SNAP: Secure Network Access Partnering
|
|
|
- Clemence Bell
- 10 years ago
- Views:
Transcription
1 SNAP: Secure Network Access Partnering (and Partnering for Secure Network Access ) Dynamic Coalition Formation at its best (sigmund@best). Inherent Security. HA. High-Performance. Server/Storage Virtualization. Scalability. UNIX/Linux, Windows & Mac OS X Interoperability 1
2 Business Challenges for the Defense, Government, Intelligence, Public Safety Communities and High-Sensitive Industrial Areas Access to multiple overlapping Security Domains Secure data transfer between Domains Ability to meet the highest Common Criteria Evaluation Access Level (EAL) Scalability and HA Maximize operation efficiency MINIMIZE COST 2
3 Solutions of Access to Multiple Security Domains Stove-piped ("Air Gap") Solution + physically isolated clients (networks) - often resulting in up to 10 different PCs in a single office Overlapping Domains Solution + allows collaboration on defined data by role-based individuals using defined processes on overlapping domains - requires the highest Common Criteria Eval. Acc. Level (EAL) certification of the OS in order to become 'Air-Gap'-Secure 3
4 SNAP Overlapping Security Domains Solutions Proven in Real- World Applications Joint Intelligence Center Pacific (JICPAC) Intelligence Center for the Pacific Command Collaboration between multiple disparate intelligence and military agencies requires simultaneous access to applications residing in multiple secure domains 24/7h operation of 1000 seats Maximize operation efficiency Projected 90% cost reduction over 5 years Meets highest levels of DOD Trusted Computing Deployment Criteria Space and Naval Warfare Systems Command (SPAWAR) Secure collaboration among up to 60 countries involved in the coalition effort in Persian Gulf Multiple levels of security and access spec's Intelligence Government Control Center military INS DEA Coalition Sun Network Access Platform Solution 4
5 Ready f. Collaboration-Deployment by Industry/Commerce, EDU&Research, Regional&Local Public Authorities? Enterprise Headquarters, Central EDU & Research Institution Regional Industry or Commerce Subsidiary, EDU &Research Site, Public Authotity Branch Office, Local EDU& Research Site, Local Public Authority Home Office, Collaborating Partner, Outsourced Capacity, Mobile Use, Public Access Kiosk 5 5
6 Function Independent Certification - Common Criteria IBM Sun Sun HP Microsoft Red Hat AIX 5L v5.3 Solaris 10 HP-UX 11i EAL 4, CAPP, RBACPP, LSPP (B1) Provides the highest level of assurance of any OS EAL 4, CAPP (C2) W2k oly Provides the second highes level of assurance of OS More Granular User Control Role-Based Access Control (RBAC) (Adminis. enforced) Ability to allocate access rights based on role. BENEFIT: Increases the accountability and granularity of user control over other standard OS levels. User Rights Management Centralized database which specifies what users rights are granted to users. BENEFIT: Limits user's access to applications and functions within applications. Process Rights Management Fine-grained privileges are used instead of a single superuser. BENEFIT: Limits the power of applications so that they are not subject to abuse. Prevent Eavesdropping in Windows Environment Trusted X11 Windows Environment Enforces mandatory and discretionary access control within the window system. BENEFIT: All wiindows are labeled according to their sensitivity. OS Security Functions Partial (No Admins.) Partial Partial Partial (No Admins.) (No Admins.) Trusted Solaris 10 Windows Server 2003 N.A. Advanced Server 4.0 (SE Linux) 6
7 Function Trusted Path Allows for uninterrupted communication between the Trusted X11 windows server and the window manager. BENEFIT: Helps assure that users are not tricked by hostile programs into supplying information that might be used to penetrate the system. Selection Confirmation Forces users to confirm the transfer of information (text, graphics, etc.) between windows. BENEFIT: Prevents information flow between windows system objects. Increased Privacy Mandatory Access Control (MAC) A system-enforced policy in which all data objects are labeled according to their sensitivity and users may be cleared for one or more labels. BENEFIT: Prevents information flow between users and processes unless they have compatible labels. Labeled Printing Associates sensitivity label ranges with individual printers. Records label of data on each page and on banner and trailer pages. BENEFIT: Restricts the security levels of information sent to individual printers. Guarantees that output is properly labeled. OS Security Functions (Cont'd.) IBM Sun Sun HP Microsoft Red Hat Windows Advanced Trusted AIX 5L v5.3 Solaris 10 HP-UX 11i Server Server 4.0 Solaris (SE Linux) Partial 7
8 OS Security Functions (Cont'd.) Function Trusted Networking All information flows on a system are labeled and access control is enforced.benefit: Prevents information flow between clients and servers unless they have the same label. Multi-level File System All files and directories are protected according to their label BENEFIT: Prevents information from being downgraded via the file system. Reduced Risk of Security Violations Security Labels Allows information to be classified at appropriate security sensitivity levels. BENEFIT: Only owners with the corresponding security clearance can access the information residing on the device. Clearances The degree of security with which a user is entrusted. BENEFIT: Restricts access based on need to know. Audit all or Selected User Actions Records all security-relevant events in a tamper-proof audit trail. BENEFIT: Allows securing of data deemed highly secure. IBM Sun Sun HP Microsoft Red Hat Windows Advanced Trusted AIX 5L v5.3 Solaris 10 HP-UX 11i Server Server 4.0 Solaris (SE Linux) Partial 8
9 Function Prevent Spoofing Programs Trusted Path Attribute A process attribute which indicates the ancestry of trusted programs. BENEFIT: Process with questionable ancestry can't acquire privilege via RBAC. Limit Privileges Defines an upper bound for a zone, or for an account. BENEFIT: Applications can't become more powerful than they already are. Protect Local Devices from Unauthorized Users Device Allocation based on Label Assigns a device or group of devices to a particular user or group of users based on security labels and MAC privileges. BENEFIT: Prevents unauthorized removal of data from the system. Pluggable Authentication Module An extensibile authentication framework with standard APIs. BENEFIT: Provides failed-login account locking, trusted path checking, and machine generated passwords, without the need to change code. Name Service Support All systems share a common repository of security attributes and policies. BENEFIT: Provides a single system image with consistent identity and policy. OS Security Functions (Cont'd.) IBM Sun Sun HP Microsoft Red Hat Windows Advanced Trusted AIX 5L v5.3 Solaris 10 HP-UX 11i Server Server 4.0 Solaris (SE Linux) No - proprietary 9
10 OS Security Functions (Cont'd.) IBM Sun Sun HP Microsoft Red Hat Windows Advanced Trusted AIX 5L v5.3 Solaris 10 HP-UX 11i Server Server 4.0 Solaris 10 Function 2003 (SE Linux) Trusted Mail can be received by an account only if the message is within the account's clearance. BENEFIT: Prevents information flow between users unless they have the same label. Investment Protection Runs most Off-the-Shelf Solaris Apps. BENEFIT: Protects customer's existing application development. Runs Alongside Standard Solaris BENEFIT: Allows customers to add Trusted Solaris security to systems as needed while continuing to use their existing systems. N.A. N.A. N.A. N.A. N.A. N.A. N.A. N.A. N.A. 10
11 Summary: The Most Secure Certified Operating Environment in the Industry Is By Far the Trusted Solaris Trusted Solaris Solaris EAL4 or EAL4+ (c2) (CAPP only) Windows 2000 HP-UX EAL4 (B1) (CAPP, RBPP, LSPP) IBM AIX EAL3 SGI Irix EAL 2 Based on data from Linux Only OS Certified with EAL4 and 3 Protection Profiles in EAL4: CAPP: Controlled Access Protection Profile (Ensures proper login) RBPP: Role-based Protection Profile (Role-based access control allows the system administrator to define roles based on job functions within an organization. The administrator assigns privileges to those roles) LSPP: Labeled Security Protection Profile (All data and application components are formally labeled addressed, and tracked through role based access control. 11
12 Implications: Widespread deployment of the Sun Secure Network Access Platform (SNAP) for collaboration in high-security areas with overlapping Security Domains Top Secret Top Secret Releaseable on the Partner A Secret Secret Releaseable on the Partner B Secure Network Access Platforms deployed e.g. in the area of Homeland Security: its Security Domains overlap with those of - Defense - Government - Intelligence - Public Safety Communities relying on the Security Certification of Trusted Solaris Top Secret Releaseable on Partner A Secret Releaseable on Partner B 12
13 Ready for Industry/Commerce/Local Public Communities? Don't reinvent the wheel: you can start to evaluate&implement Secure Network for Collaboration today - if you involve a local EDUand/or Public R&D partner (Call sigmund@best - Secret 089/ ) Confidential Unclassified for Emplyees Shared w/ external EDU or R&D Partner C Shared w/ Secure Network Access Platforms for collaboration with your local EDU and/or Public R&D partners - they get Trusted Solaris for free if deployed in Research&Development Projects in conjuction with - Industry - Commerce - Local, Regional or Government Public Authorities - other EDU & Research Institutions Secret ext.edu/r&d Partner C 13
14 Don't Reinvent the Wheel Use the proven Reference Architectures while collaborating w/ a local EDUor R&D institution of your choice Anläßlich der Fachtagung best Open Systems Spring'05 laden wir Sie zu unsem Frühjahrs-Sonderprogramm in Zusammenarbeit mit der bayerischen Lehre & Forschung ein, um die Praxisanbindung von F&L an die Industrie/Kommerz/Behörden in Bayern zu fördern *): SNAP - Secure Network Access Partnering Action - Pre-integrated&tested Secure Network Access Plattforms **) - Real-world proven Reference Architectures - collaborative design within 2 hours on your site - flexible to meet your needs - Customer-Ready-Solution coming pre-integrated&tested with detailed Techn.Guides - best Systeme GmbH is a. Sun Data Center System Provider. Sun Service Manager. Sun Accredited Installation Provider (AIP). Sun Cluster Specialty Partner. Sun Campus Reseller for EDU & Research. Preferred Oracle Real Application Cluster (RAC) Partner of Oracle Corp.. Preferred Partner of Veritas, Legato, StorageTek, IBM, HDS, ADIC, Cisco SNAP-5 5 Arbeitsplätze 8.500,00 (+MwSt.) heterogene Secure Network Konfiguration 1 64-Bit AMD Opteron150 Workstation 2.4GHz/1GB/Grafik 1 64-Bit Unix RISC Workstation 1.5GHz/3GB/Grafik 2 SunRay Secure Clients 1 SunRay Remote Secure Client (wie Notebook, inkl. TFT-LCD) - incl. aller SW-Liz. (m. Ausnahme der MS Win. Liz. f. d. Teilpos.1, Opter.WS) f. d. Dauer einer bis zu 2-Jahres-Aufbauphase von SNAP bei Ihnen - ext. Monitore nicht beinhaltet (beliebige PC-Monitore verwendbar) SNAP-8 8 Arbeitsplätze ,00 (+MwSt.) wie oben, jedoch 3 SunRay Secure Clients 3 SunRay Remote Secure Clients (inkl. TFT) *) Zeitlich begrenzte Sonderaktion bis zum Irrtum und Änderungen der Hersteller vorbehalten **) Call 089/ oder [email protected] 14
Certification Report
Certification Report EAL 4+ Evaluation of Solaris 10 Release 11/06 Trusted Extensions Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
CAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD
CAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD Robert N. M. Watson Security Research Computer Laboratory University of Cambridge March 23, 2006 Introduction Background Common Criteria,
Common Criteria Evaluation Challenges for SELinux. Doc Shankar IBM Linux Technology Center [email protected]
Common Criteria Evaluation Challenges for SELinux Doc Shankar IBM Linux Technology Center [email protected] Agenda Common Criteria Roadmap/Achievements CAPP/LSPP Overview EAL4 Overview Open Sourcing
SOLARIS 10 SECURITY. Technical Overview. Andreas Neuhold Systems Practice Lead Austria Sun Microsystems, GesmbH
SOLARIS 10 SECURITY Technical Overview Andreas Neuhold Systems Practice Lead Austria Sun Microsystems, GesmbH Solaris 10 Lizenzen Millions ~ 7M ZFS 7,0 6,5 6,0 5,5 Solaris Container 5,0 4,5 4,0 3,5 3,0
Oracle Desktop Virtualization
Oracle Desktop Virtualization Oracle Desktop Virtualization Portfolio Oracle Desktop Virtualization Portfolio Software. Hardware. Complete. Oracle Virtual Desktop Infrastructure VDI desktops to users on
Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments. Dragos Manac 01.10.2008
Red Hat Enterprise IPA Identity & Access Management for Linux and Unix Environments Dragos Manac 01.10.2008 Agenda The Need for Identity & Access Management Enterprise IPA Overview Pricing Questions to
OPTIONS / AGENTS DESCRIPTION BENEFITS
All Backup Exec 12 Agents and Options Backup Exec 12 Agents and Option enhance and extend platform and feature support for Backup Exec Environments. Whether you need to protect critical Microsoft applications
CimTrak Technical Summary. DETECT All changes across your IT environment. NOTIFY Receive instant notification that a change has occurred
DETECT All changes across your IT environment With coverage for your servers, network devices, critical workstations, point of sale systems, and more, CimTrak has your infrastructure covered. CimTrak provides
Security Enhanced Linux and the Path Forward
Security Enhanced Linux and the Path Forward April 2006 Justin Nemmers Engineer, Red Hat Agenda System security in an insecure world Red Hat Enterprise Linux Security Features An overview of Discretionary
White Paper Levels of Linux Operating System Security
White Paper Levels of Linux Operating System Security Owl Approach to the Hardening of Linux Abstract Cross Domain Solutions produced by Owl Computing Technologies, Inc., running on Security Enhanced (SE)
Red Hat Enterprprise Linux - Renewals DETAILS SUPPORTED ARCHITECTURE
Red Hat Enterprprise Linux - Renewals PRODUCT CODE DESCRIPTION 1 Year DETAILS SUPPORTED ARCHITECTURE Red Hat Enterprise Linux Advanced Platform Red Hat Enterprise Linux Advanced Platform, (unlimited Red
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
Operating Systems compatible with GigasoftOBM / GigasoftACB (Supported Operation System List):
Product Version: Gigasoft Software: Post6.0 Description: This document lists the available operating systems, platforms, and applications specifically tested to be compatible with Ahsay software. Contents:
What s New in Centrify Server Suite 2013 Update 2
CENTRIFY SERVER SUITE 2013.2 DATA SHEET What s New in Centrify Server Suite 2013 Update 2 The new Centrify Server Suite 2013 Update 2 (2013.2) builds on the core enhancements Centrify introduced in Server
RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION
RSA ACCESS MANAGER Web Access Management Solution ESSENTIALS Secure Access Enforces access to Web applications based on risk and context Centralizes security and enforces business policy Web Single Sign-on
Samba in the Enterprise : Samba 3.0 and beyond
Samba in the Enterprise : Samba 3.0 and beyond By Jeremy Allison [email protected] [email protected] Where we are now : Samba 2.2 The current Samba is a credible replacement for a Windows server providing
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
Compatibility Matrixes. Blackboard Academic Suite
Compatibility Matrixes Application Pack 3 (Release 6.3) Blackboard Learning System Blackboard Community System Blackboard Learning System - Basic Edition (Release 2.3) Blackboard Content System PRODUCT
NCIRC Security Tools NIAPC Submission Summary Harris STAT Scanner
NCIRC Security Tools NIAPC Submission Summary Harris STAT Scanner Document Reference: Security Tools Internal NIAPC Submission NIAPC Category: Vulnerability Scanning Date Approved for Submission: 24-04-2007
Operating System Compiler Bits Part Number CNL 6.0 AMD Opteron (x86-64) Windows XP x64 Intel C++ 9.0 Microsoft Platform SDK 64 P10312
This document is published periodically as a service to our customers. Supported environments are always changing, so if do not see your environment listed, please go to http://www.vni.com/forms/scp_request.html
How Private Industry Protects Our Country's Secrets. James Kirk
An Inside Look Into Defense Industrial Base (DIB) Technical Security Controls: How Private Industry Protects Our Country's Secrets James Kirk Outline Background DOD Agency Responsible for Interpretation
Veritas NetBackup 6.0 Server Now from Symantec
Veritas NetBackup 6.0 Server Now from Symantec Innovative data protection As the recognized leader for enterprise-class backup and recovery, Veritas NetBackup Server software is designed to help provide
OracleAS Identity Management Solving Real World Problems
OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability
IBM Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
Integrated Approach to User Account Management
Mission Critical Enterprise Systems Symposium 2006 Integrated Approach to User Account Management Kesselman, Glenn and Smith, William Lockheed Martin Mission Services Quest Software Public Sector October
Reference Guide for Security in Networks
Reference Guide for Security in Networks This reference guide is provided to aid in understanding security concepts and their application in various network architectures. It should not be used as a template
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
Technical Specification Data
Equitrac Office 4.1 SOFTWARE SUITE Equitrac Office Software Suite Equitrac Office Suite Equitrac Office Small Business Edition (SBE) Applications Any size network with single or multiple accounting and/or
ArcSDE Oracle Database Requirements
ArcSDE Oracle Database Requirements Supported Database Versions Supported Operating Systems Database Requirements Operating System Limitations Supported Database Versions Standard/Standard One/Enterprise
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
Framework 8.1. External Authentication. Reference Manual
Framework 8.1 External Authentication Reference Manual The information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys
Satish Mohan. Head Engineering. AMD Developer Conference, Bangalore
Satish Mohan Head Engineering AMD Developer Conference, Bangalore Open source software Allows developers worldwide to collaborate and benefit. Strategic elimination of vendor lock in OSS naturally creates
Improvements Needed With Host-Based Intrusion Detection Systems
Report No. DODIG-2012-050 February 3, 2012 Improvements Needed With Host-Based Intrusion Detection Systems Warning This report is a product of the Inspector General of the Department of Defense. Its contents
Hitachi Backup Services Manager Certified Configurations Guide 6.5
Hitachi Backup Services Manager Certified Configurations Guide 6.5 Doc ID:MK-96APT014-02 i ii Chapter 0Preface Thank you for purchasing Hitachi TM Backup Services Manager powered by APTARE. About This
Virtualization Case Study
INDUSTRY Finance COMPANY PROFILE Major Financial Institution. BUSINESS SITUATION Internal security audits found that VMware ESX, Red Hat Linux, and Solaris systems lacked an efficient way to control access
HOB Remote Desktop VPN Secure access for remote workers and business partners to your enterprise network
HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Tel: +49 9103 / 715-0 Fax: +49 9103 / 715-271 E-Mail: [email protected] Internet: www.hobsoft.com HOB Remote Desktop VPN Secure access for remote
Veritas NetBackup 6.0 Database and Application Protection
Veritas NetBackup 6.0 Database and Application Protection Innovative data protection When it comes to database and application recovery, Symantec has a clear goal in mind simplify the complexity of database
Password Self-Service for Novell edirectory. Brent McCormick Novell Corporate Technology Strategist
Password Self-Service for Novell edirectory Brent McCormick Novell Corporate Technology Strategist Audience by Industry Government Healthcare Financial Services Education Telecommunications Manufacturing
2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
Tested configuration for Major versions of Primavera:-
Tested configuration for Major versions of Primavera:- s 7:- This configurations that have been tested for the Primavera P6 version 7.0 release is shown below. s Generic Platform Platform Collation Page/Locale
IBM Tivoli Endpoint Manager for Lifecycle Management
IBM Endpoint Manager for Lifecycle Management A single-agent, single-console approach for endpoint management across the enterprise Highlights Manage hundreds of thousands of endpoints regardless of location,
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley
Likewise Enterprise Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley IMPROVE SOX COMPLIANCE WITH CENTRALIZED ACCESS CONTROL AND AUTHENTICATION With Likewise Enterprise, you get one user,
Migrate AS 400 Applications to Windows, UNIX or Linux
Migrate AS 400 Applications to Windows, UNIX or Linux INFINITE Corporation White Paper prepared for Infinite Product Group date January 2012 Abstract: This paper is a discussion of how to create platform
IBM Tivoli Identity Manager
Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces
Access Management Analysis of some available solutions
Access Management Analysis of some available solutions Enterprise Security & Risk Management May 2015 Authors: Yogesh Kumar Sharma, Kinshuk De, Dr. Sundeep Oberoi Access Management - Analysis of some available
Patch Assessment Content Update Release Notes for CCS 11.0. Version: 2012-2 Update
Patch Assessment Content Update Release Notes for CCS 11.0 Version: 2012-2 Update Patch Assessment Content Update 2012-2 Release Notes for CCS 11.0 Legal Notice Copyright 2012 Symantec Corporation. All
VERITAS NetBackup 6.0 Database and Application Protection
VERITAS NetBackup 6.0 Database and Application Protection INNOVATIVE DATA PROTECTION When it comes to database and application recovery, VERITAS Software has a clear goal in mind simplify the complexity
SnapServer NAS GuardianOS 5.2 Compatibility Guide October 2009
SnapServer NAS GuardianOS 5.2 Compatibility Guide October 2009 1 Table of Contents 1 Introduction... 3 2 ed SnapServer NAS Systems... 3 3 Client Compatibility... 3 3.1 Microsoft Windows... 3 3.2 Apple
Integration with Active Directory. Jeremy Allison Samba Team
Integration with Active Directory Jeremy Allison Samba Team Benefits of using Active Directory Unlike the earlier Microsoft Windows NT 4.x Domain directory service which used proprietary DCE/RPC calls,
VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION DATASHEET. Product Highlights
VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION As the recognized leader for enterprise-class backup and recovery, VERITAS NetBackup Enterprise Server software is designed to help provide
Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin
Common Criteria Introduction 2014-02-24 Emilie Barse Magnus Ahlbin 1 Magnus Ahlbin Head of EC/ITSEF Information and Security Combitech AB SE-351 80 Växjö Sweden [email protected] www.combitech.se
Name Description Included in
1 s and s Table s and s Table Agents s Backup Exec agents and options enhance and extend platform and feature support for Backup Exec environments. Whether you need to protect critical Microsoft applications
BMC CONTROL-M Agentless Tips & Tricks TECHNICAL WHITE PAPER
BMC CONTROL-M Agentless Tips & Tricks TECHNICAL WHITE PAPER Table of Contents BMC CONTROL-M An IT workload automation platform... 1 Using standard agent-based scheduling... 1 Agentless scheduling... 1
<Insert Picture Here> Oracle Database Support for Server Virtualization Updated December 7, 2009
Oracle Database Support for Server Virtualization Updated December 7, 2009 Support Policy Server virtualization software allows multiple operating system instances to run on the same
FREQUENTLY ASKED QUESTIONS
FREQUENTLY ASKED QUESTIONS Secure Bytes, October 2011 This document is confidential and for the use of a Secure Bytes client only. The information contained herein is the property of Secure Bytes and may
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
EMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on August 16, 2012
EMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on August 16, 2012 This report provides information about software releases, including release dates, any announced
Securing Virtual Applications and Servers
White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating
Symantec Disaster Recovery Advisor
Protect your business: Automatically detect and report on risks in your High Availability and Disaster Recovery Infrastructure Data Sheet: Disaster Recovery A single undetected configuration error can
Heroix Longitude Quick Start Guide V7.1
Heroix Longitude Quick Start Guide V7.1 Copyright 2011 Heroix 165 Bay State Drive Braintree, MA 02184 Tel: 800-229-6500 / 781-848-1701 Fax: 781-843-3472 Email: [email protected] Notice Heroix provides
Introduction to Computer Administration. System Administration
Introduction to Computer Administration System Administration System Administration System Administration Duties of System Administrator Types of Administrators/Users Operating Systems Supporting Administration
IBM Tivoli Directory Integrator
IBM Tivoli Directory Integrator Synchronize data across multiple repositories Highlights Transforms, moves and synchronizes generic as well as identity data residing in heterogeneous directories, databases,
Enterprise Security Solutions
Enterprise Security Solutions World-class technical solutions, professional services and training from experts you can trust ISOCORP is a Value-Added Reseller (VAR) and services provider for best in class
Vormetric Encryption Architecture Overview
Vormetric Encryption Architecture Overview Protecting Enterprise Data at Rest with Encryption, Access Controls and Auditing Vormetric, Inc. 2545 N. 1st Street, San Jose, CA 95131 United States: 888.267.3732
BladeLogic Software-as-a- Service (SaaS) Solution. Help reduce operating cost, improve security compliance, strengthen cybersecurity posture
BladeLogic Software-as-a- Service (SaaS) Solution Help reduce operating cost, improve security compliance, strengthen cybersecurity posture February 20, 2014 Contents The Configuration Security Compliance
Detecting a Hacking Attempt
Detecting a Hacking Attempt Speaker: Isaac Thompson Director of Sales Engineering and Training About Prism Microsystems Founded in 1999, headquartered Columbia, Maryland Current Version EventTracker 6
Veritas Cluster Server by Symantec
Veritas Cluster Server by Symantec Reduce application downtime Veritas Cluster Server is the industry s leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status
Data Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery
Data replication for disaster recovery Overview Veritas Volume Replicator provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable recovery of critical
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES
RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS Server virtualization offers tremendous benefits for enterprise IT organizations server
Red Hat Enterprise ipa
Red Hat Enterprise ipa Introduction Red Hat Enterprise IPA enables your organization to comply with regulations, reduce risk, and become more efficient. Simply and centrally manage your Linux/Unix users
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
IBM Tivoli Endpoint Manager for Security and Compliance
IBM Endpoint Manager for Security and Compliance A single solution for managing endpoint security across the organization Highlights Provide up-to-date visibility and control from a single management console
What s New in Centrify Server Suite 2014
CENTRIFY SERVER SUITE 2014 WHAT S NEW What s New in Centrify Server Suite 2014 The new Centrify Server Suite 2014 introduces major new features that simplify risk management and make regulatory compliance
Red Hat Enterprise Linux 6. Stanislav Polášek ELOS Technologies [email protected]
Stanislav Polášek ELOS Technologies [email protected] Red Hat - an Established Global Leader Compiler Development Identity & Authentication Storage & File Systems Middleware Kernel Development Virtualization
RSA AUTHENTICATION AGENT SUPPORTED PLATFORMS
RSA AUTHENTICATION AGENT SUPPORTED PLATFORMS Web server authentication agents Version Description platform operating system rsa authentication agent 7.1 for Web for Apache 7.1 Apache 2.2 Apache 2.0 and
Discovery and Usage data for Software License Management
Discovery and Usage data for Software License Management Is Microsoft SCCM the best solution? Many organizations use Microsoft s SCCM product as their primary software discovery method. Because SCCM is
FOR SERVERS 2.2: FEATURE matrix
RED hat ENTERPRISE VIRTUALIZATION FOR SERVERS 2.2: FEATURE matrix Red hat enterprise virtualization for servers Server virtualization offers tremendous benefits for enterprise IT organizations server consolidation,
SOLUTION BRIEF. Advanced ODBC and JDBC Access to Salesforce Data. www.datadirect.com
SOLUTION BRIEF Advanced ODBC and JDBC Access to Salesforce Data 2 CLOUD DATA ACCESS In the terrestrial world of enterprise computing, organizations depend on advanced JDBC and ODBC technologies to provide
Oracle Business Intelligence Publisher. 1 Oracle Business Intelligence Publisher Certification. Certification Information 10g Release 3 (10.1.3.4.
Oracle Business Intelligence Publisher Certification Information 10g Release 3 (10.1.3.4.2) E12692-08 September 2011 This document outlines the certified hardware and software configurations for Oracle
CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam
CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials
Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES
Product Brief DC-Protect Content based backup and recovery solution By DATACENTERTECHNOLOGIES 2002 DATACENTERTECHNOLOGIES N.V. All rights reserved. This document contains information proprietary and confidential
Symantec Backup Exec 12 for Windows Servers
The gold standard in Windows data protection Overview Symantec Backup Exec 12 delivers efficient, easy-tomanage backup and recovery protection from server to desktop, providing optimized data protection
Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn
Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...
Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows
Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest
Access Control Intro, DAC and MAC. System Security
Access Control Intro, DAC and MAC System Security System Security It is concerned with regulating how entities use resources in a system It consists of two main phases: Authentication: uniquely identifying
The syslog-ng Store Box 3 LTS
The syslog-ng Store Box 3 LTS PRODUCT DESCRIPTION Copyright 2000-2012 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Store Box (SSB) is a high-reliability and high-performance
Standard: Event Monitoring
Standard: Event Monitoring Page 1 Executive Summary The Event Monitoring Standard defines the requirements for Information Security event monitoring within SJSU computing resources to ensure that information
