WebEx Security Overview Security Documentation
|
|
|
- George Montgomery
- 10 years ago
- Views:
Transcription
1 WebEx Security Overview Security Documentation 8/1/2003: WebEx Communications Inc. WebEx Security Overview
2 WebEx Security Overview Introduction WebEx Communications, Inc. provides real-time communication services to a large and growing number of corporations. These corporations use WebEx services for diverse purposes ranging from sales, marketing, project management and support. These corporations represent a variety of market sectors including technology, finance, manufacturing and healthcare. WebEx endeavors that its service offerings meet the most stringent security requirements of corporations so they can use WebEx services effectively and routinely, secure in the knowledge that their sessions are safe and private. It s no surprise then that WebEx assigns data security the highest priority in the design, deployment and maintenance of its network, platform and services. The purpose of this document is to provide information on the data security features and functions that are available in the various WebEx services and inherent in the underlying WebEx communication infrastructure. We discuss the following items in this document: Application User Interface Architecture SSL Encryption Facilities Security WebTrust Accommodation The reader is assumed to have knowledge of core WebEx capabilities and services, including an understanding of the WebEx MediaTone Network. The WebEx services include: Meeting Center, for highly interactive sessions Training Center, to deliver the most effective training via the Web Event Center, for large Web-based seminars Support Center, optimized for helpdesk and support sessions The reader should also be aware of the roles available in the various services, like Host, Presenter, Panelist, etc. Unless otherwise specified, the topics described in this document pertain equally to all WebEx services. 2
3 Application WebEx implements security at the application layer primarily via the WebEx Service Manager software. This is comprised of several local machine software components that make data collaboration possible by coordinating with WebEx Services clusters located across the WebEx MediaTone Network. The WebEx Service Manager has many features that make it a safe and secure method for data collaboration. It is impossible to participate in a WebEx session without the close coordination between the Service Manager and the WebEx Services cluster. Since the data in a WebEx session is shared using the Service Manager software, which must establish a connection with a WebEx Service cluster, these security features are inherent throughout the session. In short, each session is dynamic and involves a handshake between the client and the WebEx Service cluster, and the communication between these components is by default encoded and optionally SSL encrypted. Firewall Compatibility The WebEx Service Manager communicates with the WebEx Services cluster to establish a reliable and secure connection. At the time of client instantiation, the WebEx Service Manager will attempt to determine the best method for communication. In the process of establishing this connection, the WebEx Service Manager attempts to connect using TCP (port 1270) or HTTP/HTTPS (port 80/443). Quite often port 1270 is blocked by a firewall and when this is the case the WebEx Service Manager will tunnel all WebEx communications using HTTP/HTTPS. In the case that a WebEx site incorporates an SSL connection, all the traffic is carried over HTTPS (port 443). Regardless of the connection that is established at the time of client instantiation, by establishing this communication between the Service Manager and the WebEx Cluster, firewalls do not have to be specially configured to enable WebEx sessions. The WebEx Service Manager software: Is invoked only from within a Web browser and cannot be started independently Is certified with a signed certificate of authenticity from Verisign Is the only means possible to participate in a WebEx session Is entirely dependent upon connections established on a session-by-session basis with the WebEx MediaTone Network Performs a proprietary encoding process that encodes all shared data Optionally establishes a 128-bit SSL encrypted connection Content Security WebEx provides several controls to prevent unwittingly sharing data. Unlike other Web conferencing solutions, WebEx restricts application sharing to specified applications. With WebEx, when a Presenter shares a web page or a specified application, other applications running on the Presenter s desktop will never appear on Participants machines (other vendors display everything within a predefined frame ). Further, a Presenter can use the Pause Sharing feature at any time to restrict the Participants view of sensitive data within a shared application. Finally, WebEx is the only provider of 128- bit SSL encryption that encompasses all session data, from the session creation and join pages, to the actual session itself, to the Web pages that follow an interactive session. WebEx provides a highly secure environment for data collaboration. The WebEx Service Manager is designed to deliver in real time, rich-media content securely to each Participant within a WebEx session. All content that a Presenter shares with the Participants in a WebEx session is only a representation of the original data. In addition, all content that is shared with the Participants in the session is encoded with a proprietary encoding process. To gain a better understanding of this process, it is useful to compare the WebEx proprietary encoding process to the PDF encoding process. The PDF format is a proprietary encoded representation of the original object. This encoded content contains no executable data but only inert data, which can be interpreted only by the appropriate content viewer. The WebEx Service Manager functions similarly. The WebEx Service Manager encodes a representation of the original object and delivers that representation 3
4 to the other Participants within the session. The encoded content contains no executable code and it is viewable only by the WebEx Service Manager. However, the way in which this encoded content is delivered is entirely different. As discussed previously, WebEx Services never sends session content in clear text. Prior to sending information from a Participant s Service Manager to the WebEx Service Cluster, the WebEx Service Manager encodes all data in a proprietary format. Moreover, WebEx uniquely identifies session Participants with individual session IDs that WebEx uses to thwart hackers from reassembling session content. These techniques provide safeguards to prevent reconstruction of the data conferencing portion of the WebEx session. Session Security In every WebEx session there is only a logical connection between each local machine via the WebEx MediaTone Network; there is no direct network connection between the local machines. The logical connection is fixed and only application functions can be performed. There is no way to perform general-purpose tasks outside of what the WebEx Service allows. A WebEx session connection is composed of several layers superimposed on one another. The lowest layer is TCP/IP that allows for general data communication and underlies all communications. Above this is the application (web) layer that provides for logical connection of a web browser to a web server. The WebEx Service Manager software, which establishes an end-to-end connection between the Service Manager software and the WebEx Cluster, also communicates at the same application layer as the web browser. Each layer serves a different purpose and has different capabilities. While the lowest level provides arbitrary data communications, higher layers are more specific and less flexible in what can be done. As each layer is established, the network connection is further constrained by the limitations of each layer. The end result being that the total connection is limited to what can be done at the WebEx layer. The layers can be characterized by connection flexibility, protocols used and capabilities allowed. The following table summarizes each layer. 4
5 Layer TCP/IP Web WebEx Connection Flexibility Can be used to create connections between network components. Can only be used to establish a connection between a web browser and a web server. Connection must be initiated by the web browser and made OUTBOUND to the web server. No flexibility at all. Endpoints are fixed between the WebEx Server and the Web browser plug-in. Protocols Used TCP/IP HTTP, SSL Proprietary protocols specific to WebEx services Capabilities Allowed Capabilities allowed subject to limits imposed by network security (e.g. firewalls). HTTP allows a rich data stream that can implement a wide variety of application-specific capabilities. Capabilities are defined explicitly by the WebEx server and the Service Manager software running in the web browser. No other capabilities allowed. Scope and Security Although TCP/IP underlies all communications, it is only directly used by the web browser to initiate a connection to a web server. In many cases, this will be a connection to a proxy server that is internal to the respective company. There are no other connections being initiated outside of the web connection. The Web layer provides a secure connection between the web browser and the web server. No other use of the connection is allowed. Once established the endpoints are fixed. Provides collaborative capabilities and functionality. Only of the applications that are specified by the Presenter from presenting machine. The application-specific functions are possible since WebEx components are running on each end of the connection. Client Connection Security Every WebEx Service Manager connection must authenticate properly prior to establishing a connection with the WebEx cluster to join a WebEx session. The client authentication process uses a unique, per client, per session cookie to confirm the identity of each Participant attempting to join a WebEx session. Each WebEx session has a unique set of session parameters that are generated by the WebEx Service cluster. Each authenticated Participant must have access to these session parameters in conjunction with the unique session cookie in order to successfully join the WebEx session. 5
6 User Interface WebEx security is also enforced through a variety of mechanisms exposed through the WebEx user interface which include web pages devoted to site maintenance, Host profiles, and creating sessions, as well as the session interface itself (denoted by the Welcome Screen ). The available options depend on the role a WebEx session Participant assumes. Roles and Responsibilities There are several roles in a WebEx session Host, Presenter and Participant. (Training Center has the notion of a Panelist, which in the context of privileges, is treated similarly to a Presenter in Meeting Center.) A Host can create, schedule and maintain WebEx sessions, including session parameters that the Host defines (see below). Only the Host can view and edit these session parameters. The Host is the only user who can start a WebEx session. Hosts are identified and created either by self-registration, a site administrator or via WebEx on behalf of our customer. (Self-registration can be disabled.) Meeting Parameters Hosts can specify the following meeting parameters relating to security: Unlisted meetings Meeting passwords Participants must have a Host ID for the site When a meeting is created, WebEx assigns a randomly generated, non-sequential meeting number to uniquely identify the meeting. Unlisted meetings never appear on the user interface. They are accessible only through a link sent via the invitation process or by a Participant explicitly providing the meeting number on the WebEx join page. In either case, the Host must explicitly inform the Participant of the existence of the meeting. Meeting passwords can be forced at either the site or the meeting level. If the site requires meeting passwords, all meetings on that site will require passwords. In addition, the notion of strong passwords can be specified on the WebEx site as a requirement if the site has been configured to require meeting passwords. The strong password feature will apply to Host ID passwords as well. The WebEx site can also be configured to disable invitations. This allows the Host greater control over the distribution of the meeting access information. 6
7 Summary of Host responsibilities: Host, Presenter and Participant Privileges Only a Host can start a WebEx meeting. Each Host is required to log on to the WebEx site with a Host ID and password. Once the Host is authenticated on the site, the Host can start a WebEx meeting. The Host has the first level of control in the meeting and is made the initial Presenter. He or she can grant or revoke Host or Presenter permissions at any time to any Participant in the meeting. The Host can also terminate the session for all Participants at any time. Additionally, the Host can expel any meeting Participant for any reason and can prevent subsequent meeting access from any potential Participant by locking down the meeting. The Presenter is the WebEx session Participant who has the capability to share data. The Presenter determines what is shared in a WebEx session and the level of access that the Participants will have during a WebEx session by setting Participant privileges. A special case is where the Presenter may also grant permissions for individual Participants while an Application/Desktop sharing session is under way. One such permission is the ability for a Presenter to grant a Participant the ability to remotely control the Presenter s shared application or desktop. This is the WebEx remote control capability. At any point during such a session the Presenter can immediately revoke the Participant s remote control privileges. This allows granular control over what can occur during a remote control session. The key point here is that the Presenter must specifically identify a Participant, allow that Participant to remote control his or her application or desktop, and is able to immediately relinquish this capability if required. A Participant within the WebEx session can view the data that is being shared by the Presenter and, using remote control with the Presenter s permission, manipulate a shared application. The Presenter controls the permission levels that Participants have when interacting with the shared data. Site Administration Configuration WebEx Site Administration permits customization of the configuration of a WebEx site to disable some of the core functions available within a session. For example, the Presenter s ability to Share Desktop can be disabled on a per site basis. The Share Desktop feature in the WebEx Service Manager software user interface would be disabled for any sessions that are started from that site and the Presenter would be unable to share their desktop with other Participants in the session. Other related features of Site Administration Configuration include: Require login before site access Require approval of Forgot Password? request All meetings must be unlisted Require participant address Require strict password for new user accounts All meetings must have a password Start/Schedule WebEx meetings Grant/Revoke Presenter privileges Grant/Revoke Host privileges Terminate application sharing session for all Participants in the meeting Expel Participants Restrict access to the meeting Terminate WebEx meetings Mute/Un-Mute individuals using the integrated teleconference The following security capabilities are available to the Presenter: View the list of Participants in the session Enable Participants to save or print presentations or documents shared in the session Enable Participants to switch pages in a presentation or document share Enable Participants to annotate on session content Enable Participants to send text messages to other Participants, the Presenter (or both) Enable Participants to record the session Ability to grant temporary control of a shared application to specific Participants Temporarily freeze an application share, preventing the Participants from viewing the shared content, in order to allow the Presenter private and secure access to sensitive portions of the application 7
8 Architecture WebEx uniquely deploys a globally distributed network of high-speed switches. With this architecture, session data originating from the Presenter s machine and arriving at the Participants machines is switched never stored -- through the WebEx MediaTone Network. No session data is stored on the WebEx cluster; WebEx sessions are completely transient. It is useful to compare the WebEx switching network with the telephone system, where voice is carried across the PSTN in a sophisticated, switched manner. From a security standpoint, this architecture has an advantage in that there is no persistent storage of any session data within the WebEx infrastructure. There is no need to upload content to the WebEx Services cluster; dynamic session content displayed during a WebEx session originates only from the Presenter s machine; Participants see only representations of this data. At the conclusion of a session, all such representations dissipate similar to what happens when a voice telephone call terminates. Like the phone system all that remains of a WebEx data call is ancillary information like billing records, not a record of the conversation itself. WebEx has invested much time and energy into developing and deploying a secure environment for our services. WebEx employs state of the art firewalls, network monitoring, and intrusion detection tools. Production servers undergo a hardening process prior to deployment. Strict change management is employed and additional policies and procedures are enforced. To further ensure adherence to best practices with respect to data security, WebEx retains third parties to regularly perform security audits and conduct vulnerability threat assessments. SSL Encryption In addition to all the safeguards discussed herein, for utmost security, WebEx provides the option of securing all session content with 128-bit encryption using Secure Sockets Layer (SSL), which is the most widely used Internet standard for securing sensitive data communications. With SSL, WebEx encrypts all data within a WebEx Service cluster, including the WebEx session data. This will prevent third parties from accessing any data in transit. Facilities Security WebEx session services are provided through points of presence (POPs) in various geographic locations, including the San Jose and Denver-based Data Centers. The facilities have on duty personnel, 24 hours a day and seven days a week. To gain access to any facility, one must first be on the approved access list and then be authenticated by additional security controls. Security Personnel WebEx has a dedicated security department. Security personnel receive regular training in all aspects of enterprise security. WebEx spends a significant amount of time receiving training from vendors and industry experts to keep current in this rapidly changing environment. 8
9 WebTrust Accreditation WebEx has been awarded a WebTrust seal of accreditation. Here is a brief excerpt that describes the value of this accreditation. WebTrust is a seal awarded to web sites that consistently adhere to certain business standards established by the Canadian Institute of Chartered Accountants (CICA.ca) and the American Institute of Chartered Public Accountants (AICPA). Now globally recognized, these standards can be in the areas of privacy, security, business practices/transaction integrity, availability, confidentiality or non-repudiation. The WebTrust Security Principle sets out an overall objective for the security of data transmitted over the Internet and stored on an e-commerce system. In the course of a WebTrust audit, the practitioner uses the WebTrust Criteria as the basis for assessing whether the Principle has been achieved. Backed by the CICA and AICPA, WebTrust is the only Internet seal that can give web-goers true confidence that certain businesses can be trusted with consumers' (and business') most important asset and prized possession: their private information. What makes WebTrust different from all other Internet seals? Independent verification is the key to WebTrust. Unlike any other Internet seal that claims to protect consumer or business privacy, WebTrust is the only seal administered by a third-party. That means when you see a WebTrust Seal on a web site, the owners did not get a seal simply by paying for the privilege. They had to meet standards set by the professional accounting bodies of Canada and the United States (CICA & AICPA). And the site is audited for WebTrust compliancy at least every 6 mo. WebEx s Commitment WebEx believes that privacy and security are of the highest importance to our clients and business partners. WebEx s commitment includes: Consult with specially trained and licensed WebTrust auditors to review our security policies and procedures Maintain the highest business standards found on the Internet Have our production environment regularly audited to make sure the standards are maintained For more information on WebTrust please visit: Conclusion WebEx services have undergone exceptional increases in usage. This would not be possible without careful attention to the incorporation of security principles and standards in the design and operation of the WebEx infrastructure and services. Data security will remain the highest priority at WebEx, enabling WebEx to continue achieving the goal of providing the most efficient and secure online real-time communication service WebEx Communications, Inc. WebEx, WebEx MediaTone, and the WebEx logo are registered trademarks of WebEx Communications, Inc. All rights reserved. All other trademarks are the property of their respective owners SOWP 9
Security Overview Introduction Application Firewall Compatibility
Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging
The Secure WebEx Meeting Experience
The Secure WebEx Meeting Experience presented by InterCall, a subsidiary of West Corporation, in partnership with WebEx Communications, Inc provides web conferencing services. Because these services are
BeamYourScreen Security
BeamYourScreen Security Table of Contents BeamYourScreen Security... 1 The Most Important Facts in a Nutshell... 3 Content Security... 3 User Interface Security... 3 Infrastructure Security... 3 In Detail...
MIKOGO SECURITY DOCUMENT
MIKOGO SECURITY DOCUMENT Table of Contents Page 2. 6. 6. The Most Important Facts in a Nutshell In Detail Application Firewall Compatibility Quality Management: ISO 9001 Certification Data Compression
Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration
White Paper Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration This paper focuses on security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support
Unleashing the power of real-time collaboration:
Unleashing the power of real-time collaboration: Security overview of Cisco WebEx solutions Whitepaper Unleashing the power of real-time collaboration: Security overview of Cisco WebEx solutions. WebEx
Unleashing the power of secure, real-time collaboration
Unleashing the power of secure, real-time collaboration Cisco WebEx web conferencing security White Paper 1 2010 Cisco and/or its affiliates. All rights reserved. Introduction Enabling real-time collaboration
WebEx Remote Access White Paper. The CBORD Group, Inc.
WebEx Remote Access White Paper The CBORD Group, Inc. Document Revision: 1 Last revised: October 30, 2007 Changes are periodically made to the information contained in this document. While every effort
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO
TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability
Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using
Xerox SMart esolutions. Security White Paper
Xerox SMart esolutions Security White Paper 1 Xerox SMart esolutions White Paper Network and data security is one of the many challenges that businesses face on a daily basis. Recognizing this, Xerox Corporation
WHITE PAPER. GoToMyPC. Citrix GoToMyPC Corporate Security FAQs. Common security questions about Citrix GoToMyPC Corporate. www.gotomypc.
Citrix Corporate Security FAQs Common security questions about Citrix Corporate www.gotomypc.com Q: What are the Corporate software components that I need to install on the host and client computers? A:
Content Page. 1 Remote Access - HEIDELBERG's interactive remote service approach 2. 2 How HEIDELBERG's remote service approach works 3
Versions-Information Version - Kapitel Beschreibung Name / Abt.. Datum 11 06.04.04 Adoption provider change WebEx Oelsner/ RD 12-08.04.04 Comments B.Fritzsche/ viruses... Oelsner/Fritzsche 13-26.04.04
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
Copyright Telerad Tech 2009. RADSpa. HIPAA Compliance
RADSpa HIPAA Compliance 1. Introduction 3 1.1. Scope and Field of Application 3 1.2. HIPAA 3 2. Security Architecture 4 2.1 Authentication 4 2.2 Authorization 4 2.3 Confidentiality 4 2.3.1 Secure Communication
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
Blue Jeans Network Security Features
Technical Guide Blue Jeans Network Security Features Blue Jeans Network understands an organization s need for secure communications. The Blue Jeans cloud-based video conferencing platform provides users
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
GoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard
Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard August 2014 Table of Contents Introduction... 1 PCI Data Security Standard...
GoToMyPC Corporate Security FAQs
GoToMyPC Corporate Security FAQs Common security questions about Citrix GoToMyPC Corporate gotomypc.com Q: What are the GoToMyPC Corporate software components that I need to install on the host and client
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
How To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
SHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
How Reflection Software Facilitates PCI DSS Compliance
Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit
SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM
SECURITY AND PRIVACY ISSUES IN A KNOWLEDGE MANAGEMENT SYSTEM Chandramohan Muniraman, Meledath Damodaran, Amanda Ryan University of Houston-Victoria Abstract As in any information management system security
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
SSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
FormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
Fact Sheet FOR PHARMA & LIFE SCIENCES
Fact Sheet PATHWAY STUDIO WEB SECURITY OVERVIEW Pathway Studio Web is a comprehensive collection of information with powerful security features to ensure that your research is safe and secure. FOR PHARMA
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
Unisys Internet Remote Support
white paper Unisys Internet Remote Support Systems & Technology, CMP-based Servers Introduction Remote Support is a method of connecting to remotely located systems for remote administration, real-time
Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
White Paper. Quantum StorageCare Guardian
Quantum StorageCare Guardian April 2013 Notice This White Paper contains proprietary information protected by copyright. Information in this White Paper is subject to change without notice and does not
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
Stateful Inspection Technology
Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions
MIGRATIONWIZ SECURITY OVERVIEW
MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
User Identification and Authentication
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
Overview... 2. Servers and Infrastructure... 2. Communication channels... 3. Peer-to-Peer connections... 3. Data Compression and Encryption...
Data security is a high priority at Brosix, enabling us to continue achieving the goal of providing efficient and secure online realtime communication services. Table of Contents Overview... 2 Servers
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
Data Security and Governance with Enterprise Enabler
Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date
Securing the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
Enterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
Security Features 01/01/2014
Security Features 01/01/2014 Introduction ArkadinAnywhere is Arkadin s easy-to-use web collaboration service that helps improve internal and external communication processes, thereby enabling employees
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our
ENDNOTE ONLINE SECURITY OVERVIEW FOR MY.ENDNOTE.COM In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our servers from attacks and other attempts
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
Electronic Service Agent TM. Network and Transmission Security And Information Privacy
Electronic Service Agent TM and Transmission Security And Information Privacy Electronic Services January 2006 Introduction IBM Electronic Service Agent TM is a software application responsible for collecting
Remote Access Platform. Architecture and Security Overview
Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards
E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
Sophistication of attacks will keep improving, especially APT and zero-day exploits
FAQ Isla Q&A General What is Isla? Isla is an innovative, enterprise-class web malware isolation system that prevents all browser-borne malware from penetrating corporate networks and infecting endpoint
Version Highlights. CertainT 100 SSL Accelerator. Version 2.11. International. New hardware and software version. North America
Version Highlights SSL Accelerator Version 2.11 New hardware and software version North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22
DEPLOYMENT GUIDE DEPLOYING F5 WITH MICROSOFT WINDOWS SERVER 2008
DEPLOYMENT GUIDE DEPLOYING F5 WITH MICROSOFT WINDOWS SERVER 2008 Table of Contents Table of Contents Deploying F5 with Microsoft Windows Server 2008 Prerequisites and configuration notes...1-1 Deploying
Evaluate the Usability of Security Audits in Electronic Commerce
Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka
Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview
Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R
Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism. www.spreed.com
Spreed Keeps Online Meetings Secure Online meeting controls and security mechanism www.spreed.com Spreed Online Meeting is protected by the most advanced security features. Rest assured that your meetings
STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
Information Technology Security Guideline. Network Security Zoning
Information Technology Security Guideline Network Security Zoning Design Considerations for Placement of s within Zones ITSG-38 This page intentionally left blank. Foreword The Network Security Zoning
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
ISM/ISC Middleware Module
ISM/ISC Middleware Module Lecture 13: Security for Middleware Applications Dr Geoff Sharman Visiting Professor in Computer Science Birkbeck College Geoff Sharman Sept 07 Lecture 13 Aims to: 2 Show why
Security Whitepaper. NetTec NSI Philosophy. Best Practices
Security Whitepaper NetTec NSI provides a leading SaaS-based managed services platform that to efficiently backup, monitor, and troubleshoot desktops, servers and other endpoints for businesses. Our comprehensive
Securing an IP SAN. Application Brief
Securing an IP SAN Application Brief All trademark names are the property of their respective companies. This publication contains opinions of StoneFly, Inc., which are subject to change from time to time.
Chapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
athenahealth Interface Connectivity SSH Implementation Guide
athenahealth Interface Connectivity SSH Implementation Guide 1. OVERVIEW... 2 2. INTERFACE LOGICAL SCHEMATIC... 3 3. INTERFACE PHYSICAL SCHEMATIC... 4 4. SECURE SHELL... 5 5. NETWORK CONFIGURATION... 6
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
CareGiver Remote Support Information Technology FAQ
CareGiver Remote Support Information Technology FAQ CareGiver remote support Information Technology FAQ Purpose The purpose of this document is to answer Frequently Asked Questions (FAQs) regarding CareGiver
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
