3VR SmartRecorder TM. IT Requirements. 3VR Video Intelligence Platform. June 2011

Size: px
Start display at page:

Download "3VR SmartRecorder TM. IT Requirements. 3VR Video Intelligence Platform. June 2011"

Transcription

1 3VR SmartRecorder TM IT Requirements 3VR Video Intelligence Platform IT REQUIREMENTS WHITE PAPER June 2011 Applies to: 3VR Software Version: VRSR-ITREQ-R5 3VR, Inc 475 Brannan Street, Suite 430 San Francisco, CA Tele: Sales: Fax: VR, Inc. 3VR and the 3VR logo are either trademarks or federally registered trademarks of 3VR, Inc. Specifications herein subject to change without notice.

2 Contents 1. Summary 3 2. IT Security with 3VR Operating System Applications Network Services Ports SMTP Physical Access Antivirus Client Applications Vulnerability Testing 6 3. Systems Management with 3VR Systems and User Management Extraordinary Maintenance Account Systems Health Monitoring Updates/Upgrades Management Plan 8 4. Client Application Management About 3VR Client Applications Where to Find Client Applications Client Application System Requirements Licensing 3VR Client Applications 9 5. Data Redundancy with 3VR RAID Settings Backup 9 6. Bandwidth Utilization with 3VR Bandwidth Consumption Bandwidth Throttling 10 About 3VR 11 2

3 1. Summary The purpose of this paper is to detail the capabilities and hardened security measures built into 3VR systems to address the IT requirements of today s security buyers. 3VR has invested heavily to ensure that all of their 3VR VIP appliances are as secure as possible against virus threats and external attacks. Of particular importance are the following 3VR features: 3VR systems conform to industry-leading information security baselines and pose equal or lesser risk than alternative appliances, workstations or operating systems on the market. The 3VR system is built upon a modular version of Microsoft Windows (either Windows Embedded Standard or Windows Embedded Standard 7) and is implemented in a way to strictly avoid components that present security risks such as Internet Explorer, Internet Information Server, File Transfer Protocol or Telnet clients which have historically represented vulnerabilities. All 3VR software applications communicate using proprietary protocols that minimize the risk of intruder access. 3VR appliances require only four open ports for network communication with client applications and the 3VR Enterprise Appliance. In five years of widespread commercial deployment, 3VR has not generated any security compromises. 3

4 2. IT Security with 3VR 2.1 Operating System 3VR systems use a modular version of Microsoft Windows Embedded Standard or Microsoft Windows Embedded Standard 7 (WES). 3VR version is our latest software release and is current with all of the latest operating system patches and security hotfixes. 3VR s specific configuration of WES significantly reduces security risks as described in the appropriate sections below. 2.2 Applications 3VR VIP Appliance applications: MySQL 3VR Recording Systems: Shell (3VR proprietary) ContentServer (3VR proprietary) PipelineManager (3VR proprietary) Controller (3VR proprietary) OpCenter (3VR proprietary) SystemManager (3VR proprietary) 3VR Enterprise Appliance applications: MySQL 3VR Recording Systems Shell (3VR proprietary) EnterpriseServer (3VR proprietary) Controller (3VR proprietary) OpCenter (3VR proprietary) SystemManager (3VR proprietary) Interconnects between 3VR applications are by proprietary protocol. This eliminates the attack vectors that viruses use to attack systems. To attack the 3VR system, adversaries would have to build complex protocols. The 3VR appliance is also protected against denial of service attacks. 4

5 2.3 Network Services 3VR has created an appliance that is highly resistant to network-based attacks. The applications most commonly exploited by attackers are not present on 3VR systems. These include Internet Explorer, Internet Information Server, File Transfer Protocol (FTP), and Telnet servers and clients. 3VR does not use any form of file sharing for storage on the appliance. To further protect the system, 3VR has built-in a software firewall which restricts traffic to only the allowed ports. With this set of security measures in place, the 3VR appliance uses only two types of service: 3VR proprietary protocols and Microsoft Message Queuing (MSMQ) with proprietary payload formats. Each of these methods supports authentication with one-way hash-based encryption. 3VR believes the only potential risk is pirating the Device Update Agent and launching an artificial upgrade. This complicated task, however, would require reverse engineering 3VR s proprietary protocols. The actual threat is low as the expertise is rare and the value of doing so is minimal. 2.4 Ports Models Protocol Port Program Purpose All systems in an TCP 1801 mysuc.exe (MSMQ) Synchronization Enterprise environment VIP Appliance TCP 2500 ContentServer.exe Live video All TCP 3001 Shell.exe Logging All TCP 3020 Shell.exe Remote upgrade, restarts, and network settings changes VIP Appliance TCP 3043 ContentServer.exe Data access VIP Appliance TCP 3044 ContentServer.exe Bandwidth measurement (optional) Enterprise Appliance TCP 3045 EnterpriseServer.exe Enterprise management All UDP 123 ws32time.dll Network Time Protocol All UDP 3333 SystemManager.exe Find Local Servers feature While all the ports in the above list are important, users of OpCenter and SystemManager can access the appliance for normal use using only port 3043 and port 2500 (standalone VIP Appliances) or ports 3043, 2500, and 3045 (appliances connected to an Enterprise). Note that for the Enterprise Appliance, port 1801 must always permit communication between the Enterprise Appliance and connected VIP Appliances. All other ports listed above can be blocked in non-diagnostic, non-upgrade situations. 2.5 SMTP 3VR provides limited SMTP support that is constrained to eliminate risk. 3VR provides outbound-only SMTP and only when a customer specifically configures it. No SMTP forwarding is allowed. content is always automatically determined by the software. Furthermore, the SMTP client is coded directly into the application and there is no receiving code in any of 3VR s applications. 5

6 2.6 Physical Access 3VR appliances can be physically accessed in one of two ways: Logging in at the local console with a monitor, keyboard, and mouse. Logging in to the 3VR Client Applications on a laptop that is directly connected to the system with a USB network adapter. Note: This connection method is subject to the same security restrictions as a remote client. Because of 3VR s account management architecture, a malicious user does not have access to the underlying system. Moreover, even if the user somehow accessed the system, because networking services such as web client, telnet and FTP are not installed, an attack would be extremely difficult. 2.7 Antivirus 3VR ensures that viruses do not attack the system or the network by enforcing explicit signing of all software that is installed. 3VR uses SHA-1, 160-bit key for this task. Because of this, sniffing the transmission and intercepting/modifying is not a practical risk. 3VR s antivirus strategy focuses on lockdown. 3VR does not currently perform antivirus scanning. In five years of widespread commercial deployment, not a single 3VR system has been infected with a virus. 2.8 Client Applications 3VR supports a remote viewing client called OpCenter. OpCenter connects to 3VR appliances via port 3043 as explained in the Ports section. OpCenter uses the same account management plan as described in the Systems Management section. 3VR Client Applications (discussed in more detail in the section Client Application Management ) access the VIP Appliance using port 3043 for data access and port 2500 for video access. The applications access the Enterprise Appliance on port 3045 for both data and any video stored there. All of the protocols used over these ports are 3VR proprietary protocols with one-way hash based authentication. The Client Applications do not support extensions or scripting. Therefore, attacks by these mechanisms are not possible. 2.9 Vulnerability Testing 3VR runs Tenable s Nessus vulnerability test suite on every release that we ship. These tests consistently show that our system is clean with respect to known vulnerabilities. Detailed test results are available from 3VR on request. Network security personnel at various 3VR customers have run different suites with similar results. 6

7 3. Systems Management with 3VR 3.1 Systems and User Management 3VR designed its systems management solution to maximize the security of the underlying operating system and the overall network. 3VR separates login to the 3VR application from login to Windows. Passwords for user accounts are stored in a SQL database using a one-way hash. No 3VR user account has access to the operating system. Windows logins are completely disabled on 3VR appliances. 3VR also provides single sign-on capabilities, so that an administrator can centrally access and modify system and camera configurations on any specific 3VR system across an enterprise. The administrator can also centrally manage users privileges and passwords. Users access rights can be restricted as follows: By machine(s). A user can be granted access to certain specific machines or to a group of machines in a region. For example, a user may be given access only to machines in the Northeast Region. By capability. For example a user may be restricted to viewing video only. By default, 3VR does not force password changes. However, the administrator of a 3VR Enterprise may enable password constraints to enforce one or more of the following password restrictions: Require minimum password length Require the password contain lower case, upper case, or non-alphanumeric characters Prevent simple dictionary words Prevent word variations Prevent resetting password to a previous password The administrator may also restrict user behavior in respect to user accounts changes: Block account after a given number of failed sign in attempts Require password change after a given number of days Block account after a number of days of inactivity An adversary who acquired the password for a 3VR user despite the protections above could only change data maintained by 3VR software. Since there is no system access available, there is no risk to the system or network. 3.2 Extraordinary Maintenance Account 3VR does have a special system access account used for extraordinary maintenance. This account is accessed through a double password, one supplied by the customer and one that changes daily that s built into the system. The extraordinary maintenance functions cannot be accessed unless both passwords are correctly entered. 7

8 3.3 Systems Health Monitoring 3VR provides remote health monitoring with real-time health alerts of cameras, hard drives, systems, software, and networks. Administrators can log on from a central location to monitor health of components, reducing potential downtime. 3.4 Updates/Upgrades Management Plan 3VR manages software updates and upgrades through the 3VR system software, which no one can access without the 3VR client tool and proprietary protocol. Customers can administer updates or upgrades by using 3VR s SystemManager application. Administrators can log in from a central location and easily manage the distribution of software updates and upgrades throughout a large enterprise in minutes without the need to visit each system. 4. Client Application Management 4.1 About 3VR Client Applications Standard applications: 3VR OpCenter (opcenter.exe) is a powerful video monitoring and searching application, which also includes the ability to create and track cases, develop watchlists, and configure alerts. 3VR SystemManager (systemmanager.exe) is an appliance configuration and health monitoring application; used for camera setup, user management, and system updates and maintenance. Optional applications used for specific purposes: 3VR SpotMonitor (spotmonitor.exe) is a simple application used to view multiplexed or sequential live video feeds on a TV or other monitor. 3VR EnterpriseViewer (enterpriseviewer.exe) is an application used to view multiplexed or sequential live video feeds from systems across an Enterprise Appliance. 3VR AlertViewer (alertviewer.exe) is an application that notifies the user when an alert has been triggered on the 3VR system. 3VR ReportViewer (reportviewer.exe) is an application used to run reports for the 3VR People Counting analytic. 4.2 Where to Find Client Applications 3VR Partners may download the 3VR Client Applications from the 3VR Partner Portal (partners.3vr.com). The Client Applications can also be installed from the Installation & Resource CD that ships with every 3VR unit. 3VR Technical Support can also provide software and documentation upon request ( [email protected] or telephone: Mon-Fri from 9 AM - 9 PM Eastern). 8

9 4.3 Client Application System Requirements 3VR Client Applications run on Windows XP Service Pack 2 or later, Windows Vista, or Windows 7 using the Microsoft.NET framework and Intel Performance Primitives, which are installed if necessary as part of the installation process. The installation process also installs DirectShow video filters that may be used by other applications, but otherwise the files loaded are specific to 3VR and won t interact with other applications. The most up-to-date system and network requirements are posted in more detail on our web FAQ: > Services and Support > FAQ > What are the system requirements for 3VR Client Applications?. If the 3VR system is located behind a firewall, another web FAQ details what ports need to be open in order to connect. See > Services and Support > FAQ > What ports must be open to connect to a 3VR SmartRecorder that s behind a firewall? 4.4 Licensing 3VR Client Applications The first time a 3VR Client Application is run, the user will be prompted to enter a license key. The license keys are provided by 3VR Technical Support. Once an application has been licensed, it will remain so unless the computer s operating system is reinstalled. The applications must be licensed by an administrative user on the PC, although a nonadministrator can run the applications. 5. Data Redundancy with 3VR 5.1 RAID All 3VR P-Series Appliances and Enterprise Appliances come standard with RAID, providing fault-tolerance and protection against loss of video or data in the event of disk error or disk failure. The VIP S-Series may be purchased with RAID (S-Series 40 model) or without RAID (S-Series 30 and S-Series 35). 5.2 Settings Backup All S-Series, P-Series, and Enterprise Appliances have on-board flash storage of system software and configuration settings. If the single drive on an S-Series 30/35 unit (no RAID) or more than one drive fails on an S-Series 40, P-Series, or Enterprise (RAID), the drive(s) can be replaced and the system will come back online with all of its configuration intact. Alternatively, a completely new system can be installed and the system and configuration files copied from the failed system to the new system. This ensures quick return to full functionality without extended downtime for re-installing software and re-configuring the system. 9

10 6. Bandwidth Utilization with 3VR 6.1 Bandwidth Consumption 3VR has designed its network architecture to ensure that the system minimizes resource utilization and rapidly respects bandwidth constraints even on network connections as low as a DSL. 3VR uses TCP links for video and data. We rely on TCP to provide retransmissions in case of data loss. TCP has sophisticated algorithms for congestion avoidance that allow it to efficiently use slow networks without swamping them with retransmits. Finally, 3VR naturally degrades bandwidth for live video streaming by employing adaptive frame dropping. Most importantly, all of these design elements ensure that the 3VR appliance will not engender or contribute to hysteresis. Bandwidth consumption in the application is highly dependent on load (for example, the number of faces recognized per minute). Live video, 10 fps CIF: 64 Kb/s Searching, 32 events with 3 images per event, 150 KB total per page of search results (search results are downloaded one page at a time as the user asks for them). Depending on event load, there is some amount of new event notification traffic flowing from server to client. 6.2 Bandwidth Throttling 3VR systems have a configurable bandwidth throttle that constrains the bandwidth rate from an individual 3VR appliance to remote clients. Bandwidth throttling provides quality of service (QoS) by ensuring that bandwidth is available for other applications even on slower networks. 10

11 About 3VR 3VR, Inc., the video intelligence company, enables organizations to search, mine and leverage video to bolster security, identify and mitigate fraud and better serve customers. 3VR s Video Intelligence Platform allows video surveillance systems to reach their true potential and deliver a measurable and sustainable return on investment. 3VR is the video surveillance standard for hundreds of global customers, including leading banks, retailers, governments and law enforcement agencies and owns CrimeDex, an online community of fraud, loss prevention and law enforcement professionals dedicated to stopping crime. Based in San Francisco, CA, the company is privately held with funding from DAG Ventures, Focus Ventures, In-Q-Tel, Kleiner Perkins Caulfield & Buyers, Menlo Ventures and VantagePoint Ventures. 3VR s SmartRecorder is the three-time winner of the SIA Best New Video Product Award and was named Security Product of the Year from Frost & Sullivan in 2006 and 2007, among other awards. For more information, please visit Tel: Fax: Sales: [email protected] Website: 3VR, Inc. 475 Brannan Street, Suite 430, San Francisco, CA

3VR SmartRecorder. IT Requirements. 3VR Video Intelligence Platform. 3VR Software Version 7.0

3VR SmartRecorder. IT Requirements. 3VR Video Intelligence Platform. 3VR Software Version 7.0 3VR SmartRecorder TM IT Requirements 3VR Video Intelligence Platform IT REQUIREMENTS WHITE PAPER 3VR Software Version 7.0 3VRVIP-ITREQ7.0-R2 3VR, Inc 475 Brannan Street, Suite 430 San Francisco, CA 94107

More information

Symantec Mobile Security

Symantec Mobile Security Advanced threat protection for mobile devices Data Sheet: Endpoint Management and Mobility Overview The combination of uncurated app stores, platform openness, and sizeable marketshare, make the Android

More information

Release Notes for Websense Email Security v7.2

Release Notes for Websense Email Security v7.2 Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version

More information

Windows Remote Access

Windows Remote Access Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Driving Company Security is Challenging. Centralized Management Makes it Simple. Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

System Management. What are my options for deploying System Management on remote computers?

System Management. What are my options for deploying System Management on remote computers? Getting Started, page 1 Managing Assets, page 2 Distributing Software, page 3 Distributing Patches, page 4 Backing Up Assets, page 5 Using Virus Protection, page 6 Security, page 7 Getting Started What

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

End-user Security Analytics Strengthens Protection with ArcSight

End-user Security Analytics Strengthens Protection with ArcSight Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security

More information

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink

More information

Medical Device Security Health Group Digital Output

Medical Device Security Health Group Digital Output Medical Device Security Health Group Digital Output Security Assessment Report for the Kodak Color Medical Imager 1000 (CMI-1000) Software Version 1.1 Part Number 1G0434 Revision 2.0 June 21, 2005 CMI-1000

More information

Hardening Guide. Installation Guide

Hardening Guide. Installation Guide Installation Guide About this Document The intended use of this guide is to harden devices and also provide collateral for deployment teams to deal with local network policy, configurations and specification.

More information

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x Out n About! for Outlook Electronic In/Out Status Board Administrators Guide Version 3.x Contents Introduction... 1 Welcome... 1 Administration... 1 System Design... 1 Installation... 3 System Requirements...

More information

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy For Public Use G/On Basic Best Practice Reference Guide Version 6 Make Connectivity Easy 2006 Giritech A/S. 1 G/On Basic Best Practices Reference Guide v.6 Table of Contents Scope...3 G/On Server Platform

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform

Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR RUNNING SEP ON.... AZURE.................................... Best Practices for Running Symantec Endpoint Protection 12.1 on the Microsoft Azure Platform Who should

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010 S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure

More information

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) WHITE PAPER SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X) INTRODUCTION This document covers the recommended best practices for hardening a Cisco Personal Assistant 1.4(x) server. The term

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

E-MAIL AND SERVER SECURITY

E-MAIL AND SERVER SECURITY E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone

More information

GTS Software Pty Ltd. Remote Desktop Services

GTS Software Pty Ltd. Remote Desktop Services GTS Software Pty Ltd Remote Desktop Services Secure web access to GTS Software applications CONTENTS Overview... 2 What GTS can provide with Remote Desktop Services... 2 Main Features... 3 RD Web Access...

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

GFI Product Manual. Deployment Guide

GFI Product Manual. Deployment Guide GFI Product Manual Deployment Guide http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Guidance Regarding Skype and Other P2P VoIP Solutions

Guidance Regarding Skype and Other P2P VoIP Solutions Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,

More information

PowerChute TM Network Shutdown Security Features & Deployment

PowerChute TM Network Shutdown Security Features & Deployment PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Comodo Endpoint Security Manager SME Software Version 2.1

Comodo Endpoint Security Manager SME Software Version 2.1 Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick

More information

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices

Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices TECHNICAL BRIEF: BEST PRACTICES GUIDE FOR PROTECTING RETAIL....... POS.... SYSTEMS............................. Best Practices for Running Symantec Endpoint Protection 12.1 on Point-of- Sale Devices Who

More information

GFI Product Manual. Version 6.0. Getting Started Guide

GFI Product Manual. Version 6.0. Getting Started Guide GFI Product Manual Version 6.0 Getting Started Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either

More information

6WRUP:DWFK. Policies for Dedicated SQL Servers Group

6WRUP:DWFK. Policies for Dedicated SQL Servers Group OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

PLEASE NOTE: The client data used in these manuals is purely fictional.

PLEASE NOTE: The client data used in these manuals is purely fictional. Welcome! CAREWare Quick Start guides will walk you through the basics of setting up, managing and using the main CAREWare functions. It is intended for non-technical users who just need to get basic information

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

AVG 8.5 Anti-Virus Network Edition

AVG 8.5 Anti-Virus Network Edition AVG 8.5 Anti-Virus Network Edition User Manual Document revision 85.2 (23. 4. 2009) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Chapter 4 Application, Data and Host Security

Chapter 4 Application, Data and Host Security Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

Tk20 Network Infrastructure

Tk20 Network Infrastructure Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...

More information

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies White Paper Comparison of Firewall, Intrusion Prevention and Antivirus Technologies How each protects the network Juan Pablo Pereira Technical Marketing Manager Juniper Networks, Inc. 1194 North Mathilda

More information

inforouter V8.0 Server & Client Requirements

inforouter V8.0 Server & Client Requirements inforouter V8.0 Server & Client Requirements Please review this document thoroughly before proceeding with the installation of inforouter Version 8. This document describes the minimum and recommended

More information

Backup Manager Configuration and Deployment Guide. Version 9.1

Backup Manager Configuration and Deployment Guide. Version 9.1 Backup Manager Configuration and Deployment Guide Version 9.1 Contents Backup Manager 3 Backup Manager Support 9 Backup Manager Configuration and Deployment 14 Defining a Backup Manager Profile 14 Configuring

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 Managed Services Agreement Hilliard Office Solutions, Ltd. PO Box 52510 Phone: 432-617-4677 Midland, Texas 79710 Fax: 432-617-3043 SERVICE DESCRIPTIONS By purchasing these Services from Hilliard Office

More information

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

More information

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

Host-based Protection for ATM's

Host-based Protection for ATM's SOLUTION BRIEF:........................................ Host-based Protection for ATM's Who should read this paper ATM manufacturers, system integrators and operators. Content Introduction...........................................................................................................

More information

Best Practices for DanPac Express Cyber Security

Best Practices for DanPac Express Cyber Security March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction

More information

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00 Medical Device Security Health Imaging Digital Capture Security Assessment Report for the Kodak Capture Link Server V1.00 Version 1.0 Eastman Kodak Company, Health Imaging Group Page 1 Table of Contents

More information

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers

Getting started. Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Getting started Symantec AntiVirus Corporate Edition 8.1 for Workstations and Network Servers Copyright 2003 Symantec Corporation. All rights reserved. Printed in the U.S.A. 03/03 Symantec and the Symantec

More information

Web Plus Security Features and Recommendations

Web Plus Security Features and Recommendations Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of

More information

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide

Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information

1. Server 2008 - Microsoft FEP 2010 - Instalation

1. Server 2008 - Microsoft FEP 2010 - Instalation 1. Server 2008 - Microsoft FEP 2010 - Instalation 1 2. Windows XP x86 (32bit) - Microsoft FEP 2010 Instalation 2 3 2.1. 4 System Requirements Microsoft Forefront Endpoint Protection 2010 1 System Requirements

More information

SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012

SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012 SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse

More information

Burst Technology bt-loganalyzer SE

Burst Technology bt-loganalyzer SE Burst Technology bt-loganalyzer SE Burst Technology Inc. 9240 Bonita Beach Rd, Bonita Springs, FL 34135 CONTENTS WELCOME... 3 1 SOFTWARE AND HARDWARE REQUIREMENTS... 3 2 SQL DESIGN... 3 3 INSTALLING BT-LOGANALYZER...

More information

Docufide Client Installation Guide for Windows

Docufide Client Installation Guide for Windows Docufide Client Installation Guide for Windows This document describes the installation and operation of the Docufide Client application at the sending school installation site. The intended audience is

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

StruxureWare Power Monitoring 7.0.1

StruxureWare Power Monitoring 7.0.1 StruxureWare Power Monitoring 7.0.1 Installation Guide 7EN02-0308-01 07/2012 Contents Safety information 5 Introduction 7 Summary of topics in this guide 7 Supported operating systems and SQL Server editions

More information

Network- vs. Host-based Intrusion Detection

Network- vs. Host-based Intrusion Detection Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

How To Secure Your System From Cyber Attacks

How To Secure Your System From Cyber Attacks TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital

More information

GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop

GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Contents: Executive Summary... 1

More information

Virtual Private Networks (VPN) Connectivity and Management Policy

Virtual Private Networks (VPN) Connectivity and Management Policy Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections

More information

DriveLock and Windows 7

DriveLock and Windows 7 Why alone is not enough CenterTools Software GmbH 2011 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Compulink Advantage Online TM

Compulink Advantage Online TM Compulink Advantage Online TM COMPULINK ADVANTAGE ONLINE TM INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE FOR WINDOWS (Revised 07/08/2011) 2011 Compulink Business Systems, Inc. All rights reserved

More information

GoToMyPC Corporate Advanced Firewall Support Features

GoToMyPC Corporate Advanced Firewall Support Features F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy

More information

Enterprise Manager. Version 6.2. Administrator s Guide

Enterprise Manager. Version 6.2. Administrator s Guide Enterprise Manager Version 6.2 Administrator s Guide Enterprise Manager 6.2 Administrator s Guide Document Number 680-017-017 Revision Date Description A August 2012 Initial release to support version

More information

Blackbaud Sphere & The Raiser s Edge Integration Guide

Blackbaud Sphere & The Raiser s Edge Integration Guide Blackbaud Sphere & The Raiser s Edge Integration Guide 101311 Blackbaud Sphere 2011 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means,

More information

5nine Virtual Firewall 2.1 for Microsoft Hyper-V

5nine Virtual Firewall 2.1 for Microsoft Hyper-V KEY POINTS Secure your Hyper-V Virtual Machines & Virtual Servers Control Network Traffic In and Out of Your Virtual Machines & Virtual Servers Restrict Virtual Network Traffic Using Stateful Packet Filtering

More information

Cyber Security: Software Security and Hard Drive Encryption

Cyber Security: Software Security and Hard Drive Encryption Links in this document have been set for a desktop computer with the resolution set to 1920 x 1080 pixels. Cyber Security: Software Security and Hard Drive Encryption 301-1497, Rev A September 2012 Copyright

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of

More information

2014 Electrical Server Installation Guide

2014 Electrical Server Installation Guide 2014 Electrical Server Installation Guide TITLE: 2014 Electrical Server Installation Guide DATE: September 2013 SUBJECT: ABSTRACT: Installation guide for SolidWorks Electrical 2014 on the server Guide

More information

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements

SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card

More information

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015 NovaTech NERC CIP Compliance Document and Product Description Updated June 2015 This document describes the NovaTech Products for NERC CIP compliance and how they address the latest requirements of NERC

More information

Virtualization Guide. McAfee Vulnerability Manager Virtualization

Virtualization Guide. McAfee Vulnerability Manager Virtualization Virtualization Guide McAfee Vulnerability Manager Virtualization COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

Firewall and UTM Solutions Guide

Firewall and UTM Solutions Guide Firewall and UTM Solutions Guide Telephone: 0845 230 2940 e-mail: [email protected] Web: www.lsasystems.com Why do I need a Firewall? You re not the Government, Microsoft or the BBC, so why would hackers

More information

Introduction of Intrusion Detection Systems

Introduction of Intrusion Detection Systems Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:

More information

Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved.

Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved. Kerio Control VMware Virtual Appliance Quick Setup Guide 2011 Kerio Technologies s.r.o. All rights reserved. This document provides detailed description on installation and basic configuration of the Kerio

More information