Design and Implementation Issues ECHO: An Active Health Data Management System
|
|
|
- Malcolm Webb
- 10 years ago
- Views:
Transcription
1 Title Design and Implementation Issues of a Secure Cloud-Based Health Data Management System Frank Steimle, Matthias Wieland, Bernhard Mitschang, Sebastian Wagner, and Frank Leymann Funded By:
2 Agenda Title Introduction to the ECHO project Problem description Solution Design and Implementation Issues ECHO: An Active Health Data Management System System Architecture RESTful Interfacing the Health Data Management Layer Health Data Management Automated Provisioning and Management of the Health Data Management Layer Summary and Future Work 2
3 Introduction: What Title the Problem is Chronic disease patients may not have regular communication with physicians Lack of time, economic difficulties or negligence This may induce exacerbation of their condition, possible hospitalization But closer connectivity can ensure uninterrupted care and crisis avoidance Field of Application is COPD - chronic obstructive pulmonary disease 3
4 Introduction: What Title We Want to Do Combine human medical expertise with state-of-the-art technologies, like cloud computing, data mining, and smart phones Enable regular monitoring of patients and avoidance of medical emergencies Patients enter Data on a daily basis The system analyzes the incoming data If the system recognizes a dangerous situation it notifies the patient and the doctor 4
5 Title Design & Implementation Issues 5
6 Design and Implementation Title Issues (1) Data Privacy & Security Health data are sensitive data and have to be protected by means of encryption, access control, SQL injection prevention, input verification... Support of User Roles Separation of patients and physicians Different Access Channels Support many possbilities how a client can access the system: web, mobile, etc. Support of multiple hospitals The system has to be easily adaptable to different hospitals. Cloud readiness Enable automatic management and deploying in cloud environments. 6
7 Design and Implementation Title Issues (2) Easy Development of Applications Provide Uniform API, good documentation, and tool support. Scalability System should react fast even if many users access it. Plus, it has to deal with more and more data. Automatic Health Data Analysis and Active Behavior The System should automatically analyze data provided by the patient and react to possible health problems by generating notifications. Data Quality The system has to implement mechanisms that ensure data quality. Extensible service-based Architecture It should be possible to create new services by composing existing services, like Health Services which manage patients data or Analytic Services which analyze patients data. 7
8 Title The ECHO System: An Active Health Data Management System 8
9 ECHO System: Title Architecture Smartphone Pa(ents App Smartphone Browser Browser Doctors App Doctors Portal Pa(ents Portal Applica'on Layer: ECHO Frontend Health Status Health Risk (& SMS) Push No(fica(on (& SMS) Recommenda(ons Enquiries Enquiries Enquiries Enquiries Health API (RESTful) Orchestra(ons Health Services Analy(cs Analy(cs Management & Provisioning Engine Health Data Health Data Management Layer: ECHO Pla=orm Health Server (Cloud Service) 9
10 Health API: Title Resources Health API used to store data/query the system. RESTful HTTP-API to simplify application development Resources: Questions 1 Notifications 1 Accounts 1 Patients 1 * Question Subresources of Patient 1 * * Account Patient Daily Reports CATs CCQs Charlsons Readings Treatments Death * * * * * * Daily Report CAT CCQ Charlson Reading Treatment 1 10
11 Health API: Title Security Transport Security: SSL Authentication: Token-Based OAuth 2.0 Library JSON Web Token Token is digitally signed and contains user information Token has to be send in the Authentication-Header Token can expire Refresh Token can be used to get a new Token 11
12 Health API: Title Implementation Implemented using node.js & Express-Framework Calling a Health Service via the Health API: Request+ Authen'ca'on+ Error+ Input+Parser+ Health+Service+ Response+ Error+Handling+ Error+Message+ 12
13 Health API: Title Documentation Swagger is used for Documentation of the Health API It is a Description Language for REST Services based on JSON Swagger enables: Service Discovery Model Definitions Generation of Client and Server Stubs ECHO System comes with SwaggerUI interactive documentation 13
14 Health Data Title Management: Health Data Model MySQL for Health Data Management RDBMS because it enforces data integrity and has security features like views Health Data Model: Accounts Daily Reports CCQs CATs Pa1ents Death Charlsons Readings Treatments No1fica1ons 14
15 Health Data Title Management: Simple Analyses Data entered by the patient: Q1: Did your shortness of breath increase? Q2: Did your cough increase? Q3: Did your sputum change? Q4: Did you have chest pain or discomfort? Q5: Did you take the same medications? Or increased them?...and some measurements, like heart rate and temperature Rule-based Analysis: e.g., Q1, Q2 & Q3 answered with yes Call your physician! 15
16 Health Data Title Management: Security Database user for each system user This user is used by the health service to store/query data Views filter data depending on logged in user Right management of Database is used to secure data User Roles Available roles: patient, doctor, admin MySQL does not support user roles Stored Procedure sets appropriate access privileges Injection Prevention Node.js has no support for prepared statements Stored procedures for writing Health Services 16
17 Automated Provisioning Title and Management of the Health Data Management Layer System has to be easily deployable in different IT environments Management tasks (e.g., backup/workload-depending scaling) should be automated. We used the TOSCA standard to achieve this Topology and Orchestration Specification for Cloud Applications TOSCA is used to describe the platform and the management functions in a machine-readable and self-contained manner TOSCA descriptions can be deployed in any supported cloud environment 17
18 Title ECHO TOSCA Topolgy (SQLConnec*on), OpenStack,VM, (Server), OpenStack,VM, (Server), OpenStack,VM, (Server), Ubuntu,14.04, (Opera*ng, System), Ubuntu,14.04, (Opera*ng, System), Ubuntu,14.04, (Opera*ng, System), Node.JS, , (Node.JS), Tomcat,7.0, (ApacheTomcat), MySQL,5.5, (DBMS), Analy*cs,Service, (Axis2,Web, Service), Health,Data,DB, (Database), WSO2, (BPEL,Engine), Service, Orchestra*on, (BPEL,Process), Health,API, (JavaScript), Health,Service, (JavaScript), (SQLConnec*on), (calls), (calls), (calls), (calls), (calls), 18
19 Title Summary 19
20 Design and Implementaion Title Issues: Revisited Issue Data Security User Roles Access Channels Mul1ple Hospitals Cloud Readiness Easy App Development Ac1ve Behavior Scalabil1y Extensible Architecture Solu(on Views, Encryp1on, Token- based Authen1fica1on Roles: doctor, pa1ent and admin Mobile/Web via REST Interface HDML can provide Ques1ons TOSCA REST Interface, Swagger Descrip1ons System analyzes Data and creates No1fica1ons REST, Node.js can easily be scaled up New services can be composed from exis1ng ones 20
21 Summary and Title Future Work We have build an active Health Data Management System Our system can be deployed in many different cloud environments We identified issues and showed how to solve them Future Work: HL7 support Data Mining Customizable Analyzes 21
22 Title THANK YOU
PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS
www.openi-ict.eu Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS Open-Source,
Mobile Application Platform
Mobile Application Platform from FeedHenry Next generation cloud-based solution that simplifies the development, deployment and management of mobile apps for enterprise. Develop native, hybrid and HTML5
API Management: Powered by SOA Software Dedicated Cloud
Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting
Deploying ArcGIS for Server Using Managed Services
Deploying ArcGIS for Server Using Managed Services Andrew Sakowicz Erin Ross Sridhar Karra Agenda Introduction Program Overview - Overview - Methodology - Tools Customer Deployments - Architecture and
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
Onegini Token server / Web API Platform
Onegini Token server / Web API Platform Companies and users interact securely by sharing data between different applications The Onegini Token server is a complete solution for managing your customer s
Donky Technical Overview
Donky Technical Overview This document will provide the reader with an overview of the features offered and technologies used with the Donky Messaging Network. This document will give a good base level
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Build and Secure Mobile Apps in the Enterprise. Ed Brill Ian Robinson Josh Lambert
Build and Secure Mobile Apps in the Enterprise Ed Brill Ian Robinson Josh Lambert Introductions Ed Brill Director, Mobile Enterprise Marketing IBM Ian Robinson Program Director, MobileFirst Platform and
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation
MIT Tech Talk, May 2013 Justin Richer, The MITRE Corporation Approved for Public Release Distribution Unlimited 13-1871 2013 The MITRE Corporation All Rights Reserved } OpenID Connect and OAuth2 protocol
Reaching Customers Across Multiple Channels
Leading Provider of Cloud-Based Customer Experience Solutions Relies on Integrated, Modular WSO2 Middleware to Speed the Delivery of Services that Enhance User Engagement Businesses recognize that brand
IBM API Management Overview. 2014 IBM Corporation
IBM API Management Overview Please Note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential
API Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
TrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
Automatic vs. Manual Code Analysis
Automatic vs. Manual Code Analysis 2009-11-17 Ari Kesäniemi Senior Security Architect Nixu Oy [email protected] Copyright The Foundation Permission is granted to copy, distribute and/or modify this
Private Cloud Website Solu2on
Private Cloud Website Solu2on Who We Are 2 HighPoint Solu1ons is a premier provider of specialized Management and IT services dedicated to the Life Sciences and Healthcare industries. Since 2000, our business
Axway API Portal. Putting APIs first for your developer ecosystem
Axway API Portal Putting APIs first for your developer ecosystem To fully embrace an API-first strategy, it s no longer enough to simply develop and deploy APIs. Organizations need broad API management
SeaClouds Project D6.2 - Case Study test-beds and key features mapping
SeaClouds Project D6.2 - Case Study test-beds and key features mapping Project Acronym Project Title Call identifier Grant agreement no. 610531 Start Date 1 st October 2013 Ending Date 31 st March 2016
Microsoft Dynamics GP 2015. What s New
Microsoft Dynamics GP 2015 What s New Copyright Copyright 2015 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views expressed in this document,
Cloud Powered Mobile Apps with Azure
Cloud Powered Mobile Apps with Azure Malte Lantin Technical Evanglist Microsoft Azure Agenda Mobile Services Features and Demos Advanced Features Scaling and Pricing 2 What is Mobile Services? Storage
Cloud Computing. Cloud computing:
Cloud computing: Cloud Computing A model of data processing in which high scalability IT solutions are delivered to multiple users: as a service, on a mass scale, on the Internet. Network services offering:
Cloud-based Identity and Access Control for Diagnostic Imaging Systems
Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering University of Ontario Institute of Technology
This module provides an overview of service and cloud technologies using the Microsoft.NET Framework and the Windows Azure cloud.
Module 1: Overview of service and cloud technologies This module provides an overview of service and cloud technologies using the Microsoft.NET Framework and the Windows Azure cloud. Key Components of
ShareNet. Technical Support Software. Powerful Request tracking built on the ShareNet platform!
Data Sheet ShareNet Powerful Request tracking built on the ShareNet platform! The Novo ShareNet Cloud Platform is a powerful web and mobile application that can be used as a Solution to efficiently track,
The deployment of OHMS TM. in private cloud
Healthcare activities from anywhere anytime The deployment of OHMS TM in private cloud 1.0 Overview:.OHMS TM is software as a service (SaaS) platform that enables the multiple users to login from anywhere
Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform
Mitra Innovation Leverages WSO2's Open Source Middleware to Build BIM Exchange Platform May 2015 Contents 1. Introduction... 3 2. What is BIM... 3 2.1. History of BIM... 3 2.2. Why Implement BIM... 4 2.3.
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks
全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks Agenda Challenges and PCI DSS 3.0 Updates Personal Information Protection Act Strategy to Protect against leak of Confidential Personal and Corporate
owncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
Tableau Online Security in the Cloud
Tableau Online Security in the Cloud Author: Ellie Fields Senior Director, Product Marketing, Tableau Software June 2013 p2 Tableau Software understands that data is among the most strategic and important
Collaborative Open Market to Place Objects at your Service
Collaborative Open Market to Place Objects at your Service D6.4.1 Marketplace integration First version Project Acronym COMPOSE Project Title Project Number 317862 Work Package WP6 Open marketplace Lead
Apigee Edge API Services Manage, scale, secure, and build APIs and apps
Manage, scale, secure, and build APIs and apps Hex #FC4C02 Hex #54585A Manage, scale, secure, and build APIs and Apps with is designed to unite the best of Internet and enterprise technologies to provide
UMA in Health Care: Providing Patient Control or Creating Chaos?
SESSION ID: IDY-F03 UMA in Health Care: Providing Patient Control or Creating Chaos? David Staggs JD, CISSP Technologist / IP Attorney Staggs PLLC UMA Value Proposition User Managed Access (UMA) brings
Automated Data Ingestion. Bernhard Disselhoff Enterprise Sales Engineer
Automated Data Ingestion Bernhard Disselhoff Enterprise Sales Engineer Agenda Pentaho Overview Templated dynamic ETL workflows Pentaho Data Integration (PDI) Use Cases Pentaho Overview Overview What we
owncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Collaborative Open Market to Place Objects at your Service
Collaborative Open Market to Place Objects at your Service D6.2.1 Developer SDK First Version D6.2.2 Developer IDE First Version D6.3.1 Cross-platform GUI for end-user Fist Version Project Acronym Project
Microsoft Power BI. Nov 21, 2015
Nov 21, 2015 Microsoft Power BI Biray Giray Practice Lead - Enterprise Architecture, Collaboration, ECM, Information Architecture and Governance getalbert.ca [email protected] Michael McKiernan
GE Healthcare. Centricity 360. Case Exchange service. Unleash the power of cloud to bring your distributed care teams together.
GE Healthcare Centricity 360 Case Exchange service Unleash the power of cloud to bring your distributed care teams together. Centricity 360 Case Exchange streamlines clinical collaboration with unaffiliated
Decoding the Big Data Deluge a Virtual Approach. Dan Luongo, Global Lead, Field Solution Engineering Data Virtualization Business Unit, Cisco
Decoding the Big Data Deluge a Virtual Approach Dan Luongo, Global Lead, Field Solution Engineering Data Virtualization Business Unit, Cisco High-volume, velocity and variety information assets that demand
Enterpise Mobility Lexicon & Terminology
1 Enterpise Mobility Lexicon & Terminology www.openratio.com By Rabih Kanaan 1 Amazon SNS Amazon Simple Notification Service (SNS) is a push messaging service that makes it simple & cost-effective to push
2-FACTOR AUTHENTICATION WITH
2-FACTOR AUTHENTICATION WITH 2X JUNE 2014 Two-Factor Authentication and Authy What is Two-Factor Authentication? Two-Factor Authentication is a process involving two stages to verify the identity of someone
Data Management in the Cloud: Limitations and Opportunities. Annies Ductan
Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management
ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps
ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps Agenda Security Enablement Concepts for BYOD & SaaS Cloud Apps! Intro and background! BYOD
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
Protect Everything: Networks, Applications and Cloud Services
Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
The Seven Habits of State-of-the-Art Mobile App Security
#mstrworld The Seven Habits of State-of-the-Art Mobile App Security Mobile Security 8 July 2014 Anand Dwivedi, Product Manager, MicroStrategy strworld Agenda - Seven Habits of State of the Art Mobile App
Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen
Enterprise Mobile App Management Essentials Presented by Ryan Hope and John Nielsen 1 Mobile App Trends Global mobile app downloads to exceed 30B by 1016 US and Europe account for over 70% of the market
Build Your Mobile Strategy Not Just Your Mobile Apps
Mobile Cloud Service Build Your Mobile Strategy Not Just Your Mobile Apps Copyright 2015 Oracle Corporation. All Rights Reserved. What is is it? Oracle Mobile Cloud Service provides everything you need
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
Feature Comparison. Help Desk. Ticket Management. Email to Ticket. Fully Customizable User Interface. Escalation Rules.
Feature Comparison Help Desk Ticket Management Email to Ticket Fully Customizable User Interface Escalation Rules Routing Rules Granular Permission Control Customizable Survey Multiple Survey Questions
Corporate Bill Analyzer
Corporate Bill Analyzer Product Description V 3.1 Contents Contents Introduction Platform Overview Core features Bill/Invoice presentment Corporate hierarchy support Billing Account hierarchy support Call
Hortonworks & SAS. Analytics everywhere. Page 1. Hortonworks Inc. 2011 2014. All Rights Reserved
Hortonworks & SAS Analytics everywhere. Page 1 A change in focus. A shift in Advertising From mass branding A shift in Financial Services From Educated Investing A shift in Healthcare From mass treatment
Return on Experience on Cloud Compu2ng Issues a stairway to clouds. Experts Workshop Nov. 21st, 2013
Return on Experience on Cloud Compu2ng Issues a stairway to clouds Experts Workshop Agenda InGeoCloudS SoCware Stack InGeoCloudS Elas2city and Scalability Elas2c File Server Elas2c Database Server Elas2c
The Perks of Having a Dedicated Database.
Building Capacity The Perks of Having a Dedicated Database. Host: Ryan Coleman [email protected] Presenter: Berit Johannessen [email protected] TRAINING TOPICS What is a Dedicated
Choosing the Best Mobile Backend
MOBILE APP DEVELOPER S GUIDE blog.kii.com Choosing the Best Mobile Backend A brief guide to selecting a trustworthy Mobile Backend as a Service (MBaaS). www.kii.com Share this e-book YOU RE A MOBILE APP
Cloud Service Brokerage Case Study. Health Insurance Association Launches a Security and Integration Cloud Service Brokerage
Cloud Service Brokerage Case Study Health Insurance Association Launches a Security and Integration Cloud Service Brokerage Cloud Service Brokerage Case Study Health Insurance Association Launches a Security
Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant
Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
The bridge to delivering digital applications across cloud, mobile and partner channels
Axway API Gateway The bridge to delivering digital applications across cloud, mobile and partner channels Axway API Gateway a foundational component in an API-first architecture for digital business provides
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
MARKETING CLOUD APIS
MARKETING CLOUD APIS Agenda I want to integrate with digital marketing applications, what s the best way Demo I m bored, what else can I do Integrating into the Marketing Cloud, a preview Examples Demo
MEAN/Full Stack Web Development - Training Course Package
Brochure More information from http://www.researchandmarkets.com/reports/3301786/ MEAN/Full Stack Web Development - Training Course Package Description: This course pack features a detailed exploration
Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
How to Extend Identity Security to Your APIs
How to Extend Identity Security to Your APIs Executive Overview The number of users and devices requesting access to applications is growing exponentially and enterprises are scrambling to adapt their
Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
CUSTOMER SAP Afaria Overview
SAP Afaria 7 SP15 Document Version: 1.0 2016-06-13 CUSTOMER Content 1 Afaria Overview....3 1.1 About Afaria....3 1.2 Afaria Access and Support....4 1.3 Finding Information....5 2 Afaria Architecture....7
Content Delivery Service (CDS)
Content Delivery Service (CDS) Xyleme delivers content management for learning and development. We transform the way you author, publish, deliver, and analyze learning content to drive business performance.
CARRIOTS TECHNICAL PRESENTATION
CARRIOTS TECHNICAL PRESENTATION Alvaro Everlet, CTO [email protected] @aeverlet Oct 2013 CARRIOTS TECHNICAL PRESENTATION 1. WHAT IS CARRIOTS 2. BUILDING AN IOT PROJECT 3. DEVICES 4. PLATFORM
CA Mobile Device Management 2014 Q1 Getting Started
CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
AVG Business SSO Partner Getting Started Guide
AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in
HTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
Qlik Sense Enabling the New Enterprise
Technical Brief Qlik Sense Enabling the New Enterprise Generations of Business Intelligence The evolution of the BI market can be described as a series of disruptions. Each change occurred when a technology
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
Secure Your Enterprise with Usher Mobile Identity
Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
Security in the Sauce Labs Cloud. Practices and protocols used in Sauce s infrastructure and Sauce Connect
Security in the Sauce Labs Cloud Practices and protocols used in Sauce s infrastructure and Sauce Connect Table of Contents page 2 page 4 page 6 page 8 page 9 page 10 page 11 Overview I. Sauce Labs Data
API-Security Gateway Dirk Krafzig
API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing
Frequently Asked Questions Aerohive ID Manager
Frequently Asked Questions Aerohive ID Manager About the Product... 1 Ordering FAQs... 4 Product Strategy... 6 About the Product 1. What is ID Manager? ID Manager is Aerohive s new cloud-based guest management
ENTERPRISE MOBILE BACKEND AS A SERVICE EVALUATION CHECKLIST
ENTERPRISE MOBILE BACKEND AS A SERVICE EVALUATION CHECKLIST Considerations for choosing a secure, scalable, and reliable enterprise mobile backend platform OVERVIEW Organizations often struggle with identifying
