Remote Control System. Budgetary Proposal
|
|
|
- Corey Rice
- 10 years ago
- Views:
Transcription
1 Remote Control System Budgetary Proposal
2 April 14 th 2015 NEW YORK COUNTY DISTRICT ATTORNEY s OFFICE Att. David Stuart Offer # MB Subject: Budgetary Proposal for RCS Mobile Platform 10 Agents Dear Mr. Stuart, As for your kind request, please find the budgetary proposal regarding the Remote Control System Galileo reserved to New York County District Attorney s Office. This budgetary proposal includes 3 main components: - Upfront License fees for the Remote Control System Software - Professional Services for training and assistance and App support - Exploit Delivery Services Annual Subscription The Remote Control System Software has been specifically configured to the needs of the New York County District Attorney s Office. It includes: - 1 Master Node Shard - 2 Collectors - 6 Anonymizers - 10 Console Users - Physical Infection Vectors (by default) - Android and ios Mobile Platforms - 10 concurrent Agents - 1 st year Maintenance & Support Professional Services to assist the New York County District Attorney s Office ramping up in the use of the Software include: - Software Installation (1 or 2 days) - Foundation training (9 days for up to 6 attendees) - Advanced training (5 days for up to 6 attendees) - 3 x 1 week of on-site Assistance spread over the first 3 months - App support project It is however understood that this proposal and the agreement subsequent to your acceptance shall be automatically terminated pursuant to Sections 1353 and ff. of Italian Civil Code should any necessary license or authorization required for the export of the product - under Italian laws, the EU legislation and/or any other applicable laws - be not granted to HT within a period of 120 days from the date of your acceptance. It is also understood that HT shall give notice of the occurrence or the non-occurrence of the Condition in a timely manner, being further agreed that the above condition subsequent can be waived by HT also after its occurrence
3 Don t hesitate to contact me for any further information. With best regards, Marco Bettini Sales Manager HT S.r.l
4 Remote Control System Description Please refer to the following document for technical description: - HT_Galileo_SolutionDescription_2.4 Remote Control System Technical Requirements Please refer to the following document for technical requirements: - RCS9_Technical_Requirements_v2.3.4.pdf Professional Services: Installation and Foundation Training 1. Installation The solution will be installed at Customer Site by HT field application engineers. Duration of the activities is actually planned for one (2) working days and it will be under Customer responsibility to prepare the Operation Environment as indicated in the Technical Requirements document. 2. Foundation Training Following the installation, we will provide nine (9) days of training focused on the usage of Remote Control System Galileo. This training will be performed at Client Site. Please refer to the following document for product training: - HT_Galileo_Product Training_v Maintenance & Support Maintenance for one (1) year is included. Please refer to the following document for Maintenance and Support: - HT_Galileo_SolutionDescription_ On Site Assistance On-site assistance is delivered, if requested, by a HackingTeam Field Application Engineer (FAE) to assist the end user in the daily activities
5 Remote Control System Galileo Quotation The Remote Control System Software includes all the components and main features needed to implement essential functionalities as requested by the New York County District Attorney s Office. REMOTE CONTROL SYSTEM SOFTWARE Description Galileo RCS Master Node License for one (1) Master Node Server Software. The Master Node is the Back-End server of Remote Control System. It comprises the databases of agents, targets, evidences and operations, the storage and the business logic of RCS. The Master Node consists of Shards that can be added in order to increase response time and storage capacity. Includes the license for one (1) Shard, equivalent to one (1) database server. Product Code Upfront License Fees in $ USD The Master Node includes the following key features: - Configuration of the Agents - Creation of Infection Vectors - Storage of Target s data (profile, devices, etc.) - Storage of Evidence (e.g., Skype and voice recording, chat and messages from social networks, mail from clients and web interfaces, open files, screenshots, visited web sites, passwords from browsers, mail clients, key-logging, on-screen keyboards, clipboard texts, position, webcam photos, contacts, calendars, etc.) - Optical Character Recognition (OCR), crypto-currency (e.g., BitCoin) and file metadata extraction tools (e.g., Word file s author, JPG picture EXIF data) -,Role based access control (RBAC) for Administrator, Technician, Analysts, System Admin user profiles - Audit trail - Ordinary and extraordinary system administration - Automatic distribution of data among Shards RCS-MN $ 250, Galileo RCS Collector License for two (2) Collectors Server Software. The RCS Collector is the Front-End server of Remote Control System. Collectors are the points of presence of RCS on the Internet and are the sole components able to communicate with Agents. Collectors can be added to expand the capacity of the system in terms of number of concurrent agents that report back the collected information. Having at least 2 Collectors provides you with redundancy in case of failure, allowing Agents to continue reporting. RCS-COL $ 150, Includes the license for two (2) Collectors. The Collector includes the following key features: - Secured communication flow management (encryption/decryption) - 5 -
6 - 2-layer strong encryption with Agent authentication - Collection and storage of evidence - Fail-proof storage of evidence in case of Master Node temporary unavailability - Delivery of Infection Vectors to Targets (multi-stage infections) - Upgrade of Agents to new versions Galileo RCS Anonymizers License for three (6) Anonymizers Software. Anonymizers insure the protection of the Collectors and the routing of the evidence to the Collectors. Anonymizers can be replaced or substituted over time to avoid exposure. You can adapt the number of Anonymizers for added security. Includes the license for three (6) Anonymizers. RCS-PR $ 100, The Anonymizers includes the following key features: - Safeguarding of the communication channel s encryption - Routing of evidence through the Anonymizer chain - Protection of the Collector Internet address and identity Galileo RCS User Console License for ten (10) User Console Software. The User Console is the Single Point of Control to perform all operations. Role based access control is built-in and users can access features according to their privileges. The User Console implements a powerful Graphical User Interface, combined with a target-centric specific workflow and an easy to use logic, Includes the license for up to 10 (10) active and concurrent Users. RCS-USR $ 50, The RCS User Console includes the following key features: - Graph-based representation of Target correlations - Target s digital profiledrag-and-drop advanced Agent s configuration - Wizard for generating infection vectors - User administration - Audit trail Physical Infection Vectors License for Physical Infection Vectors Software. Physical Infection Vectors license allows you to use a range of methods to install the Agents on the Targets devices by means of physical access (e.g., by USB connectivity). Availability of Infection Vectors is based on the licensed Platforms (e.g., if you purchase Windows Platform, you automatically have all the Physical Infection Vectors available for Windows). RCS-PHI $ 50, Prerequisite: some Physical Infection Vectors may be available only with a Tactical Network Injector license
7 Android Platform License for Android platform. The license allows you to infect Android operating system by implanting an Agent. The license includes support for Android 2.3 to 5.0. The Android platform includes the following key features: - Skype call and chat - Facebook chat and check-ins - Gmail and Outlook.com - Crypto currency transactions (e.g., BitCoins, LiteCoin, etc) - File capture - Camera snapshots - Key logging RCS-AND $ 50, Apple ios Platform License for Apple ios platform. The license allows you to infect Android operating system by implanting an Agent. The license includes support for ios 4.x and up to 8.1 The Apple ios platform includes the following key features: - Skype call and chat - Facebook chat and check-ins - Gmail and Outlook.com - Crypto currency transactions (e.g., BitCoins, LiteCoin, etc) - File capture - Camera snapshots - Key logging RCS-IOS $ 60, Concurrent Agents License for ten (10) Concurrent Agents Software. Concurrent Agents license allow you to receive evidence concurrently from 10 Agents. Concurrent Agents can be used for every kind of evidence available and for an unlimited amount of time. Once you uninstall an Agent, its license can be reused to collect evidence from another Target s device. RCS-ASL10 $ 50, The licensed Agents can be used in any combination on the platforms that has been licensed. There is no limit to the number of Agents you can install, however only 10 Agents are allowed to transmit evidence. Additional agents can be licensed at any time. 1 st Year Maintenance and Support License for 1 st Year Maintenance and Support. It includes: - Software updates (e.g., bug fixing, improvements to platform support) - Invisibility updates - Dedicated Support through Web Ticketing System - RiTE (Rite-is-a-Testing Ecosystem) performs 500+ daily tests of several RCS-MAINT Included - 7 -
8 combinations of 50+ anti-virus and 20+ applications. TOTAL UPFRONT LICENSE FEES USD $ ,00 Note: - Every Concurrent Agent license can be used for an unlimited amount of times. Once the investigation is over and the backdoor is uninstalled, it can be used to infect another target. - The total number of device and platforms can be used in any combination. - Each agent license will work on any type of operating system that has been bought. - Hardware Equipment is not included. (Signature and stamp for Acceptance) - 8 -
9 Professional Services PROFESSIONAL SERVICES Description Product Code Price in $ USD Foundation Training Nine (9) days of Foundation Training. Foundation Training gives the attendees the confidence to operate the solution autonomously. It can be structured as a single session covering all the topics or as separate sessions for each of the operator roles available (Administrator, Technician, System Administrator, Analyst). The Foundation Training covers the following topics: - RCS Galileo Architecture - Accounting and Operation - Agent configuration - Infection Vectors - Tactical Network Injector - Dashboards and Alerting - Intelligence - System Maintenance RCS-FTR $ 30, Prerequisite: few years experience in operating systems and software in general. Previous experience in information security is a plus. Number of participants: up to 6 attendees. Advanced Training Five (5) days of Advanced Training. Advanced Training builds on the client s first months of experience in using Remote Control System, combining the 10 years experience of HackingTeam to provide processes and best practice suitable to the client s unique operational scenarios. Prerequisite: few years experience in operating systems and software in general. Previous experience in information security is a plus. RCS-ATR $ 20, Prerequisite: Foundation Training, 3 months of Remote Control System use. Number of participants: up to 6 attendees. On-Site Assistance Three (3) weeks of On-site Assistance. On-site Assistance is designed to assist in giving the client peace of mind. A Field Engineer is available on-site to help the client with any technical concern or difficulty that may arise during ordinary or extraordinary operation of Remote Control System solution. Note: On-Site Assistance is limited to giving technical assistance. Due to company RCS-ASS $ 60,
10 policy and international regulations Field Engineers and support personnel in general cannot be directly involved or participate in Law Enforcement operations. TOTAL AMOUNT FOR PROFESSIONAL SERVICES $ ,00 USD Note: - All travel and accommodations cost are not included (Signature and stamp for Acceptance)
11 Exploit Delivery Service EXPLOIT DELIVERY SERVICE 1 YEAR SUBSCRIPTION Description Exploit Delivery Service 1 Year Subscription License for one (1) year subscription to Exploit Delivery Service (EDS). EDS grants you access to a selection of 0-day exploit targeting different applications. The Exploit Delivery Service includes the following key features: - RiTe (RiTe is a Testing ecosystem) performing validity and security checks daily (see RiTe description) - Exploit Delivery Network (EDN) managed by HT and hosted on anonymous systems, providing a secure environment for serving exploits - Requests performed via secured online ticketing. As an example, a request can consist of customer-provided application content (e.g., Word file) and specific infection vector - Delivery of weaponized customer s content (e.g., Word file with embedded exploit), to be sent to the Target by the customer via customer s Tactical Network Injector or other means - Automatic delivery of multi-stage exploits components - Automatic deletion of all the stages and content from the EDN as soon as the infection is complete Note: exploits availability and service process can change without notice. Product Code RCS-EDS1Y Upfront License Fees in $ USD $ 120, USD TOTAL AMOUNT OF SUBSCRIPTION (1 YEAR) $ ,00 USD Note: - Exploit Delivery Service is a yearly subscription to be purchased every year. (Signature and stamp for Acceptance)
12 Maintenance & Support The 1 st year of Maintenance & Support is included in the Upfront License fees. The price for the 2 nd year and subsequent years of Maintenance & Support is detailed below. REMOTE CONTROL SYSTEM MAINTENANCE & SUPPORT Description Yearly Maintenance & Support Fee License for Yearly Maintenance and Support. It includes: Product Code Annual License Fees in $ USD - Software updates (e.g., bug fixing, improvements to platform support) - Invisibility updates - Dedicated Support through Web Ticketing System - RiTE (Rite-is-a-Testing Ecosystem) performs 500+ daily tests of several combinations of 50+ anti-virus and 20+ applications. RCS-MAINT $ 152, YEARLY MAINTENANCE & SUPPORT (FROM 2 nd YEAR) $ ,00 USD Note: The yearly maintenance fee price is calculated on the purchased configuration, if the configuration changes the maintenance price will be recalculated. (Signature and stamp for Acceptance)
13 Terms& Conditions 1. Warranty The warranty period for HT software products is one year starting from date of delivery. 2. Financials Pricing doesn t include VAT and local taxes. Prices are reserved to NEW YORK COUNTY DISTRICT ATTORNEY s OFFICE NEW YORK COUNTY DISTRICT ATTORNEY s OFFICE accepts to purchase the solution as above reported for a price of USD ,00. NEW YORK COUNTY DISTRICT ATTORNEY s OFFICE has to sign the attached End User License Agreement (HT_EULADIRECT_5.0) and the End User Statement (EXPORT DOC_EU STATEMENT). Software Delivery and Training within 30 days from the export authorization (to be agreed). Terms of Payment o 50% Down Payment at PO date o 50% at Delivery Certificate signature date (please refer to the attached document) Validity: The quotation is valid 30 days. (Signature and stamp for Acceptance)
14 List of Attachments: - HT_Galileo_SolutionDescription_2.4.pdf - RCS9_Technical_Requirements_v HT_Galileo_Product Training_v1.4.pdf - HT_Galileo_Delivery Certificate_v1.2.pdf - HT_EULADIRECT_5.0.pdf - EXPORT DOC_EU STATEMENT 1.0 (Signature and stamp for Acceptance)
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
FINFISHER. it intrusion. www.gammagroup.com. Remote Monitoring & Infection Solutions FINSPY QUICK INFORMATION
FinSpy is a field-proven Remote Monitoring Solution that enables Governments to face the current challenges of monitoring Mobile and Security-Aware Targets that regularly change location, use encrypted
HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
GOLD EMM SUBSCRIPTIONS Experience the most secure mobility management solution with BES12 and Gold Enterprise Mobility Management (EMM) subscriptions. HIGH-SECURITY MOBILITY MANAGEMENT FROM BLACKBERRY
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance Introduction Critical infrastructure is the backbone of any nations fundamental economic and societal well being. Like any business, in
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
THE COMPLETE GUIDE TO GOOGLE APPS SECURITY. Building a comprehensive Google Apps security plan
THE COMPLETE GUIDE TO GOOGLE APPS SECURITY Building a comprehensive Google Apps security plan Contents Introduction................................ 3 1. Secure the core.............................4 Google
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
Supporting Apple ios Devices
Supporting Apple ios Devices 2016 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform
The Recipe for Sarbanes-Oxley Compliance using Microsoft s SharePoint 2010 platform Technical Discussion David Churchill CEO DraftPoint Inc. The information contained in this document represents the current
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
ONE INTEGRATED PLATFORM FOR ALL YOUR PRINT, SCAN AND DEVICE MANAGEMENT. uniflow canon.com.au/business
ONE INTEGRATED PLATFORM FOR ALL YOUR PRINT, SCAN AND DEVICE MANAGEMENT uniflow canon.com.au/business INTEGRATED, PRODUCTIVE CONTROL OF PRINTING, COPYING SCANNING, AND FAXING uniflow is an integrated print
Oracle Data Integrator 11g: Integration and Administration
Oracle University Contact Us: Local: 1800 103 4775 Intl: +91 80 4108 4709 Oracle Data Integrator 11g: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive
MS-55115: Planning, Deploying and Managing Microsoft Project Server 2013
MS-55115: Planning, Deploying and Managing Microsoft Project Server 2013 Description The goal of this three-day instructor-led course is to provide students with the knowledge and skills necessary to effectively
SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
Features of AnyShare
of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...
User Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
F-Secure Internet Security 2014 Data Transfer Declaration
F-Secure Internet Security 2014 Data Transfer Declaration The product s impact on privacy and bandwidth usage F-Secure Corporation April 15 th 2014 Table of Contents Version history... 3 Abstract... 3
CA Service Desk Manager - Mobile Enabler 2.0
This Document is aimed at providing information about the (CA SDM) Mobile Enabler and mobile capabilities that is typically not available in the product documentation. This is a living document and will
Securing Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
How to Configure Guest Management on the DWC-1000
Configuration Guide How to Configure Guest Management on the DWC-1000 Overview This guide describes how to configure and customize a billing profile and generate temporary user account on the D-Link DWC-1000
Google Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
Sophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Website: www.ftsafe.com
epass2003 User Guide V1.0 Feitian Technologies Co., Ltd. Revision History: Date Revision Description June 2013 V1.0 Release of the first version i Software Developer s Agreement All Products of Feitian
Server Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
Momentum offers you free training, webinars and much more to: help you understand the power of your current LANDESK products
LANDESK Momentum Momentum offers you free training, webinars and much more to: help you understand the power of your current LANDESK products improve your ROI Upcoming Webinars: Visit: www.landesk.com/momentum
Course 55115: Planning, Deploying and Managing Microsoft Project Server 2013
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Course 55115: Planning, Deploying and Managing Microsoft Project Server 2013 Length: 3 Days Audience:
Symantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Administration Guide BES12. Version 12.3
Administration Guide BES12 Version 12.3 Published: 2015-10-30 SWD-20151028105551254 Contents Introduction... 11 About this guide...12 How to use this guide... 13 Steps to administer BES12... 13 Examples
Microsoft Skype for Business/Lync
Quick Glance: } Skype for Business/Lync is a text, voice, and video conference application. } Skype for Business is available for Windows computers. } Lync is available for Mac, ios, and Android devices.
At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS
HP Application Lifecycle Management on Software-as-a-Service Dedicated HP ALM/QC Offering Data sheet At a Glance The Dedicated HP ALM/QC offering is an on-demand Software-as-a-Service (SaaS) solution for
Securing Remote Vendor Access with Privileged Account Security
Securing Remote Vendor Access with Privileged Account Security Table of Contents Introduction to privileged remote third-party access 3 Do you know who your remote vendors are? 3 The risk: unmanaged credentials
Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Introduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
BES12 Frequently Asked Questions. BEs12. questions. FAQs
1 BEs12 Frequently asked questions FAQs 2 Contents Overview... 3 Pricing... 4 Technical: Upgrade, Migration & Installation... 5 Additional Migration Questions... 10 Installation... 11 System... 12 BES5
BitDefender Security for Exchange
Quick Start Guide Copyright 2011 BitDefender 1. About This Guide This guide will help you install and get started with BitDefender Security for Exchange. For detailed instructions, please refer to the
About Network Data Collector
CHAPTER 2 About Network Data Collector The Network Data Collector is a telnet and SNMP-based data collector for Cisco devices which is used by customers to collect data for Net Audits. It provides a robust
LabTech Mobile Device Management Overview
You are here: Using LabTech > Mobile Device Management > Mobile Device Management Overview LabTech Mobile Device Management Overview Features LabTech mobile device management (MDM) is a fully integrated
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
SharePoint 2010 Interview Questions-Architect
Basic Intro SharePoint Architecture Questions 1) What are Web Applications in SharePoint? An IIS Web site created and used by SharePoint 2010. Saying an IIS virtual server is also an acceptable answer.
Full Compliance Contents
Full Compliance for and EU Annex 11 With the regulation support of Contents 1. Introduction 2 2. The regulations 2 3. FDA 3 Subpart B Electronic records 3 Subpart C Electronic Signatures 9 4. EU GMP Annex
www.novell.com/documentation User Guide Novell iprint 1.1 March 2015
www.novell.com/documentation User Guide Novell iprint 1.1 March 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically
Oracle Data Integrator 12c: Integration and Administration
Oracle University Contact Us: +33 15 7602 081 Oracle Data Integrator 12c: Integration and Administration Duration: 5 Days What you will learn Oracle Data Integrator is a comprehensive data integration
Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
Citrix XenApp 6.5 Administration
Presentation Style: Duration: Tutor-led Classroom 5 Days Course Start Time: 09:30hrs Course End Time: 16:30hrs Citrix XenApp 6.5 Basic Administration training course provides the foundation necessary for
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
Hospital Certified Electronic Health Record (EHR) Technology Questionnaire
Page 1 of 10 Hospital Certified Electronic Health Record (EHR) Technology Questionnaire Thank you for taking time to complete this questionnaire. The Office of Inspector General (OIG) is conducting this
Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system.
21 CRF 11 Electronic Records and Signatures Implement best practices by using FileMaker Pro 7 as the backbone of your 21 CFR 11 compliant system. By Todd Duell What does Title 21 of the Code of Federal
CMB 207 1I Citrix XenApp and XenDesktop Fast Track
CMB 207 1I Citrix XenApp and XenDesktop Fast Track This fast paced course provides the foundation necessary for students to effectively centralize and manage desktops and applications in the datacenter
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
55115 - Planning, Deploying and Managing Microsoft Project Server 2013
55115 - Planning, Deploying and Managing Microsoft Project Server 2013 Duration: 3 Days Course Price: $1,785 Software Assurance Eligible Course Description Course Overview The goal of this three-day instructor-led
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER
HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
AVeS Cloud Security powered by SYMANTEC TM
Protecting your business from online threats should be simple, yet powerful and effective. A solution that secures your laptops, desktops, and servers without slowing down your systems and distracting
Agency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
PEGA MOBILITY A PEGA PLATFORM WHITEPAPER
PEGA MOBILITY A PEGA PLATFORM WHITEPAPER Background Mobile devices now outnumber computers as a means of connecting to the Internet. This new mobile ubiquity presents opportunities for the enterprise to
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
msuite5 & mdesign Installation Prerequisites
CommonTime Limited msuite5 & mdesign Installation Prerequisites Administration considerations prior to installing msuite5 and mdesign. 7/7/2011 Version 2.4 Overview... 1 msuite version... 1 SQL credentials...
BYOD Policy for [AGENCY]
BYOD Policy for [AGENCY] This document provides policies, standards, and rules of behavior for the use of smartphones, tablets and/or other devices ( Device ) owned by [AGENCY] employees personally (herein
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
Sharepoint vs. inforouter
Sharepoint vs. inforouter Introduction The purpose of this document is to compare the functionality and capability of Microsoft SharePoint Server vs. inforouter. Microsoft quote some pretty impressive
nexus Hybrid Access Gateway
Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries
Sophos Enterprise Console server to server migration guide. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console server to server migration guide Product : 5.1 Document date: June 2012 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the key
Kaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
NetWrix Server Configuration Monitor
NetWrix Server Configuration Monitor Version 2.2 Quick Start Guide Contents NetWrix Server Configuration Monitor Quick Start Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW
What s New in LANDESK Service Desk A tour of the new features and functionality released since Connect 2014
What s New in LANDESK Service Desk A tour of the new features and functionality released since Connect 2014 Lara Hellman, Product Owner Since Connect 2014 7.7.1, 7.7.2, 7.7.3, 7.8 7.8.1 Roadmap 2 7.7.1
safend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools
White Paper Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools Introduction The modern workforce is on the hunt for tools that help them get stuff done. When the technology
Getting Started Guide: Getting the most out of your Windows Intune cloud
Getting Started Guide: Getting the most out of your Windows Intune cloud service Contents Overview... 3 Which Configuration is Right for You?... 3 To Sign up or Sign in?... 4 Getting Started with the Windows
HarePoint Workflow Extensions for Office 365. Quick Start Guide
HarePoint Workflow Extensions for Office 365 Quick Start Guide Product version 0.91 November 09, 2015 ( This Page Intentionally Left Blank ) HarePoint.Com Table of Contents 2 Table of Contents Table of
Sophos Enterprise Console server to server migration guide. Product version: 5.2
Sophos Enterprise Console server to server migration guide Product : 5.2 Document date: December 2014 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the
Patch Management SoftwareTechnical Specs
Patch Management SoftwareTechnical Specs 1. Scalable: a. The PMS (Patch Management Software)must be scalable(can grow as network grows). b. The PMSmust be able to support more than 10k nodes from a single
Lead Management CRM Marketing Automation Powerful. Affordable. Intuitive. gold-vision
Unify your communications with Gold-Vision, a fully featured CRM solution with customer Contact, Sales, Marketing, Projects and Events. Gold-Vision stands out from the crowd with interactive dashboard
Video Management Software. Product Brochure
Video Management Software Product Brochure Flexible, Powerful and Intelligent Video Management Software gives the user a powerful and advanced video surveillance software that is easy to use. These unique
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
Endpoint Protection Small Business Edition 2013?
Symantec Endpoint Protection Small Business Edition 2013 Customer FAQ FAQ: Endpoint Security What is Symantec Endpoint Protection Small Business Edition 2013? is a new solution that offers simple, fast,
Netwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 7.1 10/26/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
Deploying Apple ios in Education
Solution Guide Deploying Apple ios in Education March 013 This document covers strategies for deploying, monitoring, and supporting ios devices in education environments. Table of Contents 1 3 4 5 6 7
Cloudbuz at Glance. How to take control of your File Transfers!
How to take control of your File Transfers! A MFT solution for ALL organisations! Cloudbuz is a MFT (Managed File Transfer) platform for organisations and businesses installed On-Premise or distributed
Business and enterprise cloud sync, backup and sharing solutions
Business and enterprise cloud sync, backup and sharing solutions Private Cloud Synchronization Collaboration Backup / Versioning Web Access Mobile Access LDAP / Active Directory Federated RADIUS Single
