 4.4.0.5. Mobile Device Management (MDM) User Manual
User Manual for Version 4.4.0.5 Mobile Device Management (MDM) User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?...
USER GUIDE CLOUDME FOR WD SENTINEL
USER GUIDE CLOUDME FOR WD SENTINEL Document 2013-11-17 Page 2 of 13 TABLE OF CONTENTS INTRODUCTION 2 Safe European Storage 2 How does this really work? 2 GETTING STARTED 3 Setting up an account 3 Setting
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands. Ian Wills Country Manager, Entrust Datacard
Mobility, Security and Trusted Identities: It s Right In The Palm of Your Hands Ian Wills Country Manager, Entrust Datacard WHO IS ENTRUST DATACARD? 2 Entrust DataCard Datacard Corporation. Corporation.
How To Backup Your Hard Drive With Pros 4 Technology Online Backup
Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
Sage Nonprofit Online and Sage Virtual Services. Frequently Asked Questions
Sage Nonprofit Online and Sage Virtual Services Frequently Asked Questions General What is Sage Nonprofit Online? Sage Nonprofit Online provides access to Sage 100 Fund Accounting, Sage Grant Management,
Crypho Security Whitepaper
Crypho Security Whitepaper Crypho AS Crypho is an end-to-end encrypted enterprise messenger and file-sharing application. It achieves strong privacy and security using well-known, battle-tested encryption
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
Dropbox for Business security A Dropbox whitepaper
A Dropbox whitepaper Contents Introduction 3 Under the hood 3 Architecture Dropbox user interfaces Reliability Encryption Product features 6 Admin management features User management features Apps for
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
Access All Your Files on All Your Devices
d Access All Your Files on All Your Devices The Best Performance, Features and Price for Private cloud storage for all platforms Windows, Mac, Linux, ios, Android, Blackberry & more Enterprise Private
Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access
Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access To strengthen KBR information security and safeguard company data, Information Technology will implement two-factor authentication
YOUR SECURE ONLINE VAULT. DSWISS AG BADENERSTRASSE 281 CH-8003 ZURICH [email protected] +41 44 515 11 11 www.securesafe.com
YOUR SECURE ONLINE VAULT DSWISS AG BADENERSTRASSE 281 CH-8003 ZURICH [email protected] +41 44 515 11 11 www.securesafe.com SECURESAFE PRIVACY MANIFESTO We have embedded privacy directly into the design
Reviewer Guide Core Functionality
securing your personal data Sticky Password Reviewer Guide Core Functionality Sticky Password is the password manager for the entire lifecycle of your passwords. Strong passwords the built-in password
Business and enterprise cloud sync, backup and sharing solutions
Business and enterprise cloud sync, backup and sharing solutions Private Cloud Synchronization Collaboration Backup / Versioning Web Access Mobile Access LDAP / Active Directory Federated RADIUS Single
