A Secure Federated Company

Size: px
Start display at page:

Download "A Secure Federated Company"

Transcription

1 A Secure Federated Company 10 nov 2010 Using Windchill Technology 1 THALES NEDERLAND B.V. THALES NEDERLAND B.V. AND/OR ITS SUPPLIERS. THIS INFORMATION CARRIER CONTAINS PROPRIETARY INFORMATION WHICH SHALL NOT BE USED, REPRODUCED OR DISCLOSED TO THIRD PARTIES WITHOUT PRIOR WRITTEN AUTHORIZATION BY THALES NEDERLAND B.V. AND/OR ITS SUPPLIERS, AS APPLICABLE.

2 Agenda: Mandate History Requirements General approach Implementation of business & security requirements Questions 2 THALES NEDERLAND B.V.

3 Mandate: Background wrt external interfacing: Changing needs: Collaboration (SR-FR, Nevesbu, customer, etc); engineering/design Outsourcing; manufacturing/design Shortened design cycles Opportunities: Efficiency/effectivity improvements in the communication with external partners; fast, configured and role based Ability to pay a key role in co-designer relations Threats: Insecure interfacing; usb-stick, , CD/DVD, hard-disk, quickplaces, etc Poorly managed; status, configuration, completeness, validity, etc Practically unworkable situation for Thales-Norma after moving date. 3 THALES NEDERLAND B.V.

4 Mandate: Goal: To realize proper configuration facilities for the mechanical engineering domain between both Thales and suppliers/codesigners and Thales-to-Thales internationally. Constraint: All collaborations exist within the setting of defence related products and are therefore subject to security constraints. 4 THALES NEDERLAND B.V.

5 Project B Product Radar X Thales, Fr Partner 3, NL Thales anywhere Thales Hengelo Project A Partner 1, NL Partner 2, D 5 THALES NEDERLAND B.V.

6 History: Feb Intralink->PDMlink 8 Architecture not sufficient (then 8 now 9.1) Requirements definition; security en business How do others work? Architectures Other approaches; UEE Windchill; external flexibility maintained No OEM approach; a federated company approach, Quickplaces; security becomes blocking PTC provides functionality in PDMlink/Projectlink THALES NEDERLAND B.V.

7 Dynamic links exist due to PDMLink & ProjectLink embedded solution PDMLink = Referential area for CAD documents (Permanent area) Collab. work within entity Collab. work between entities ProjectLink = Temporary area for collaborative work (Project area is removed when work is completed) 7 THALES NEDERLAND B.V.

8 Requirements: Business: Supplied solution must support collaboration for mechanical engineers in their day-to-day operational use of the system. It should conform to the general service level agreement KPI s that are in place for other engineering related services Specifically, it must be both easy and secure, to give visibility to engineering artefacts and communities that can be easily established and maintained within the solution. Security: 15 requirements defined including: Authorised locations-users-data-(time period) Data manager Logging who-what-when Encryption Also export control 8 THALES NEDERLAND B.V.

9 General approach: Use cases to be executed/demonstrated in three consecutive installation runs to assure: Correct migration; after the final migration there is no easy roll-back Meeting the security requirements; otherwise there will be no external collaboration allowed Operational availability and performance; to convince the key-users and the business Operational functionality of PDMlink 9.1; some new functions and working methods Final migration will be done in a weekend and after agreement of all parties. Hire specific Windchill knowledge No customisation, standard functionality and configuration Linux, virtualisation, migration, anti-virus, test-environment French corporate vision Controlled start-up; get experience and confidence 9 THALES NEDERLAND B.V.

10 Implementation: Implementation of Business Requirements Implementation of Security Requirements 10 THALES NEDERLAND B.V.

11 Implementation of Business Requirements Migrate Windchill 8.0 to new secure Windchill 9.1 environment Windchill 8.0 Windchill 9.1 Physic Servers (2 servers) Vmware Servers (6 servers) Windows 2003 Redhat Enterprise Linux No virus scanning on server Virus scanning for external slaves Windchill 8.0 M040 Windchill PDMLink & ProjectLink Contains mcad/ecad content Default user interface Windchill 9.1 M020 Windchill PDMLink & ProjectLink Contains same mcad/ecad content Simple role-based user interface Same or equal performance and minimal impact on daily work. 11 THALES NEDERLAND B.V.

12 Implementation of Business Requirements Role-based User Interface (Profiles) 12 THALES NEDERLAND B.V.

13 Implementation of Security Requirements Migrate Windchill 8.0 to new secure Windchill 9.1 environment Windchill 8.0 Windchill 9.1 Windchill Monolithic Secure Windchill Architecture Local area network (LAN) Demilitarized zone (DMZ) Windchill PDMLink & ProjectLink Windchill PDMLink & ProjectLink No Security Labeling and Agreements Security Labeling and Agreements No Windchill Auditing & Logging Windchill Auditing & Logging Use cases to define collaboration working scenario s and procedures. 13 THALES NEDERLAND B.V.

14 Implementation of Security Requirements Windchill Architecture HTTPS Windchill Cluster on virtual Linux Redhat in the DMZ VLAN PDM (inside VLAN DMZ) Thales NL Slave 1 View Master Oracle ThalesNet Slave 2 Thales Env. Internet Slave 3 Partner NL SAN Internet Slave 4 Partner NAVO 14 THALES NEDERLAND B.V.

15 Implementation of Security Requirements Windchill Thales NL Environment VLAN PDM (inside VLAN DMZ) Thales NL Slave 1 View Master Oracle Slave 2 Slave 3 Slave 1 Minimal required auditing & logging. Only Thales NL users can log in. Memory and caching parameters optimized for internal LAN use. SAN Slave 4 15 THALES NEDERLAND B.V.

16 Implementation of Security Requirements Windchill Thales NAVO Partner Environment Slave 4 All required auditing & logging. Memory and caching parameters optimized for internet use. Virus scanning on server. NAVO Partner needs: VPN Box from Thales NL. Thales SSL certificate from Thales NL. Valid username/password from Thales NL. Partner NAVO Internet Slave 1 Slave 2 Slave 3 Slave 4 VLAN PDM (inside VLAN DMZ) Master View Oracle SAN 16 THALES NEDERLAND B.V.

17 Implementation of Security Requirements Security Labeling and Agreements Export control: License required Authorised Participants (NL persons) A Authorised Participants (Internal people) Corporate Proprietary: Internal 17 THALES NEDERLAND B.V.

18 Implementation of Security Requirements Security Labeling and Agreements Security Labels Security Level Security Marking Export Control Intellectual Property Agreements Security Authorization Agreement Government Export License Commercial License Disclosure Agreement Non-Disclosure Agreement Example for: Security Marking 18 THALES NEDERLAND B.V.

19 Implementation of Security Requirements Report on who accessed what objects and when 60 discrete traceable events, including Viewing of pages and Downloading of content Critical information captured, including user ID and IP address as well as object details Additional Apache & Windchill logging 19 THALES NEDERLAND B.V.

20 Thank you for your attention! Questions? 20 THALES NEDERLAND B.V.

Pro/INTRALINK 10.0. Curriculum Guide

Pro/INTRALINK 10.0. Curriculum Guide Pro/INTRALINK 10.0 Curriculum Guide Live Classroom Curriculum Guide Introduction to Pro/INTRALINK 10.0 Business Administration of Pro/INTRALINK 10.0 Update to Windchill 10.0 for System Administrators System

More information

Pro/INTRALINK 9.0/9.1 Curriculum Guide

Pro/INTRALINK 9.0/9.1 Curriculum Guide Pro/INTRALINK 9.0/9.1 Curriculum Guide NOTE: For a graphical depiction of the curriculum based on job role, please visit this page: http://www.ptc.com/services/edserv/learning/paths/ptc/proi_90.htm Web

More information

Pro/INTRALINK 10.1. Curriculum Guide

Pro/INTRALINK 10.1. Curriculum Guide Pro/INTRALINK 10.1 Curriculum Guide Live Classroom Curriculum Guide Introduction to Pro/INTRALINK 10.1 Business Administration of Windchill Pro/INTRALINK 10.1 System Administration of Windchill 10.1 Customization

More information

CloudDesk - Security in the Cloud INFORMATION

CloudDesk - Security in the Cloud INFORMATION CloudDesk - Security in the Cloud INFORMATION INFORMATION CloudDesk SECURITY IN THE CLOUD 3 GOVERNANCE AND INFORMATION SECURITY 3 DATA CENTRES 3 DATA RESILIENCE 3 DATA BACKUP 4 ELECTRONIC ACCESS TO SERVICES

More information

Scalable Secure Remote Access Solutions

Scalable Secure Remote Access Solutions Scalable Secure Remote Access Solutions Jason Dely, CISSP Principal Security Consultant [email protected] Scott Friberg Solutions Architect Cisco Systems, Inc. [email protected] Jeffrey A. Shearer,

More information

Windchill ProjectLink 10.1. Curriculum Guide

Windchill ProjectLink 10.1. Curriculum Guide Windchill ProjectLink 10.1 Curriculum Guide Live Classroom Curriculum Guide Introduction to Windchill ProjectLink 10.1 Business Administration of Windchill ProjectLink 10.1 Workflow Administration of Windchill

More information

System Administration of Windchill 10.2

System Administration of Windchill 10.2 System Administration of Windchill 10.2 Overview Course Code Course Length TRN-4340-T 3 Days In this course, you will gain an understanding of how to perform routine Windchill system administration tasks,

More information

CONTENTS. PCI DSS Compliance Guide

CONTENTS. PCI DSS Compliance Guide CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not

More information

FIREWALL POLICY DOCUMENT

FIREWALL POLICY DOCUMENT FIREWALL POLICY DOCUMENT Document Id Firewall Policy Sponsor Laura Gibbs Author Nigel Rata Date May 2014 Version Control Log Version Date Change 1.0 15/05/12 Initial draft for review 1.1 15/05/14 Update

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

Arbortext Content Manager 9.0/9.1 Curriculum Guide

Arbortext Content Manager 9.0/9.1 Curriculum Guide Arbortext Content Manager 9.0/9.1 Curriculum Guide NOTE: For a graphical depiction of the curriculum based on job role, please visit this page: http://www.ptc.com/services/edserv/learning/paths/ptc/atcm_90.htm

More information

Windchill Service Information Manager 10.1. Curriculum Guide

Windchill Service Information Manager 10.1. Curriculum Guide Windchill Service Information Manager 10.1 Curriculum Guide Live Classroom Curriculum Guide Building Information Structures with Windchill Service Information Manager 10.1 Building Publication Structures

More information

Overcoming Security Challenges to Virtualize Internet-facing Applications

Overcoming Security Challenges to Virtualize Internet-facing Applications Intel IT IT Best Practices Cloud Security and Secure ization November 2011 Overcoming Security Challenges to ize Internet-facing Applications Executive Overview To enable virtualization of Internet-facing

More information

RSS Cloud Solution COMMON QUESTIONS

RSS Cloud Solution COMMON QUESTIONS RSS Cloud Solution COMMON QUESTIONS 1 Services... 3 Connectivity... 5 Support... 6 Implementation... 7 Security... 8 Applications... 9 Backups... 9 Email... 10 Contact... 11 2 Services What is included

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use TMG network templates Abstract In this article I will show

More information

WW HMI SCADA-08 Remote Desktop Services Best Practices

WW HMI SCADA-08 Remote Desktop Services Best Practices Slide 1 WW HMI SCADA-08 Remote Desktop Services Best Practices Steven L. Weygandt Portfolio Product Manager - Device Integration /Wonderware social.invensys.com @InvensysOpsMgmt / #SoftwareRevolution /InvensysVideos

More information

How To Get Atos Paas For Free

How To Get Atos Paas For Free G-Cloud Pricing Atos PaaS Accredited Secure+ Contents 1. Introduction... 3 2. Pricing... 4 2.1 Standard Feature Pricing... 4 2.2 Atos PaaS Accredited Secure+ Virtual Machines... 4 2.3 Atos PaaS Accredited

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

CHOOSING A RACKSPACE HOSTING PLATFORM

CHOOSING A RACKSPACE HOSTING PLATFORM CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project

More information

The Bomgar Appliance in the Network

The Bomgar Appliance in the Network The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.

More information

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples

More information

Diploma in Computer Science

Diploma in Computer Science SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: CN5191 Senior Linux Engineer British 22 years RedHat Certified Engineer Diploma in Computer

More information

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009

Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009 Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in

More information

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013 MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters

More information

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc. [email protected]

STERLING SECURE PROXY. Raj Kumar Integration Management, Inc. Raj.Kumar@integrationmgmt.com STERLING SECURE PROXY Raj Kumar Integration Management, Inc. [email protected] Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram

More information

Table of Contents Introduction and System Requirements 9 Installing VMware Server 35

Table of Contents Introduction and System Requirements 9 Installing VMware Server 35 Table of Contents Introduction and System Requirements 9 VMware Server: Product Overview 10 Features in VMware Server 11 Support for 64-bit Guest Operating Systems 11 Two-Way Virtual SMP (Experimental

More information

Pro/INTRALINK 10.2. Curriculum Guide

Pro/INTRALINK 10.2. Curriculum Guide Pro/INTRALINK 10.2 Curriculum Guide Live Classroom Curriculum Guide Introduction to Pro/INTRALINK 10.2 Business Administration of Pro/INTRALINK 10.2 System Administration of Windchill 10.2 Introduction

More information

Table of Contents. Introduction. Audience. At Course Completion

Table of Contents. Introduction. Audience. At Course Completion Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course Outline Introduction This three-day instructor-led course provides

More information

[email protected] 2009 STREAM FRBC

David.Balka@chi.frb.org 2009 STREAM FRBC Virtualization ti Dave Balka [email protected] Examination Elements Architecture Management Processes Integrity Availability Security 2 Datacenter Consolidation 3 What is Virtualization A framework

More information

1. PREREQUISITES 2. NETWORK ADMINISTRATORS INFO

1. PREREQUISITES 2. NETWORK ADMINISTRATORS INFO 1. PREREQUISITES Software on Database server: - Microsoft SQL Server 2012 or 2012 Express - Minimum 1 CPU (more depending on number of users) - Minimum 4 GB (more depending on number of users) Software

More information

User Identification and Authentication

User Identification and Authentication User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

Next Gen Data Center. KwaiSeng Consulting Systems Engineer [email protected]

Next Gen Data Center. KwaiSeng Consulting Systems Engineer kslai@cisco.com Next Gen Data Center KwaiSeng Consulting Systems Engineer [email protected] Taiwan Update Feb 08, kslai 2006 Cisco 2006 Systems, Cisco Inc. Systems, All rights Inc. reserved. All rights reserved. 1 Agenda

More information

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance

More information

Altus UC Security Overview

Altus UC Security Overview Altus UC Security Overview Description Document Version D2.3 TABLE OF CONTENTS Network and Services Security 1. OVERVIEW... 1 2. PHYSICAL SECURITY... 1 2.1 FACILITY... 1 ENVIRONMENTAL SAFEGUARDS... 1 ACCESS...

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

Integrated processes aligned to your business The examples of the new NetEye and EriZone releases

Integrated processes aligned to your business The examples of the new NetEye and EriZone releases Integrated processes aligned to your business The examples of the new NetEye and EriZone releases Georg Kostner, Product Manager NetEye / EriZone 4/15/2015 1 Measurement & management in most organizations

More information

ShadowLink 2. Overview. May 4, 2015. ONLINE SUPPORT emdat.com/ticket/ PHONE SUPPORT (608) 270-6400 ext. 1

ShadowLink 2. Overview. May 4, 2015. ONLINE SUPPORT emdat.com/ticket/ PHONE SUPPORT (608) 270-6400 ext. 1 ShadowLink 2 Overview May 4, 2015 ONLINE SUPPORT emdat.com/ticket/ PHONE SUPPORT (608) 270-6400 ext. 1 1 Interfacing with Emdat ShadowLink is an Emdat developed product that securely moves data between

More information

SANGFOR SSL VPN. Quick Start Guide

SANGFOR SSL VPN. Quick Start Guide SANGFOR SSL VPN Quick Start Guide This document is intended to assist users to install, debug, configure and maintain SANGFOR SSL VPN device quickly and efficiently. Please read the followings carefully

More information

The BiGuard SSL VPN Appliances

The BiGuard SSL VPN Appliances The BiGuard SSL VPN Appliances ERP Application Guide 1. What is ERP (Enterprise Resource Planning)? 2. The current status of ERP 3. Billion s solutions for several ERP usage scenarios A. Small to medium

More information

Fact Sheet FOR PHARMA & LIFE SCIENCES

Fact Sheet FOR PHARMA & LIFE SCIENCES Fact Sheet PATHWAY STUDIO WEB SECURITY OVERVIEW Pathway Studio Web is a comprehensive collection of information with powerful security features to ensure that your research is safe and secure. FOR PHARMA

More information

Next Generation Network Firewall

Next Generation Network Firewall Next Generation Network Firewall Overview Next Generation Network Firewalls are an important part of protecting any organisation from Internet traffic. Next Generation Firewalls provide a central point

More information

Cloud and VM Based Security

Cloud and VM Based Security Cloud and Based Security Supoj Aram-ekkalarb Network Security Consultant 2012 Check Point Software Technologies Ltd. [PROTECTED] All rights reserved. 2012 Check Point Software Technologies Ltd. [PROTECTED]

More information

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines Introduction........................................................................................ 2 ESX Server Architecture and the design of Virtual Machines........................................

More information

CITY UNIVERSITY OF HONG KONG Network and Platform Security Standard

CITY UNIVERSITY OF HONG KONG Network and Platform Security Standard CITY UNIVERSITY OF HONG KONG Network and Platform Security Standard (Approved by the Information Strategy and Governance Committee in December 2013) INTERNAL Date of Issue: 2013-12-24 Document Control

More information

Alliance Key Manager A Solution Brief for Technical Implementers

Alliance Key Manager A Solution Brief for Technical Implementers KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key

More information

Private Compute-as-a-Service

Private Compute-as-a-Service BROCHURE PRIVATE COMPUTE-AS-A-SERVICE Private Compute-as-a-Service Today, organisations of all sizes are facing challenges unlike any they ve experienced before. Globalisation and economic pressures are

More information

REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION

REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION SD007 V4.1 Issue Date 04 July 2014 1) SERVICE OVERVIEW 1.1) SERVICE OVERVIEW Redcentric s managed firewall service (MFS) is based on a hardware firewall appliance

More information

Virtual Server and Storage Provisioning Service. Service Description

Virtual Server and Storage Provisioning Service. Service Description RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...

More information

HEC Security & Compliance

HEC Security & Compliance HEC Security & Compliance SAP Security, Risk & Compliance Office November, 2014 Public Version 2.0 Details Introduction Overview Security Offering Approach Certifications Introduction Dear Customer, Information

More information

Managing internet security

Managing internet security Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further

More information

CA Mobile Device Management 2014 Q1 Getting Started

CA Mobile Device Management 2014 Q1 Getting Started CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9 NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document

More information

Customer Service Description Next Generation Network Firewall

Customer Service Description Next Generation Network Firewall Customer Service Description Next Generation Network Firewall Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Interoute Communications Limited

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

Document control for sensitive company information and large complex projects.

Document control for sensitive company information and large complex projects. Data sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control for sensitive

More information

Windchill Service Information Manager 10.2. Curriculum Guide

Windchill Service Information Manager 10.2. Curriculum Guide Windchill Service Information Manager 10.2 Curriculum Guide Live Classroom Curriculum Guide Introduction to Windchill Service Information Manager 10.2 Building Information Structures with Windchill Service

More information

System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes

System Compatibility. Enhancements. Email Security. SonicWALL Email Security 7.3.2 Appliance Release Notes Email Security SonicWALL Email Security 7.3.2 Appliance Release Notes System Compatibility SonicWALL Email Security 7.3.2 is supported on the following SonicWALL Email Security appliances: SonicWALL Email

More information

How to complete the Secure Internet Site Declaration (SISD) form

How to complete the Secure Internet Site Declaration (SISD) form 1 How to complete the Secure Internet Site Declaration (SISD) form The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,

More information

Why a Reverse Proxy with My Instant Communicator for mobiles??

Why a Reverse Proxy with My Instant Communicator for mobiles?? Why a Reverse Proxy with My Instant Communicator for mobiles?? INTEGRATED COMMUNICATION SYSTEMS 8AL020043359DRARA, February 2010 What is OmniTouch 8600 My Instant Communicator? Is an aggregator of all

More information

CompTIA Cloud+ 9318; 5 Days, Instructor-led

CompTIA Cloud+ 9318; 5 Days, Instructor-led CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,

More information

The Weakest Link : Securing large, complex, global Oracle ebusiness Suite solutions

The Weakest Link : Securing large, complex, global Oracle ebusiness Suite solutions The Weakest Link : Securing large, complex, global Oracle ebusiness Suite solutions Radomir Vranesevic Director and IT Architect Oracle Certified Master, CISSP Fusion Professionals 1 Agenda Introduction

More information

Secondary DMZ: DMZ (2)

Secondary DMZ: DMZ (2) Secondary DMZ: DMZ (2) Demilitarized zone (DMZ): From a computer security perspective DMZ is a physical and/ or logical sub-network that resides on the perimeter network, facing an un-trusted network or

More information

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend: CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification

More information

Windchill Policy Administration within TEWI Administrative Domain

Windchill Policy Administration within TEWI Administrative Domain JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 21 No. 2 (2013), pp. 153-163 Windchill Policy Administration within TEWI Administrative Domain Konrad Swirski, Urszula Zajkowska Technical University of Warszawa

More information

70-682. Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician. http://www.pass4sureofficial.com. www.dumpspdf.

70-682. Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician. http://www.pass4sureofficial.com. www.dumpspdf. 70-682 Microsoft Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician http://www.pass4sureofficial.com Dumpspdf.com is a reputable IT certification examination guide, study guides and

More information

Building Secure Networks for the Industrial World

Building Secure Networks for the Industrial World Building Secure Networks for the Industrial World Anders Felling Vice President, International Sales Westermo Group Managing Director Westermo Data Communication AB 1 Westermo What do we do? Robust data

More information

White Paper Secure Reverse Proxy Server and Web Application Firewall

White Paper Secure Reverse Proxy Server and Web Application Firewall White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security

More information

DIGIPASS Authentication for SonicWALL SSL-VPN

DIGIPASS Authentication for SonicWALL SSL-VPN DIGIPASS Authentication for SonicWALL SSL-VPN With VACMAN Middleware 3.0 2006 VASCO Data Security. All rights reserved. Page 1 of 53 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations

More information

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY Originator: IT Performance and Capacity Management Policy Approval and Version Control Approval Process: Position or Meeting

More information

Industrial Security for Process Automation

Industrial Security for Process Automation Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

Sophos Endpoint Security and Control on-premise installation best practice guide. Endpoint Security and Control 10 Enterprise Console 5

Sophos Endpoint Security and Control on-premise installation best practice guide. Endpoint Security and Control 10 Enterprise Console 5 Sophos Endpoint Security and Control on-premise installation best practice guide Endpoint Security and Control 10 Enterprise Console 5 Document date: May 2014 Contents 1 About this guide...3 2 What software

More information

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l s @ t e r r e m a r k. c o m

C a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l s @ t e r r e m a r k. c o m Cloud Computing for Government & Enterprise C a r l G o e t h a l s T e r r e m a r k E u r o p e C a r l. g o e t h a l s @ t e r r e m a r k. c o m Agenda Some history on Terremark State of Cloud Public

More information

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall

How To Set Up A Firewall Enterprise, Multi Firewall Edition And Virtual Firewall Quick Start Guide McAfee Firewall Enterprise, Multi-Firewall Edition model S7032 This quick start guide provides high-level instructions for setting up McAfee Firewall Enterprise, Multi-Firewall Edition

More information

Achieving PCI Compliance Using F5 Products

Achieving PCI Compliance Using F5 Products Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security Chapter 12 Network Security Security Policy Life Cycle A method for the development of a comprehensive network security policy is known as the security policy development life cycle (SPDLC). Network Security

More information

Upgrade to Webtrends Analytics 8.7: Best Practices

Upgrade to Webtrends Analytics 8.7: Best Practices Technical Best Practices 8.7 Software Upgrade Upgrade to Webtrends Analytics 8.7: Best Practices Version 3 Webtrends Analytics is a powerful application that must be installed on a dedicated computer.

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

How the Software-Defined Data Center Is Transforming End User Computing

How the Software-Defined Data Center Is Transforming End User Computing How the Software-Defined Data Center Is Transforming End User Computing The Essentials Series sponsored by David Davis SDDC Powered Virtual Desktops and Applications... 1 Three Pillars of SDDC and Desktop/Application

More information

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2 RSA Authentication Manager 8.1 Setup and Configuration Guide Revision 2 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

Security and the Mitel Teleworker Solution

Security and the Mitel Teleworker Solution Security and the Mitel Teleworker Solution White Paper July 2007 Copyright Copyright 2007 Mitel Networks Corporation. This document is unpublished and the following notice is affixed to protect Mitel Networks

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Security Threat Risk Assessment: the final key piece of the PIA puzzle Security Threat Risk Assessment: the final key piece of the PIA puzzle Curtis Kore, Information Security Analyst Angela Swan, Director, Information Security Agenda Introduction Current issues The value

More information

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)

More information

How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook

How To Set Up A Shared Insight Cache Server On A Pc Or Macbook With A Virtual Environment On A Virtual Computer (For A Virtual) (For Pc Or Ipa) ( For Macbook) (Or Macbook). (For Macbook SEP 12.1 Best Practices in a Virtual Environment The document is intended to capture the complete set of best practices for installation and configuration of SEP in a virtual environment. 1 Table of Contents

More information

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs White Paper Meeting PCI Data Security Standards with Juniper Networks SECURE ANALYTICS When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs Copyright 2013, Juniper Networks,

More information