Reverse Proxy Three Myths Busted

Size: px
Start display at page:

Download "Reverse Proxy Three Myths Busted"

Transcription

1 Reverse Proxy Three Myths Busted Discover the real facts about how reverse proxy enables enhanced security and IT efficiency. Written by Joe Campbell, Principal Solutions Architect, Dell Software Abstract Most enterprises today use forward proxy (or simply proxy ) technology all the time. In particular, they use web proxies internal users don t actually connect directly to the internet, but to a proxy server. This proxy server captures the data from requested websites and forwards it to users behind the firewall, usually without the user even knowing the proxy exists. Web proxies can enhance security (for example, by blocking access to certain websites), enable tracking of user web activity, and improve performance by caching website content for reuse. Although forward proxies are commonplace, some organizations have been reluctant to take advantage of a similar technology, the reverse proxy. Like forward proxies, reverse proxies can improve security and performance and they offer a host of additional benefits as well, including encryption, load balancing and even single sign-on (SSO). This white paper explains the reverse proxy server and debunks three key myths that may be keeping your organization from reaping the benefits of this valuable technology.

2 Forward proxies, especially web proxies, are commonplace in organizations today, for good reason. With a web proxy, internal users don t actually connect directly to the internet but to a proxy server that captures the content from a website and forwards it to the user behind the firewall, as illustrated in Figure 1. Usually, the user does not even know the proxy exists it is transparent to the user. Reverse proxies can improve security and performance and they offer a host of additional benefits as well, including encryption, load balancing and even single sign-on (SSO). Proxies like this can provide a number of benefits to organizations: Security A proxy can restrict access to sites known for objectionable or dangerous material like phishing attacks, malware and Trojan horses. Auditing A proxy server can track access requests and provide forensic details and logging to security experts looking for details during a security audit. Performance Some proxies support website caching the proxy captures the web page content and saves it locally. When a user requests a cached page, it can be rendered almost immediately since it does not need to be downloaded again from the internet. The reverse proxy server A reverse proxy is essentially the same technology but in reverse: while a forward proxy proxies on behalf of users or other clients accessing almost any internet site, a reverse proxy proxies on behalf of a particular set of servers stationed behind an internet site, as shown in Figure 2. Reverse proxies can (and often do) obfuscate or hide the origin of the website the user is trying to access. For example, the user in Figure 3 is requesting sitea.reverserproxy.com but, without knowing it, is actually receiving data from hidden.sitea.com. User Web proxy Internet Figure 1. A web proxy in action Site A User Internet Reverse proxy Site B Figure 2. A reverse proxy 2

3 User request sitea.reverseproxy.com Proxied request hidden.sitea.com User Reverse proxy Web server Figure 3. Reverse proxy in action Setting up a reverse proxy offers significant benefits: Access control A reverse proxy can capture requests to a targeted website and reject or deny each request based on a security policy. Encryption A reverse proxy can encrypt or apply SSL to a site that is otherwise unsecure or not encrypted. Caching A reverse proxy can often cache certain items like pictures or HTML code for targeted websites, which will speed the user s browsing experience. Extranet access A reverse proxy can securely render an internal webpage to users outside the firewall. In this model, the actual server itself remains untouched by external user, whose access is limited to what the reverse proxy is allowed to show. User session management and SSO Some reverse proxies are capable of injecting code or automatically replying to downstream server requests for authentication to a requested website. In this model, SSO can be achieved with a site that would otherwise never support that capability. Debunking three important myths about reverse proxies with Dell One Identity Cloud Access Manager Unfortunately, many organizations are missing out on the benefits of reverse proxies because of three common myths: VPN technology is the best way to ensure network security. A proxy will create an application bottleneck. Firewalls are secure; reverse proxies are not. Let s debunk these myths and explore how the right reverse proxy solution such as Dell One Identity Cloud Access Manager, part of the Dell One Identity products from Dell Software can be a valuable component of your network infrastructure. Myth #1: VPN technology is the best way to ensure network security. Firewalls are an essential part of any network security strategy, and they often include Virtual Private Network (VPN) technology for secure access to internal resources. VPN is an extremely useful technology for organizations because it enables a computer to securely send and receive data across the internet as if it were directly connected to the private corporate network. However, VPN has important limitations. First, VPN software must be installed on the client computer, which limits user access to the technology. For instance, suppose you are at a public place, like your local library, and you receive an urgent message on your phone that requires you to immediately access an internal site and update some data in your HR system. But, of course, the librarian isn t going to offer you a local admin account on their computer network so you can t install your VPN software and get the secure access you need. In situations like this, VPN technology is useless. Moreover, VPN technology is best suited for your internal trusted employees only. Organizations that use VPN to provide partners with secure access to internal applications make themselves more vulnerable to attack. When a user connects via your VPN gateway, they are essentially on your network they can A reverse proxy server can deliver secure intranet access without the limitations of VPN. 3

4 The Cloud Access Manager reverse proxy engine runs as a self-hosted web service and was written for speed a single proxy server is typically enough to handle the application load for a medium-sized enterprise. search for vulnerabilities using methods like port scanning or simple ping scripts. Therefore, the idea that VPN is the solution for all your secure access needs is a myth. Fact: You can use a reverse proxy to grant secure intranet access. A reverse proxy server, on the other hand, can deliver secure intranet access without the limitations of VPN. First, a reverse proxy, such as Cloud Access Manager, offers a zero-footprint requirement on the user s machine. This means that there is no software to install, and no requirement for browser plug-ins or certificate management. Users at the library, on the corporate network, or on mobile devices can all equally access secure intranet resources. A reverse proxy also enables you to provide secure access to partners and other external users. Cloud Access Manager can act as a gateway to your internal sites. Before users can access anything within a network secured by Cloud Access Manager, they must first authenticate, and then their attributes and group membership will be used to govern exactly what they can access. Moreover, since users accessing a reverse proxy are not actually on your secured network, it is impossible for them to search the network for vulnerabilities. In addition, Cloud Access Manager provides a simple to follow, wizarddriven interface that even the newest web administrators can use. There are no complicated terminologies or instructions to learn, so you can securely provide your users and partners with secure access to an internal site in just a few minutes. Myth #2: A proxy will create an application bottleneck. Organizations worry about having their applications flowing through a single server, especially if they have experienced bottlenecks in the past. And often a reverse proxy is tasked with doing more than a forward proxy it needs to rewrite links, filter traffic according to security policies and, in the case of Cloud Access Manager, provide SSO by injecting credentials and respond to security challenges of downstream servers. So concerns about bottlenecks are legitimate. However, times have changed, and so has our technology. Fact: Today s technology makes reverse proxies reliable with no performance bottlenecks. The Cloud Access Manager reverse proxy has been written from the ground up with performance in mind, and has evolved over 15 years of development and customer experience. Over that time, new features have been added, including proxy tuning, customized scripting and built-in load-balancing. If you had asked a game developer in the early 90s to write a 3D game engine that simulated water accurately, they would have laughed. Sure, they could have written one, but you would have needed a powerful graphics workstation to run it. Today, a small game console is capable of nearly perfect fluid simulation. Power computing and virtualization has finally caught up to the technology. Taking advantage of that technology, the Cloud Access Manager reverse proxy engine runs as a self-hosted web service and was written for speed a single proxy server is typically enough to handle the application load for a medium-sized enterprise. Organizations who want to scale their installation need only to add another proxy; the server will auto-discover the rest of the Cloud Access Manager deployment and configure itself appropriately. In short, thanks to years of fine tuning and today s processing power and scalability, bottlenecks are simply not an issue for the Cloud Access Manager reverse proxy. It s worth pointing out that Dell has been running the Cloud Access Manager reverse proxy in its own environment for years, with only two production proxies (a good fail-over 4

5 strategy). The Cloud Access Manager reverse proxy delivers a real solution to the challenge, and does so with reliability and performance. Myth #3: Firewalls are secure; reverse proxies are not. The final myth can be summed up as follows: Firewalls are secure and reverse proxies aren t firewalls. Therefore, reverse proxies are not secure. The truth is, a reverse proxy solution is often more secure than a firewall VPN strategy. But the more important truth is that organizations do not have to choose between a firewall and a reverse proxy they can have both. Fact: You can choose both a firewall and a reverse proxy. Using a reverse proxy does not mean no longer using firewalls. In fact, you shouldn t even consider installing a reverse proxy on a machine that does not have a firewall, or at least behind one on your network. Think of traffic on your network as the stations on your radio. In the United States, FM radio channels are split into frequencies ranging from 87.8 MHz to Mhz, and the jump between frequencies is 0.2 Mhz. So, a U.S. FM radio receiver can receive about 101 different radio channels. In today s network technology, a similar method is used to separate traffic on the wire. There are 65,535 possible channels, called ports, to move information around on a network. Websites typically transmit on port 80, while secure sites like your bank are on port 443. The problem is there really isn t any requirement that certain types of data travel on certain ports. You could easily design your website to travel on port as easily as you could get it to transmit on port 80. This huge number of ports is exactly what a firewall is designed to secure. For instance, let s say you have installed a secret banking web service on port 1080 and you want to make sure that only the banking website can call that web service. You could easily configure a firewall with a policy to do just that, as illustrated in Figure 4. Beyond that, the firewall should simply block all unassigned and unsecured ports by default. This is the job of a firewall, and this is the job of a firewall when it s applied to a reverse proxy solution. A reverse proxy solution isn t a firewall, nor does it pretend to be. As noted earlier, Figure 3 shows a reverse proxy securing the sites behind an organization s firewall. Since the proxy Using a reverse proxy to secure access to internal sites can be more secure than using a firewall alone. Unauthorized website Secure banking web service Banking website Figure 4. A firewall allowing a specific banking website to access a secure banking web service and, but blocking access to the service from all other websites 5

6 supports traffic only on port 443 (the secure SSL gateway), port scanning is simply impossible. More than that, a user trying to access hidden.site.com cannot do so; it is simply impossible. The truth is, using a reverse proxy to secure access to internal sites can be more secure than using a firewall alone. There is no real comparison to be made between a firewall and a reverse proxy server. They are two different solutions providing two essential and different features. About Dell One Identity Cloud Access Manager Dell Software recently released the next generation of its solution for access management, including access management for remote users. The new Dell One Identity Cloud Access Manager solution represents a huge leap in usability and features for securing and managing access. More than a simple single sign-on product, Cloud Access Manager is a full-fledged web access management solution. Cloud Access Manager uses reverse proxy technology to provide authenticated and authorized users connecting from the internet or a partner organization s network with secure intranet access to applications that are hosted safely behind your organization s firewall. Cloud Access Manager delivers the following benefits: User-specific application portal Cloud Access Manager provides each user with a web application portal customized to their security profile. Users can launch applications from this portal and add applications to the portal from a secure application catalog. Just-in-time (JIT) provisioning Before a user can use a web property like Google Apps, Salesforce.com or Office 365, they must be provisioned to the platform. Many products offer a big bang or dirsync provisioning strategy in which all members of a particular security group are provisioned en masse. This strategy often results in cost overruns, since more people are provisioned than are actively using the service. With a JIT strategy, users who match the correct security profile are provisioned only when they specifically ask for access or add the application to their portal collection. Single sign-on Cloud Access Manager s approach to SSO is unique in the industry. Rather than focusing only on the modern challenges of federation used in with technologies like SAML and WS-Federation, Cloud Access Manager offers a balanced solution. It supports modern federation, but also adds support for legacy authentication methods like forms-based, basic and Windows authentication. Secure intranet access from the internet without VPN Cloud Access Manager s reverse proxy engine not only provides SSO to legacy applications, but will serve users from outside the firewall secure access to internal applications. This is achieved without any additional plug-ins, server agents, or requirement to install VPN software on the client machine. Tuning and scripting capabilities With less mature reverse proxy technologies, internal websites with unique HTML or scripting features are often not re-written correctly in the proxy, forcing organizations to either leave applications out of the proxy or wait for the product team to implement a new translation. Cloud Access Manager s unique tuning and scripting capabilities enable you to respond to an application s unique HTML requirements without changing the core product. That means you can maintain the mappings yourself. Conclusion Reverse proxies have come of age and the myths keeping them out of widespread use are simply that myths. As we ve illustrated here in busting these myths, reverse proxies are a valuable part of any secure web access strategy, supplementing the security of your firewalls and overcoming the limitations of VPN technologies. Cloud Access Manager s reverse proxy unlocks the potential of integrating securely with your partners, keeping users happy with high performance, and enabling SSO solutions previously thought impossible. About the author Joe Campbell is Principal Solutions Architect at Dell Software. He is an accomplished software developer with an extremely diverse background. His professional career spans innovations for some of the world s biggest companies, and he s pioneered new, award-winning technologies in wireless, RFID, visualization, communications and telephony. Joe s unmatched experience in leading security and software architecture makes him a highlyrespected visionary and leader in the technology industry. 6

7 For More Information 2014 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose without the written permission of Dell, Inc. ( Dell ). Dell, Dell Software, the Dell Software logo and products as identified in this document are registered trademarks of Dell, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Dell products. EXCEPT AS SET FORTH IN DELL S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Dell does not make any commitment to update the information contained in this document. About Dell Software Dell Software helps customers unlock greater potential through the power of technology delivering scalable, affordable and simple-to-use solutions that simplify IT and mitigate risk. The Dell Software portfolio addresses five key areas of customer needs: data center and cloud management, information management, mobile workforce management, security and data protection. This software, when combined with Dell hardware and services, drives unmatched efficiency and productivity to accelerate business results. If you have any questions regarding your potential use of this material, contact: Dell Software 5 Polaris Way Aliso Viejo, CA Refer to our Web site for regional and international office information. 7 WhitePaper-ReverseProxy-US-VG-24426

Logging and Alerting for the Cloud

Logging and Alerting for the Cloud Logging and Alerting for the Cloud What you need to know about monitoring and tracking across your enterprise The need for tracking and monitoring is pervasive throughout many aspects of an organization:

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

Understanding Enterprise Cloud Governance

Understanding Enterprise Cloud Governance Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination

More information

Identity and Access Management for the Cloud

Identity and Access Management for the Cloud Identity and Access Management for the Cloud What you need to know about managing access to your clouds Organizations need to control who has access to which systems and technology within the enterprise.

More information

How to Deploy Models using Statistica SVB Nodes

How to Deploy Models using Statistica SVB Nodes How to Deploy Models using Statistica SVB Nodes Abstract Dell Statistica is an analytics software package that offers data preparation, statistics, data mining and predictive analytics, machine learning,

More information

Top 10 Most Popular Reports in Enterprise Reporter

Top 10 Most Popular Reports in Enterprise Reporter Top 10 Most Popular Reports in Enterprise Reporter Users Rely Most on Reports for Active Directory Security and Operations and File Server Migration Assessment Written by Alexey Korotich, Dell Software

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

Managing the Risk of Privileged Accounts and Privileged Passwords in Civilian Agencies

Managing the Risk of Privileged Accounts and Privileged Passwords in Civilian Agencies Managing the Risk of Privileged Accounts and Privileged Passwords in Civilian Agencies Reduce Risk while Streamlining Administrative Workflows Written by Dell Software Abstract Even IT environments that

More information

10 easy steps to secure your retail network

10 easy steps to secure your retail network 10 easy steps to secure your retail network Simple step-by-step IT solutions for small business in retail to leverage advanced protection technology in ways that are affordable, fast and easy October 2015

More information

Best Practices for Secure Mobile Access

Best Practices for Secure Mobile Access Best Practices for Secure Mobile Access A guide to the future. Abstract Today, more people are working from more locations using more devices than ever before. Organizations are eager to reap the benefits

More information

Types of cyber-attacks. And how to prevent them

Types of cyber-attacks. And how to prevent them Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual

More information

SharePlex for SQL Server

SharePlex for SQL Server SharePlex for SQL Server Improving analytics and reporting with near real-time data replication Written by Susan Wong, principal solutions architect, Dell Software Abstract Many organizations today rely

More information

Dell One Identity Manager Scalability and Performance

Dell One Identity Manager Scalability and Performance Dell One Identity Manager Scalability and Performance Scale up and out to ensure simple, effective governance for users. Abstract For years, organizations have had to be able to support user communities

More information

DevOps for the Cloud. Achieving agility throughout the application lifecycle. The business imperative of agility

DevOps for the Cloud. Achieving agility throughout the application lifecycle. The business imperative of agility DevOps for the Cloud Achieving agility throughout the application lifecycle We don t have to tell you that your company is under increasing pressure to respond more quickly to changing business conditions.

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview

Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview May 2015 Overview Functional highlights Functional details Legal notices Overview Support for Dell SonicWALL malware detection

More information

Hybrid Cloud Computing

Hybrid Cloud Computing Hybrid Cloud Computing Managing the reality of enterprise cloud computing Cloud computing promises a new world of IT agility, with quick deployment of applications to support business needs. Organizations

More information

How To Use Shareplex

How To Use Shareplex Data consolidation and distribution with SharePlex database replication Written by Sujith Kumar, Chief Technologist Executive summary In today s fast-paced mobile age, data continues to accrue by leaps

More information

Understanding and Configuring Password Manager for Maximum Benefits

Understanding and Configuring Password Manager for Maximum Benefits Understanding and Configuring Password Manager for Maximum Benefits Written by Chris Radband, senior professional services consultant, Dell Software Introduction About Password Manager The pain of password

More information

Organized, Hybridized Network Monitoring

Organized, Hybridized Network Monitoring Organized, Hybridized Network Monitoring Use a combination of technologies and organizational techniques to master complex network monitoring Abstract In the world of network monitoring, you re basically

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps

Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com

More information

Achieve Deeper Network Security

Achieve Deeper Network Security Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order

More information

Solving the Security Puzzle

Solving the Security Puzzle Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big

More information

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System

More information

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,

More information

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall

Dell InTrust 11.0. Preparing for Auditing Cisco PIX Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Simplify Your Migrations and Upgrades. Part 1: Avoiding risk, downtime and long hours

Simplify Your Migrations and Upgrades. Part 1: Avoiding risk, downtime and long hours Simplify Your Migrations and Upgrades Part 1: Avoiding risk, downtime and long hours Introduction You can say migrations and upgrades to a database administrator (DBA) or systems administrator. But what

More information

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott

More information

Navigating the NIST Cybersecurity Framework

Navigating the NIST Cybersecurity Framework Navigating the NIST Cybersecurity Framework Explore the NIST Cybersecurity Framework and tools and processes needed for successful implementation. Abstract For federal agencies, addressing cybersecurity

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Desktop Authority vs. Group Policy Preferences

Desktop Authority vs. Group Policy Preferences Desktop Authority vs. Group Policy Preferences A Comparison of Desktop Lifecycle Management Features Introduction Group Policy Preferences In Windows Server 2008 and Windows Vista Service Pack 1, Microsoft

More information

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Object Level Authentication

Object Level Authentication Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required

More information

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Dell Statistica. Statistica Document Management System (SDMS) Requirements Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Proactive Performance Management for Enterprise Databases

Proactive Performance Management for Enterprise Databases Proactive Performance Management for Enterprise Databases Abstract DBAs today need to do more than react to performance issues; they must be proactive in their database management activities. Proactive

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Eight Ways Better Software Deployment and Management Can Save You Money

Eight Ways Better Software Deployment and Management Can Save You Money Eight Ways Better Software Deployment and Management Can Save You Money Introduction Software management and deployment are perhaps among the most difficult and time-consuming activities undertaken by

More information

How to Quickly Create Custom Applications in SharePoint 2010 or 2013 without Custom Code

How to Quickly Create Custom Applications in SharePoint 2010 or 2013 without Custom Code How to Quickly Create Custom Applications in SharePoint 2010 or 2013 without Custom Code A Guide through Web Parts in Quick Apps for SharePoint By Dan Barker, product manager, Dell Software Table of Contents

More information

Quest vworkspace Virtual Desktop Extensions for Linux

Quest vworkspace Virtual Desktop Extensions for Linux Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Defender 5.7. Remote Access User Guide

Defender 5.7. Remote Access User Guide Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Governed Migration using Dell One Identity Manager

Governed Migration using Dell One Identity Manager Governed Migration using Dell One Identity Manager How Dell Identity Manager not only reduces migration costs and improves migration outcomes, but delivers ongoing value Abstract Sooner or later, your

More information

Identifying Problematic SQL in Sybase ASE. Abstract. Introduction

Identifying Problematic SQL in Sybase ASE. Abstract. Introduction Identifying Problematic SQL in Sybase ASE Written by Darren Mallette, Senior Technical Consultant, Dell Software Abstract Database administrators (DBAs), developers, quality assurance (QA) analysts and

More information

Quest Collaboration Services 3.6.1. How it Works Guide

Quest Collaboration Services 3.6.1. How it Works Guide Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Active Directory Auditing: What It Is, and What It Isn t

Active Directory Auditing: What It Is, and What It Isn t Active Directory Auditing: What It Is, and What It Isn t Abstract What s wrong with Active Directory s native audit logging? More importantly, what functionality do you really need in an AD auditing solution,

More information

Achieve Deeper Network Security and Application Control

Achieve Deeper Network Security and Application Control Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet

More information

Managing the Risk of Privileged Accounts and Privileged Passwords in Defense Organizations

Managing the Risk of Privileged Accounts and Privileged Passwords in Defense Organizations Managing the Risk of Privileged Accounts and Privileged Passwords in Defense Organizations Reduce Risk while Streamlining Administrative Workflows Written by Dell Software Abstract Even IT environments

More information

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall

Dell InTrust 11.0. Preparing for Auditing CheckPoint Firewall 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Security Features in Password Manager

Security Features in Password Manager Security Features in Written by Einar Mykletun, Ph.D. security and compliance architect for research and development at Dell Introduction Information system security is a priority for every organization,

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Quest Collaboration Services 3.5. How it Works Guide

Quest Collaboration Services 3.5. How it Works Guide Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

Moving Single Sign-on (SSO) Beyond Convenience

Moving Single Sign-on (SSO) Beyond Convenience Moving Single Sign-on (SSO) Beyond Convenience Written by Todd Peterson, IAM evangelist, Dell Software Introduction For years, single sign-on (SSO) has been the poster child for identity and access management

More information

Dell vworkspace Supports Higher Education s Desktop Virtualization Needs

Dell vworkspace Supports Higher Education s Desktop Virtualization Needs Dell vworkspace Supports Higher Education s Desktop Virtualization Needs Prepared by Chris Lyman, Senior Systems Consultant Dell Cloud Client Computing Solutions Abstract As adoption of desktop virtualization

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide March 2015 The Spotlight Management Pack for SCOM is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Ensuring High Availability for Critical Systems and Applications

Ensuring High Availability for Critical Systems and Applications Ensuring High Availability for Critical Systems and Applications Using SharePlex to Ensure Your Oracle Databases Are Always Up and Running Bill Brunt, Product Manager, Dell Software Abstract Keeping business

More information

Dell Client Profile Updating Utility 5.5.6

Dell Client Profile Updating Utility 5.5.6 Complete Product Name with Trademarks Version Dell 5.5.6 April 21, 2015 These release notes provide information about the Dell release. Welcome to What's New Known issues Upgrade and Compatibility System

More information

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Introduction to Version Control in

Introduction to Version Control in Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any

More information

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Enterprise Reporter Report Library

Enterprise Reporter Report Library Enterprise Reporter Overview v2.5.0 This document contains a list of the reports in the Enterprise Reporter. Active Directory Reports Change History Reports Computer Reports File Storage Analysis Reports

More information

Web Portal Installation Guide 5.0

Web Portal Installation Guide 5.0 Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

The Top 10 Things DBAs Should Know About Toad for IBM DB2

The Top 10 Things DBAs Should Know About Toad for IBM DB2 The Top 10 Things DBAs Should Know About Toad for IBM DB2 Written by Jeff Podlasek, senior product architect, Dell Software Abstract Toad for IBM DB2 is a powerful tool for the database administrator.

More information

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to

More information

Dell InTrust 11.0 Best Practices Report Pack

Dell InTrust 11.0 Best Practices Report Pack Complete Product Name with Trademarks Version Dell InTrust 11.0 Best Practices Report Pack November 2014 Contents About this Document Auditing Domain Controllers Auditing Exchange Servers Auditing File

More information

Getting Agile with Database Development

Getting Agile with Database Development Getting Agile with Database Development Using automation to shorten the database development cycle By Daniel Norwood, senior product manager, Dell Software Introduction Once an organization becomes convinced

More information

Adopting a service-centric approach to backup & recovery

Adopting a service-centric approach to backup & recovery Adopting a service-centric approach to backup & recovery Written by John Maxwell, VP, Data Protection Products Abstract This solution brief explores the business challenges driving the need to move beyond

More information

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated

Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated Dell Migration Manager for Enterprise Social What Can and Cannot Be Migrated MMES - What Can and Cannot Be Migrated First Release - April 2015 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary

More information

11 ways to migrate Lotus Notes applications to SharePoint and Office 365

11 ways to migrate Lotus Notes applications to SharePoint and Office 365 11 ways to migrate Lotus Notes applications to SharePoint and Office 365 Written By Steve Walch, Senior Product Manager, Dell, Inc. Abstract Migrating your Lotus Notes applications to Microsoft SharePoint

More information

Data center and cloud management. Enabling data center modernization and IT transformation while simplifying IT management

Data center and cloud management. Enabling data center modernization and IT transformation while simplifying IT management Data center and cloud management Enabling data center modernization and IT transformation while simplifying IT management 2013 Dell, Inc. ALL RIGHTS RESERVED. This document contains proprietary information

More information

Quest vworkspace. System Requirements. Version 7.2 MR1

Quest vworkspace. System Requirements. Version 7.2 MR1 Quest vworkspace System Requirements Version 7.2 MR1 2011 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright. The software described

More information

How To Protect Your Active Directory (Ad) From A Security Breach

How To Protect Your Active Directory (Ad) From A Security Breach Securing Active Directory: An Ounce of Prevention or a Pound of Cure? Abstract This technical brief reviews three tasks that should be a part of your proactive Active Directory (AD) security routine: Establishing

More information

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide Foglight for Oracle Managing Oracle Database Systems Getting Started Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

DATA GOVERNANCE EDITION

DATA GOVERNANCE EDITION Quest One Identity Manager DATA GOVERNANCE EDITION 6.1 What s New 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell One Identity Manager 7.0. Help Desk Module Administration Guide

Dell One Identity Manager 7.0. Help Desk Module Administration Guide Dell 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure

More information

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Quick Connect Express for Active Directory

Quick Connect Express for Active Directory Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Best Practices for an Active Directory Migration

Best Practices for an Active Directory Migration Best Practices for an Active Directory Migration Written by Derek Melber, MCSE, MVP, president, BrainCore.Net AZ, Inc. Abstract This white paper details the major challenges of Microsoft Active Directory

More information

Dell One Identity Quick Connect for Cloud Services 3.6.0

Dell One Identity Quick Connect for Cloud Services 3.6.0 Dell One Identity Quick Connect for Cloud Services 3.6.0 August, 2014 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

7.5 7.5. Spotlight on Messaging. Evaluator s Guide

7.5 7.5. Spotlight on Messaging. Evaluator s Guide 7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

New Features and Enhancements

New Features and Enhancements Dell Migration Manager for SharePoint 4.7 Build number: 4.7.20141207 December 9, 2014 These release notes provide information about the Dell Migration Manager for SharePoint release. New Features and Enhancements

More information

2.0. Quick Start Guide

2.0. Quick Start Guide 2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

Dell One Identity Quick Connect for Cloud Services 3.6.1

Dell One Identity Quick Connect for Cloud Services 3.6.1 Dell One Identity Quick Connect for Cloud Services 3.6.1 March 2015 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.4 Managing SQL Server Database Systems Getting Started Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Go beyond basic up/down monitoring

Go beyond basic up/down monitoring Go beyond basic up/down monitoring Extending the value of SCOM with Foglight for SQL Server Introduction Microsoft Systems Center Operations Manager (SCOM) allows IT professionals to manage and monitor

More information

Move Data from Oracle to Hadoop and Gain New Business Insights

Move Data from Oracle to Hadoop and Gain New Business Insights Move Data from Oracle to Hadoop and Gain New Business Insights Written by Lenka Vanek, senior director of engineering, Dell Software Abstract Today, the majority of data for transaction processing resides

More information

Dell Spotlight on Active Directory 6.8.4. Deployment Guide

Dell Spotlight on Active Directory 6.8.4. Deployment Guide Dell Spotlight on Active Directory 6.8.4 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Seven Steps to Designating Owners of Unstructured Data

Seven Steps to Designating Owners of Unstructured Data Seven Steps to Designating Owners of Unstructured Data Written by Randy Franklin Smith, president and CEO of Monterey Technology Group, Inc., and Microsoft MVP Introduction Many organizations are seeing

More information