ASP Technology & Security Overview
|
|
- Georgina Terry
- 8 years ago
- Views:
Transcription
1 ASP Technology & Security Overview
2 J. J. Keller & Associates Company Profile Year Founded: 1953 Corporate Location: Neenah, Wisconsin, USA Number of Employees: Over 1200 Type of Business: Safety, Regulatory & Information Publications, Products & Services Products: Regulatory Guides, Compliance Manuals, Log Books, Training Handbooks, Newsletters, Video-based Training Kits, Forms & Supplies, Software, Custom Products & Programs Services: Online Services, On-Site Consulting, Seminars & Workshops, Outsourcing Services Number of Customers: 200,000+ companies in a wide range of industries, including transportation, industrial/manufacturing, environmental, distribution, chemical manufacturing, construction, food safety, mining and more. ASP Applications: J.J. Keller s Encompass, Driver Management Online, Vehicle Management Online, Log Checker Online, Fuel Tax Master Online, and Maintenance Manager Online ASP History The feasibility and justification for J. J. Keller s ASP applications were developed in late 1999, early There are now over 450,000 drivers and vehicles being managed with our online services. The design of our ASP takes into account several fundamental benefits to our clients. Aside from the regulatory and compliance functionality that J. J. Keller is known for, the ASP model allows companies to manage and monitor the compliance activities of multiple locations across North America. Corporate, regional, and division-level management have access to compliance information and practices for locations they are responsible for. Managers can implement standardized regulatory, compliance, and hiring processes throughout an organization, limiting exposures related to fines and mismanagement. Small to medium-sized companies have access to the same tools that have only been available to larger carriers, giving them an affordable, competitive advantage, as they pay based on the number of records stored in the system. Companies that do not have the regulatory expertise on site now have a tool to help them stay in compliance, while overall compliance is managed centrally. All companies can drastically improve their recruiting process and reduce the need for labor intensive, paper-based workflow. The benefits of ASP go on and on. Last revised January
3 ASP Technology Overview J. J. Keller s ASP applications were designed and developed using the Rational Unified Process (RUP). This methodology was chosen to ensure that a project of this scope and magnitude could be delivered in a high quality, cost-effective manner. Using the RUP methodology and tool set, J. J. Keller ASP has been developed with an emphasis on time-to-market and Quality Assurance. Our ASP applications were developed primarily using Microsoft tools. The underlying application framework, or building blocks of the system, were developed using Microsoft.NET Frameworks. Specific tools include: Application Component Programming Language C# Presentation Tier Technology ASP.NET Database Access Technology ADO.NET Reporting Engine Crystal Reports.NET Web Server Internet Information Server (IIS) 6.0/7.0 Quality Assurance Technology IBM Rational Test Suite/Microsoft Visual Studio Team System Because it has developed under.net Frameworks, our ASP is an open, flexible, stateof-the-art system that can be enhanced and maintained in a highly efficient manner. System/Operating Requirements Connection speed: 56K Minimum High Speed, T1 Recommended Screen Resolution: 800X600 Minimum 1024X768 Recommended (can fit more information on the screen) High Color 16 bit Browser: Microsoft Internet Explorer; v6.0 or higher (ASP applications are optimized for IE) Mozilla Firefox; v3.0 or higher Report Viewer: Adobe Acrobat Reader v6.0 or higher Platform Requirements: Windows XP or higher 100 MB of Free Hard Drive space Last revised January
4 ASP Security Overview Encryption Summary We use the same industry-standard Secure Socket layer (SSL) protocol that leading e- commerce and financial service providers use to encrypt information sent across the Internet. This encryption ensures the privacy of your data as it flows between your Web browser and our ASP applications. Application Security Summary Our ASP provides password-level security for all users. Users have access only to the tools and data permitted by their authorized security settings. J. J. Keller ASP requires a two-way match of a random and unique string of 72 characters each time the system is asked to retrieve information. We also use 128 bit encryption during transfer of any data. Physical Security Summary The application and equipment used to host our ASP is located at a physically secured facility specializing in the hosting of Internet applications. The facility is completely free of glass and any unsecured entry points. They use biometric hand scanning technology, access key cards, and combinations secure the physical location. General Security J. J. Keller will periodically audit our ASP application infrastructure to ensure compliance with the ASP Policy and these Standards. Full security reviews by outside security experts have been conducted. J. J. Keller maintains an architecture document that includes a full network diagram of the ASP Application Environment, illustrating the relationship between the Environment and any other relevant networks, with a full data flowchart that details where customer data resides, the applications that manipulate it, and the security thereof. This document remains confidential and will be made available based on customer written requests and demonstrated need only. J. J. Keller will immediately disable all or part of the functionality of the application should a security issue be identified. Affected customers will be notified as soon as possible should this occur. Physical Security Specifics Application hosting by a 3 rd Hosting Provider is the most secure way for an ASP to protect a customer s data. Hosting Providers offer physical security such as restricted building access and locked cages, as well as general application uptime services and redundancy that help ensure maximum availability. Availability services include guaranteed Internet bandwidth connections, backup generators, and fire suppression system. The equipment and application hosting for our ASP is located at CDW (formerly Berbee Information Networks), a physically secured facility in Madison, Wisconsin, specializing in the hosting of Internet applications. Biometric technology, access key Last revised January
5 cards, and combinations secure the physical location. Further information on CDW can be found at The CDW facilities are state-of-the-art with multiple independent geographic connections to the most reputable Internet access providers to help maintain and balance Internet traffic; with a fully redundant OC-12 SONET Ring; multiple Uninterruptible Power Supplies (UPSs), and backup systems. J. J. Keller shall have final say as to who is authorized to enter any secured physical environment. J. J. Keller will disclose, upon request, who amongst their personnel and CDW s personnel will have access to the environment hosting the application. J. J. Keller ASP applications incorporate redundant network connections and a backup diesel generator that permits the system s continuous operation even in cases of prolonged electric power outages. Network Security Specifics The network hosting the application is air-gapped from any other network or client CDW may have. This means J. J. Keller s application environment utilizes separate hosts and separate infrastructure. J. J. Keller ASP utilizes logical separation to ensure customer data is not compromised. While the data of multiple customers is shared on common physical hardware, the data is separated logically within shared physical servers and application code handles the client data isolation. This method is fairly common practice in the ASP industry and ensures that all customers are utilizing the latest enhancements within the system and the data stores are fully redundant. All visible query string parameters are based on 72 character strings that are scientifically proven as random and unique. Our ASP requires a two-way match of relevant data in order to retrieve information. J. J. Keller ASP utilizes GUIDs or Globally Unique Identifiers, which randomly create identifications based on a 128-bit number for customer data and their employee data. The idea of a GUID is that not two machines can ever generate the same GUID value twice and unique numbers are created on independent machines. J. J. Keller ASP safeguards customer data and transactions while they are in transit. The system employs 128-bit RSA secured-socket layer (SSL) data encryption. Such 128-bit encryption has never been broken, and would require a trillion years to crack using current and foreseeable technology, according to RSA laboratories. Our ASP s SSL-based network security is supplemented by a VeriSign Server ID, also known as a digital certificate. The certificate verifies that all data claimed to have originated from a customer or partner web site has, in fact, originated from that site, and that is has not been tampered with along the way. Based on 128-bit encryption, a VeriSign digital certificate is the industry standard and can be neither forged nor decoded with current and foreseeable technology. Last revised January
6 Engineered to deliver maximum feasible availability to its customers, the ASP system maintains replicated versions of its application and data on multiple servers in order to protect against unscheduled server interruptions. Our ASP s automatic fail over capability further ensures that the seamless transfer of operations to backup servers in the unlikely event of a main server failure. Host Security Patches are applied to host, web servers, and databases as often as they become available and based on the severity and applicability of the patch. In addition, standard operating procedures exist for the application of OS patches. A combination of protocol exists to monitor web site availability and system hardware performance. The combination includes activities on the parts of CDW and J. J. Keller, as well as, a 3 rd party service. The Network Operations Center at CDW is staffed 24 hours a day, 7 days a week with experienced and qualified Network Administrators. The system at CDW also monitors internal and customer systems, not only for failures, but also for exceeded thresholds in CPU, bandwidth, memory or hard disk utilization. Network Administrators perform trace route functions that are designed to identify response time delays with their Internet connections. Should one connection fail or experience unacceptable response time delay, the other connections have enough capacity to handle the full workload. Web Security The ASP applications use JavaScript and Microsoft ASPx technology. The applications are back-end written in C#, an object-oriented programming language with XML-based Web services on the.net platform. C# is designed for improving productivity in the development of Web application and boasts type-safety, garbage collection, simplified type declarations, versioning and scalability support and other features that make developing solutions faster and easier. J. J. Keller ASP has an active, dedicated, and on-going Quality Assurance process. Validation of system functionality, compliance, authentication, authorization, and accounting functions are all part of the Quality Assurance process. J. J. Keller ASP uses Trend Micro anti-virus software and the network system administrators monitor the Trend Micro web site daily for virus definitions and virus protection. A full virus scan is also completed weekly on all files. Data Security J. J. Keller ASP is built using Microsoft s.net framework. Microsoft brought in independent security experts, Foundstone, Inc. and CORE Security Technologies to analyze and remark on.net. Foundstone, Inc. and CORE Security Technologies have many years of experience assessing and securing complex software application of organizations ranging from members of the Fortune 500 to startups. Their analysis Last revised January
7 stated, In fact, used appropriately, we believe that it is one of the best platforms for developing enterprise and Web Application with strict security requirements (Foundstone, 2003). ASP.NET includes well-integrated support for signing and encrypting cookie content addressing longstanding sensitive issues on Web Application security (Foundstone, 2003). The ASP system automatically backs up all customer data every night with backups stored on non-degradable media in a fireproof, offsite location. This makes it possible for quick restorations of service should online data ever become damaged in a natural disaster or similarly unlikely occurrence. Cryptography Connections to the ASP utilize SSL, Secure Sockets Layer, protocol for transmitting private, confidential documents via the Internet. All modern browsers currently support SSL. All cookies are hashed using SHA1 and protected through the continued use of the 128- bit TripleDES encryption. Role-Based Security Standard user roles are defined based on our knowledge of the transportation industry and best industry practices. While we have attempted to identify a set of standard user roles, we appreciate the uniqueness of processes in place at each of our customer s locations. For this reason, we have adopted role-based security. Role-based security assigns appropriate user access based on those users job responsibilities and affected regulatory compliance. This feature can be customized by the customer s system administrator to meet their company s unique needs. Standard user roles may include: Driver Qualification, Driver Recruiting, Alcohol & Drug Compliance Management, Safety Manager, Regional Safety Manager, and Corporate Management. The customer s system administrator maintains user roles outside of those identified as standard user roles. The customer s system administrator manages additional roles, access, and assignment of these roles to users. J. J. Keller offers initial consultation on this process with additional services as defined in the service agreement. Management of user roles can be effective just in time as managed by the customer s system administrator. Access to the ASP system is restricted to authorized users only. The password policy for ASP applications is designed to address the individual needs of our customers. J. J. Keller will manage the initial account generation, user and password setup under the service agreement. The customer s system administrator manages further security relating to user identification and passwords. This includes the maintenance or subsequent termination of a user s account. Last revised January
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
More informationBOWMAN SYSTEMS SECURING CLIENT DATA
BOWMAN SYSTEMS SECURING CLIENT DATA 2012 Bowman Systems L.L.C. All Rights Reserved. This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered
More informationSecure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
More informationLas Vegas Datacenter Overview. Product Overview and Data Sheet. Created on 6/18/2014 3:49:00 PM
Las Vegas Datacenter Overview Product Overview and Data Sheet Product Data Sheet Maintaining a Software as a Service (SaaS) environment with market leading availability and security is something that Active
More informationcustom hosting for how you do business
custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide
More informationEmpLive Technical Overview
Version 1.6 Updated 27/08/2015 Support: +61 2 8399 1688 Email: support@wfsaustralia.com Website: wfsaustralia.com Legal Notice Copyright WFS: A WorkForce Software Company. All Rights Reserved. By receiving
More informationjoin.me architecture whitepaper
join.me architecture whitepaper 2 join.me architecture whitepaper Table of Contents Introduction 3 Architecture Overview 3 Data Security 6 Session and Website Security 7 Hosting Overview 8 Conclusion 8
More informationClick. Schedule. Relax.
Reliability and Security Reliability and Security: Twelve Essential Questions to Ask Online Employee Scheduling Providers about Reliability and Security 2003 ScheduleSource, Inc. All rights reserved. Table
More informationPerceptive Software Platform Services
Perceptive Software Platform Services CLOUD SOLUTIONS process and content management Perceptive Software Platform Services Perceptive Software process and content management systems have been deployed
More informationHow To Use Irecruit Software
irecruit is a hosted SaaS (Software as a Service), cloud-based recruiting software designed to provide any size of business a cost effective, affordable and way to manage the recruiting process online.
More informationAttachment D System Hardware & Software Overview & Recommendations For IRP System
Attachment D System Hardware & Software Overview & Recommendations For IRP System Submitted by Explore Information Services, LLC Table of Contents Table of Contents...2 Explore IRP Configuration Recommendations...3
More informationWHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery
WHITE PAPER HIPPA Compliance and Secure Online Data Backup and Disaster Recovery January 2006 HIPAA Compliance and the IT Portfolio Online Backup Service Introduction October 2004 In 1996, Congress passed
More informationMAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
More informationPowerVCS and Security
White Paper Sept. 2009 E. Crane Computing PowerVCS and Security Cloud computing is the newest technology buzz word. But the Cloud is more than a fad -- the concepts and technologies have been evolving
More informationSophisticated Password Policy
Hosted PRESENTS... Secure Your Source Code Studies show that companies of all sizes have begun adopting SaaS (Software as a Service) solutions in a faster pace as a way to implement IT services more quickly
More informationBOLDCHAT ARCHITECTURE & APPLICATION CONTROL
ARCHITECTURE & APPLICATION CONTROL A technical overview of BoldChat s security. INTRODUCTION LogMeIn offers consistently reliable service to its BoldChat customers and is vigilant in efforts to provide
More informationOracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
More informationtechsafe Features Technology Partners - 2955 20th Street - Vero Beach, FL 32960 - www.techpart.net - (772) 299-5178 Page 1/9 0910080-01
techsafe Features Page 1/9 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 5 Security File Compression Encryption Transmission
More informationSection 1 CREDIT UNION Member Information Security Due Diligence Questionnaire
SAMPLE CREDIT UNION INFORMATION SECURITY DUE DILIGENCE QUESTIONNAIRE FOR POTENTIAL VENDORS Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire 1. Physical security o Where is
More informationMaking the leap to the cloud: IS my data private and secure?
Making the leap to the cloud: IS my data private and secure? tax & accounting MAKING THE LEAP TO THE CLOUD: IS MY DATA PRIVATE AND SECURE? Cloud computing: What s in it for me? The more you know about
More informationSMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
More informationSVA Backup Plus Features
1221 John Q. Hammons Drive Madison, WI 53717 P.O. Box 44966, Madison, WI 53717 P: 608.826.2400 TF: 800.366.9091 F: 608.831.4243 www.sva.com Introduction Computers are the default storage medium for most
More informationEvolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016
Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission
More informationCOMLINK Cloud Technical Specification Guide CLOUD DESKTOP
COMLINK Cloud Technical Specification Guide CLOUD DESKTOP Updated June 13, 2014 *Subject to Change* Table of Contents 1 Overview of Cloud Desktop 1-2 CloudProtect 1 DataProtect 2 Server Protect 2 Desktop
More informationCreated By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee
Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server
More informationIntroduction. Ease-of-Use
Remote Data Backup Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and expensive method for
More informationHow To Backup Your Hard Drive With Pros 4 Technology Online Backup
Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and
More informationHow To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
More informationIBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
More informationredcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: support@redcoal.com Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More informationSecure Your Source Code and Digital Assets
Hosted PRESENTS... Secure Your Source Code and Digital Assets - World's 1st Hosted SCM Solution Studies show that companies of all sizes have begun adopting SaaS (Software as a Service) solutions in a
More informationeztechdirect Backup Service Features
eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets
More informationBirst Security and Reliability
Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their
More informationOnline Backup Solution Features
CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium
More informationREMOTE BACKUP-WHY SO VITAL?
REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote
More informationCustomized Cloud Solution
Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo
More informationProjectManager.com Security White Paper
ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for
More informationSUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
More informationEnterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationUNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER INFO@INTERCALL.COM INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
More informationSecurity & Infra-Structure Overview
Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4
More informationAutodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
More informationSecure Data Hosting. Your data is our top priority.
Secure Data Hosting Your data is our top priority. ESO s world-class security infrastructure is designed to provide data redundancy, security and availability while keeping sensitive HIPAA and PHI information
More informationby New Media Solutions 37 Walnut Street Wellesley, MA 02481 p 781-235-0128 f 781-235-9408 www.avitage.com Avitage IT Infrastructure Security Document
Avitage IT Infrastructure Security Document The purpose of this document is to detail the IT infrastructure security policies that are in place for the software and services that are hosted by Avitage.
More informationTable of Contents. Page 1 of 6 (Last updated 30 July 2015)
Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational
More informationCloudDesk - Security in the Cloud INFORMATION
CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES
More informationSecurity Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
More informationCollaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%
Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the
More informationThis document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.
SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,
More informationensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
More informationGTS Software Pty Ltd. Remote Desktop Services
GTS Software Pty Ltd Remote Desktop Services Secure web access to GTS Software applications CONTENTS Overview... 2 What GTS can provide with Remote Desktop Services... 2 Main Features... 3 RD Web Access...
More informationTroux Hosting Options
Troux Hosting Options Introducing Troux Hosting Options Benefits of a Hosted Troux Environment...3 Convenience...3 Time-to-Value...3 Reduced Cost of Ownership...3 Scalability and Flexibility...3 Security...4
More informationWhite Paper. 1 800 FASTFILE / www.ironmountain.ca Page 1
White Paper LIVEVAULT Top 10 Reasons for Using Online Server Backup and Recovery Introduction Backup of vital company information is critical to a company s survival, no matter what size the company. Recent
More information800 319 5581 800 319 5582 Fax www.protectmyministry.com www.mobilizemyministry.com
800 319 5581 800 319 5582 Fax www.protectmyministry.com www.mobilizemyministry.com Protect My Ministry websites including www.ministryopportunities.org have the following SSL Certificates and protection:
More informationKeyfort Cloud Services (KCS)
Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency
More informationFive keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
More informationTop 10 Reasons for Using Disk-based Online Server Backup and Recovery
ADVISORY Top 10 Reasons for Using Disk-based Online Server Backup and Recovery INTRODUCTION Backup of vital company information is critical to a company s survival, no matter what size the company. Recent
More informationService Overview CloudCare Online Backup
Service Overview CloudCare Online Backup CloudCare s Online Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
More informationWhite Paper: Librestream Security Overview
White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing
More informationINTRODUCTION ADVANTAGES OF RUNNING ORACLE 11G ON WINDOWS. Edward Whalen, Performance Tuning Corporation
ADVANTAGES OF RUNNING ORACLE11G ON MICROSOFT WINDOWS SERVER X64 Edward Whalen, Performance Tuning Corporation INTRODUCTION Microsoft Windows has long been an ideal platform for the Oracle database server.
More informationInteract Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
More informationBroadData Unified Meeting Security Whitepaper v4.2
BroadData Unified Meeting Security Whitepaper v4.2 Introduction As organizations unlock the true potential of meeting over the Web as an alternative to costly and time-consuming travel, they do so in the
More informationHow To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
More informationA. The Treeno Data Center maintains audited advanced security systems equal to the most sophisticated systems of large corporations.
Treeno SaaS FAQ Q. Who is Treeno? A. Established in 2002 and located in Portsmouth, NH, Treeno Software has grown to become a leader in the Enterprise Document Management (EDM) industry. Treeno Software
More informationSecurity Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
More informationWHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery
WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights
More informationChristchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Corporate Policies & Procedures Section 1: General Administration Document
More informationWoodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview
Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R
More informationStratusLIVE for Fundraisers Cloud Operations
6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace
More informationBEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options
BEGINNER S GUIDE TO SSL CERTIFICATES: Making the best choice when considering your online security options BEGINNERS GUIDE TO SSL CERTIFICATES Introduction Whether you are an individual or a company, you
More informationSystem Requirements Version 8.0 July 25, 2013
System Requirements Version 8.0 July 25, 2013 For the most recent version of this document, visit our documentation website. Table of Contents 1 System requirements 3 2 Scalable infrastructure example
More informationBase One's Rich Client Architecture
Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.
More informationEnterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
More informationWorkflow Solutions Data Collection, Data Review and Data Management
Data Collection, Data Review and Data Management Workflow Finding more efficient ways to support patient needs begins with better workflow management. MGC Diagnostics has developed a complete workflow
More informationPrint4 Solutions fully comply with all HIPAA regulations
HIPAA Compliance Print4 Solutions fully comply with all HIPAA regulations Print4 solutions do not access, store, process, monitor, or manage any patient information. Print4 manages and optimize printer
More informationWhite Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
More informationPremier Services Program (PSP) Tools: Security Overview
Premier Services Program (PSP) Tools: Security Overview Software Version 3.0 Extreme Networks, Inc. 3585 Monroe Street Santa Clara, California 95051 (888) 257-3000 (408) 579-2800 http://www.extremenetworks.com
More informationSaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
More informationPrivate Cloud. One solution managed by Applied
Private Cloud : : C L O U D S E R V I C E S : : One solution managed by Applied THE CLOUD IS NO LONGER AN IT CONSIDERATION ALONE IT IS FUNDAMENTALLY CHANGING THE WAY EXECUTIVES ACROSS DEPARTMENTS VIEW
More informationTalk With Someone Live Now: (760) 650-2313. One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE
One Stop Data & Networking Solutions PREVENT DATA LOSS WITH REMOTE ONLINE BACKUP SERVICE Prevent Data Loss with Remote Online Backup Service The U.S. National Archives & Records Administration states that
More informationSupplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
More informationGuardian365. Managed IT Support Services Suite
Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service
More informationFormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
More informationComputers and Society: Security and Privacy
1 Chapter 12 Computers and Society: Security and Privacy 2 Chapter 12 Objectives 3 Computer Security: Risks and Safeguards What is a computer security risk? 4 Computer Security: Risks and Safeguards 1
More informationFamly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
More informationManaging internet security
Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further
More informationTOP SECRETS OF CLOUD SECURITY
TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3
More informationDeveloping Secure Web Applications
Developing Secure Web Applications Elements of this syllabus are subject to change. Key Data Course #: 2300 Number of Days: 3 Format: Instructor-Led Certification Exams: None Certification Track: MCSD
More informationenicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
More informationKeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
More informationRL Solutions Hosting Service Level Agreement
RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The
More informationWhite Paper DocuWare Cloud. Version 2.0
White Paper DocuWare Cloud Version 2.0 May 2015 Impressum: DocuWare GmbH Therese-Giehse-Platz 2 D-82110 Germering Telephone: +49.89.89 44 33-0 Fax: +49.89.8 41 99 66 E-Mail: infoline@docuware.com Disclaimer:
More informationEnsuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services
Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services 1 Contents 3 Introduction 5 The HIPAA Security Rule 7 HIPAA Compliance & AcclaimVault Backup 8 AcclaimVault Security and
More informationSafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
More informationState of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP)
State of Wisconsin DET File Transfer Protocol Service Offering Definition (FTP & SFTP) Document Revision History Date Version Creator Notes File Transfer Protocol Service Page 2 7/7/2011 Table of Contents
More informationRAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER
RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based
More informationPrivacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
More information