WHITE PAPER NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW
|
|
- Malcolm Hodges
- 8 years ago
- Views:
Transcription
1 NEXSAN TRANSPORTER PRODUCT SECURITY AN IN-DEPTH REVIEW
2 INTRODUCTION As businesses adopt new technologies that touch or leverage critical company data, maintaining the highest level of security is their most pressing concern. Often, these businesses handle increasing amounts of digital data from their customers or partners. This exposes them to increasing risks and new vulnerabilities including: viruses, malware, data intrusion, and even hackers. In the absence of an easy to use IT controlled file sharing platform and to enhance personal productivity, employees often self select a public cloud to sync, and share files (i.e., Box or Dropbox). The desire by employees to access their files in a manner that is convenient to them is promoting their use of tools and cloud services not approved by their employers. The use of unapproved cloud services can lead to data breaches and non-compliance in regulated industries. Ultimately, these discretions can result in expensive legal costs and hefty fines. To avoid these problems, IT organizations need to provide employees with a convenient, easy to use, and secure method of accessing files from their mobile devices. Such a robust file-sharing platform with comprehensive data protection will help IT avoid unintended data breach problems. Transporter for Business offers such a solution. Once established, this unique enterprise file sharing solution with world-class security, privacy and control, provides businesses with a secure file access, storage, and collaboration platform that employees actually want to use. Nexsan s Transporter is designed with end-to-end data protection and multiple levels of security at each layer. Transporter empowers IT with administrative controls for: Access, storage, network, transmission, and data Mobile data management Ability to invite users to share folders Best of all, Transporter provides users with the user interface (UI) experience they expect from a traditional cloud provider. With Transporter, there are no difficult VPNs to navigate because files stored on Transporter are immediately available to all mobile devices owned by the user. In addition, whenever a file is modified on one device, Transporter syncs these changes to the other devices ensuring the user always has access to the latest files. Should the user want to return to an earlier version of a file, Transporter s versioning capabilities enable the user to do that as well. It translates into an employee workflow tool that s easier for IT to setup and control, and ensures that all employee file activity comply with their industry s regulations and company s privacy policies. 2
3 TRANSPORTER FOR BUSINESS Transporter for Business private cloud appliances returns control and security of a company s data back to its IT department. That s because it easily and quickly enables businesses to build and deliver their own private cloud service for their employees and important stakeholders. In fact, the Transporter UI is similar to those from popular services like Box and Dropbox. By offering your employees the cloud features they require and the UI they demand, Transporter eliminates the temptation to use unauthorized public cloud solutions that could expose sensitive business information. Transporter s hardware deployment model gives you total control over the physical location of your data and its redundancy. Best of all, there are no recurring monthly fees. ARCHITECTURE Nexsan products like Transporter for Business are engineered with data security, user mobility, and ease of use as key design elements. To accomplish this, Transporter is deployed as an encrypted peer-to-peer private network that can reside either side of a company s firewall. It delivers multiple layers of protection, covering user permissions, data transfer, and encryption that is all distributed across a scalable and secure infrastructure. Unlike public cloud file sync and share providers, Nexsan s database stores the relationships between Transporters, and Transporters and Apps (i.e., mobile devices). It also stores user addresses, login information and more. The main difference between Transporter and its competitors is that the data stored on your Transporter is never in Nexsan s possession. That s because we separated the data plane from the control plane. In fact, we never see or have access to your data! Data is transferred between Transporters and user owned devices using Advanced Encryption Standard (AES-256) Public/Private Key Encryption. Connections between nodes on the network are established using three different techniques. First, the Transporter will request for the network s gateway to open a port using the Universal Plug and Play (UPnP) set of networking protocols and the Network Address Translation Port Mapping Protocol (NAT-PMP). These are not supported, Transporter will establish a public port using industry standard User Datagram Protocol (UDP) hole punching techniques (a.k.a., Session Traversal Utilities for NAT and Interactive Connectivity Establishment). Finally, if neither of these techniques is successful (under 10%), Nexsan utilizes a relay server to facilitate the connection. No matter which connection technique, all data is encrypted at the end points and Nexsan has no ability to inspect the data. Web/browser-based network traffic is handled using industry standard Secure Hypertext Transfer Protocol (https) which signal the browser to use an added 3
4 encryption layer based on the Secure Sockets Layer/Transport Layer Security (SSL/TLS) to protect network traffic. Transporter users can access files and folders at any time from a desktop or mobile device. CENTRAL SERVICE The Central Service enables Nexsan to monitor the health and capacity usage on all deployed Transporters via their serial numbers. This service is located on protected database and web servers in a hidden private network that cannot be accessed directly from the Internet. For administrative purposes, Nexsan s web servers can be accessed from the management site through load balancers using the https protocol. Think of the Central Service in the same way you think of air traffic control, Transporters are the planes, and the folders/files are the passengers. Air Traffic Control never directly interacts with the planes or passengers they guide safely between two locations (originating airport and destination airport). Air traffic control gives the pilots information on the takeoff and landing (runways, course, altitude, and speed). Thus helping to give passengers a safe on time arrival at their destination. In this example: a user will request a file be moved between two devices. The originating device will contact the Transporter s Central Service which then tells the devices who they are allowed to communicate with using a universally unique identifier (UUID). If both devices are authorized to establish a secure connection, they will then exchange data. The devices will inform each other about the files directly, Nexsan s Central Service has no knowledge about this exchange. ENCRYPTION Most public and private cloud file sync and share providers do employ data encryption technology both in-flight and at-rest. And when you look at the data in a Web Browser, it has already been decrypted for you by the time it reaches your computer or device. Like other cloud offerings, Nexsan Transporter generates and stores your private/public encryption keys directly on your appliances and these are used to decrypt your data. This means the data is directly under your control and nobody else (including Nexsan) has any access to your files. Nexsan can never decrypt data packets sent by the relay router because they never have access to the private key. Transporter is the first business class file sync and share solution to meet the privacy requirements necessary for sensitive medical, financial, and legal data. KEY MANAGEMENT Transporter creates an Encryption key based on the AES-256 specification for the encryption of electronic data established by the U.S. National Institute of 4
5 Standards and Technology (NIST) in AES has been adopted by the U.S. government and is now used worldwide. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting the data. When a transporter is born (leaves manufacturing), a record is created in the Central Service database. Once created the record is populated with all the important information that uniquely identifies that specific Transporter. When first powered on, Transporter announces itself to the Central Service and then is told it needs to create its private/public encryption key. If something unexpected happens during key generation, the Transporter will place itself into an unusable state to ensure the device isn t used in a production environment. FOLDER ACCESS INVITATIONS When deploying Transporter for the first time, there s no top-level folder structure that needs to be created. An administrator simply deploys the Transporter on their network, claims it, and starts creating user accounts. Users within the organization receive an invitation instructing them to complete their account registration and install the desktop application, much like they would for a public cloud service like Box or Dropbox. Once the user has installed the desktop application, they will see a newly created folder, called Transporter, that looks and works just like any other folder on their computer. Within this folder the organizational user: Creates their own folder hierarchy Shares folders Creates links Folder owners can then invite other people to share the folder and its contents. Invited users will then have organizational level privileges (read/write) or guest user privileges (read only) to all files and folders within the shared folder. Therefore, the folder owners themselves undertake responsibility for setting folder security and access privileges. For example, a folder owner may be a department manager who only invites their team to share the folder. Accepting this invitation establishes access and sharing privileges for members of the department. However, no one else in the Organization will have access to the folder. TOKEN USAGE Transporter doesn t use VPNs. Instead the administrator claims a Transporter 5
6 after it s connected to the network and then creates an account using an address and password. This information is then stored in the Central Service database; the password is hashed for security. When using a Transporter application on any supported device, the Central Service will issue a security token, which it validates when a user attempts to sign into their account. These tokens can easily be revoked. As a security precaution, if the user forgets their password and resets it, all authenticated applications will automatically no longer be able access Transporter until the user authenticates again. During the sign-on process the Central Service will validate the token sent from the Transporter application. This is accomplished by checking the token information against the Central Service database record. Once verified as a valid token, the Central Service then contacts all Transporter devices allocated to the account and notifies them of the validated application. Only after the access token is validated will a connection be established to the Transporter and the folders become accessible to the user. However, if the user doesn t have permission or the correct token, the Application will fail to connect. Finally, the validity of each side of the connection is accomplished using the public/private keys discussed earlier in this paper. USER PERMISSIONS Transporter users have the ability to set different permissions (read-only or read/write) on a folder-by-folder basis. This permission capability significantly varies with other traditional cloud providers, for example: Microsoft OneDrive: Does not allow a read-only shared folder to sync with a user s desktop. Shared folder (both read-only and read/write) are only available via Microsoft s website and cannot be accessed from the desktop. Box: Does not allow a read-only shared folder to sync with a user s computer and the folder is only available using their website. Google: Has read-only folder sync with a computer. However, should the user delete a file from that folder, Google announces that the folder is now mismatched and it cannot repair itself Unlike the services discussed above, Transporter does sync read only folders with the user s computer and it will repair a read-only folder should the user make a modification to the data within the folder. If a read-only file is modified, the Transporter software will rename it and mark it as un-syncable (thus, the changes are not lost). The Transporter software will then restore the original file. SHARED FOLDERS In the event a folder owner decides to rescind access to a shared folder, the folder owner simply removes the person from the access list using the Web- 6
7 based management interface. As a result, the files and folders will be removed from the disinvited person s devices within seconds. This capability is often referred to as remote wipe. LINKS Many organizational users prefer to send a link to a user instead of attaching a potentially large file to an and possibly have the server reject it due to its size. While other users are concerned about security. Transporter offers the user a better alternative, a choice between using "direct" and "standard" links. The user can select the type of link from Account Preferences located in the Transporter Management Website. "Direct" links transfer files directly from your Transporter to the recipient; your files are never uploaded to Nexsan s servers. This type of link offers a higher degree of privacy even though the recipient isn t required to create a Transporter account. To ensure security, the recipient must either authorize a web browser plug-in or download a small helper app. "Standard" links upload files to Nexsan s servers and allow recipients to download them without the need of an authorized plug-in or helper app. The recipient simply clicks the link and gets the file. When the file type allows, a preview will be displayed. While this type of link does not offer the same degree of privacy, it is easier to use. This can be especially useful for ing links to clients who don't care to authorize or install anything. Use direct links if you need a higher degree of control. NAS INTEGRATION Over the years, established IT organizations have acquired some of the best NAS solutions available but they are based on older protocols (CIFS/SMB/NFS) and don t offer file sync or mobile support like modern cloud services. Although Transporter can be deployed as a stand-alone private cloud file sharing solution, it can also easily be integrated with an existing on-premise NAS file server. By mapping shares using the Transporter Network Storage Connector feature (standard on all rack mount Transporters), users will have the same level of access and security to designated NAS folders as they would to folders located on a stand-alone Transporter. When paired with a NAS system, Transporter will bi-directionally and transparently sync with its paired NAS partner along with other Transporters that are moving data to where it s required in an enterprise. Any number of Transporters can be deployed and connected to as many NAS systems as required. ACTIVE DIRECTORY SERVICES Unlike traditional NAS systems, Transporter doesn t require a difficult or time consuming set up process. Instead, an administrator will follow the steps 7
8 outlined in the Invitations section above. Dropbox pioneered this popular self-organization approach. Businesses with large numbers of users are most likely using a directory service product like Active Directory (AD) as a user directory and central point for authenticating them via their credentials. AD CONNECTOR Transporter can leverage AD to help an administrator quickly and easily setup a their appliance. To expedite the initial setup process, we created an AD connector. This connector provides Transporter with all the information necessary to identify and prepare the system for the organizations users. As part of the setup process, the AD connector will use the information with AD to send an containing a link to each user the administrator invites to the organization. After sign up, the website walks each user through short setup process where the user sets a few account preferences and downloads the Transporter Desktop Application software for their computer Thus the IT Administrator doesn t need to preload everyone s machine, and users can securely start sharing files with each other very quickly. AD INTEGRATION Transporter uses third-party identity provider (IdP) integration to connect and integrate with AD. Nexsan will have the ability to support several IdPs over time beginning with OneLogin. As part of this deployment a OneLogin account should be created, it will then connect to the directory services of your choice, such as Active Directory, LDAP, and more. Once setup is complete, Active Directory users will be automatically provisioned in the Transporter Organization. From that point on, changes to the AD domain, such as password resets or user de-provisioning will be reflected in real time. AUDIT LOGS Many regulated industries are required to keep track of all users and file access events within their organization. In the event an unauthorized activity happens, regulated companies will need to track when these events took place and identify all users involved. Audit logs break down into two categories: device logs and web logs. Device audit logs keep track of activity between client devices and the Transporter unit itself. These logs are obtained from Transporter Desktop software. Whereas, Web audit logs keep track of activity that occurs between users and the management website (i.e., creating shared folders, changing folder membership, and creating links). Should something unexpected happen; an IT administrator is able to recreate 8
9 the sequence of events and the users involved. This capability addresses many of the concerns a company or organization may have in a regulated industry. It should be noted that once a file is pulled off Transporter to a local device, the audit log will no longer track or report on the file. CONCLUSION Despite all the built-in privacy and security, Transporter is not hard to use. Department managers and individual users are already familiar with services like Box and Dropbox, and have the necessary knowledge to establish a folder hierarchy that best suits their needs. By giving users the same simplified file sharing capabilities as these popular public cloud providers, Transporter eliminates the need for users to break corporate IT policies by moving private company data to personal accounts in the public cloud. Transporter s data security helps safeguard a company s sensitive information from being unintentionally exposed and lost. Additionally, it protects against legal exposure by helping companies conform to corporate governance and government mandated industry regulations. Transporter gives IT Administrators the type of integrated solution and deployment control they want. Its on-premise deployment model along with its peer-to-peer network, security tokens, syncing controls, and remote wipe capabilities make this one of the most secure file sync and share solutions on the market today. 9
WHITE PAPER. Understanding Transporter Concepts
WHITE PAPER Understanding Transporter Concepts Contents Introduction... 3 Definition of Terms... 4 Organization... 4 Administrator... 4 Organization User... 4 Guest User... 4 Folder Hierarchies... 5 Traditional
More informationTransporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst
ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationSECURE YOUR DATA EXCHANGE WITH SAFE-T BOX
SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data
More informationSync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
More informationSecurity Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationDropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
More informationDirectory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
More informationDecember 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure
December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
More informationHow To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
More informationTHE COMPLETE GUIDE TO GOOGLE APPS SECURITY. Building a comprehensive Google Apps security plan
THE COMPLETE GUIDE TO GOOGLE APPS SECURITY Building a comprehensive Google Apps security plan Contents Introduction................................ 3 1. Secure the core.............................4 Google
More informationChoosing a File Sync & Share Solution. PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions
Choosing a File Sync & Share Solution PRESENTATION TITLE GOES HERE Darryl Pace Optimal Computer Solutions Agenda File Sync & Share What and Why File Sync & Share How Selection Criteria Q & A Summary 3
More informationHow To Use Egnyte
INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information
More informationSecurity Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
More informationThe Essential Security Checklist. for Enterprise Endpoint Backup
The Essential Security Checklist for Enterprise Endpoint Backup IT administrators face considerable challenges protecting and securing valuable corporate data for today s mobile workforce, with users accessing
More informationSecret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
More informationEgnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
More informationowncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
More informationConfiguration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
More informationPROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
More informationDirectory Integration with Okta. An Architectural Overview. Okta White paper. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107
Okta White paper Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 info@okta.com 1-888-722-7871 wp-dint-053013 Table of Contents
More informationTHE SECURITY OF HOSTED EXCHANGE FOR SMBs
THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available
More informationActive Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
More informationThe Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
More informationWhite Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
More informationBarracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK
Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc
More informationTroubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
More informationFilesAnywhere Feature List
FilesAnywhere Feature List FilesAnywhere Page 1 of 9 3/31/2014 Contents Basic Features... 3 Advanced Features... 7 Enterprise Features... 9 FilesAnywhere Page 2 of 9 3/31/2014 Basic Features No File Size
More informationComparing Alternatives for Business-Grade File Sharing. intermedia.net 1.800.379.7729. sales@intermedia.net CALL US EMAIL US ON THE WEB
for -Grade CALL US EMAIL US ON THE WEB 1.800.379.7729 sales@intermedia.net intermedia.net for -Grade Goal of this report This report compares and contrasts various alternatives for file sharing in a business
More informationSecuring access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
More informationXerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
More informationvcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
More informationDeployment Guide: Unidesk and Hyper- V
TECHNICAL WHITE PAPER Deployment Guide: Unidesk and Hyper- V This document provides a high level overview of Unidesk 3.x and Remote Desktop Services. It covers how Unidesk works, an architectural overview
More informationBarracuda SSL VPN Administrator s Guide
Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,
More informationGoldKey Software. User s Manual. Revision 7.12. WideBand Corporation www.goldkey.com. Copyright 2007-2014 WideBand Corporation. All Rights Reserved.
GoldKey Software User s Manual Revision 7.12 WideBand Corporation www.goldkey.com 1 Table of Contents GoldKey Installation and Quick Start... 5 Initial Personalization... 5 Creating a Primary Secure Drive...
More informationHow To Use Quantum Rbs Inc. Small Business Backup
Small Business Backup & Recovery (File Servers, Peer-to-Peer, Laptops, Desktops) Smart Features: Continuous Backup Anywhere Access to Backed Up Data Simple Rate Plan Secure Bank Grade Encryption Open Files
More informationTresorit s DRM. A New Level of Security for Document Collaboration and Sharing
Tresorit s DRM A New Level of Security for Document Collaboration and Sharing Cloud-based storage has made it easier for business users to share documents, but it has also opened up new vulnerabilities.
More informationnwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
More informationIntroduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
More informationFlexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
More informationSMART Vantage. Installation guide
SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the
More informationGFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
More informationCopyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationFirewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
More informationOutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationXerox Mobile Print Cloud
September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United
More informationOverview - Using ADAMS With a Firewall
Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationAnchor End-User Guide
Table of Contents How to Access Your Account How to Upload Files How to Download the Desktop Sync Folder Sync Folder How to Share a File 3 rd Party Share from Web UI 3 rd Party Share from Sync Folder Team-Share
More informationLeonardo Hotels Group Page 1
Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes
More informationowncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
More informationWeb Security School Entrance Exam
Web Security School Entrance Exam By Michael Cobb 1) What is SSL used for? a. Encrypt data as it travels over a network b. Encrypt files located on a Web server c. Encrypt passwords for storage in a database
More informationMoving to the Cloud: What Every CIO Should Know
Moving to the Cloud: What Every CIO Should Know CONTACT SALES US: 1.877.734.6983 UK: +44 (0)845.528.0588 www.egnyte.com WHITEPAPER Overview Enterprise data storage needs are growing exponentially, doubling
More informationThe increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
More informationOverview - Using ADAMS With a Firewall
Page 1 of 9 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular
More informationAlex Wong Senior Manager - Product Management Bruce Ong Director - Product Management
Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release
More informationSRG Security Services Technology Report Cloud Computing and Drop Box April 2013
SRG Security Services Technology Report Cloud Computing and Drop Box April 2013 1 Cloud Computing In the Industry Introduction to Cloud Computing The term cloud computing is simply the use of computing
More informationUsing Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
More informationConfiguring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationMedia Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
More informationDiamondStream Data Security Policy Summary
DiamondStream Data Security Policy Summary Overview This document describes DiamondStream s standard security policy for accessing and interacting with proprietary and third-party client data. This covers
More informationSOOKASA WHITEPAPER SECURITY SOOKASA.COM
SOOKASA WHITEPAPER SECURITY SOOKASA.COM Sookasa Overview Sookasa was founded in 2012 by a team of leading security experts. The company s patented file-level encryption enables enterprises to protect data
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationIntroduction to the AirWatch Cloud Connector (ACC) Guide
Introduction to the AirWatch Cloud Connector (ACC) Guide The AirWatch Cloud Connector (ACC) provides organizations the ability to integrate AirWatch with their back-end enterprise systems. This document
More informationUIT USpace Flexible and Secure File Manager for Cloud Storage
UIT USpace Flexible and Secure File Manager for Cloud Storage USpace File Manager for Cloud Storage Main features: USpace is a cloud storage solution which is very suitable for both private cloud deployment
More informationFeature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationIntroduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
More informationTop 7 Tips for Better Business Continuity
Top 7 Tips for Better Business Continuity With Hosted Fax www.biscom.com sales@biscom.com (+1) 800-477-2472 or (+1) 978-250-1800 Introduction Biscom s Secure File Transfer (Biscom SFT) solution enables
More informationSecurity Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
More informationManual for Android 1.5
Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor
More informationSecurity from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
More informationChapter 10. Cloud Security Mechanisms
Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based
More informationMobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED. Copyright 2014 Intuition
Mobile Mobile Security COPYRIGHT 2014 INTUITION ALL RIGHTS RESERVED 1 Background Traditionally, security has not been a high priority for e-learning; as such content was hosted and only accessible at the
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationCOLLEAGUES. CLIENTS. CONNECTED. CLOUD.
COLLEAGUES. CLIENTS. CONNECTED. CLOUD. THOMSON REUTERS Simplifying your life with powerful, integrated and innovative solutions. The Tax & Accounting business of Thomson Reuters provides the profession
More informationWhen enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationCloud Attached Storage 5.0
Release Notes Cloud Attached Storage 5.0 March 2015 2015 Cloud Attached Storage 5.0 Release Notes 1 1 Release Contents Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document
More informationComparing Box and Egnyte. White Paper
White Paper Revised July, 2013 Introduction File storage in the cloud has broad appeal for individuals as well as large businesses. At a macro level, there are two types of file storage/sharing solutions:
More informationSophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
More informationCBIO Security White Paper
One Canon Plaza Lake Success, NY 11042 www.ciis.canon.com CBIO Security White Paper Introduction to Canon Business Imaging Online Canon Business Imaging Online ( CBIO ) is a cloud platform for Canon s
More informationMonitoring Hybrid Cloud Applications in VMware vcloud Air
Monitoring Hybrid Cloud Applications in ware vcloud Air ware vcenter Hyperic and ware vcenter Operations Manager Installation and Administration Guide for Hybrid Cloud Monitoring TECHNICAL WHITE PAPER
More informationMANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
More informationSeCUritY. Safeguarding information Within Documents and Devices. imagerunner ADVANCE Solutions. ADVANCE to Canon MFP security solutions.
imagerunner ADVANCE Solutions SeCUritY Safeguarding information Within Documents and Devices ADVANCE to Canon MFP security solutions. Whether your business relies on paper documents, electronic documents,
More informationXerox Mobile Print Cloud
Xerox Mobile Print Cloud Information Assurance Disclosure Software Version 3.0 May 2015 702P03595 2013-2015 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
More informationProblem. Solution. Quatrix is professional, secure and easy to use file sharing.
Quatrix Data Sheet Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring your own file transfer) opens up vulnerabilities
More informationSaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology
SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning
More informationSafeguard Protected Health Information With Citrix ShareFile
Safeguard Protected Health Information With Citrix ShareFile This enterprise file sync and sharing solution supports HIPAA compliance, boosts security and mobilizes data access Citrix ShareFile helps healthcare
More informationLast Updated: July 2011. STATISTICA Enterprise Server Security
Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...
More informationIntroduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
More informationMANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
More informationSECURING SAP NETWEAVER DEPLOYMENTS WITH SAFE-T RSACCESS
SECURING NETWEAVER DEPLOYMENTS A RSACCESS WHITE PAPER SECURING NETWEAVER DEPLOYMENTS 1 Introduction 2 NetWeaver Deployments 3 Safe-T RSAccess Overview 4 Securing NetWeaver Deployments with Safe-T RSAccess
More informationAn Enterprise Approach to Mobile File Access and Sharing
White Paper File and Networking Services An Enterprise Approach to Mobile File Access and Sharing Table of Contents page Anywhere, Any Device File Access with IT in Control...2 Novell Filr Competitive
More informationPrivileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery
Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account
More informationOverview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
More informationHow Managed File Transfer Addresses HIPAA Requirements for ephi
How Managed File Transfer Addresses HIPAA Requirements for ephi 1 A White Paper by Linoma Software INTRODUCTION As the healthcare industry transitions from primarily using paper documents and patient charts
More information