Lecture 12: M.Sc. Project Overview

Size: px
Start display at page:

Download "Lecture 12: M.Sc. Project Overview"

Transcription

1 Security for Open Distributed Systems 1 1 Prof. Sead Muftic Lecture 12: M.Sc. Project Overview Security for Cloud and Mobile Environments

2 Cloud Access Points Communication and Applications 2 User Wi-Fi App-1 Internet User CAP AAP App-2 User 3G/4G Web

3 Cloud Security Components 3 IDMS PDP CA User Wi-Fi Internet App-1 User CAP/FW SAP AAP User 3G/4G App-2 CAP/FW Cloud Access Point / Firewall SAP Security Access Point (Portal Security ) AAP Application Access Point (Cloud Portal) IDMS Identity Management PDP Policy Decision Point CA Certification Authority

4 OpenStack Architecture 4

5 Central and Portal Security s 5 Central Security Security Cloud Station Web IDMS PACS CA Smart Cards SAML / PDP Cards Station Card Auth Portal Portal Station Internet Portal Security Internet Web / Portal A-1 Internet Web PEP VPN A-2 User Cloud Station Proxy Web / Portal A-3

6 M.Sc. Projects 6 Central Security Security Central Station Web IDMS PACS CA Smart Cards SAML / PDP Cards Station Card Auth Central Security (Home Page) Group 1: Cloud Security Management (Chenchen) Sanjaya: Security istration of the OpenStack Security Platform Arunendra: Secure IDMS for Financial Transactions in a Cloud Environment Davit: Secure Web Services for istration of Cloud Security s

7 Secure Cloud Applications Mail, Web, Documents 7 Portal Security Mail / Web Portal Mail Internet Web PEP VPN Web User Portal Station Proxy Web / Portal Doc Portal Security (Home Page)

8 Secure Cloud Applications SAFE System 8 SAFE System Internet Network Customer Browser Access SAFE Web Bank IT Bank Accounts DB Customer Merchant SMS SMS Gateway SAFE Communication SAFE Payments Mobile Accounts DB GPRS GSM/3G Network System Agent System SAFE Station Credit Card Credit Card Accounts DB

9 M.Sc. Projects 9 GSM/CDMA Network Customer SAFE Wallet Portal Security Mail / Web Portal Mail Internet Web PEP VPN Web User Portal Station Proxy Web / Portal Doc Group 2: Secure Cloud Applications (Ghafoor) Bibesh: Secure Cloud Client based on Smart Cards Daniel: Secure E mail and Secure Web in a Cloud Environment Natan: Secure Files/Documents Sharing System in a Cloud Environment (Ikram: Secure SEPA Web and Smart Card Clients) Feng: (Ph.D.) Secure SoA for Financial Environments

10 Hierarchical SEPA Security System 1 0 National SEPA Nat X-BIC Nat SEPA Station BIC DB Security Card SEPA Info X-Bank Interface X-Bank Transactions X-Bank Transactions Bank SEPA Bank SEPA DB DB Web Info Web Info Bank Interface Bank Interface

11 SEPA Cloud and Portals 11 Bank SEPA Portal Security DB Portal Portal Station Web PEP VPN Bank Interface Web Info Cloud Security Cloud Station Cloud Sec Proxy Bank SEPA Portal Security DB Portal Portal Station SEPA Cloud (Home Page) Web PEP VPN Bank Interface Web Info SEPA Portal (Home Page) Proxy

12 SEPA Clients Mobile, Web and Smart Cards 1 2 Bank SEPA Portal Security DB Web Info SEPA Customer SEPA Web Wallet Web PEP VPN Bank Interface SEPA SC Wallet Cloud Sec Proxy Portal Security Bank SEPA DB SEPA Customer SEPA Mobile Wallet SEPA Merchant SEPA Mobile Merchant Web PEP VPN Bank Interface Web Info SEPA SC Wallet SEPA POS Device Proxy

13 SEPA Mobile Wallet 1 3!

14 SEPA Payment Card 1 4 Soles Movil

15 SAFE / SEPA / PIV Card and Mobile Phone 1 5 Soles Movil!

16 M.Sc. Projects 1 6 Bank SEPA Portal Security DB Web Info SEPA Customer SEPA Web Wallet Web PEP VPN Bank Interface SEPA SC Wallet Cloud Sec Proxy SEPA Customer SEPA Mobile Wallet SEPA SC Wallet SEPA Merchant SEPA Mobile Merchant SEPA POS Device Group 3: Secure Financial Transactions (Feng) Salman: Secure SEPA Financial s Hafiz: Secure SEPA Cloud and Portals Web s Ikram: Secure SEPA Web and Smart Card Clients Mohammad: Secure SEPA Mobile Clients Feng: (Ph.D.): SAFE User / Web Services

17 Secure Messages for Mobile Applications 1 7 GSM Network SMS SAFE Gateway SAFE Bank Bank IT Clear Clear Protected (RSA) SAFE to Bank Protected (RSA) Protected (AES) Wallet to Bank (AES Shared key) Protected (AES) Thin / USSD Wallet Protected (RSA) Wallet to Bank (RSA Certificates) Protected (RSA) Thick Wallet

18 Trusted Stack 1 8 Cloud 4 Secure Mobile Applications 5 3G/GPRS Network Comm Switch 6 Service Switch Service Provider 7 Internet Network 3 Security Middleware Trusted Stack 2 Applets 2 Applets Services Switches Communications 4 M Appl 1 3 Middleware 2 Applets microsd Card SIM/UICC Chip Smart Cards 1 Chip (SE)

19 Secure Managements of UICC Modules 1 9

20 M.Sc. Projects 2 0 TSM OTA 3G/GPRS Network Comm Switch Service Switch Service Provider! NFC SEPA POS Device Protected (RSA) Phone to (RSA Certificates) Protected (RSA) Group 4: Secure Mobile Transactions (Hao) Dana: Security OTA Provisioning of Mobile Applications Girmay: Security of Mobile Applications based on Smart Cards Majid: Security Services for Mobile Applications Hao: (Ph.D.) Security Aspects for UICC Modules and Applications Pasquale: (Ph.D.) Trusted Stack

21 Secure Mobile POS Applications 2 1 Merchant 2 7 Receipt 1 PoS Device 6 Payments Wi-Fi NFC 3 4 SAFE System 5 Customer SAFE Communication 4 SAFE Payments Mobile Accounts DB 5

22 Secure Mobile Medical Applications 2 2

23 Secure Mobile Commerce Applications 2 3 SAFE System Internet Network Customer Ticketing Web 1 Ticketing Messages: 1 1 Theater enters ticket into in the system Customer searches for tickets Customer orders tickets Customer pays tickets 2 Events DB Tickets DB SAFE Tickets 4 Ticketing Station GSM/CDMA Network 3 SAFE Gateway SAFE Payments Customer Accounts DB

24 M.Sc. Projects 2 4 Group 5: Secure Mobile Applications (Aron) Kazi: Security Mobile POS System Zepu: Security Mobile System for Motor Vehicles Sabina: Secure Healthcare Applications for Mobile Devices! Aron: (Ph.D.) Security System for m Commerce Environments Ioannis: (Ph.D.) Privacy and Protection of Citizens in Mobile Environments

25 Sky and Clouds Home Pages 2 5 Dimensions and Sizes 218 x x x 88 Banner Security istration

26 Sky and Clouds Home Pages 2 6 Selection of Applications Users Sky / Cloud Logo Cloud Providers SEPA SAFE Applications Healthcare Sky / Clouds Portal Banner Promotion Area Information Area Security istration News, Info, Documents Web Design Tool: CMS Made Easy

27 Portals Home Pages 2 7 Security istration istrators Security istration Platforms Identities Certificates Smart Cards Authentication Authorization Provider s Portal Group 1 Group 2 Group 3 Group 4 Function 1.1 Function 1.2 Function 1.3 Function 1.4 Forms Area Display Area Portal Logo News, Info, Documents

28 Web Services Team 2 8 Web Services Group: Secure Web Services Hafiz: Secure SEPA Cloud and Portals Web Services Template Sanjaya: Web services for OpenStack istrators Arunendra: Web services for Security Providers istrators Davit: Web services for Security Providers istrators Natan, Daniel: Web services for Secure Applications istrators and Users Salman: Web services for SEPA Financial s istrators Ikram: Web services for SEPA Web Users Feng: Web services for SAFE istrators and Users

29 SecLab Security Architecture Portal Security Central / Shared Security Provider SSP Cloud Broker and SSP Web PEP IDMS CA SAML / PDP Station SSP Auth HA Cloud Security HA Cloud Platform Cloud Mail SAFE Enterprise Cloud /Users Web PEP Virtual s Web Doc SEPA Appl s MLA Cloud Security MLA Cloud Platform Mail SAFE User Cloud /Users Web PEP Virtual s Web Doc SEPA

30 Sec Broker HP: Selection of User Applications and Sec (Portal for Central Security ) Enterprise Appl s Secure Applications Home Architecture Security Applications User Cloud Secure Cloud Secure Web Cloud Secure Documents Cloud Secure Banking Cloud Secure Mobile Create Cloud Flash Area List of standard configurations (Configure, calculate, create) Link to Secure or Public Cloud

31 Sec Broker: Create Cloud Computer (Portal for Central Security ) Create Cloud SERVER TYPE Memory Clock Disk Network OS Price -- [ ] Small 2GB [ ] 2MHz [ ] 100GB [ ] 10Mb/sec [ ] Win 2008 [ ] $ 100 [ ] Medium 3GB [ ] 3MHz [ ] 200GB [ ] 20Mb/sec [ ] Win 2008 [ ] $ 200 Enterprise [ ] Large 4GB [ ] 4MHz [ ] 400GB [ ] 50Mb/sec [ ] Win 2008 [ ] $ 300 [ ] Super 16GB [ ] 8MHz [ ] 1TB [ ] 100Mb/sec [ ] Win 2008 [ ] $ 500 [ ] High Assurance Security [ ] Medium Assurance Security [ ] Low Assurance Security (PIV Smart Cards) (Software Certificates) (Password) Create Cancel

32 Cloud s istration HP (Portal for Central Security ) Cloud s istration Enterprise Secure Cloud s (List all Virtual s created by Create Cloud and select one to administer it) Appl s Secure Applications (List all Virtual s created by Create Cloud and select one. Then list all applications on that server. Select one to administer it) After selecting Virtual (by Enterprise ) or Secure Application (by Applications ) the system will transfer Ent or Appl to the s HP or Application HP located on Portals for HA Cloud (20.77) or for MLA Cloud (16). These HP are missing, must be created by Sanjaya and Appl Developers.

33 Sec HP: Sec Providers and Selection of Clouds /Sec (Portal for Central Security ) Security Providers istration Security Providers Identities Provider PKI/Certificates SSP PIV Smart Cards PIV Authentication PIV Authorization Secure Clouds Cloud SecLab Cloud Public Clouds SecLab Cloud Secure Cloud Home Page (20.77) Public Cloud Home Page (16)

34 Secure Cloud HP /Sec (Portal for Secure Cloud) Secure Platform Secure Cloud istration Cloud End-point Services Images Tenants and users Monitoring (Log) Networking / Firewall Certificates

35 Public Cloud HP /Sec (Portal for Public Cloud) Public Platform Public Cloud istration Cloud End-point Services Images Tenants and users Monitoring (Log) Networking / Firewall Certificates

36 Cloud Secure Application /Secure_ (Secure Cloud) Secure Secure Read Write Address Book Security Inbox User Outbox Drafts Junk Trash

37 Security for Open Distributed Systems Prof. Sead Muftic Lecture 12: M.Sc. Project Overview Security for Cloud and Mobile Environments

Software and Cloud Security

Software and Cloud Security 1 Lecture 12: Software and Cloud Security 2 Lecture 12 : Software and Cloud Security Subjects / Topics : 1. Standard ISO/OSI security services 2. Special problems, specific for software components and

More information

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES

SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden

More information

CryptoNET: Security Management Protocols

CryptoNET: Security Management Protocols CryptoNET: Security Management Protocols ABDUL GHAFOOR ABBASI, SEAD MUFTIC CoS, School of Information and Communication Technology Royal Institute of Technology Borgarfjordsgatan 15, SE-164 40, Kista,

More information

Generic, Secure and Modular (GSM) Methodology for Design and Implementation of Secure Mobile Applications

Generic, Secure and Modular (GSM) Methodology for Design and Implementation of Secure Mobile Applications Generic, Secure and Modular (GSM) Methodology for Design and Implementation of Secure Mobile Applications Feng Zhang 1, Ioannis Kounelis 1,2, and Sead Muftic 1 1 Communication Systems School of Information

More information

Secure Mobile POS System

Secure Mobile POS System A point of sale application for secure financial transitions in a mobile business enviroment KAZI MASUM SADIQUE KTH Information and Communication Technology Master of Science Thesis Stockholm, Sweden 2013

More information

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and

More information

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved.

Secure your Privacy. www.jrsys.com.tw. jrsys, Inc. All rights reserved. Secure your Privacy www.jrsys.com.tw CNN 2013/7/16 8:25PM Man Middle In The I got your ID/Password! Mobile Secure Secure sensitive access data Random Login Web Authentication One Secure Time Channel Password

More information

Strong Authentication Protocol using PIV Card with Mobile Devices

Strong Authentication Protocol using PIV Card with Mobile Devices KTH Information and Communication Technology Strong Authentication Protocol using PIV Card with Mobile Devices Kunning Mao KTH Royal Institute of Technology School of Information and Communication Technology

More information

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file

Page 1. Lecture 1: Introduction to. Introduction to Computer Networks Security. Input file DES DES DES DES. Output file 1 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 1: Introduction to Computer s Security Introduction to Computer s Security 4. security services and mechanisms 3 Approach 4 Introduction to Computer

More information

Entrust IdentityGuard Comprehensive

Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust

More information

Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications

Page 1. Smart Card Applications. Lecture 7: Prof. Sead Muftic Matei Ciobanu Morogan. Lecture 7 : Lecture 7 : Smart Card Applications in Open Distributed Processing s 1 in Open Distributed Processing s 2 Prof. Sead Muftic Matei Ciobanu Morogan Lecture 7: 1 2 in Open Distributed Processing s 3 in Open Distributed Processing s Smart s

More information

SAP NetWeaver AS Java

SAP NetWeaver AS Java Chapter 75 Configuring SAP NetWeaver AS Java SAP NetWeaver Application Server ("AS") Java (Stack) is one of the two installation options of SAP NetWeaver AS. The other option is the ABAP Stack, which is

More information

VMware Workspace Portal Reference Architecture

VMware Workspace Portal Reference Architecture VMware Workspace Portal 2.1 TECHNICAL WHITE PAPER Table of Contents Executive Summary.... 3 Overview.... 4 Hardware Components.... 5 VMware vsphere.... 5 VMware Workspace Portal 2.1.... 5 VMware Horizon

More information

Hosting topology SMS PASSCODE 2015

Hosting topology SMS PASSCODE 2015 Hosting topology SMS PASSCODE 2015 Hosting Topology In a hosting environment, you have a backend and a several front end (clients). In the example below, there is a backend at the right side. At the left

More information

HOL9449 Access Management: Secure web, mobile and cloud access

HOL9449 Access Management: Secure web, mobile and cloud access HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

SERVICES & CAPABILITIES

SERVICES & CAPABILITIES SERVICES & CAPABILITIES 2014 CAPABILITIES CASHLESS EVENT (Key benefits from this new technology) TICKETING: (Key benefits from this new technology) MEMBERSHIP DRIVES. LEAD GENERATION FACEBOOK COMMUNITY

More information

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in

More information

Kaspersky Security for Mobile Administrator's Guide

Kaspersky Security for Mobile Administrator's Guide Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Banking. Extending Value to Customers. KONA Banking product matrix. KONA@I is leading the next generation of payment solutions.

Banking. Extending Value to Customers. KONA Banking product matrix. KONA@I is leading the next generation of payment solutions. Smart IC Banking Banking Extending Value to Customers KONA Banking product matrix Contact - SDA Product EEPROM Java Card Type KONA Products KONA@I is leading the next generation of payment solutions Banks,

More information

Who s Endian? www.cloudrouter.dk

Who s Endian? www.cloudrouter.dk Who s Endian? Endian was founded in 2003 at Appiano, Italy, by a team of experienced network specialists and Linux enthusiasts. Endian s goal and path of development are immediately clear: creating sophisticated

More information

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses

STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses STATE OF NEW YORK IT Transformation Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses June 8, 2012 Appendix B Consolidated Vendor Questions with

More information

Mobile Office Security Requirements for the Mobile Office

Mobile Office Security Requirements for the Mobile Office Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

Mobile Wallet Platform. Next generation mobile wallet solution

Mobile Wallet Platform. Next generation mobile wallet solution Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator

More information

Managed Security Web Portal USER GUIDE

Managed Security Web Portal USER GUIDE Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1

More information

Deriving a Trusted Mobile Identity from an Existing Credential

Deriving a Trusted Mobile Identity from an Existing Credential Deriving a Trusted Mobile Identity from an Existing Credential Exploring and applying real-world use cases for mobile derived credentials +1-888-690-2424 entrust.com Table of contents Approval of the mobile

More information

Oracle Desktop Virtualization

Oracle Desktop Virtualization Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on

More information

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco

More information

ICT budget and staffing trends in the UK

ICT budget and staffing trends in the UK ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget

More information

Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios

Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios Overview Citrix XenApp, XenDesktop and NetScaler are commonly used in the creation of Payment Card Industry (PCI), Data Security

More information

Sophos Mobile Control Technical Guide. Product version: 3

Sophos Mobile Control Technical Guide. Product version: 3 Sophos Mobile Control Technical Guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...3 2 Integration...5 3 Architecture...7 4 Workflow...12 5 Directory Access...14

More information

Using RD Gateway with Azure Multifactor Authentication

Using RD Gateway with Azure Multifactor Authentication Using RD Gateway with Azure Multifactor Authentication We have a client that uses RD Gateway to allow users to access their RDS deployment from outside their corporate network. They have about 1000+ users.

More information

Deliver Desktops as a Service! With VDI 2.0!

Deliver Desktops as a Service! With VDI 2.0! Deliver Desktops as a Service! With VDI 2.0! Me! About the Author! Two smart people I work with! Gartner does not endorse any vendor, product or service depicted in our research publications, and does

More information

VPN Client User s Guide. 9235966 Issue 2

VPN Client User s Guide. 9235966 Issue 2 VPN Client User s Guide 9235966 Issue 2 Copyright 2004 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the

More information

Advanced Administration

Advanced Administration BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What

More information

Adaptive Authentication Integration Options. John Murray Manager, RSA Systems Engineering

Adaptive Authentication Integration Options. John Murray Manager, RSA Systems Engineering Adaptive Authentication Integration Options John Murray Manager, RSA Systems Engineering What is RSA Adaptive Authentication? Comprehensive authentication and fraud detection platform Powered by Risk-Based

More information

Flash Storage Optimizing Virtual Desktop Deployments

Flash Storage Optimizing Virtual Desktop Deployments Flash Storage Optimizing Virtual Desktop Deployments Ashok Rajagopalan UCS Product Management May 2014 In Collaboration with Intel Old Fashioned VDI (circa 2012) was Financially Unattractive to Most Average

More information

Jrsys International Corp.

Jrsys International Corp. Jrsys International Corp. Advance Mobile/Cloud Security Solutions James Wu www.jrsys.com.tw Jrsys Introduction Friends from 128 countries Mobile and Cloud security solution provider Secure mobile devices:

More information

Policy and Profile Reference Guide

Policy and Profile Reference Guide BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Policy and Profile Reference Guide Published: 2014-06-16 SWD-20140616165002982 Contents 1 About this guide... 10 2 New IT policy

More information

SEPA Clients in A Secure Cloud Banking Environment IKRAM RAHIM. Master s Degree Project Stockholm, Sweden 2013. Master Thesis in Communication Systems

SEPA Clients in A Secure Cloud Banking Environment IKRAM RAHIM. Master s Degree Project Stockholm, Sweden 2013. Master Thesis in Communication Systems SEPA Clients in A Secure Cloud Banking Environment Master Thesis in Communication Systems IKRAM RAHIM Master s Degree Project Stockholm, Sweden 2013 TRITA-ICT-EX-2013:4 Acknowledgements Thanks God for

More information

msuite5 & mdesign Installation Prerequisites

msuite5 & mdesign Installation Prerequisites CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...

More information

iphone Softphone App for the Opera IP System Installation and user guide

iphone Softphone App for the Opera IP System Installation and user guide iphone Softphone App for the Opera IP System Installation and user guide IPhone App Installation and Use Specifications are subject to change without notice. Facilities described may or may not be supported

More information

Junos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: 2013-10-18. Copyright 2013, Juniper Networks, Inc.

Junos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: 2013-10-18. Copyright 2013, Juniper Networks, Inc. Junos Pulse Windows In-Box Junos Pulse Client Quick Start Guide Published: 2013-10-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Toward Connected Vehicle with AGL

Toward Connected Vehicle with AGL Toward Connected Vehicle with AGL September 9 th 2015 (at the AGL All Member Meeting - 2015 Fall) Ken-ichi Murata BR Connected Strategy & Planning Toyota Motor Corporation 68% of new vehicle will be connected

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

BIG-IP Access Policy Manager Tech Note for BIG-IP Edge Client App for ios

BIG-IP Access Policy Manager Tech Note for BIG-IP Edge Client App for ios BIG-IP Access Policy Manager Tech Note for BIG-IP Edge Client App for ios 2 OpenTopic TOC Contents What is BIG-IP Edge Client app for ios?... 3 About supported authentication types... 3 About establishing

More information

Cloudessa AAA and Captive Portal Cloud Service

Cloudessa AAA and Captive Portal Cloud Service Cloudessa AAA and Captive Portal Cloud Service Key Advantages Cloudessa AAA and Captive Portal Cloud Service makes it easy for any merchant, venue, institution, or organization to provide on-site WiFi

More information

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release

More information

Applying Common Criteria to a cloud type payment service

Applying Common Criteria to a cloud type payment service 1 Applying Common Criteria to a cloud type payment service Kenji Yamaya ECSEC Laboratory Inc. 2 Evaluation of a cloud system Tablet internet cloud Newly developed terminal products Mobile POS Smart Phone

More information

Secure Over the Air (OTA) Management Of Mobile Applications

Secure Over the Air (OTA) Management Of Mobile Applications Secure Over the Air (OTA) Management Of Mobile Applications Dinakaran Rajaram KTH-Royal Institute of Technology School Of Information and Communication Technology Communication Systems Master of Science

More information

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010 Foundation IT Written approximately Dec 2010 1 Outlook Web Access With the new version of Exchange 2010 Outlook Anywhere has been enabled and configured with a secure socket layer (SSL) certificate from

More information

Secure Authentication for the Development of Mobile Internet Services Critical Considerations

Secure Authentication for the Development of Mobile Internet Services Critical Considerations Secure Authentication for the Development of Mobile Internet Services Critical Considerations December 2011 V1 Mobile Internet Security Working Group, SIMalliance AGENDA SIMalliance presentation What s

More information

idash Infrastructure to Host Sensitive Data: HIPAA Cloud Storage and Compute

idash Infrastructure to Host Sensitive Data: HIPAA Cloud Storage and Compute integrating Data for Analysis, Anonymization, and SHaring idash Infrastructure to Host Sensitive Data: HIPAA Cloud Storage and Compute Claudiu Farcas, Antonios Koures Outline Infrastructure Overview Typical

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

Managing BlackBerry Enterprise Service 10 version 10.2

Managing BlackBerry Enterprise Service 10 version 10.2 Managing BlackBerry Enterprise Service 10 version 10.2 Course details Course code 726-08882-123 Approximate duration Labs 3 days Labs are included in this course Course overview This course explains how

More information

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0

How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0 How to set up the HotSpot module with SmartConnect Panda GateDefender 5.0 Content Introduction... 3 Minimum requirements to enable the hotspot module... 4 Hotspot settings... 6 General settings....6 Configuring

More information

! Context: IoT, CPS and M2M! Challenges in M2M! Evolutionary M2M the FiDM way! Focus on: ! Conclusion 2

! Context: IoT, CPS and M2M! Challenges in M2M! Evolutionary M2M the FiDM way! Focus on: ! Conclusion 2 UMR 5205 On the Integration of Federated Identity Management in M2M middleware Youakim Badr!! LIRIS Lab, SOC team! INSA-Lyon! The 3 rd Franco American Workshop On CyberSecurity, Lyon, December 9-11, 2014

More information

Tehran Traffic Control Company. Shabnam Farahani Tehran Traffic Control Company. Farshad Jalali Tehran Traffic Control Company

Tehran Traffic Control Company. Shabnam Farahani Tehran Traffic Control Company. Farshad Jalali Tehran Traffic Control Company Mobile Phone as a medium for Electronic Toll Collection Toward developing a virtual e-wallet Tehran Congestion Charging Experience Hojat Behrooz Tehran Traffic Control Company Shabnam Farahani Tehran Traffic

More information

PRIVACY, SECURITY AND THE VOLLY SERVICE

PRIVACY, SECURITY AND THE VOLLY SERVICE PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers

More information

Clodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage

Clodoaldo Barrera Chief Technical Strategist IBM System Storage. Making a successful transition to Software Defined Storage Clodoaldo Barrera Chief Technical Strategist IBM System Storage Making a successful transition to Software Defined Storage Open Server Summit Santa Clara Nov 2014 Data at the core of everything Data is

More information

U.S. Department of Agriculture HSPD 12 Program. USDA HSPD-12 Implementing PIV cards @ USDA

U.S. Department of Agriculture HSPD 12 Program. USDA HSPD-12 Implementing PIV cards @ USDA U.S. Department of Agriculture HSPD 12 Program USDA HSPD-12 Implementing PIV cards @ USDA April 2009 USDA and the GSA HSPD-12 Shared Solution USDA has been at the forefront of driving a shared solution

More information

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described

More information

2013 AWS Worldwide Public Sector Summit Washington, D.C.

2013 AWS Worldwide Public Sector Summit Washington, D.C. Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company

More information

Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network

Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network Wireless Network Names and Credentials There are two wireless networks operating at the Goldfields

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

Creating a Strong Security Infrastructure for Exposing JBoss Services

Creating a Strong Security Infrastructure for Exposing JBoss Services Creating a Strong Security Infrastructure for Exposing JBoss Services JBoss Enterprise SOA Platform Service Clients Service Gateway Enterprise Services Blake Dournaee, Product Management, Intel SOA Products

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync

More information

CA Mobile Device Management 2014 Q1 Getting Started

CA Mobile Device Management 2014 Q1 Getting Started CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Centrify Identity Service and Mac - Online Training

Centrify Identity Service and Mac - Online Training C E N T R I F Y D A T A S H E E T M A R C H 2015 Centrify Identity Service and Mac - Online Training Overview This course is designed for administrators of the Centrify User Suite and mobile devices. At

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

SSL VPNs: An IETF Perspective

SSL VPNs: An IETF Perspective SSL VPNs: An IETF Perspective IETF 72, Dublin Paul Hoffman, VPNC Overview Why this might be interesting Intro to SSL VPN technologies Where SSL VPNs use IETF technologies, and where they make up their

More information

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0 ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,

More information

Proof of Concept Guide

Proof of Concept Guide Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

Master Thesis in Information and Communication Systems Security SALMAN KHAN

Master Thesis in Information and Communication Systems Security SALMAN KHAN Master Thesis in Information and Communication Systems Security SALMAN KHAN Abstract Due to Information Technology (IT) the world has become a global village. We can get information from anywhere on a

More information

Version 2.3. Operations Manual for Users, Agents and Merchants

Version 2.3. Operations Manual for Users, Agents and Merchants SETECS SAFE System Secure Mobile Transactions System Version 2.3 Operations Manual for Users, Agents and Merchants (for Smart Phone Applications) ~~~~~~~~~~~~~~~~ December 2011 Copyright 2009 2011 SETECS

More information

NCP Secure Enterprise Management Next Generation Network Access Technology

NCP Secure Enterprise Management Next Generation Network Access Technology Data Sheet NCP Secure Enterprise Management Next Generation Network Access Technology General description NCP Secure Enterprise Management is the central component of the NCP Next Generation Network Access

More information

Quick Start Guide: Iridium GO! Advanced Portal

Quick Start Guide: Iridium GO! Advanced Portal Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...

More information

SVN5800 Secure Access Gateway

SVN5800 Secure Access Gateway The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,

More information

CIDR Range Subnet Mask 85.115.32.0/19 85.115.32.0-85.115.63.255 85.115.32.0 255.255.224.0

CIDR Range Subnet Mask 85.115.32.0/19 85.115.32.0-85.115.63.255 85.115.32.0 255.255.224.0 MAC Endpoint Technical Overview Overview Websense MAC Web Endpoint is designed to provide a seamless experience to end users for authenticating and directing traffic to the Websense Cloud Security infrastructure.

More information

Deploying iphone and ipad Virtual Private Networks

Deploying iphone and ipad Virtual Private Networks Deploying iphone and ipad Virtual Private Networks Secure access to private corporate networks is available on iphone and ipad using established industry-standard virtual private network (VPN) protocols.

More information

Trådløs forbindelse. Juni 2011. Peter Fuglsang Product Application Engineer Automation

Trådløs forbindelse. Juni 2011. Peter Fuglsang Product Application Engineer Automation Trådløs forbindelse Juni 2011 Peter Fuglsang Product Application Engineer Automation Trådløs kommunikation Definition af netværk Trådløse produkter fra Schneider Electric RTU moduler Trådløse Løsninger

More information

FBZ General Information. Cloud Mobile Banking 13,10,14-5. Copyright FBZ 2012-2013 All rights reserved

FBZ General Information. Cloud Mobile Banking 13,10,14-5. Copyright FBZ 2012-2013 All rights reserved FBZ General Information Cloud Mobile Banking 13,10,14-5 Copyright FBZ 2012-2013 All rights reserved FBZ General information Cloud Banking Copyright (c) 2012-2013 Page 1 Read this first Thank you for choosing

More information

Cloud Store & Share Frequently Ask Questions

Cloud Store & Share Frequently Ask Questions Cloud Store & Share Frequently Ask Questions Where can I find information about the offer, e.g. the price list? How can I order the service? What is the Cloud Store & Share Client? Where can I download

More information

GuestAir Administrators Guide

GuestAir Administrators Guide GuestAir Administrators Guide 1. Introduction 2. Companies 3. Users 4. Zones 5. SonicWALL Configuration 6. Emails 7. User Auth Logins 8. User Registration 9. Facebook Logins 10. Editing Templates 11. File

More information

Remote Access via VPN Configuration (May 2011)

Remote Access via VPN Configuration (May 2011) Remote Access via VPN Configuration (May 2011) Contents Copyright...2 Important Considerations...3 Introduction...4 Supported router models... 4 Installation Topology... 4 Dynamic IP Configuration (DynDNS)...5

More information

Your Mobile Phone as a Ticket (NFC)

Your Mobile Phone as a Ticket (NFC) Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal [email protected] Abstract.

More information