Citrix GoToAssist Service Desk Security
|
|
- Damon Dylan Banks
- 8 years ago
- Views:
Transcription
1 Citrix GoToAssist Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data.
2 2 Many service desk operations regularly deal with sensitive data, and support organizations and IT teams are rightly concerned with security. With the worldwide surge in privacy breaches, malware, viruses and denial-of-service attacks, it s important to scrutinize each and every IT solution to see that it is employing the most up-to-date and effective security measures available. This white paper outlines the measures that GoToAssist Service Desk utilizes to minimize security risks. Citrix considers the security of your information to be of the highest importance. Security is not an afterthought to functionality, but a key element that is designed and built into our systems from the ground up. Security encompasses all aspects of GoToAssist Service Desk, from the software to the facilities to the personnel developing and operating the service. Extensive measures have been undertaken to maintain the privacy and integrity of all data managed by GoToAssist Service Desk. This white paper describes some of those measures, including access controls, physical and operational security, data security and software development lifecycle security. Protecting the front door An essential element of information security is the reliable identification and authentication of those accessing the information. Every manner of application, data and network security could be applied to a system, but if we were not able to reliably identify those accessing the system, all our efforts toward security would be in vain. For this reason, GoToAssist Service Desk, as with all Citrix SaaS offerings, places great emphasis on user authentication. To begin with, all users must be registered using a valid account, which is associated with an identified organization. No guest or anonymous access to the system is permitted. In addition, numerous techniques are employed to detect and prevent unauthorized account access, such as complex password enforcement, soft and hard account lockout triggered by repeated unsuccessful log-in attempts and the logging and continuous monitoring of account probing and other anomalous behavior. Once a user is authenticated, continued access to the system is dependent upon the presence of a set of security tokens exchanged with the client during the authentication process. These tokens, or session identifiers, are protected using advanced web security mechanisms, including the use of cryptographically strong pseudo-random number generators and session hijacking/fixation countermeasures.
3 3 All access to GoToAssist Service Desk, whether pre- or post-authentication, is permitted only over connections that are secured with SSL/TLS. Any connection attempt that is not using SSL/TLS will be refused. Because of this security requirement, organizations and users can be confident that information passed between GoToAssist Service Desk and the user s browser or mobile app will be safe from would-be eavesdroppers and potential man-in-the-middle attacks that rely upon an initial HTTP (unsecured) connection. A secure foundation Although protecting the front door is essential, if the networks and systems that host a service are not themselves secure, the service may still be vulnerable. The successful penetration and compromise of the service can occur without passing through the front door at all. This, of course, is the reason that GoToAssist Service Desk is built upon a foundation of network, host and physical security. All web, application and database servers supporting Service Desk reside within highly secured worldwide datacenters. Physical access to these datacenters is actively monitored and restricted to authorized personnel only. The servers themselves are hardened to stringent Citrix standards and dedicated to running only those services required to support GoToAssist Service Desk. Citrix policy requires that all servers remain up to date with the latest security patches and undergo periodic reassessment through both internal and independent auditing and penetration testing. Network access to the systems hosting GoToAssist Service Desk is strictly controlled through firewalls and other network security devices designed to detect and respond to various attacks, including but not limited to denial-of-service (DoS) attacks originating from the Internet. Backend servers and services are never directly accessible to external systems or personnel. Furthermore, multiple levels of host and network security are employed to ensure that only authorized access is permitted between backend systems, effectively containing any potential internally leveraged attacks. Access to and activity on all systems is centrally logged and actively monitored for anomalous patterns or behavior. How safe is your data? Once your information has been entered into the GoToAssist Service Desk system, it is secured with multiple levels of access controls. Only those users explicitly granted access to your information may view or modify it. The design of the system requires that every access request pass through an authorization subsystem that verifies the access rights of the user before allowing the request to proceed. Unlike some data management systems, GoToAssist Service Desk does not include the concept of root access. This helps to ensure the privacy of your information, even against inadvertent or other internal exposure. Sensitive configuration information, passwords and keys are secured using the latest in cryptographic technology. Passwords are secured through a uniquely salted, one-way (irreversible) password hashing mechanism that ensures protection against exposure even to internal personnel with access to the storage systems and/or encryption keys.
4 4 Security by design In addition to the many security measures already described, GoToAssist Service Desk was built and continues to be developed using processes that guarantee the priority of security at every stage of the development lifecycle. At Citrix, every significant design and architectural decision must undergo a review process known as threat modeling, in which all foreseeable threats to the system are evaluated and measured in light of the proposed design/architectural features. Additionally, all code is required to be assessed for security flaws via static analysis, while all new and updated systems must be scanned and tested for security weaknesses using industry-leading manual and automated application vulnerability assessment tools. Finally, the entire deployed system is subject to continuous 24/7 vulnerability scanning and security analysis by an independent, industry-leading security firm. Our attention to secure product design is one of the reasons Citrix is the global market leader and one of the most-trusted names in IT support solutions. Citrix customers include 100 percent of the Fortune 100 and 99 percent of the Fortune Global 500, as well as hundreds of thousands of small businesses and individuals. Availability All the protection measures in the world will prove meaningless if you cannot access your information or systems when needed. Thus, one of the primary concerns with information security is availability. With GoToAssist Service Desk, the continued availability of your information is achieved in several ways. First, the Citrix datacenters that host your information incorporate system redundancy throughout in order to ensure resiliency in the face of outages due to failure or attack. Additionally, for the purposes of scalability and reliability, load balancers transparently distribute incoming requests among multiple Citrix servers. As mentioned above, security devices are also in place in every Citrix datacenter to implement countermeasures to denial-of-service (DoS) attacks. With regard to the prevention of unintended destruction or corruption of information, all Service Desk systems are backed up daily, and encrypted backups are securely replicated to multiple, geographically separated datacenters for disaster recovery purposes. Additionally, the Service Desk interface includes two independent protection mechanisms that require explicit user acknowledgement before executing any destructive requests and additionally provide for the recovery of inadvertently deleted data. Summary Security of data is more important than ever, and Citrix places a major focus on this across all levels of GoToAssist Service Desk. We have put in place a formidable array of security countermeasures so that our customers can use GoToAssist Service Desk with confidence.
5 5 Nevertheless, we recommend that you perform your own appropriate best-fit analysis to make sure our service meets your security requirements. We invite you to talk to a GoToAssist Service Desk representative today to discuss your needs and answer any questions you may have. North America Citrix Online, LLC 7414 Hollister Avenue Goleta, CA U.S.A. T info@citrixonline.com Europe, Middle East & Africa Citrix Online, UK Ltd Chalfont Park House Chalfont Park, Gerrards Cross Bucks SL9 0DZ United Kingdom T +44 (0) europe@citrixonline.com Asia Pacific Citrix Online, AUS Pty Ltd Level 3, 1 Julius Avenue Riverside Corporate Park North Ryde NSW 2113 Australia T asiapac@citrixonline.com About Citrix Citrix (NASDAQ:CTXS) is the cloud company that enables mobile workstyles empowering people to work and collaborate from anywhere, easily and securely. With market-leading solutions for mobility, desktop virtualization, cloud networking, cloud platforms, collaboration and data sharing, Citrix helps organizations achieve the speed and agility necessary to succeed in a mobile and dynamic world. Citrix products are in use at more than 260,000 organizations and by over 100 million users globally. Learn more at Citrix Online, LLC. All rights reserved. Citrix, GoToAssist, GoToMeeting, GoToMyPC, GoToTraining, GoToWebinar, OpenVoice, Podio and ShareFile are trademarks of Citrix Systems, Inc., or a subsidiary thereof, and are or may be registered in the U.S. Patent and Trademark Office and other countries. All other trademarks are the property of their respective owners /B-88414/PDF
Advanced Service Desk Security
Advanced Service Desk Security Robust end-to-end security measures have been built into the GoToAssist Service Desk architecture to ensure the privacy and integrity of all data. gotoassist.com Many service
More informationGoToAssist Remote Support HIPAA compliance guide
GoToAssist emote Support HIPAA compliance guide Privacy, productivity and remote support 2 The healthcare industry has benefited greatly from the ability to receive remote support from technology providers
More informationCorporate and Payment Card Industry (PCI) compliance
Citrix GoToMyPC Corporate and Payment Card Industry (PCI) compliance GoToMyPC Corporate provides industryleading configurable security controls and centralized endpoint management that can be implemented
More informationHIPAA compliance. Guide. and HIPAA compliance. gotomeeting.com
and HIP compliance 2 The Health Insurance Portability and ccountability ct (HIP) calls for privacy and security standards that protect the confidentiality and integrity of patient health information. Specifically,
More informationHow to Increase Your Sales Close Rates with Video Conferencing
How to Increase Your Sales Close Rates with Video Conferencing ShareFile a Citrix company increased close rates just by turning on webcams in sales meetings. 2 It s difficult to capture people s attention
More informationThree reasons. why IT pros choose GoToAssist over the competition. Real customers share their insights on IT support tools.
Three reasons why IT pros choose GoToAssist over the competition Real customers share their insights on IT support tools 2 Technology is inexorably changing, making the information technology manager s
More informationThe Path to a Professional Meeting Agenda. How to Hold More Structured and Efficient Meetings and Get People to Pay More Attention
The Path to a Professional Meeting Agenda How to Hold More Structured and Efficient Meetings and Get People to Pay More Attention 2 A meeting agenda only costs time; a subject line is enough. My team already
More information3 Service desk predictions for 2013
3 Service desk predictions for 2013 Learn how IT departments will improve process, consolidate systems and reduce budgets. 2 Today, technology touches nearly every aspect of our lives. We still have desktop
More informationGROUP Business Software AG
GROUP Business Software AG GBS boosts global collaboration with Citrix GoTo cloud services 2 GoToMeeting has quickly become indispensable for us. Video conferencing in HD quality improves and simplifies
More informationWHITE PAPER. GoToMyPC. Citrix GoToMyPC Corporate Security FAQs. Common security questions about Citrix GoToMyPC Corporate. www.gotomypc.
Citrix Corporate Security FAQs Common security questions about Citrix Corporate www.gotomypc.com Q: What are the Corporate software components that I need to install on the host and client computers? A:
More informationGoToAssist Express Best Practices Guide to Unattended Support
Express Best Practices Guide to Unattended Support One of the most useful features of Express, Unattended Support enables support providers to deliver assistance to a customer s PC even when the customer
More informationCitrix GoToMyPC Corporate Provisioning Tool. Seamlessly integrate the GoToMyPC Corporate solution with your existing support infrastructure.
Citrix Corporate Provisioning Tool Seamlessly integrate the Corporate solution with your existing support infrastructure. www.gotomypc.com The Citrix Corporate Provisioning Tool is an out-of-box installable
More informationThe Five Fatal. Monster traps. of Corporate File Sharing. ... and How Administrators Can Easily and Safely Avoid Them.
The Five Fatal Monster traps of Corporate File Sharing... and How Administrators Can Easily and Safely Avoid Them Supported by 1 The Five Fatal MONSTER TRAPS of Corporate File Sharing 1. The Compliance
More informationGoToMyPC Corporate Security FAQs
GoToMyPC Corporate Security FAQs Common security questions about Citrix GoToMyPC Corporate gotomypc.com Q: What are the GoToMyPC Corporate software components that I need to install on the host and client
More informationWorkplace mobility and the small business
Workplace mobility and the small business Explore the global growth of personal communications devices in the workplace 2 1. Background The following white paper examines the findings of the latest Citrix-commissioned
More informationAdvanced virtualization management for Hyper-V and System Center environments
Advanced virtualization management for and System Center environments Microsoft extends the management capabilities of and System Center Virtual Machine Manager giving Microsoft customers a scalable, advanced
More informationHow to inspire customers with exciting webinars with support from
Whitepaper How to inspire customers with exciting webinars with support from How to inspire customers with exciting webinars Contents Why are webinars such an effective way of generating leads?... 3 What
More informationGoToMyPC Technology Making Life Simpler for Remote and Mobile Workers
Technology Making Life Simpler for Remote and Mobile Workers Learn why is the most secure, cost-effective and easy-to-use solution for providing remote access to the desktop. www.gotomypc.com Today, secure
More informationProvisioning ShareFile on Microsoft Azure Storage
ShareFile StorageZones Provisioning ShareFile on Microsoft Azure Storage This document provides a technical overview of how ShareFile can be provisioned on customermanaged, Microsoft Azure cloud storage
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationInfor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
More informationSecurity Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
More informationensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
More informationAutodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
More informationFeatures of a comprehensive application security solution
WHITE PAPER Citrix NetScaler Features of a comprehensive application security solution The comprehensive security features of Citrix NetScaler protect against DoS/DDoS, deliver intrusion filtering capabilities
More informationSecure SSL, Fast SSL
Citrix NetScaler and Thales nshield work together to protect encryption keys and accelerate SSL traffic With growing use of cloud-based, virtual, and multi-tenant services, customers want to utilize virtual
More informationCitrix ShareFile Enterprise: a technical overview citrix.com
Citrix ShareFile Enterprise: a technical overview White Paper Citrix ShareFile Enterprise: a technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose
More informationFive keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
More informationTOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital
More informationCollaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%
Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the
More informationAdvanced virtualization management for Hyper-V and System Center environments. www.citrix.com
Advanced virtualization management for Hyper-V and System Center environments www.citrix.com Introduction Microsoft Hyper-V provides a dynamic, reliable and scalable virtualization platform enabling cost
More informationCitrix Solutions. Overview
Citrix Solutions Citrix solutions empower people to work and collaborate from anywhere, securely accessing apps and data on any of the latest devices, as easily as they would in their own office. As work
More informationGoToMyPC reviewer s guide
GoToMyPC reviewer s guide Citrix GoToMyPC reviewer s guide Thank you for evaluating Citrix GoToMyPC. This guide will introduce you to the current GoToMyPC functionality and help you effectively evaluate
More informationHow To Secure Your Business
security In our world and in our time, security is a term that places a tremendous responsibility on the people who claim it. You need to be certain that your security partner demonstrates the right values
More informationSecurity Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
More informationSOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for Disaster Recovery www.citrix.com Contents Introduction... 3 Fitting Disaster Recovery to the Cloud... 3 Considerations for Disaster Recovery
More informationThe Citrix guide to desktop virtualisation
The Citrix guide to desktop virtualisation Market overview Desktop virtualisation is a relatively new technology that has been receiving a lot of press attention. Confusingly for those less familiar with
More informationWhite paper. Microsoft and Citrix VDI: Virtual desktop implementation scenarios
White paper Microsoft and Citrix VDI: Virtual desktop implementation scenarios Table of contents Objective Microsoft VDI offering components High definition user experience...3 A very cost-effective and
More informationQuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
More informationSimplicity is power.
IT, Simplified. Simplicity is power. Corporate vision A world where anyone can work and play from anywhere. NASDAQ CTXS Member of the NASDAQ 100 and S&P 500 Index. Revenue FY08 $1.6 billion Employees 4,000
More informationAddressing Cloud Computing Security Considerations
Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft
More informationSOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding
SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding www.citrix.com Contents Introduction... 3 The On- boarding Problem Defined... 3 Considerations for Application On- boarding...
More informationEMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an
More informationCitrix desktop virtualization and Microsoft System Center 2012: better together
Citrix desktop virtualization and Microsoft System Center 2012: better together 2 Delivery of applications and data to users is an integral part of IT services today. But delivery can t happen without
More informationThe ITIL Breakdown INCIDENT PROBLEM CHANGE RELEASE
ITIL in 30 Seconds If you re new to ITIL or just getting started, this is a great place to begin. We've simplified the core concepts and show how they apply to GoToAssist Service Desk. Use this pocket-sized
More informationBuilding a better branch office. www.citrix.com
Building a better branch office www.citrix.com Introduction The majority of workers today are in branch offices, not in a headquarters facility. In many instances, all of the applications used by branch
More informationExternal Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
More informationIT Security. Securing Your Business Investments
Securing Your Business Investments IT Security NCS GROUP OFFICES Australia Bahrain China Hong Kong SAR India Korea Malaysia Philippines Singapore Sri Lanka Securing Your Business Investments! Information
More informationBlue Jeans Network Security Features
Technical Guide Blue Jeans Network Security Features Blue Jeans Network understands an organization s need for secure communications. The Blue Jeans cloud-based video conferencing platform provides users
More informationRSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview
RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview 2 RSA and Citrix have a long history of partnership based upon integration between RSA Adaptive Authentication and Citrix NetScaler
More informationCitrix ShareFile Enterprise technical overview
Citrix ShareFile Enterprise technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose new challenges. IT is transitioning from the sole provider of user
More informationTHE SECURITY OF HOSTED EXCHANGE FOR SMBs
THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available
More informationGoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
More informationPayment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
More informationMedia Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
More informationHow does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management
More informationFive reasons why you need Citrix Essentials for Hyper-V now
Five reasons why you need Citrix Essentials for Hyper-V now This paper explores common challenges associated with server virtualization deployments and the ways Citrix Essentials for Hyper-V together with
More information7 Myths about the. Future of Work. ... and how you can create tomorrow s workplace today. Sponsored by
7 Myths about the Future of Work... and how you can create tomorrow s workplace today Sponsored by Table of Contents Introduction... 3 The Most Common Myths about the Workplace of the Future... 5 Myth
More informationRemote Access Security
Remote Access Security Security is essential when accessing home and office computers remotely. Learn how GoToMyPC provides reliable, industry-leading security that keeps your files, applications and information
More informationBrainloop Cloud Security
Whitepaper Brainloop Cloud Security Guide to secure collaboration in the cloud www.brainloop.com Sharing information over the internet The internet is the ideal platform for sharing data globally and communicating
More informationOWASP AND APPLICATION SECURITY
SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly
More informationCitrix XenClient. Extending the benefits of desktop virtualization to mobile laptop users. www.citrix.com
Citrix XenClient White Paper Citrix XenClient Extending the benefits of desktop virtualization to mobile laptop users www.citrix.com Executive summary Desktop virtualization is attractive to organizations
More informationDeployment Guide for Citrix XenDesktop
Deployment Guide for Citrix XenDesktop Securing and Accelerating Citrix XenDesktop with Palo Alto Networks Next-Generation Firewall and Citrix NetScaler Joint Solution Table of Contents 1. Overview...
More informationMAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
More informationEnabling mobile workstyles with an end-to-end enterprise mobility management solution.
Mobile workstyles White Paper Enabling mobile workstyles with an end-to-end enterprise mobility management solution. 2 The evolution of mobile workstyles has made it increasingly important for professionals
More informationUniversity of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
More informationWHITE PAPER. Citrix XenDesktop. Cost savings with centralized virtual desktops. www.citrix.com
WHITE PAPER Citrix XenDesktop Cost savings with centralized virtual desktops www.citrix.com Introduction Centralized virtual desktops optimize the efficiency, security and flexibility of any PC environment.
More informationPCI Compliance for Cloud Applications
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
More information5 Reasons Why GoToAssist Remote Support and Service Desk Go Better Together
5 Reasons Why GoToAssist Remote Support and Service Desk Go Better Together Improve your customer support experience with the integrated GoToAssist toolset. GoToAssist Remote Support makes it easy to help
More informationSysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan
SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid IT On-Demand: Architecture Security Business Continuity and Disaster Recovery
More informationThe Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
More informationExternal Supplier Control Requirements
External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration
More informationDid you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
More informationHow To Install A Citrix Netscaler On A Pc Or Mac Or Ipad (For A Web Browser) With A Certificate Certificate (For An Ipad) On A Netscaler (For Windows) With An Ipro (For
Deployment Guide Deployment Guide VeriSign Certificate Authority Citrix NetScaler SSL Deployment Guide Notice: The information in this publication is subject to change without notice. THIS PUBLICATION
More informationHow To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
More informationRedefining IT for federal healthcare agencies
Redefining IT for federal healthcare agencies Redefining IT for federal healthcare agencies Virtualization solutions for clinicians and patients: Anytime, anywhere, on any device Executive summary These
More informationCitrix Password Manager 4.1
F E A T U R E S O V E R V I E W Password Manager 4.1 The access platform provides on-demand access to information, and Password Manager makes that information available with a single logon. Password Manager
More informationGoToMyPC Corporate Advanced Firewall Support Features
F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy
More informationEasy and secure application access from anywhere
Easy and secure application access from anywhere Citrix is the leading secure access solution for applications and desktops HDX SmartAccess Delivers simple and seamless secure access anywhere Data security
More informationWhite Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
More informationMIGRATIONWIZ SECURITY OVERVIEW
MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...
More informationIBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
More informationMicrosoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing
Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Solution Guide This solution guide focuses on defining the deployment process for Microsoft Dynamics CRM with Citrix NetScaler.
More informationTop Three Reasons to Deliver Web Apps with App Virtualization
Top Three Reasons to Deliver Web Apps with App Virtualization Improve manageability, security and performance for browser-based apps. Web browsers can cause many of the same headaches as any other Windows
More informationEnterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February 2010 www.alvandsolutions.
Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH White Paper February 2010 www.alvandsolutions.com Overview Today s increasing security threats and regulatory
More informationCitrix XenDesktop with FlexCast technology. Citrix XenDesktop: Desktop Virtualization For All. www.citrix.com
Citrix XenDesktop with FlexCast technology White Paper Citrix XenDesktop: Desktop Virtualization For All www.citrix.com Today s organizations encompass a diverse range of users, from road warriors using
More informationBring-Your-Own-Device Freedom
Bring-Your-Own-Device Freedom Solutions for federal, state, and local governments Increasingly, IT organizations in federal, state, and local agencies are embracing consumerization with the understanding
More informationMobilize Email with Enterprise-Grade Security and a Great Experience
White Paper Mobilize Email with Enterprise-Grade Security and a Great Experience Data protection for your business. Flexibility for IT. Seamless productivity for your workforce. People need to be able
More informationWe employ third party monitoring services to continually audit our systems to measure performance and identify potential bottlenecks.
Cloud computing, often referred to as simply the cloud, is the delivery of on-demand computing resources over the internet through a global network of state-of-the-art data centers. Cloud based applications
More informationBMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
More informationAdobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
More informationMobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
More informationData Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
More informationHIPAA Privacy & Security White Paper
HIPAA Privacy & Security White Paper Sabrina Patel, JD +1.718.683.6577 sabrina@captureproof.com Compliance TABLE OF CONTENTS Overview 2 Security Frameworks & Standards 3 Key Security & Privacy Elements
More informationSupplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
More informationSecure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
More informationBoard Portal Security: How to keep one step ahead in an ever-evolving game
Board Portal Security: How to keep one step ahead in an ever-evolving game The views and opinions expressed in this paper are those of the author and do not necessarily reflect the official policy or position
More informationSecuring the Service Desk in the Cloud
TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,
More information