WHITE PAPER: ENTERPRISE SECURITY. Secure Remote Control for IT Support Organizations
|
|
|
- Dinah Henderson
- 10 years ago
- Views:
Transcription
1 WHITE PAPER: ENTERPRISE SECURITY Secure Remote Control for IT Support Organizations
2
3 White Paper: Enterprise Security Secure Remote Control for IT Support Organizations Contents Executive summary Security concerns limit acceptance of remote control software Remote control software as a help desk tool Financial benefits of remote control software Security concerns with remote control software Security requirements of remote control software Authentication Authorization and access control Perimeter and data transfer security Administration Symantec pcanywhere 12.0 provides secure remote control A wide range of existing security features prevent unauthorized connections Encryption tools protect data transmission New security features Centralized administration tools identify security risks Reduced open firewall ports Expanded cross-platform support Conclusion
4 Executive summary Information technology (IT) professionals today are expected to support a growing number of users, many working remotely, who are using increasingly complex hardware and software systems. At the same time, IT budgets are being curtailed. Support organizations need a way of effectively handling the increased workload. Remote control software, which allows a help desk technician to assume control of a user s PC or an unattended server over a network, has proven to be a cost-effective way of providing remote support. With remote control software, call time is reduced and first-call resolution is improved, allowing the help desk to handle more calls with the same number of, or even fewer, help desk technicians. Upgrades, conversions, and installations can be handled uniformly throughout the organization. And timely, accurate problem resolution results in greater customer satisfaction with the support process. While the benefits are significant, some organizations have expressed concern that remote control software could expose data on individual PCs or the corporate network to unauthorized use. Addressing security requirements in the areas of authentication, authorization and access control, perimeter and data transfer security, and administration could allay these concerns. This paper examines how remote control products provide a cost-effective help desk tool and defines necessary security requirements for these products. The paper then outlines the features of Symantec pcanywhere 12.0, Symantec s remote control solution. Symantec pcanywhere 12.0 is the world s leading remote control solution with powerful file transfer and remote management capabilities that allow IT staff to remotely manage Windows as well as Linux and Mac systems. Both platforms can also be managed from a Java -enabled Web browser. pcanywhere Mobile also enables access to a pcanywhere host from a Microsoft Pocket PC over any TCP/IP connection, wired or wireless. The bandwidth auto-detect feature automatically helps to optimize the performance of pcanywhere over all types of connections. Microsoft Windows Preinstallation Environment is also supported. 4
5 Security concerns limit acceptance of remote control software IT professionals today are faced with the challenge of supporting more users, while reducing support costs. The increasing complexity of PC software, hardware, and networks, as well as the growing number of users accessing the network from remote locations, complicates these requirements. Value-Added Resellers (VARs) also need a way of delivering support services to their customers, while reducing travel expenses. As a solution to these needs, remote control software has evolved from a remote access product into a cost-effective support tool that simplifies troubleshooting and problem resolution. Examining this solution, this section addresses the following: Remote control software as a help desk tool The financial benefits of remote control software Security concerns with remote control software Remote control software as a help desk tool Help desk technicians typically attempt to troubleshoot and resolve support problems over the telephone. Because directions must be given and received verbally, this can be a time-consuming and frustrating experience for both users and technicians. Users eagerly seek resolution of the problem and consider any time they spend on the phone troubleshooting as time away from important tasks. Help desk technicians may not clearly understand problems as described by nontechnical users. Complicating the process, with the flexibility of today s desktop software, users configure their screens to match their personal work style. Hence, technicians and users may not be viewing the same screens while discussing the problem. Often a single problem requires multiple calls or, when a problem cannot be resolved over the phone, a technician may be dispatched to the user s site a time-consuming and expensive solution even when the user is down the hall. Remote control software removes the user from the support transaction by enabling the technician to assume control of a user s PC over the network. The technician works with the PC as if it was local and sees directly what is happening on the user s computer screen. The corresponding boost in support productivity means that each help desk technician can handle a higher volume of calls. Staffing requirements may be reduced, and user satisfaction with the help desk function increases. Remote control software also facilitates remote training, in which users learn by example. 5
6 Like the internal help desks, VARs and other organizations that provide customer support benefit from remote control software. For example, a VAR may include a copy of Symantec pcanywhere along with each copy of its accounting solution. When a customer reports a problem, the VAR can provide quality telephone support without the need to dispatch a service representative to the customer s site. This speeds problem resolution and improves the customer satisfaction with the support process. It also reduces travel expenses and allows VARs to concentrate on their core business. At larger VARs, the sales organization can spend more time selling, and the technical organization can spend more time developing and enhancing products. At smaller VARs, where the sales organization and technical organization may be a single person, a shorter support call directly increases the time that the VAR can spend developing new business. Remote control software is also used to diagnose and solve problems on servers. For example, banks and other financial institutions need 24-hour access to their databases to rapidly resolve problems that may arise. In addition to problem troubleshooting and resolution, remote control software allows help desk organizations and VARs to efficiently install, configure, and upgrade software for local and remote PCs, as well as servers. This facilitates creation and maintenance of a standard computing environment, which in turn is easier to support. The Help Desk Institute identified upgrades, conversions, and installations as one of the top three reasons for increased help desk calls and call length. 1 The other two reasons are additional customers and newer, more complex technologies. Due to the scalability of remote control software, this support solution is appropriate for any size corporation, as well as VARs with local, regional, or national distribution. In each case, the organization benefits from avoiding the hiring of dedicated support personnel at a remote location, or by not incurring the travel expense of dispatching a support technician to the remote site. Financial benefits of remote control software According to International Data Corporation (IDC), the worldwide market for remote control/remote access software will grow from $284.2 million in 2004 to $312 million in Enhanced security features and support for more platforms such as mobile devices, Mac OS X, and Linux will help sustain this large market. 2 The benefits of remote control software can be significant, lowering annual help desk costs by 6 to 13 percent. Cost savings result from reducing the size of help desk support staff, solving problems more rapidly and with fewer repeat calls. For example, Forrester Research, Inc., found that an organization with 20,000 end users and a $2.9 million help desk budget could save approximately $338,000 through the use of desktop remote control software. 3 Savings are based 1 Doherty, Sean, Helpdesk Salvation, Network Computing, April 2, Drake, Stephen D, Worldwide Remote Control Software , Forecast and 2004 Vendor Shares, IDC Report #33763, August High-impact measures for improving help desk efficiency, eweek, February 17,
7 on improving first-call resolution by 7 percent and cutting five help desk technicians. The scenario assumes an annual salary of $59,000 per call-taker, $81,000 per desk-side technician, and $68,000 per network administrator. Security concerns with remote control software Although remote control software provides a powerful tool for help desk support, it also raises security issues. Without proper security features, remote access software could expose data on individual PCs and the corporate network to unauthorized use, potentially disclosing trade secrets, confidential personnel records, and financial information. As the number of remote users grows, maintaining security becomes even more of a challenge. More and more employees are now working from home on a regular basis, in addition to branch office workers and traveling employees who also require remote help desk support. 4 Security requirements of remote control software To maintain the security of an organization s data and network resources, remote control software should support the existing network security infrastructure, including both networkand desktop-based security. Integrating with the security system already in place leverages the company s investment, reduces the cost of managing security for remote control sessions, and simplifies management. Most importantly, such integration enables enterprises to confidently deploy and realize the benefits of remote control software without concerns of adverse security impacts. Remote control software should support security requirements in the following areas: Authentication Authorization and access control Perimeter and data transfer security Administration Authentication Although no authentication technique is foolproof, requiring the use of passwords or other forms of authentication before a remote session commences discourages unauthorized access. In addition, such authentication approaches prevent users from inadvertently launching an unprotected host session. In evaluating a remote control product, it is important to establish that the product supports authentication methods that the organization is already using. Support of multiple, standard authentication methods allows the IT staff to leverage existing user name/password lists. 4 Wilde, Candee, Telework Programs Speed Up: High-speed access technologies like cable modems and DSL give telecommuting a lift, Internet Week, April 17,
8 Authorization and access control With remote control software, authorization or access control involves remote access by a user to a PC, remote access of a shared directory, or help desk technician access to the PCs of all supported users. Remote control software should be able to limit access to computers within a specific subnet or to specific TCP/IP addresses. Another effective way to block unauthorized access is by embedding a serialization code into the host and remote portions of the remote control product. For example, a Symantec pcanywhere host that has been serialized will only accept connections from a remote computer with the same serialization number. If the serialization number does not exist, the connection cannot be established. A company can utilize the same serialization code throughout their organization to effectively prevent someone from connecting with a standard retail version of the remote control software. In support situations, the host user should be able to confirm or deny access. When using a modem connection, callback capabilities, in which the host disconnects the call and then calls the remote back on a pre-entered phone number, help to prevent unauthorized access. In addition to protecting workstations and servers from remote access, the system should include desktop security features such as monitor and keyboard locking that protect an unattended host or server during remote control sessions. Disabling the host screen ensures privacy during remote control sessions in which a user is not present. The help desk technician uses the remote to connect to a host on the end user s computer. This allows the technician to assume control of the host computer and solve the problem. pcanywhere Remote Data Encryption pcanywhere encoding option Symmetric or asymmetric (public key) RC4 or AES algorithms (up to 256-bit) FIPS validated AES encryption module Default login encryption pcanywhere Host Integrity checking 13 authentication methods Serialization Specified IP address range Host address blocking Time-of-day restrictions View-only option Figure 1. Symantec pcanywhere offers extensive security options and features. Multiple encryption options facilitate protection of the data stream between host and remote. Target elimination of unauthorized connections using serialzation, IP screening and 13 different authentication methods. Integrity checking can also be used to prevent tampering with the pcanywhere host. 8
9 Perimeter and data transfer security Remote control software should support virtual private network (VPN) technology to permit secure Internet connections through a firewall, as well as over a corporate intranet. This allows organizations to provide remote access without jeopardizing security. The VPN client should operate transparently, prompting for authentication credentials whenever the user attempts to penetrate a firewall. The system should be able to disallow telephone connections and require that remote control sessions occur only through a direct network connection. Securing the data stream in transit during remote control sessions is as important as preventing unauthorized access. The data control software should support encryption services such as the Microsoft Crypto API (application program interface) and public key encryption to prevent eavesdroppers or hackers from intercepting and/or altering data during transmission. Administration If the remote control software integrates with existing authentication systems, the administrator maximizes efficiency and reduces costs by avoiding creation and management of a separate database of user IDs and passwords. For example, if an employee leaves the company, the administrator can delete that person s user ID from the central user database, preventing that user from accessing network resources. Integration of the remote control software with enterprise network management solutions such as Microsoft Systems Management Server, Tivoli NetView, and C A is often desirable. Integrated messaging allows the administrator to manage the remote support solution from the same console used for managing other network resources and provides rapid notification of potential security breaches. Since thorough alerting, logging, and reporting are essential to a secure environment, the remote control software should generate an audit log of all remote control transactions, including disallowed attempts at connection. This enables the administrator to monitor activity and detect unauthorized attempts to access systems. To prevent hackers from altering the log to hide their activities, it is recommended that the log be secured. In addition, generating an SNMP alert whenever a number of unsuccessful attempts to connect to a host PC are detected permits real-time monitoring of suspicious activity from a network management console. Enabling the IT administrator to lock in the security settings of the client remote control software ensures consistency and protects users from inadvertently exposing their systems to unauthorized access. This type of feature also prevents unauthorized users from reconfiguring the software for their own purposes. Remote control software with integrity checking features identifies 9
10 changes that have been made to the binary files since the original installation. If changes are detected, indicating potential rogue installations, the product will not function. Once the binary files have been tampered with, pcanywhere must be reinstalled to resume full function. Symantec pcanywhere offers multiple layers of configurable world-class security options and product features. To protect the data stream between the host and remote, pcanywhere supports symmetric and asymmetric encryption using the RC4 and AES encryption algorithms. In addition, pcanywhere encoding is offered for lower bandwidth connections. Unauthorized connections are eliminated with serialization, IP screening, and 13 different authentication methods. Integrity checking can also be used to prevent tampering with the pcanywhere host. Symantec pcanywhere 12.0 provides secure remote control Technicians can use Symantec pcanywhere to securely diagnose and solve problems on remote servers, desktop computers, and mobile laptop computers all without leaving the help desk. The latest version, Symantec pcanywhere 12.0, includes significant security features in the following areas: Mandatory authentication through 13 supported methods Support for Windows policy Robust security features that prevent unauthorized connections Encryption up to AES 256-bit that protects data transmission FIPS Level 1 validation for the Symantec Cryptographic Module Centralized administration tools to identify security risks and improve efficiency Access restriction by date and time of day Keyboard and mouse control restrictions 10
11 A wide range of existing security features prevent unauthorized connections Symantec pcanywhere requires an authentication method and mandatory password for all host sessions. This prevents users from inadvertently launching an unprotected host session. Symantec pcanywhere 12.0 supports the following 13 authentication methods for Microsoft, Novell, and Web-based environments: RSA SecurID pcanywhere Authentication Windows Authentication NT Domain Active Directory Service (ADS) Novell Directory Services (NDS) Novell Bindery Services Microsoft Lightweight Directory Access Protocol (LDAP) Novell LDAP Netscape LDAP FTP HTTP HTTPS RSA SecurID support provides a two-factor authentication process. This model presents the legitimate user with a security code that changes every 60 seconds. This code is displayed on a key fob/token that the user carries. This code must be combined with a user-remembered PIN to complete the authentication. The RSA SecurID solution may be of particular interest to the federal government and financial industry. For Windows policy support, by leveraging Windows policy management, administrators can control which pcanywhere components the end user can modify and access. By limiting the capabilities that end users have, administrators are better equipped to enforce their organization s security policies. One of the best ways to ensure security when remote control software is installed is to restrict connections from outside the organization. Symantec pcanywhere provides multiple ways to accomplish this objective: (1) limitation of connections to a specific TCP/IP address range and (2) serialization. 11
12 TCP/IP address range: Symantec pcanywhere hosts can be configured to accept only TCP/IP connections that are within a specified subnet or limited to specific TCP/IP addresses, enabling restriction of connections to employees. Serialization: IT professionals can embed a security code into the Symantec pcanywhere host and remote object executables. This security code must be present on both ends before a connection can be established. By limiting connections to their serialized copies of Symantec pcanywhere, the organization effectively prevents outside access through use of an unauthorized copy of Symantec pcanywhere. In addition, a number of existing security features in Symantec pcanywhere 12.0 prevent unauthorized users from connecting to or abusing connections to the host. Callback security for dial-up connections: In a typical Symantec pcanywhere session, the remote PC connects to the host, and the session begins. When callback is enabled, the remote PC calls the host, but the host drops the connection before returning the call at a specified phone number. Prompt to confirm connection: This security feature prompts the host to permit or reject the connection with the remote caller. When this feature is enabled, users are aware whenever a remote connection is being established. Login restrictions: Symantec pcanywhere allows host users to limit the number of times a remote user can attempt to log in during a single session. In addition, hosts can limit the amount of time permitted for a remote user to complete a login. Restrict connections after abnormal end of session: Host users can prevent remote users from reconnecting to the host if the session is interrupted abnormally. Host Address Blocking makes it possible (via user option) to block a certain incoming IP address for a certain length of time after a predetermined number of failed connection attempts. Users are offered a configurable number of attempts and user-configurable time period for the address to be blocked. This is enabled by default. When the Secure Workstation feature is enabled, the host machine will automatically lock (or log off) upon connection, regardless of the user's credentials. If this feature is not enabled, if the logged-in user has a higher level of privileges than the connecting user (e.g., Admin vs. Guest), the host will deny the connection. 12
13 Encryption tools protect data transmission Symantec pcanywhere 12.0 protects the data stream between the host and remote through its support of symmetric and asymmetric encryption using RC4 (up to 128-bit cipher strength) and AES encryption (with all available cipher strengths: 128-bit, 192-bit, and 256-bit). In addition, pcanywhere encoding is offered for lower bandwidth connections. The software s encryption wizard helps users set up public key encryption. Default Login Encryption allows encryption of login information (handshake) by default. The RC4 algorithm is used for this encryption, to ensure backwards compatibility with legacy pcanywhere hosts. AES (or Rijndael), introduced as a National Institute of Standards and Technology (NIST) standard in November 2001, is one of only four symmetric key encryption algorithms approved against the NIST FIPS standard. 5 It is intended to serve as a more secure and more current alternative than its preceding DES and 3DES algorithm standards. AES is exponentially stronger than DES and 3DES, and is generally considered to be faster and less resource-intensive as well. AES has been set as the standard across all pcanywhere 12.0 product components, and provides data encryption at the 128-bit, 192-bit, or 256-bit cipher strengths. The Symantec Cryptographic Module is used in Symantec pcanywhere 12.0 to provide the AES cryptography with its communications encryption. The Symantec Cryptographic Module has received Federal Information Processing Standard (FIPS) 140-2, Level 1 validation from the National Institute of Standards and Technology (NIST). FIPS validation allows products that include the Symantec Cryptographic Module to be deployed by federal agencies, including contracted service providers, and other organizations that require stringent security standards to protect sensitive information. FIPS is also required by federal agencies in Canada, is recognized in Europe and Australia, and is being adopted by many financial institutions worldwide. New security features In order to further safeguard connections to a Symantec pcanywhere host, version 12.0 has added the following new security features: Access restrictions by date and time of day Keyboard and mouse control restrictions 5 National Institute of Standards & Technology, Annex A: Approved Security Functions for FIPS PUB 140-2, Security Requirements for Cryptographic Modules, September
14 Access restrictions by date and time of day let administrators block a user or group of users from connecting to a host computer on certain days or times. This lets administrators control the amount of time that a host computer is available for connections. For example, administrators can block remote users from connecting to a host at certain times after hours in accordance with a corporate security policy. Keyboard and mouse control restrictions let administrators restrict the control of the keyboard and mouse for a specific user or group of users. It provides the option to restrict use of the keyboard and mouse to the host or to restrict usage at the remote computer. The setting can apply to all host sessions for specific callers or can be limited to a specific session. Centralized administration tools identify security risks Symantec pcanywhere 12.0 features several tools that help administrators identify potential security risks. Host Assessment Tool: This enables administrators to visually diagnose the configuration of computer systems and to assess the level of security for each Symantec pcanywhere host s connection. The tool also provides guidance on how to improve security weaknesses. Integrity checking: Integrity checking is a feature in Symantec pcanywhere 12.0 that, when enabled, ensures that Symantec pcanywhere installations remain unchanged. This feature verifies that the host and remote objects, DLL files, executables, and registry settings have not been modified since the original installation. If changes are detected to these files, Symantec pcanywhere will not launch and must be reinstalled to resume full function. For security and auditing purposes, Symantec pcanywhere 12.0 includes support for both local and centralized logging of all files and applications that are accessed on the host during a remote control session. Symantec pcanywhere also logs all remote control activity such as login attempts, file transfers, and session start/end times. Events can be logged to the Symantec pcanywhere log, an NT Event Log, or an SNMP monitor. Screen blanking and keyboard locking: Remote administrators have the option to blank the host screen during a session, as well as lock out the host keyboard and mouse, so that sensitive information is not inadvertently displayed or made accessible to unauthorized persons. 14
15 Reduced open firewall ports New features and add-on products to Symantec pcanywhere 12.0 strengthen an organization s security efforts by reducing the number of firewall ports that an organization must open to establish connections between remote machines and managed hosts. The new features and products include the following: Symantec pcanywhere Access Server Symantec pcanywhere Gateway in Symantec pcanywhere 12.0 Host Invitation feature in Symantec pcanywhere 12.0 Organizations leverage firewalls, DHCP routers, and NAT devices to secure the perimeters of their network infrastructure. However, these security measures can make it difficult for authorized users on remote machines to discover and connect to the hosts that they need to manage. Firewalls can block both discovery and connection attempts by remote machines to managed hosts. NAT devices hide the managed host s IP address, making discovery difficult. Symantec pcanywhere 12.0 can take advantage of Symantec pcanywhere Access Server to resolve discovery and connectivity problems associated with establishing remote control sessions with managed hosts in a manner that lets the user minimize the number of open ports on the firewall and NAT devices. Symantec pcanywhere Access Server overcomes connectivity problems by establishing a reverse connection with managed hosts. Instead of the remote machine attempting to discover the host machine, the host machine is configured with information on how to discover the Symantec pcanywhere Access Server. When the host machine finds the access server, it registers itself with the access server, enabling the access server to mediate a connection between a remote computer and a managed host without the need to open additional ports in the firewall or NAT devices of the network where the host machines reside. To connect to the access server, remote users must supply proper authentication credentials. Additionally, remote users must also provide the hostspecific authentication credentials needed to connect to the host machine. When the Symantec pcanywhere Gateway service is used, it can automatically discover all the host machines running on its local subnet. It can also be configured to identify host machines running on other specified subnets. By using the Symantec pcanywhere Gateway, all connection traffic flowing toward host machines is routed first through the gateway, minimizing the number of ports that need to be opened in an organization s firewall and NAT devices. Access to the gateway is password-protected. Additionally, to further increase security, the gateway computer can be configured so that it is hidden from network search results. 15
16 The Host Invitation feature in Symantec pcanywhere 12.0 also facilitates an organization s ability to establish remote sessions securely. As with the Symantec pcanywhere Access Server, host invitations rely on a reverse connection initiated by a host machine. To implement a host invitation, the user at the remote machine would use the Symantec pcanywhere Manager to create a host invitation that contains the remote s connection settings. The remote user could send the host invitation to the host user via or on a physical medium. The host user would then use that host invitation to initiate the remote session with the remote user. When the remote user accepts the invitation and supplies the proper authentication credentials, the connection can be established, all without the need to open additional ports in the firewall or NAT devices of the network where the host machine resides. Expanded cross-platform support The cross-platform capability in Symantec pcanywhere 12.0 has been expanded to support Mac OS X. With this addition, remote sessions can now be initiated on computers running Windows, Windows Mobile, Linux, and Mac OS. Systems running Windows, Windows Embedded, Linux, or Mac OS can be managed hosts. This cross-platform capability gives administrators the flexibility to remotely control and manage different types of host computers from the remote machines of their choice. Conclusion Remote control software provides internal help desks and VAR support organizations with a cost-effective support tool. By gaining direct access to a user s PC, desktop technicians and other support personnel can quickly diagnose and resolve problems and upgrade remote desktops without leaving their desks. Despite the benefits in terms of increased productivity and reduced support costs for overworked IT departments, some organizations have been reluctant to install remote control products because of the potential security risks. Symantec pcanywhere 12.0 focuses on these security issues and includes new features that help prevent unauthorized access and protect file transfers. With Symantec pcanywhere 12.0, IT organizations can confidently realize the promise of remote control software today. 16
17
18 About Symantec Symantec is the world leader in providing solutions to help individuals and enterprises assure the security, availability, and integrity of their information. Headquartered in Cupertino, Calif., Symantec has operations in more than 40 countries. More information is available at For specific country offices and contact numbers, please visit our Web site. For product information in the U.S., call toll-free 1 (800) Symantec Corporation World Headquarters Stevens Creek Boulevard Cupertino, CA USA +1 (408) (800) Copyright 2006 Symantec Corporation. All rights reserved. Symantec, the Symantec logo, and pcanywhere are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Microsoft, Windows, and Windows Mobile are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Java is a trademark or registered trademark of Sun Microsystems, Inc., in the U.S. or other countries. Other names may be trademarks of their respective owners. 05/
Remote Administration
Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over
Symantec pcanywhere Administrator s Guide
Symantec pcanywhere Administrator s Guide Symantec pcanywhere Administrator s Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
How Reflection Software Facilitates PCI DSS Compliance
Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit
Internet-based remote support for help desks
Internet-based remote support for help desks White Paper Published: October 2005 Contents Introduction...1 Advantages of Internet-based Remote Support...1 Reduced Support Costs through Increased Productivity...2
Endpoint Virtualization for Healthcare Providers
WHITE PAPER: xxxxxx BEST PRACTICES [00-Cover_Bar] FOR HEALTHCARE Endpoint Virtualization for Healthcare Providers Confidence in a connected world. White Paper: Best Practices for Healthcare Endpoint Virtualization
NetSupport Manager v11
Remote Support For Any Environment NetSupport Manager v11 NetSupport Manager has been helping organizations optimize the delivery of their IT support services since 1989 and while the use of Remote Control
Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology
The #1 Remote Control and File Transfer Software Contents 1 Introduction 1 Application Level Security 2 Network Level Security 2 Usage Examples 4 Summary 4 Appendix A Setting Up a Firewall for Timbuktu
White Paper. Enhancing Website Security with Algorithm Agility
ENHANCING WEBSITE SECURITY WITH ALGORITHM AGILITY White Paper Enhancing Website Security with Algorithm Agility Enhancing Website Security with Algorithm Agility Contents Introduction 3 Encryption Today
Ti m b u k t up ro. Timbuktu Pro and Microsoft System Management Server Integration White Paper. Contents
The #1 Remote Control and File Transfer Software Contents 1 Integration Summary 1 An Introduction to Timbuktu Pro 2 Integration Details 2 SMS Application Distribution Packs for Timbuktu Pro 3 SMS Console
technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
WebEx Remote Access White Paper. The CBORD Group, Inc.
WebEx Remote Access White Paper The CBORD Group, Inc. Document Revision: 1 Last revised: October 30, 2007 Changes are periodically made to the information contained in this document. While every effort
TFS ApplicationControl White Paper
White Paper Transparent, Encrypted Access to Networked Applications TFS Technology www.tfstech.com Table of Contents Overview 3 User Friendliness Saves Time 3 Enhanced Security Saves Worry 3 Software Componenets
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
Citrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
Security. Technical article
Technical article Complete, scalable, and secure remote control software for IT professionals Security Remote control in the IT industry is the process of being able to see the screen of a remote computer
Data Sheet: Archiving Altiris Client Management Suite 7.0 from Symantec Deploy, manage, secure, and troubleshoot
Deploy, manage, secure, and troubleshoot Overview The cost of a PC is only a small part of its total cost. Nearly 80 percent of the total cost of owning a client system goes toward the support and maintenance
GoToMyPC. Remote Access Technologies: A Comparison of GoToMyPC and Microsoft Windows XP Remote Desktop
Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Remote Access Technologies: A Comparison of and Microsoft Windows XP Remote Desktop Contents: Executive Summary... 1
SSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: [email protected] www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
SECURELINK.COM REMOTE SUPPORT NETWORK
REMOTE SUPPORT NETWORK I. INTRODUCTION EXECUTIVE SUMMARY MANAGING REMOTE SUPPORT IN A SECURE ENVIRONMENT Enterprise software vendors strive to maximize support efficiency log on to the customer system,
GoToMyPC and. pcanywhere. expertcity.com. Remote-Access Technologies: A Comparison of
Remote-Access Technologies: A Comparison of GoToMyPC and pcanywhere expertcity.com 1 Table of Contents 1. Executive Summary Remote Control Solutions Revolutionary Solution: Expertcity's GoToMyPC 2. Comparison
Using a VPN with Niagara Systems. v0.3 6, July 2013
v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
PC Business Banking. Technical Requirements
PC Business Banking Technical Requirements For PC Business Banking Version 7.0 March 2007 Application Overview PC Business Banking (PCBB) is Bank of New Zealand s banking platform for large business/corporate
WHITE PAPER. GoToMyPC. Citrix GoToMyPC Corporate Security FAQs. Common security questions about Citrix GoToMyPC Corporate. www.gotomypc.
Citrix Corporate Security FAQs Common security questions about Citrix Corporate www.gotomypc.com Q: What are the Corporate software components that I need to install on the host and client computers? A:
Unicenter Remote Control r11
Data Sheet Unicenter Remote Control r11 Unicenter Remote Control TM is a highly reliable and secure application for controlling and supporting remote Windows and Linux systems. It delivers all of the features
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Compliance and Security Challenges with Remote Administration
Sponsored by Netop Compliance and Security Challenges with Remote Administration A SANS Whitepaper January 2011 Written by Dave Shackleford Compliance Control Points Encryption Access Roles and Privileges
Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition
Remote Access Technologies: A Comparison of Expertcity GoToMyPC and GraphOn GO-Global XP Enterprise Edition Contents: Executive Summary...1 Remote Access Overview...2 Intended Application... 2 Revolutionary
WHITE PAPER: TECHNICAL OVERVIEW. NetBackup Desktop Laptop Option Technical Product Overview
WHITE PAPER: TECHNICAL OVERVIEW NetBackup Desktop Laptop Option Technical Product Overview Mayur Dewaikar, Sr. Technical Product Manager NetBackup Platform Symantec Technical Network White Paper EXECUTIVE
Security White Paper The Goverlan Solution
Security White Paper The Goverlan Solution The Goverlan Administration Suite (which includes the following modules: Administration & Diagnostics, Remote Control, Scope Actions, and WMIX) is a powerful
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Secure, Remote Access for IT Infrastructure Management
Infrastructure Management & Monitoring for Business-Critical Continuity TM Secure, Remote Access for IT Infrastructure Management ACS Advanced Console Server Secure, Remote Access for IT Infrastructure
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Extranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
LogMeIn HIPAA Considerations
LogMeIn HIPAA Considerations Contents Introduction LogMeIn HIPAA Considerations...3 General HIPAA Information...4 Section A Background information on HIPAA Rules...4 Technical Safeguards Overview...5 Section
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
Data Sheet: Endpoint Management Altiris Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot
Deploy, manage, secure, and troubleshoot Overview The cost of a PC is only a small part of its total cost. Nearly 80 percent of the total cost of owning a client system goes toward the support and maintenance
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
Getting a Secure Intranet
61-04-69 Getting a Secure Intranet Stewart S. Miller The Internet and World Wide Web are storehouses of information for many new and legitimate purposes. Unfortunately, they also appeal to people who like
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
SonicWALL SSL VPN 3.5: Virtual Assist
SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following
RemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software
FAST, RELIABLE, & JUST WORKS! White Paper Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software Proxy Networks, Inc. 877-PROXY-US or 617-453-2700 www.proxynetworks.com
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
Cisco Secure Access Control Server 4.2 for Windows
Cisco Secure Access Control Server 4.2 for Windows Overview Q. What is Cisco Secure Access Control Server (ACS)? A. Cisco Secure ACS is a highly scalable, high-performance access control server that operates
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems
Symantec Backup Exec 12.5 for Windows Small Business Server Premium and Standard Editions Comprehensive data protection and system recovery for Microsoft Windows Small Business Server Overview Symantec
Citrix XenApp 6 Fundamentals Edition for Windows Server 2008 R2 Administrator's Guide
Citrix XenApp 6 Fundamentals Edition for Windows Server 2008 R2 Administrator's Guide Copyright and Trademark Notices Use of the product documented herein is subject to your prior acceptance of the End
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
Security and the Mitel Teleworker Solution
Security and the Mitel Teleworker Solution White Paper July 2007 Copyright Copyright 2007 Mitel Networks Corporation. This document is unpublished and the following notice is affixed to protect Mitel Networks
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
ERserver. iseries. Securing applications with SSL
ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
Out-of-Band Management: the Integrated Approach to Remote IT Infrastructure Management
WHITE PAPER Management: the Integrated Approach to Remote IT Management EXECUTIVE SUMMARY For decades, business imperatives for information technology (IT) have remained constant to cut costs and improve
Secure Remote Control Security Features for Enterprise Remote Access and Control
Secure Remote Control Security Features for Enterprise Remote Access and Control Good communication is vital to any company, large or small. Many departments within companies are utilizing different platforms
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Using a VPN with CentraLine AX Systems
Using a VPN with CentraLine AX Systems User Guide TABLE OF CONTENTS Introduction 2 What Is a VPN? 2 Why Use a VPN? 2 How Can I Set Up a VPN? 2 Important 2 Network Diagrams 2 Network Set-Up with a VPN 2
Implementation Guide
Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein
Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec 11d for Windows Servers New Encryption Capabilities White Paper: Enterprise Security Symantec Backup Exec 11d for Windows Servers Contents Executive
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
iphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN
Dell SonicWALL Secure Virtual Assist: Clientless remote support over SSL VPN Businesses can enhance user satisfaction, productivity, profitability and security by leveraging existing infrastructure to
Centralized Self-service Password Reset: From the Web and Windows Desktop
Centralized Self-service Password Reset: From the Web and Windows Desktop Self-service Password Reset Layer v.3.2-007 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200
Symantec AntiVirus Enterprise Edition
Symantec AntiVirus Enterprise Edition Comprehensive threat protection for every network tier, including client-based spyware prot e c t i o n, in a single product suite Overview Symantec AntiVirus Enterprise
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
Endpoint Security VPN for Windows 32-bit/64-bit
Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
OBM (Out of Band Management) Overview
OBM (Out of Band Management) Overview With the growth of IP, routers deployed into an IP network must not only be accessible by the network operator for maintenance and configuration purposes, but secure
Netop Remote Control Security Server
A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days
Network Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
