Xerox Digital Alternatives Security and Evaluation Guide. May 2015 Version 1.1
|
|
|
- Dinah Rogers
- 10 years ago
- Views:
Transcription
1 Xerox Digital Alternatives Security and Evaluation Guide May 2015 Version 1.1
2
3 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and CompleteView are trademarks of Xerox Corporation in the United States and/or other countries. BR14502 Microsoft, Windows, SQL Server, Internet Explorer, Active Directory, and Azure are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. ipad is a trademark of Apple Inc., registered in the U.S. and other countries. ipad mini is a trademark of Apple Inc. Intel Pentium is a trademark of Intel Corporation in the U.S. and/or other countries. Changes are periodically made to this document. Changes, technical inaccuracies, and typographic errors will be corrected in subsequent editions. Revision History Date Version Number Description 4/10/ Major reorganization to comply with internal security documentation template Updates for 1.1 Release, including introduction of private cloud support. 8/06/ Initial Version
4
5 Table of Contents 1 Introduction... 1 Product Overview... 1 Xerox Digital Alternatives Local Server Implementation Types... 1 Xerox Digital Alternatives End User Client Application... 2 Xerox Digital Alternatives Central Server... 2 Reporting Data Communicator... 2 How to Use This Guide... 2 Intended Audience... 3 Limits to This Guide... 3 What s New for Release Digital Alternatives Private Cloud Deployment Support... 3 Software Licensing... 3 Compliance and Certification... 4 Customer IT Organization... 4 Xerox Managed Print Services Delivery Organization... 4 Ongoing Operational Roles and Responsibilities Xerox Digital Alternatives Server Maintenance Architecture Solution / Application Environments... 7 Hardware and Software Requirements... 7 Local Server... 7 Xerox Digital Alternatives PC Client Requirements... 8 Xerox Digital Alternatives ipad Client Requirements... 9 Local Server Deployment Models... 9 Xerox Digital Alternatives Local Server Requirements Required Resources for All Deployments Private Cloud Implementation Considerations Establishing Business-to-Business (B2B) Connectivity Physical Security Access Management Access Control Identification and Authentication i
6 Xerox Digital Alternatives Security & Evaluation Guide 8 Data Transmissions Auditing and Logging Application Timeout Application Security Business Continuity / Disaster Recovery Data Management / Protection Document Storage ii
7 Xerox Digital Alternatives Security & Evaluation Guide Figures Figure 1: Onsite Implementation... 5 Figure 2: Private Cloud Implementation... 6 iii
8
9 1 Introduction Product Overview Xerox Digital Alternatives is a software service supporting the reading, annotating, and sharing of documents digitally. Once a document enters a user s Digital Alternatives client, it automatically replicates to all of the user s PC and ipad devices on which the Digital Alternatives client is installed. Users can also share the annotated document with other users via the application as well as by . Digital Alternatives is composed of five main component areas. Component Xerox Digital Alternatives Local Server End User Client Application Internet-based Central Server User Analytics Reporting Data Communicator Digital Alternative User Analytics Reporting Description Performs authentication tasks Replicates documents to user s other devices and to other users Installs on the end user s PC and/or ipad Displays documents for review and annotation Stores account information and licensing used by the local server and clients Transmits usage data to the Digital Alternatives User Analytics reporting platform hosted within Xerox. Uses Digital Alternatives usage information obtained from the Digital Alternatives Local Server to provide analysis of usage benefits to the customer based on industry standard metrics. Xerox Digital Alternatives Local Server Implementation Types Onsite Implementation The onsite implementation performs all authentication tasks with the customer s IT Active Directory on behalf of the Digital Alternatives user. The user supplies credentials through the Digital Alternatives End User Client Application. Another main task of the Digital Alternatives Local Server is to replicate documents to a user s other devices as well as to other users with whom the document is being shared. The Digital Alternatives Local Server also performs Global Address Lookup on behalf of the Digital Alternatives End User Client Application when sharing documents with other customer Digital Alternatives users. Additionally, if a document is shared with a non-digital Alternatives user, the Digital Alternatives Local Server sends the document through the customer s server for the Digital Alternatives End User Client Application. The Digital Alternatives Local Server interacts with the Internet-based central server to provide documents upon demand to users who are outside of the customer s network infrastructure. 1
10 Xerox Digital Alternatives Security & Evaluation Guide Private Cloud Implementation Xerox hosts the Local Server within the Xerox private cloud network on behalf of the Digital Alternatives customer. In this case, no customer onsite server software installation is necessary and the customer is no longer responsible for managing the physical server, as Xerox assumes this responsibility. With the private cloud deployment, a dedicated VPN connection between the customer network environment and the Xerox private cloud environment is required. Access to the customer s Active Directory and Exchange LDAP resources from the private cloud application server provided securely through the established VPN connection is also required. The private cloud implementation supports all the same functionality that exists with the onsite, local server implemented implementation. Xerox Digital Alternatives End User Client Application This software, which can be installed on the end user s PC and/or ipad, displays the document and holds a local copy of the documents being displayed within the user s local Digital Alternatives document repository. Users go to the client when they want to access their documents. Xerox Digital Alternatives Central Server This component houses the account information and licensing used by the local server and clients. The central server manages the Digital Alternatives customer account that includes the central server generated customer ID for each Digital Alternatives client implementation as well as the associated customer domain(s) that customers use when accessing their Digital Alternatives accounts. Within this Digital Alternatives customer account, user seat licensing quotas for each implementation are managed. Consult the Xerox Digital Alternatives Administration Guide for more details on how license management. Reporting Data Communicator The Reporting Data Communicator software component, which is separately installed on the Digital Alternatives Local Server, extracts customer user usage information from the Local Server s reporting database and sends this information to the Digital Alternatives CompleteView User Analytics servers that are hosted within Xerox. The Reporting Data Communicator configuration does not allow the transfer of personally identifiable information to the Digital Alternatives CompleteView User Analytics servers. Consult the Digital Alternatives Data Communicator Installation Guide for more information on Reporting Data Communicator configuration for sending reporting data to Digital Alternatives CompleteView User Analytics servers. How to Use This Guide This guide is to help Xerox or Partner presales representatives provide their prospective customer s IT organizations with security related information on Digital Alternatives, to help in the certification of the deployment of Digital Alternatives within the customer s 2
11 Xerox Digital Alternatives Security & Evaluation Guide environment. Customer and Xerox personnel can use the guide as part of the presales evaluation, post-sales testing, and acceptance process. Actual test plans and acceptance criteria are dependent upon the formality or required documentation of the customer. This document contains information related to Digital Alternatives potential impact to security, enterprise IT infrastructure, network traffic, resources, and required planning. Intended Audience The customer s IT, security, and management will use this guide. Before certifying Digital Alternatives, customers, and appropriate Xerox personnel should have a clear understanding of: The IT environment at the site where Digital Alternatives will be installed, If the private cloud hosting option is going to be utilized, an understanding of the nature of the VPN connectivity and its security aspects. Any restrictions placed on applications that are deployed on that network, The Microsoft Windows Server operating system, and The Microsoft SQL Server database system. Limits to This Guide The Digital Alternatives solution is highly configurable and has many features. This guide covers standard implementations and a typical customer IT. If the customer s IT environment differs from what this guide documents, then the customer s IT team and the Xerox representative need to identify the differences and resolve any potential concerns. The guide s information pertains to the Digital Alternatives 1.1 release. Although much of this information will remain constant through the software s life cycle, some of the data provided may be revision-specific, and will require periodic updates. IT organizations should check with the Xerox representative to obtain the appropriate version. What s New for Release 1.1 Digital Alternatives Private Cloud Deployment Support This capability allows Xerox to host the customer s Digital Alternatives Local Server on Xerox-furnished cloud servers instead of the customer having to furnish the host machines and all of the normal server maintenance responsibilities for this purpose. Software Licensing Software licensing is managed at the account level and stored in the customer account defined in the Digital Alternative s Central Server. Neither the End User Client software 3
12 Xerox Digital Alternatives Security & Evaluation Guide application nor the local server are specifically licensed, but rather when a new customer end user logs into their Digital Alternatives account for the first time, the overall available license seat count as managed in the central server is decremented. This initial login of a customer is known as Onboarding. Uninstalling the End User Client software does not increment the allocated license count within the Central Server. You must obtain additional license seats from Xerox once the onboarded customers deplete the available license count on the central server. Compliance and Certification Customer IT Organization Ultimately, it is the responsibility of the customer s IT organization to certify and accept the deployment and operation of the Digital Alternatives solution within their network environment. The customer may have an informal certification process, which is limited to the review of Xerox Digital Alternatives documentation and a Xerox demonstration. Or, the customer may have a more formal process that requires actual installation and testing with defined test criteria and test plan. The customer needs to define the certification criteria and work with the Xerox team to define the required steps and timeline. Xerox Managed Print Services Delivery Organization Xerox personnel may participate in the certification process and help determine which Digital Alternatives features and functions are required and the frequency of Digital Alternatives activities. Ongoing Operational Roles and Responsibilities Xerox Digital Alternatives Server Maintenance As part of the customer certification process, the Xerox account team, also known as the Operations Team, the field analyst who will be part of the initial deployment and ongoing maintenance, and the customer s IT organization need to define the roles and responsibilities for the ongoing care of the Digital Alternatives software installation: Who will be responsible and what is the planned schedule for periodic backups for the SQL Server database that Digital Alternatives uses in its operation? If the account is unstaffed with Xerox personnel, then the IT organization needs to include the Digital Alternatives database within their periodic database backup schedule, which they may perform on other systems. As the responsibility of providing the server hardware falls upon the customer IT management organization, installing periodic Microsoft operating system software updates will be the responsibility of the customer IT organization. Typically, the server that on which Digital Alternatives is installed will have to follow the server software update policies of the customer s IT organization, but the two parties need to discuss and agree to this standard practice. 4
13 2 Architecture The diagrams below show the two deployment scenarios for the Digital Alternatives local server components. In the onsite scenario, we implement the Digital Alternatives Local Server within the customer s IT environment, where the customer furnishes the Windows servers, including Microsoft SQL Server. In the private cloud implementation scenario, Xerox provides the hosts and SQL Server within its private cloud network and a VPN connection between the Xerox private cloud network and the Customer s IT network. Figure 1: Onsite Implementation Using the private cloud implementation, we establish a dedicated business-to-business VPN connection needs between the Application Server within the Xerox Services network and the customer s network environment that provides access by the Application Server to the customer s Active Directory and Exchange LDAP connections. The VPN connection also allows customer users who have the Digital Alternatives End User Client user software loaded onto their PC and ipad devices to connect to the Application Server when these devices are within the customer network environment. 5
14 Xerox Digital Alternatives Security & Evaluation Guide Figure 2: Private Cloud Implementation 6
15 3 Solution / Application Environments Hardware and Software Requirements Detailed in the following sections are the software and hardware requirements for the local server and Client software components in the Digital Alternatives solution. In addition, the document focuses on the local server component, but it discusses the PC and ipad components as well. Local Server Supported Operating Systems Windows 2008 Standard Windows 2008 Enterprise Windows 2008 R2 Standard Windows 2008 R2 Enterprise Windows 2012 Standard Windows 7 Other Software Required Microsoft.NET Framework v4.5.2 Windows Task Scheduler Hardware RAM: 8 GB CPU: AMD Dual Core 1.20GHZ Hard drive: 260GB The installation requires 50MB of free space. Install the reporting data communicator on a local server application node. 7
16 Xerox Digital Alternatives Security & Evaluation Guide Xerox Digital Alternatives PC Client Requirements Installation The following are the minimum system requirements for installation: (Based upon specific system configuration and needs, additional hardware may be required.) Supported Operating System: Windows 7 (Professional, Ultimate, Enterprise) Windows 7 x64 (Professional, Ultimate, Enterprise) Windows 8 Windows 8 x64 Windows 8.1 (Professional, Ultimate) Office 2007 with SP3 to Office 2013 Intel Pentium 4 Processor Physical Memory (RAM): 2 GB minimum (4 GB is recommended) Free hard disk space: 250 MB for the application only. Recommend 5 GB minimum for document storage too. Note: This may increase for users who have many documents. Microsoft.NET Framework is required as a prerequisite for all supported operating systems. Security The PC Client uses the customer s Active Directory Domain Authentication. Users will use the same Windows Domain login as on their PC client. Requires user to have Internet Explorer configured for proxy server for installer to predetermine customer IT proxy settings for outside central server access. Requires that Digital Alternatives Local Server connect to the customer s domain authentication server(s). Note: After installation Internet access is required for users to: a. Onboard the Digital Alternatives solution with their client for the first time. b. Reauthenticate their Digital Alternatives client when their token or password expires. Tokens expire every 8 hours. 8
17 Xerox Digital Alternatives Security & Evaluation Guide Xerox Digital Alternatives ipad Client Requirements Installation ios 7 or 8 operating system ipad 2 and newer, includes ipad mini (with and without Retina) Security: The ipad Client uses the customer s Active Directory Domain Authentication. Requires that Digital Alternatives Local Server connect to customer s domain authentication server(s). Note: After installation, Internet access is required for users to: a. Onboard the Digital Alternatives solution with their client for the first time. b. Reauthenticate their Digital Alternatives client when their token or password expires. Authentication tokens expire every 8 hours. c. In order to sync and share you can use either the Internet or customer intranet. Local Server Deployment Models 9
18 Xerox Digital Alternatives Security & Evaluation Guide Xerox Digital Alternatives Local Server Requirements Component Minimum Desired / Recommended Operating System Windows Server 2008 R2 Windows Server 2008 R2 or Windows Server 2012 Web Server IIS version 7.5 IIS version 7.5 for Server 2008 R2 or IIS version 8 for Server 2012 Virtual Memory Network COM+ Access Network DTC Access Access Components Microsoft.Net Framework 8 GB Not needed Not needed Required (bundled w/microsoft.net Framework) Not needed Not needed NET Required (bundled w/microsoft.net Framework) Database Server Microsoft SQL Server 2008 R2 Microsoft SQL Server 2008 Service Pack 3 R2 or SQL Server 2012 SQL Authentication Server Administrative Rights Required with admin account access Required Required with admin account access Required Required Resources for All Deployments Customer IT needs to provide the following required resources for the Digital Alternatives Local Server. SMTP (outbound mail server): Customer SMTP server information is required for Digital Alternatives Local Server to send share notifications. If the SMTP server needs user authentication, the credentials of the Service Account user credentials are used. The local server uses customer's existing SMTP interface to customer's existing MS exchange mail server. Port 25 is the most common setting for interacting with SMTP mail relays for Digital Alternatives, but can be overridden during configuration of the local server based upon customer mail server requirements. LDAP Connection for Global Address Lookup: Primary customer user directory lookup server. This is used to access user addresses for owner verification during onboarding. This is also used for Global Address Lookup. By default port 389 is used, unless the customer s IT department instructs us to use a different port ID. 10
19 Xerox Digital Alternatives Security & Evaluation Guide LDAP Connection(s) for Authentication: Digital Alternatives users are authenticated using Microsoft Windows Network Domain authentication. The Digital Alternatives Local Server can automatically detect membership in a given domain (using the provided service account), which allows domains and servers to appear automatically in the configuration screen. Otherwise, domains and LDAP connections can be added manually. By default port 389 is used, unless the customer s IT department instructs us to use a different port ID. Service Account: Customer IT needs to create a service account for the IIS app pools and the maintenance service to use on the local server. This account needs to be a domain account and have administrative rights on the Digital Alternatives Local Server node(s). If the SMTP server used requires user authentication, the username and password for the service account are used. This Service Account should be exempt from password expiration, as an expired password impacts the operation of the local server. Please refer to the Digital Alternatives Local Server Administration Guide for the correct configuration of the local server service account. This account is required at local server installation time. Internet Access: Access to the Digital Alternatives Central Server is needed. The required https port is 443. Private Cloud Implementation Considerations Establishing Business-to-Business (B2B) Connectivity With the private cloud implementation, we must establish a dedicated B2B connection between the customer s network and the Xerox private cloud network in order to secure privacy. Typically this implementation occurs with, but is not limited to, an Internet site-tosite VPN solution establishing a NAT IP address connection between the customer s firewall and the private cloud s firewall. IP Address and Port Number of Customer Active Directory Server The Digital Alternatives Private Cloud server needs to present the credentials of an onboarding user to the Customer s Active Directory server, using its Lightweight Directory Access Protocol (LDAP) interface through the B2B connection. IP Address and Port Number of Customer Exchange Server LDAP Interface When an end user views their company s global address book within Digital Alternatives, the local server obtains this information by accessing the customer s Exchange Server through its LDAP interface. By default port 389 is used, unless the customer s IT department instructs us to use a different port ID. 11
20 Xerox Digital Alternatives Security & Evaluation Guide Customer IP Address Network Address Translation Rule in Firewall Because internal IP addresses used by the customer for their network devices may be similar to other customer networks as well as addresses within Xerox, the customer should provide a Network Address Translation (NAT) rule to map their outbound IP address communication to the Digital Alternatives Private Cloud Server. For example, it is common for the customer network devices to use XXX or XXX address ranges for internal addressing. Since each customer s client application communicates to the private cloud server for document synchronization, all of the customer s outbound traffic appears to Xerox as a single inbound IP source representing all of the customer s traffic with which the private cloud server needs to interact. Document Security within Cloud-Based Local Server Documents imported into Digital Alternatives are stored within the local server as unencrypted PDF files within the local server s document repository. Access to this document repository, along with the application and database server is restricted to Xerox private cloud IT personnel who require access to administer and maintain these servers. Direct access to the document repository by users or non-authorized Xerox private cloud IT personnel is prevented using Windows permissions specified on the directory containing the documents. Thus, we observe safe practices with respect to document security and personally identifiable information when storing sensitive documents in a cloud-based system. 12
21 4 Physical Security Xerox uses multiple data centers to host its application and data, providing essential redundancy. All data centers employ physical security, strict access policies, and secure vaults and cages. First and foremost, Xerox takes every security measure to make sure confidential information stays that way. We provide administrative, technical, and physical safeguards to help ensure we meet your organizational compliance requirements. Data centers use two factor authentication methods, for example biometric entry authentication and secured with 24/7 security resources Uninterruptible power and backup systems, plus fire/flood prevention at storage sites The data centers that host Digital Alternatives Private Cloud are compliant with ISO 27001, HIPAA, PCI-DSS, and SOX guidelines. We constantly monitor our private network and perform frequent threat assessments to ensure data protection. Multiple Internet backbone connections provide routing redundancy and high-performance connectivity. Digital Alternatives Private Cloud instances are housed in Xerox data centers with secondary disaster recovery sites that are all ISO compliant: North American Data Centers Primary Site Lexington, KY, USA Secondary Site (Disaster Recover) European Data Centers Primary Site Sandy, UT, USA Telford, UK Newport, UK North York, ON Toronto, ON Paris, FR Tours, FR Secondary Site (Disaster Recover) Secondary disaster recovery sites are activated when their primary sites are down. When activated, the secondary site is restored from the nightly backup of the primary site. No customer information or documents are housed in the Microsoft Azure environment. For Digital Alternatives Private Cloud, all customer information and documents are stored within Xerox-managed data centers. Key components of a data center are environmental controls (air conditioning, fire suppression, etc.), redundant/backup power supplies, redundant B2B and B2C network/internet connections, and high physical and information security. 13
22 5 Access Management We constantly monitor our private network and perform frequent threat assessments to ensure data protection. Multiple Internet backbone connections provide routing redundancy and high-performance connectivity. Servers reside behind robust firewalls that selectively grant access to network resources on an as required basis. External penetration testing ensures system security and validation. Intrusion Detection System (IDS) monitors network traffic. In addition to following Microsoft security best practices, the following lock-down examples are a standard part of the server configuration: Disable AutoAdminLogon Remove the DefaultPassword registry value Disable 8.3 naming convention requirements Disable CD-ROM AutoRun Security-hardening the TCP/IP stack Disable anonymous network or local access to the registry 14
23 6 Access Control Xerox private cloud maintains a strategic information security framework based on regular assessments of the threats, vulnerabilities, and business impact to protected information systems from a variety of attackers and contingencies. We review this framework at least biannually. The framework encompasses enterprise-wide information security as well as issues specific to the Digital Alternatives Private Cloud hosting environment. Xerox also maintains a comprehensive set of policies, procedures, and tools to ensure continuous compliance with internal and external security guidelines. Our production systems are located in our private data center facilities. We monitor and protect production web, application, file, and database servers, along with network equipment. Video surveillance monitors access to our data centers. We use two-factor authentication, such as card readers and biometric scanners, as well as on-site security personnel to control access. We record access to our data centers and require approval along with identity confirmation. Cloud and data center features include, but are not limited to: Secure data center Encrypted user authentication Internet firewalls Network Address Translation and proxy services and servers Secure Socket Layer (SSL) data encryption Redundant, highly available routers and switches Redundant, highly available, and secure servers Redundant, highly available power management Highly available data access via redundant circuits and carriers Regularly scheduled backups, offsite storage and site replication Hardened servers and operating systems Regular vulnerability scanning 15
24
25 7 Identification and Authentication First and foremost, Xerox private cloud takes every security measure to make sure confidential information stays that way. Digital Alternatives Private Cloud provides an LDAP connector which enables a site to use a customer s corporate LDAP or Active Directory server for account management and authentication. When using LDAP/AD, users log into Digital Alternatives Private Cloud using their windows credentials (domain, user name, and password); a separate login is not required. Additionally, customer network administrators can set password policies on the LDAP/AD server to enforce stronger security measures. 17
26
27 8 Data Transmissions For added data security, Xerox uses state-of-the-art technology and industry best practices for data encryption during transit to and from the Digital Alternatives Private Cloud, as well as while stored within Digital Alternatives. Encryption at transfer with high-grade SSL and at rest with 256-bit AES using port 443 Content Delivery Networks for transfer optimization and additional encryption cycle 19
28
29 9 Auditing and Logging Xerox can provide reporting and audit trails for most actions or activities that occur within Digital Alternatives administration. 21
30
31 10 Application Timeout Not applicable. When a user session expires on Digital Alternative Client Software, the user will need to reauthenticate. 23
32 11 Application Security We constantly monitor our private network and perform frequent threat assessments to ensure data protection. Multiple Internet backbone connections provide routing redundancy and high-performance connectivity. Servers reside behind robust firewalls that selectively grant access to network resources on an as required basis. External penetration testing ensures system security and validation. Intrusion Detection System (IDS) monitors network traffic. 24
33 12 Business Continuity / Disaster Recovery Xerox maintains backups of all your data as well as redundant hardware to minimize the business impact of hardware failures, site unavailability, natural disasters, or other contingencies. We annually test disaster recovery plans and tools on a live-reference installation of Digital Alternatives. 25
34
35 13 Data Management / Protection Document Storage All Digital Alternatives user documents are maintained on the Digital Alternatives Document Server. The Digital Alternatives Document Server, along with the Local Server and the Database Server, can be on-premise or securely hosted by the Xerox private cloud. Documents are stored unencrypted in the Digital Alternatives Document Server. The documents are stored in a configurable location, which can be any location to which the Digital Alternatives Document Synchronization Service has access. Access to the documents is protected by Windows and Server access on the customer s domain. As an added layer of protection, actual documents are stored with an obfuscated file name and extension. Documents are not deleted automatically, but rather the users themselves delete documents. There is no automatic document cleanup. Each user has a specific amount of storage allotment for their documents on the Digital Alternatives File Server. No Digital Alternatives user documents are stored on the Digital Alternatives Central Server. 27
How To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
Secure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
Server Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
msuite5 & mdesign Installation Prerequisites
CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
Security Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
Optus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
efolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
Ignify ecommerce. Item Requirements Notes
wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor
LifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
Dell One Identity Cloud Access Manager 7.0.2. Installation Guide
Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
Xerox Mobile Print Cloud
September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United
ITAR Compliant Data Exchange
ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Las Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Mediasite EX server deployment guide
Mediasite EX server deployment guide 2008 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc. Additional copies
A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher
A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version
Security Whitepaper. NetTec NSI Philosophy. Best Practices
Security Whitepaper NetTec NSI provides a leading SaaS-based managed services platform that to efficiently backup, monitor, and troubleshoot desktops, servers and other endpoints for businesses. Our comprehensive
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
Abila MIP Mobile. System Requirements
This is a publication of Abila, Inc. Version 1.x 2013 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned herein are
BUILT FOR YOU. Contents. Cloudmore Exchange
BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
Introduction to the AirWatch Cloud Connector (ACC) Guide
Introduction to the AirWatch Cloud Connector (ACC) Guide The AirWatch Cloud Connector (ACC) provides organizations the ability to integrate AirWatch with their back-end enterprise systems. This document
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Implementing Microsoft Azure Infrastructure Solutions
20533B - Version: 1 02 July 2016 Implementing Microsoft Azure Infrastructure Solutions Implementing Microsoft Azure Infrastructure Solutions 20533B - Version: 1 5 days Course Description: This course is
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
Enterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
Security Considerations
Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver
Server Installation Procedure - Load Balanced Environment
Server Installation Procedure - Load Balanced Environment 1. Introduction This document explains a step-by-step procedure in case BackupAgent BV performs an installation of the BackupAgent Server Software
Installation & Configuration Guide
Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Projectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview
Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Security & Infra-Structure Overview
Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4
White Paper: Librestream Security Overview
White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing
activecho Driving Secure Enterprise File Sharing and Syncing
activecho Driving Secure Enterprise File Sharing and Syncing activecho Overview In today s enterprise workplace, employees are increasingly demanding mobile and collaborative solutions in order to get
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
Enterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson Copyright Information
CloudDesk - Security in the Cloud INFORMATION
CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.
1 Copyright Acronis International GmbH, 2002-2016 Copyright Statement Copyright Acronis International GmbH, 2002-2016. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of
This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.
SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Netwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
Installation Guide. Release Management for Visual Studio 2013
1 Installation Guide Release Management for Visual Studio 2013 This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site references, may
Xerox Mobile Print Cloud
Xerox Mobile Print Cloud Information Assurance Disclosure Software Version 3.0 May 2015 702P03595 2013-2015 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
Veeam Backup Enterprise Manager. Version 7.0
Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
Request Manager Installation and Configuration Guide
Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
StreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
White Paper. Software as a Service by Yardi. Secure, seamless hosting and support
White Paper Software as a Service by Yardi Secure, seamless hosting and support Yardi, the Yardi logo, and the names of Yardi products and services are either registered trademarks or trademarks of Yardi
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
GTS Software Pty Ltd. Remote Desktop Services
GTS Software Pty Ltd Remote Desktop Services Secure web access to GTS Software applications CONTENTS Overview... 2 What GTS can provide with Remote Desktop Services... 2 Main Features... 3 RD Web Access...
December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure
December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
SaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All
NetIQ Directory and Resource Administrator NetIQ Exchange Administrator. Installation Guide
NetIQ Directory and Resource Administrator NetIQ Exchange Administrator Installation Guide August 2013 Legal Notice NetIQ Directory and Resource Administrator is protected by United States Patent No(s):
Entrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Veeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
Birst Security and Reliability
Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their
ACE Management Server Deployment Guide VMware ACE 2.0
Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.
Netwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
NETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Xerox Mobile Print Solution
Software Version 3.0 Version 1.0 702P03147 Xerox Mobile Print Solution Information Assurance Disclosure 1 Introduction... 6 1.1 Purpose... 6 1.1 Target Audience... 6 1.2 Disclaimer... 6 2 System Workflows...
