WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW

Size: px
Start display at page:

Download "WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW"

Transcription

1 NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW

2 INTRODUCTION As businesses adopt new technologies that touch or leverage critical company data, maintaining the highest level of security is their most pressing concern. Often, these businesses handle increasing amounts of digital data from their customers or partners. This exposes them to increasing risks and new vulnerabilities including: viruses, malware, data intrusion, and even hackers. In the absence of an easy to use IT controlled file sharing platform and to enhance personal productivity, employees often self select a public cloud to sync, and share files (i.e., Box or Dropbox). The desire by employees to access their files in a manner that is convenient to them is promoting their use of tools and cloud services not approved by their employers. The use of unapproved cloud services can lead to data breaches and non-compliance in regulated industries. Ultimately, these discretions can result in expensive legal costs and hefty fines. To avoid these problems, IT organizations need to provide employees with a convenient, easy to use, and secure method of accessing files from their mobile devices. Such a robust file-sharing platform with comprehensive data protection will help IT avoid unintended data breach problems. Transporter for Business offers such a solution. Once established, this unique enterprise file sharing solution with world-class security, privacy and control, provides businesses with a secure file access, storage, and collaboration platform that employees actually want to use. Nexsan s Transporter is designed with end-to-end data protection and multiple levels of security at each layer. Transporter empowers IT with administrative controls for: Access, storage, network, transmission, and data Mobile data management Ability to invite users to share folders Best of all, Transporter provides users with the user interface (UI) experience they expect from a traditional cloud provider. With Transporter, there are no difficult VPNs to navigate because files stored on Transporter are immediately available to all mobile devices owned by the user. In addition, whenever a file is modified on one device, Transporter syncs these changes to the other devices ensuring the user always has access to the latest files. Should the user want to return to an earlier version of a file, Transporter s versioning capabilities enable the user to do that as well. It translates into an employee workflow tool that s easier for IT to setup and control, and ensures that all employee file activity comply with their industry s regulations and company s privacy policies. 2

3 TRANSPORTER FOR BUSINESS Transporter for Business private cloud appliances returns control and security of a company s data back to its IT department. That s because it easily and quickly enables businesses to build and deliver their own private cloud service for their employees and important stakeholders. In fact, the Transporter UI is similar to those from popular services like Box and Dropbox. By offering your employees the cloud features they require and the UI they demand, Transporter eliminates the temptation to use unauthorized public cloud solutions that could expose sensitive business information. Transporter s hardware deployment model gives you total control over the physical location of your data and its redundancy. Best of all, there are no recurring monthly fees. ARCHITECTURE Nexsan products like Transporter for Business are engineered with data security, user mobility, and ease of use as key design elements. To accomplish this, Transporter is deployed as an encrypted peer-to-peer private network that can reside either side of a company s firewall. It delivers multiple layers of protection, covering user permissions, data transfer, and encryption that is all distributed across a scalable and secure infrastructure. Unlike public cloud file sync and share providers, Nexsan s database stores the relationships between Transporters, and Transporters and Apps (i.e., mobile devices). It also stores user addresses, login information and more. The main difference between Transporter and its competitors is that the data stored on your Transporter is never in Nexsan s possession. That s because we separated the data plane from the control plane. In fact, we never see or have access to your data! Data is transferred between Transporters and user owned devices using Advanced Encryption Standard (AES-256) Public/Private Key Encryption. Connections between nodes on the network are established using three different techniques. First, the Transporter will request for the network s gateway to open a port using the Universal Plug and Play (UPnP) set of networking protocols and the Network Address Translation Port Mapping Protocol (NAT-PMP). These are not supported, Transporter will establish a public port using industry standard User Datagram Protocol (UDP) hole punching techniques (a.k.a., Session Traversal Utilities for NAT and Interactive Connectivity Establishment). Finally, if neither of these techniques is successful (under 10%), Nexsan utilizes a relay server to facilitate the connection. No matter which connection technique, all data is encrypted at the end points and Nexsan has no ability to inspect the data. Web/browser-based network traffic is handled using industry standard Secure Hypertext Transfer Protocol (https) which signal the browser to use an added 3

4 encryption layer based on the Secure Sockets Layer/Transport Layer Security (SSL/TLS) to protect network traffic. Transporter users can access files and folders at any time from a desktop or mobile device. CENTRAL SERVICE The Central Service enables Nexsan to monitor the health and capacity usage on all deployed Transporters via their serial numbers. This service is located on protected database and web servers in a hidden private network that cannot be accessed directly from the Internet. For administrative purposes, Nexsan s web servers can be accessed from the management site through load balancers using the https protocol. Think of the Central Service in the same way you think of air traffic control, Transporters are the planes, and the folders/files are the passengers. Air Traffic Control never directly interacts with the planes or passengers they guide safely between two locations (originating airport and destination airport). Air traffic control gives the pilots information on the takeoff and landing (runways, course, altitude, and speed). Thus helping to give passengers a safe on time arrival at their destination. In this example: a user will request a file be moved between two devices. The originating device will contact the Transporter s Central Service which then tells the devices who they are allowed to communicate with using a universally unique identifier (UUID). If both devices are authorized to establish a secure connection, they will then exchange data. The devices will inform each other about the files directly, Nexsan s Central Service has no knowledge about this exchange. ENCRYPTION Most public and private cloud file sync and share providers do employ data encryption technology both in-flight and at-rest. And when you look at the data in a Web Browser, it has already been decrypted for you by the time it reaches your computer or device. Like other cloud offerings, Nexsan Transporter generates and stores your private/public encryption keys directly on your appliances and these are used to decrypt your data. This means the data is directly under your control and nobody else (including Nexsan) has any access to your files. Nexsan can never decrypt data packets sent by the relay router because they never have access to the private key. Transporter is the first business class file sync and share solution to meet the privacy requirements necessary for sensitive medical, financial, and legal data. KEY MANAGEMENT Transporter creates an Encryption key based on the AES-256 specification for the encryption of electronic data established by the U.S. National Institute of 4

5 Standards and Technology (NIST) in AES has been adopted by the U.S. government and is now used worldwide. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. When a transporter is born (leaves manufacturing), a record is created in the Central Service database. Once created the record is populated with all the important information that uniquely identifies that specific Transporter. When first powered on, Transporter announces itself to the Central Service and then is told it needs to create its private/public encryption key. If something unexpected happens during key generation, the Transporter will place itself into an unusable state to ensure the device isn t used in a production environment. FOLDER ACCESS INVITATIONS When deploying Transporter for the first time, there s no top-level folder structure that needs to be created. An administrator simply deploys the Transporter on their network, claims it, and starts creating user accounts. Users within the organization receive an invitation instructing them to complete their account registration and install the desktop application, much like they would for a public cloud service like Box or Dropbox. Once the user has installed the desktop application, they will see a newly created folder, called Transporter, that looks and works just like any other folder on their computer. Within this folder the organizational user: Creates their own folder hierarchy Shares folders Creates links Folder owners can then invite other people to share the folder and its contents. Invited users will then have organizational level privileges (read/write) or guest user privileges (read only) to all files and folders within the shared folder. Therefore, the folder owners themselves undertake responsibility for setting folder security and access privileges. For example, a folder owner may be a department manager who only invites their team to share the folder. Accepting this invitation establishes access and sharing privileges for members of the department. However, no one else in the Organization will have access to the folder. TOKEN USAGE Transporter doesn t use VPNs. Instead the administrator claims a Transporter 5

6 after it s connected to the network and then creates an account using an address and password. This information is then stored in the Central Service database; the password is hashed for security. When using a Transporter application on any supported device, the Central Service will issue a security token, which it validates when a user attempts to sign into their account. These tokens can easily be revoked. As a security precaution, if the user forgets their password and resets it, all authenticated applications will automatically no longer be able access Transporter until the user authenticates again. During the sign-on process the Central Service will validate the token sent from the Transporter application. This is accomplished by checking the token information against the Central Service database record. Once verified as a valid token, the Central Service then contacts all Transporter devices allocated to the account and notifies them of the validated application. Only after the access token is validated will a connection be established to the Transporter and the folders become accessible to the user. However, if the user doesn t have permission or the correct token, the Application will fail to connect. Finally, the validity of each side of the connection is accomplished using the public/private keys discussed earlier in this paper. USER PERMISSIONS Transporter users have the ability to set different permissions (read-only or read/write) on a folder-by-folder basis. This permission capability significantly varies with other traditional cloud providers, for example: Microsoft OneDrive: Does not allow a read-only shared folder to sync with a user s desktop. Shared folder (both read-only and read/write) are only available via Microsoft s website and cannot be accessed from the desktop. Box: Does not allow a read-only shared folder to sync with a user s computer and the folder is only available using their website. Google: Has read-only folder sync with a computer. However, should the user delete a file from that folder, Google announces that the folder is now mismatched and it cannot repair itself Unlike the services discussed above, Transporter does sync read only folders with the user s computer and it will repair a read-only folder should the user make a modification to the data within the folder. If a read-only file is modified, the Transporter software will rename it and mark it as un-syncable (thus, the changes are not lost). The Transporter software will then restore the original file. SHARED FOLDERS In the event a folder owner decides to rescind access to a shared folder, the folder owner simply removes the person from the access list using the Web- 6

7 based management interface. As a result, the files and folders will be removed from the disinvited person s devices within seconds. This capability is often referred to as remote wipe. LINKS Many organizational users prefer to send a link to a user instead of attaching a potentially large file to an and possibly have the server reject it due to its size. While other users are concerned about security. Transporter offers the user a better alternative, a choice between using "direct" and "standard" links. The user can select the type of link from Account Preferences located in the Transporter Management Website. "Direct" links transfer files directly from your Transporter to the recipient; your files are never uploaded to Nexsan s servers. This type of link offers a higher degree of privacy even though the recipient isn t required to create a Transporter account. To ensure security, the recipient must either authorize a web browser plug-in or download a small helper app. "Standard" links upload files to Nexsan s servers and allow recipients to download them without the need of an authorized plug-in or helper app. The recipient simply clicks the link and gets the file. When the file type allows, a preview will be displayed. While this type of link does not offer the same degree of privacy, it is easier to use. This can be especially useful for ing links to clients who don't care to authorize or install anything. Use direct links if you need a higher degree of control. NAS INTEGRATION Over the years, established IT organizations have acquired some of the best NAS solutions available but they are based on older protocols (CIFS/SMB/NFS) and don t offer file sync or mobile support like modern cloud services. Although Transporter can be deployed as a stand-alone private cloud file sharing solution, it can also easily be integrated with an existing on-premise NAS file server. By mapping shares using the Transporter Network Storage Connector feature (standard on all rack mount Transporters), users will have the same level of access and security to designated NAS folders as they would to folders located on a stand-alone Transporter. When paired with a NAS system, Transporter will bi-directionally and transparently sync with its paired NAS partner along with other Transporters that are moving data to where it s required in an enterprise. Any number of Transporters can be deployed and connected to as many NAS systems as required. ACTIVE DIRECTORY SERVICES Unlike traditional NAS systems, Transporter doesn t require a difficult or time consuming set up process. Instead, an administrator will follow the steps 7

8 outlined in the Invitations section above. Dropbox pioneered this popular self-organization approach. Businesses with large numbers of users are most likely using a directory service product like Active Directory (AD) as a user directory and central point for authenticating them via their credentials. AD CONNECTOR Transporter can leverage AD to help an administrator quickly and easily setup a their appliance. To expedite the initial setup process, we created an AD connector. This connector provides Transporter with all the information necessary to identify and prepare the system for the organizations users. As part of the setup process, the AD connector will use the information with AD to send an containing a link to each user the administrator invites to the organization. After sign up, the website walks each user through short setup process where the user sets a few account preferences and downloads the Transporter Desktop Application software for their computer Thus the IT Administrator doesn t need to preload everyone s machine, and users can securely start sharing files with each other very quickly. AD INTEGRATION Transporter uses third-party identity provider (IdP) integration to connect and integrate with AD. Nexsan will have the ability to support several IdPs over time beginning with OneLogin. As part of this deployment a OneLogin account should be created, it will then connect to the directory services of your choice, such as Active Directory, LDAP, and more. Once setup is complete, Active Directory users will be automatically provisioned in the Transporter Organization. From that point on, changes to the AD domain, such as password resets or user de-provisioning will be reflected in real time. AUDIT LOGS Many regulated industries are required to keep track of all users and file access events within their organization. In the event an unauthorized activity happens, regulated companies will need to track when these events took place and identify all users involved. Audit logs break down into two categories: device logs and web logs. Device audit logs keep track of activity between client devices and the Transporter unit itself. These logs are obtained from Transporter Desktop software. Whereas, Web audit logs keep track of activity that occurs between users and the management website (i.e., creating shared folders, changing folder membership, and creating links). Should something unexpected happen; an IT administrator is able to recreate 8

9 the sequence of events and the users involved. This capability addresses many of the concerns a company or organization may have in a regulated industry. It should be noted that once a file is pulled off Transporter to a local device, the audit log will no longer track or report on the file. CONCLUSION Despite all the built-in privacy and security, Transporter is not hard to use. Department managers and individual users are already familiar with services like Box and Dropbox, and have the necessary knowledge to establish a folder hierarchy that best suits their needs. By giving users the same simplified file sharing capabilities as these popular public cloud providers, Transporter eliminates the need for users to break corporate IT policies by moving private company data to personal accounts in the public cloud. Transporter s data security helps safeguard a company s sensitive information from being unintentionally exposed and lost. Additionally, it protects against legal exposure by helping companies conform to corporate governance and government mandated industry regulations. Transporter gives IT Administrators the type of integrated solution and deployment control they want. Its on-premise deployment model along with its peer-to-peer network, security tokens, syncing controls, and remote wipe capabilities make this one of the most secure file sync and share solutions on the market today. 9

WHITE PAPER. Understanding Transporter Concepts

WHITE PAPER. Understanding Transporter Concepts WHITE PAPER Understanding Transporter Concepts Contents Introduction... 3 Definition of Terms... 4 Organization... 4 Administrator... 4 Organization User... 4 Guest User... 4 Folder Hierarchies... 5 Traditional

More information

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst

Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data

More information

Sync Security and Privacy Brief

Sync Security and Privacy Brief Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical

More information

Security Architecture Whitepaper

Security Architecture Whitepaper Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started

More information

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta. Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta

More information

December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure

December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation

More information

How To Secure Your Data Center From Hackers

How To Secure Your Data Center From Hackers Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

THE COMPLETE GUIDE TO GOOGLE APPS SECURITY. Building a comprehensive Google Apps security plan

THE COMPLETE GUIDE TO GOOGLE APPS SECURITY. Building a comprehensive Google Apps security plan THE COMPLETE GUIDE TO GOOGLE APPS SECURITY Building a comprehensive Google Apps security plan Contents Introduction................................ 3 1. Secure the core.............................4 Google

More information

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions

Choosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions Choosing a File Sync & Share Solution PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions Agenda File Sync & Share What and Why File Sync & Share How Selection Criteria Q & A Summary 3

More information

How To Use Egnyte

How To Use Egnyte INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

The Essential Security Checklist. for Enterprise Endpoint Backup

The Essential Security Checklist. for Enterprise Endpoint Backup The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

Egnyte Cloud File Server. White Paper

Egnyte Cloud File Server. White Paper Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

Directory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 Okta White paper Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-dint-053013 Table of Contents

More information

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

THE SECURITY OF HOSTED EXCHANGE FOR SMBs THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

White Paper. BD Assurity Linc Software Security. Overview

White Paper. BD Assurity Linc Software Security. Overview Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about

More information

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

FilesAnywhere Feature List

FilesAnywhere Feature List FilesAnywhere Feature List FilesAnywhere Page 1 of 9 3/31/2014 Contents Basic Features... 3 Advanced Features... 7 Enterprise Features... 9 FilesAnywhere Page 2 of 9 3/31/2014 Basic Features No File Size

More information

Comparing Alternatives for Business-Grade File Sharing. intermedia.net 1.800.379.7729. sales@intermedia.net CALL US EMAIL US ON THE WEB

Comparing Alternatives for Business-Grade File Sharing. intermedia.net 1.800.379.7729. sales@intermedia.net CALL US EMAIL US ON THE WEB for -Grade CALL US EMAIL US ON THE WEB 1.800.379.7729 sales@intermedia.net intermedia.net for -Grade Goal of this report This report compares and contrasts various alternatives for file sharing in a business

More information

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001 Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

Deployment Guide: Unidesk and Hyper- V

Deployment Guide: Unidesk and Hyper- V TECHNICAL WHITE PAPER Deployment Guide: Unidesk and Hyper- V This document provides a high level overview of Unidesk 3.x and Remote Desktop Services. It covers how Unidesk works, an architectural overview

More information

Barracuda SSL VPN Administrator s Guide

Barracuda SSL VPN Administrator s Guide Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,

More information

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.

GoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved. GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...

More information

How To Use Quantum Rbs Inc. Small Business Backup

How To Use Quantum Rbs Inc. Small Business Backup Small Business Backup & Recovery (File Servers, Peer-to-Peer, Laptops, Desktops) Smart Features: Continuous Backup Anywhere Access to Backed Up Data Simple Rate Plan Secure Bank Grade Encryption Open Files

More information

Tresorit s DRM. A New Level of Security for Document Collaboration and Sharing

Tresorit s DRM. A New Level of Security for Document Collaboration and Sharing Tresorit s DRM A New Level of Security for Document Collaboration and Sharing Cloud-based storage has made it easier for business users to share documents, but it has also opened up new vulnerabilities.

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Introduction to the Mobile Access Gateway

Introduction to the Mobile Access Gateway Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic. OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does

More information

NCSU SSO. Case Study

NCSU SSO. Case Study NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must

More information

Xerox Mobile Print Cloud

Xerox Mobile Print Cloud September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

Anchor End-User Guide

Anchor End-User Guide Table of Contents How to Access Your Account How to Upload Files How to Download the Desktop Sync Folder Sync Folder How to Share a File 3 rd Party Share from Web UI 3 rd Party Share from Sync Folder Team-Share

More information

Leonardo Hotels Group Page 1

Leonardo Hotels Group Page 1 Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443

More information

Web Security School Entrance Exam

Web Security School Entrance Exam Web Security School Entrance Exam By Michael Cobb 1) What is SSL used for? a. Encrypt data as it travels over a network b. Encrypt files located on a Web server c. Encrypt passwords for storage in a database

More information

Moving to the Cloud: What Every CIO Should Know

Moving to the Cloud: What Every CIO Should Know Moving to the Cloud: What Every CIO Should Know CONTACT SALES US: 1.877.734.6983 UK: +44 (0)845.528.0588 www.egnyte.com WHITEPAPER Overview Enterprise data storage needs are growing exponentially, doubling

More information

The increasing popularity of mobile devices is rapidly changing how and where we

The increasing popularity of mobile devices is rapidly changing how and where we Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release

More information

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013

SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 1 Cloud Computing In the Industry Introduction to Cloud Computing The term cloud computing is simply the use of computing

More information

Using Entrust certificates with VPN

Using Entrust certificates with VPN Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Media Shuttle s Defense-in- Depth Security Strategy

Media Shuttle s Defense-in- Depth Security Strategy Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among

More information

DiamondStream Data Security Policy Summary

DiamondStream Data Security Policy Summary DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers

More information

SOOKASA WHITEPAPER SECURITY SOOKASA.COM

SOOKASA WHITEPAPER SECURITY SOOKASA.COM SOOKASA WHITEPAPER SECURITY SOOKASA.COM Sookasa Overview Sookasa was founded in 2012 by a team of leading security experts. The company s patented file-level encryption enables enterprises to protect data

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Introduction to the AirWatch Cloud Connector (ACC) Guide

Introduction to the AirWatch Cloud Connector (ACC) Guide Introduction to the AirWatch Cloud Connector (ACC) Guide The AirWatch Cloud Connector (ACC) provides organizations the ability to integrate AirWatch with their back-end enterprise systems. This document

More information

UIT USpace Flexible and Secure File Manager for Cloud Storage

UIT USpace Flexible and Secure File Manager for Cloud Storage UIT USpace Flexible and Secure File Manager for Cloud Storage USpace File Manager for Cloud Storage Main features: USpace is a cloud storage solution which is very suitable for both private cloud deployment

More information

Feature and Technical

Feature and Technical BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Top 7 Tips for Better Business Continuity

Top 7 Tips for Better Business Continuity Top 7 Tips for Better Business Continuity With Hosted Fax www.biscom.com sales@biscom.com (+1) 800-477-2472 or (+1) 978-250-1800 Introduction Biscom s Secure File Transfer (Biscom SFT) solution enables

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

Manual for Android 1.5

Manual for Android 1.5 Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor

More information

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.

Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation. eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as

More information

Chapter 10. Cloud Security Mechanisms

Chapter 10. Cloud Security Mechanisms Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based

More information

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition

Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED 1 Background Traditionally, security has not been a high priority for e-learning; as such content was hosted and only accessible at the

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

COLLEAGUES. CLIENTS. CONNECTED. CLOUD.

COLLEAGUES. CLIENTS. CONNECTED. CLOUD. COLLEAGUES. CLIENTS. CONNECTED. CLOUD. THOMSON REUTERS Simplifying your life with powerful, integrated and innovative solutions. The Tax & Accounting business of Thomson Reuters provides the profession

More information

When enterprise mobility strategies are discussed, security is usually one of the first topics

When enterprise mobility strategies are discussed, security is usually one of the first topics Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Cloud Attached Storage 5.0

Cloud Attached Storage 5.0 Release Notes Cloud Attached Storage 5.0 March 2015 2015 Cloud Attached Storage 5.0 Release Notes 1 1 Release Contents Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document

More information

Comparing Box and Egnyte. White Paper

Comparing Box and Egnyte. White Paper White Paper Revised July, 2013 Introduction File storage in the cloud has broad appeal for individuals as well as large businesses. At a macro level, there are two types of file storage/sharing solutions:

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

CBIO Security White Paper

CBIO Security White Paper One Canon Plaza Lake Success, NY 11042 www.ciis.canon.com CBIO Security White Paper Introduction to Canon Business Imaging Online Canon Business Imaging Online ( CBIO ) is a cloud platform for Canon s

More information

Monitoring Hybrid Cloud Applications in VMware vcloud Air

Monitoring Hybrid Cloud Applications in VMware vcloud Air Monitoring Hybrid Cloud Applications in ware vcloud Air ware vcenter Hyperic and ware vcenter Operations Manager Installation and Administration Guide for Hybrid Cloud Monitoring TECHNICAL WHITE PAPER

More information

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.

More information

SeCUritY. Safeguarding information Within Documents and Devices. imagerunner ADVANCE Solutions. ADVANCE to Canon MFP security solutions.

SeCUritY. Safeguarding information Within Documents and Devices. imagerunner ADVANCE Solutions. ADVANCE to Canon MFP security solutions. imagerunner ADVANCE Solutions SeCUritY Safeguarding information Within Documents and Devices ADVANCE to Canon MFP security solutions. Whether your business relies on paper documents, electronic documents,

More information

Xerox Mobile Print Cloud

Xerox Mobile Print Cloud Xerox Mobile Print Cloud Information Assurance Disclosure Software Version 3.0 May 2015 702P03595 2013-2015 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation

More information

Problem. Solution. Quatrix is professional, secure and easy to use file sharing.

Problem. Solution. Quatrix is professional, secure and easy to use file sharing. Quatrix Data Sheet Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring your own file transfer) opens up vulnerabilities

More information

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning

More information

Safeguard Protected Health Information With Citrix ShareFile

Safeguard Protected Health Information With Citrix ShareFile Safeguard Protected Health Information With Citrix ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access Citrix ShareFile helps healthcare

More information

Last Updated: July 2011. STATISTICA Enterprise Server Security

Last Updated: July 2011. STATISTICA Enterprise Server Security Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...

More information

Introduction to Endpoint Security

Introduction to Endpoint Security Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

SECURING SAP NETWEAVER DEPLOYMENTS WITH SAFE-T RSACCESS

SECURING SAP NETWEAVER DEPLOYMENTS WITH SAFE-T RSACCESS SECURING NETWEAVER DEPLOYMENTS A RSACCESS WHITE PAPER SECURING NETWEAVER DEPLOYMENTS 1 Introduction 2 NetWeaver Deployments 3 Safe-T RSAccess Overview 4 Securing NetWeaver Deployments with Safe-T RSAccess

More information

An Enterprise Approach to Mobile File Access and Sharing

An Enterprise Approach to Mobile File Access and Sharing White Paper File and Networking Services An Enterprise Approach to Mobile File Access and Sharing Table of Contents page Anywhere, Any Device File Access with IT in Control...2 Novell Filr Competitive

More information

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account

More information

Overview. Timeline Cloud Features and Technology

Overview. Timeline Cloud Features and Technology Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers

More information

How Managed File Transfer Addresses HIPAA Requirements for ephi

How Managed File Transfer Addresses HIPAA Requirements for ephi How Managed File Transfer Addresses HIPAA Requirements for ephi 1 A White Paper by Linoma Software INTRODUCTION As the healthcare industry transitions from primarily using paper documents and patient charts

More information