WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
|
|
|
- Pierce Welch
- 10 years ago
- Views:
Transcription
1 WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation
2 Copyright WICKSoft WICKSoft Mobile Documents is a registered trademark of WICKSoft Corporation in certain countries. 2
3 Table of Contents Table of Contents... 3 Introduction... 4 Security Issues facing the mobile Enterprise... 4 Summary... 5 General Network Architecture... 6 Data transfer layer... 7 Two layers of cryptography... 8 WICKSoft Mobile Documents proprietary protocol... 9 Application level security Authentication Security Policy Publishing Rule Windows Policies Windows ACLs Application layer security summary Handheld level security Conclusion
4 Introduction Mobile document access technology which allows users to remotely access important documents and information from their wireless handheld greatly improves both employee productivity and convenience by freeing users from having to carry laptops when traveling, and by allowing immediate response and action to issues in real-time. However, there are certain unique security concerns that are inherent to the operating environment. Due to the fact that data travels over-the-air, and that mobile assets can be easily lost or misplaced, special care and attention must be given when considering any solution for the mobile enterprise. Security Issues facing the mobile Enterprise There are four major security challenges facing the mobile Enterprise. 1. Data travels over shared, public, and sometimes open networks. 2. Mobile handhelds may be misplaced or stolen, exposing sensitive information. 3. The mobile device represents a potentially unmanaged point-of-entry in to the network. 4. Worms and viruses may be transferred to the corporate internal network via tunnels created in the mobile VPN technology 1. WICKSoft, makers of WICKSoft Mobile Documents for the BlackBerry, offers technology to combat the aforementioned problems and enables mobile remote access to be achievable in a secure way from anywhere. 1 The Cabir virus and BBProxy are just two examples of the kinds of malware that can be propagated though and Bluetooth enabled devices. According to antivirus maker F Secure, there are already more than 370 different wireless threates in the air, including attacks that attempt to delete data stored on handhelds and even record end users phone calls. 4
5 Summary WICKSoft Mobile Documents approaches the issue of security from three distinct levels. The first is the data-transfer level, the second is at the application level, and the third is at the handheld level. Security at the data transfer level--where traffic may be susceptible to monitoring, and where worms, viruses, and attackers may attempt to gain a remote point of entry--ensures that a secure tunnel is created and maintained from the handheld directly to the Enterprise. Application level security is a policy-based approach to ensure sensitive data never leaves the office, and that only operations deemed safe from a mobile device are possible. Mobile VPN technology must ensure that users cannot accidentally distribute, remove, or otherwise tamper with sensitive information and other network resources. At the handheld level, the mobile VPN solution must be able to effect changes immediately, even if a handheld is turned off. This provision is necessary to ensure that stolen or misplaced assets can be disabled immediately, and that no sensitive information is ever left behind. Combined, these three levels provide a secure channel between the BlackBerry and the Intranet, and also a secure platform through which to operate. 5
6 General Network Architecture WICKSoft Mobile Documents is built on, leverages, and extends the inherent security built into the BlackBerry infrastructure. When used in conjunction with BES and MDS (BlackBerry Mobile Data System ), the WICKSoft Mobile Documents Server does not need to be accessible from the Internet the connection will originate from BES. In other words: no additional ports or entry points need to be opened into the network in order for WICKSoft Mobile Documents to function. By using BES with Enterprise-activated handhelds, a secure connection is already present. Data is transmitted over an encrypted channel from the handheld to the BES, which is located in the intranet. Additional security measures, which are discussed later in this document, ensure additional levels of security and integrity are achieved at both the data transmission levels, as well as the application layer. 6
7 Data transfer layer WICKSoft Mobile Documents communicates over a secure channel which is comprised of the three security layers. This secure channel ensures that: External threats cannot monitor, intercept, or modify data going between the handheld and the Intranet. Hostile internal processes, such as worms, users, or other programs introduced via some other means, cannot monitor, intercept, or modify data going between the wireless infrastructure and internal resources. Rogue applications, such as Trojans, worms, viruses, and unauthorized user applications cannot hijack or exploit the mobile VPN tunnel. WICKSoft Mobile Documents creates a secure channel to the Intranet Two separate layers of cryptography move the WICKSoft Mobile Documents protocol across the wireless network. The addition of an extra cryptography layer ensures that even traffic within the Intranet is secure. A proprietary protocol is used to transmit instructions from the WICKSoft Mobile Documents client, running on the BlackBerry, to the WICKSoft Mobile Documents Server that resides within the Intranet. 7
8 The three security features that make up the secure channel used by WICKSoft Mobile Documents are: AES cryptography from the handheld to the BES Server (or wireless carrier if no BES is present) SSL cryptography from the handheld to the WICKSoft Mobile Documents Server, through the AES tunnel. A proprietary protocol designed exclusively for the application of mobile document access. Two layers of cryptography The first two layers, the AES and SSL cryptographic layers, protect network traffic all the way from the internal WICKSoft Mobile Documents server out to the handheld. These layers ensure that data to and from the handheld always remains secure. The AES layer provides a secure tunnel from the handheld up to the BES server (or to the carrier, if no BES is present). With BES, this prevents any monitoring or tampering of the network traffic while it moves over-the-air and over open networks. The SSL layer increases the security of the AES layer while at the same time protects the tunnel while it moves through the internal Intranet. When used in conjunction with BES the WICKSoft Mobile Documents Server never needs to be accessible via the Internet, or even internal computers. In this way you can restrict the point-of-entry to verified assets (Enterprise activated handhelds) over a secure and encrypted source. This is similar to restricting an IPSEC VPN to a specific MAC address, only with a higher level of obfuscation. 8
9 WICKSoft Mobile Documents proprietary protocol WICKSoft Mobile Documents employs a proprietary communications protocol that protects internal resources from Trojans, viruses, rogue devices, and careless end users. This protocol operates over a standard HTTPS connection, so can work with your existing security infrastructure. This protocol provides no mechanism to execute remote programs or manipulate a database, and can only convey simple end user operations such as List the contents of a folder. Using such a protocol provides the following benefits: Existing security resources, such as content scanners, MDS, Microsoft ISA Server, and other Firewall products continue to take effect. Deployment requirements-- and therefore the security impact are reduced because the protocol tunnels through standard HTTPS. The limited scope of the WICKSoft Mobile Documents protocol makes it almost impossible for a standard Windows worm (like an SQL injection exploit) or Trojan to propagate through the system. The WICKSoft Mobile Documents protocol is exclusive to WICKSoft Mobile Documents in other words, other applications cannot use the protocol. The result is that WICKSoft Mobile Documents is highly resistant to tunneling efforts, such as running a torrent, remote desktop application, or some other network utility across the same protocol. For example: an end user could not setup a program like VNC within the Intranet and then use WICKSoft Mobile Documents to access VNC, thus circumventing security measures. The WICKSoft Mobile Documents protocol will not facilitate tunneling or hijacking by other applications. The protocol is highly conducive to policy enforcement. In this way WICKSoft Mobile Documents provides additional layers of security which will be discussed later, that are context and content sensitive. 9
10 Application level security All data that moves through WICKSoft Mobile Documents goes through the same set of checks and balances before being passed on to the internal network. Only after these checks and balances have been satisfied will WICKSoft Mobile Documents perform a given operation on the internal network. Authentication The first check is authentication. All WICKSoft Mobile Documents users must login to WICKSoft Mobile Documents using their BlackBerry. This authentication data is checked by the WICKSoft Mobile Documents server for each and every operation before being processed. Once authenticated, all processes within WICKSoft Mobile Documents are undertaken as if the user were logged in to the local network as that user. If an account is disabled or modified in Active Directory, or Novell edirectory, then the changes will be reflected in real-time and rejected by both WICKSoft Mobile Documents and the Operating System. Security Policy The second check is against the security policy. WICKSoft Mobile Documents contains its own patent-pending security policy technology that has been designed for remote access applications. Policies can be customized to restrict access by users and groups to: Machines Shares Files and Folders Web resources File types 10
11 Additionally, all requests must pass a basic sanity test which guards against certain intrusion attempts. Publishing Rule The third check is against publishing rules. Administrators must explicitly allow network resources to be made available to end users. In this way the risk of accidently exposing sensitive resources is mitigated. Keep in mind that security policies (mentioned earlier) override publishing rules, so mistakenly providing access to an explicitly denied resource (or user) will not compromise the system. Windows and Novell Policies The fourth check is against your Windows or Novell Security Policy. Once a user logs in to WICKSoft Mobile Documents they are subject to all of the security constraints implemented at the Intranet level. In this way a Microsoft Security Policy will affect and constrain a WICKSoft Mobile Documents user as if the user were accessing the Intranet locally. Windows and Novell ACLs The fifth check is against your Windows or Novell ACLs. At no point will WICKSoft Mobile Documents ever grant a user access to something they do not have sufficient rights to access. WICKSoft Mobile Documents honors all Microsoft Windows and Novell ACLs at both the share and folder level. These ACL checks guarantee that the end user will never be able to do something that they couldn t do from the office. Application layer security summary The application security layer, with its multiple checks and balances, makes it very easy to lock down the mobile enterprise. Basic built-in sanity checks, which cannot be overridden, ensure that relative path referencing, local paths, and certain other aberrant access types are never permitted to flow throughout the rest of the system. A failure at any one point along the sequence immediately invalidates a client request and is logged to a special security log. The entire secure channel ultimately provides a level of data and application control that facilitates only the operation of WICKSoft Mobile Documents, but no other applications. 11
12 Handheld level security The BlackBerry Wireless Handheld is a very secure operating environment and WICKSoft Mobile Documents leverages and enhances this inherent security. WICKSoft Mobile Documents provides the following security features on the handheld: At no time is sensitive data ever stored on the handheld, a SIM card, or other portable storage device 2. All messages sent using WICKSoft Mobile Documents are sent from within the corporate intranet, and do not travel over the air. When used in conjunction with Microsoft Exchange, WICKSoft Mobile Documents acts as if the user sent an message from their desk, even leaving a copy of the outgoing message in the user s Sent Items. WICKSoft Mobile Documents honors the automatic lock-out during periods of inactivity that is provided by the BlackBerry. WICKSoft Mobile Documents provides an independent automatic lock-out so that WICKSoft Mobile Documents will become locked after a period of inactivity. Data cannot be transferred from an external source, through the BlackBerry, through WICKSoft Mobile Documents. This makes WICKSoft Mobile Documents immune to Bluetooth born viruses and worms, and protects against MIDP and handheld based Trojans. 2 File downloading is disabled by default. If administrators choose to enable downloading in both the server wide security policy, and specific publishing rules, then clients may store information on their PDA. Security policies and publishing rules can restrict downloading to documents deemed safe for transfer to a PDA. 12
13 Conclusion WICKSoft Mobile Documents delivers a secure channel to the enterprise that facilitates mobile document access without exposing the corporate network to external threats. Enterprise security management features allow administrators to control mobile access to network resources. Extensive logging allows for continuous auditing of many aspects of the WICKSoft Mobile Documents deployment. Full access traces and security notification permit the administrator to closely monitor activity. By leveraging existing infrastructure WICKSoft Mobile Documents can seamlessly integrate with the mobile enterprise while providing an enhanced level of security and access control. Sensitive data is never stored on the handheld, and data transfers (such as file management, and attachments) do not travel over-the-air. Existing security infrastructure is applied to mobile user. A proprietary protocol ensures existing security threats, such as worms and viruses, do not hijack or tunnel through the secure WICKSoft Mobile Documents channel. For more information about WICKSoft Mobile Documents for the BlackBerry please visit 13
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:
Compliance Brief The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements: Using Server Isolation and Encryption as a Regulatory Compliance Solution and IT Best Practice Introduction
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS Karen Scarfone, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Many people
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES
MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single
Novell Access Manager SSL Virtual Private Network
White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core
PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE
BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE About the Author. Acknowledgments. Introduction. Chapter 1 Understanding the Threats. Quantifying the Threat.
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Does your Citrix or Terminal Server environment have an Achilles heel?
CRYPTZONE WHITE PAPER Does your Citrix or Terminal Server environment have an Achilles heel? Moving away from IP-centric to role-based access controls to secure Citrix and Terminal Server user access cryptzone.com
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
White Paper Secure Reverse Proxy Server and Web Application Firewall
White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security
HIPAA Compliance and Wireless Networks. 2005 Cranite Systems, Inc. All Rights Reserved.
HIPAA Compliance and Wireless Networks White Paper HIPAA Compliance and Wireless Networks 2005 Cranite Systems, Inc. All Rights Reserved. All materials contained in this document are the copyrighted property
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
ONE Mail Direct for Mobile Devices
ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Mobile Devices and Malicious Code Attack Prevention
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00
PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)
HIPAA Compliance and Wireless Networks
HIPAA Compliance and Wireless Networks White Paper 2004 Cranite Systems, Inc. All Rights Reserved. All materials contained in this document are the copyrighted property of Cranite Systems, Inc. and/or
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING
COMMONWEALTH OF PENNSYLVANIA DEPARTMENT S OF PUBLIC WELFARE, INSURANCE AND AGING INFORMATION TECHNOLOGY STANDARD Name Of Standard: Mobile Device Standard Domain: Security Date Issued: 09/07/2012 Date Revised:
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note
BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...
Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO
TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
Network Access Control ProCurve and Microsoft NAP Integration
HP ProCurve Networking Network Access Control ProCurve and Microsoft NAP Integration Abstract...2 Foundation...3 Network Access Control basics...4 ProCurve Identity Driven Manager overview...5 Microsoft
Network Security Guidelines. e-governance
Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls. 1 Information systems in corporations,government agencies,and other organizations
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R
HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R HughesNet Managed Broadband Network Services include a high level of end-toend security utilizing a robust architecture designed by
Securing mobile devices in the business environment
IBM Global Technology Services Thought Leadership White Paper October 2011 Securing mobile devices in the business environment By I-Lung Kao, Global Strategist, IBM Security Services 2 Securing mobile
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY
IT FIREWALL POLICY TABLE OF CONTENT 1. INTRODUCTION... 3 2. TERMS AND DEFINITION... 3 3. PURPOSE... 5 4. SCOPE... 5 5. POLICY STATEMENT... 5 6. REQUIREMENTS... 5 7. OPERATIONS... 6 8. CONFIGURATION...
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
Remote Access Security
Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card
The Benefits of SSL Content Inspection ABSTRACT
The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
Overview... 2. Servers and Infrastructure... 2. Communication channels... 3. Peer-to-Peer connections... 3. Data Compression and Encryption...
Data security is a high priority at Brosix, enabling us to continue achieving the goal of providing efficient and secure online realtime communication services. Table of Contents Overview... 2 Servers
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Security Considerations for DirectAccess Deployments. Whitepaper
Security Considerations for DirectAccess Deployments Whitepaper February 2015 This white paper discusses security planning for DirectAccess deployment. Introduction DirectAccess represents a paradigm shift
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Xerox Mobile Print Cloud
September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United
FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES
FIREWALL Features SECURITY OF INFORMATION TECHNOLOGIES To ensure that they stay competitive and in order to expand their activity, businesses today know it is in their best interests to open up more channels
Implementation Guide
Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline
Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
Using the AppGate Network Segmentation Server TO ACHIEVE PCI COMPLIANCE
Using the AppGate Network Segmentation Server TO ACHIEVE PCI COMPLIANCE Version 2.0 January 2013 Jamie Bodley-Scott Cryptzone 2012 www.cryptzone.com Page 1 of 12 Contents Preface... 3 PCI DSS - Overview
Cyber-Ark Software and the PCI Data Security Standard
Cyber-Ark Software and the PCI Data Security Standard INTER-BUSINESS VAULT (IBV) The PCI DSS Cyber-Ark s View The Payment Card Industry Data Security Standard (PCI DSS) defines security measures to protect
Best Practices for Secure Remote Access. Aventail Technical White Paper
Aventail Technical White Paper Table of contents Overview 3 1. Strong, secure access policy for the corporate network 3 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 4 3.
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Automate PCI Compliance Monitoring, Investigation & Reporting
Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.
Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc. Foundstone Labs October, 2003 Table of Contents Table of Contents...2 Introduction...3 Scope and Approach...3
RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access
Policy Title: Remote Access Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 117 (2014) Remote Access Approval Date: 05/20/2014 Revised Responsible Office: Office of Information
Network Security. Mike Trice, Network Engineer [email protected]. Richard Trice, Systems Specialist [email protected]. Alabama Supercomputer Authority
Network Security Mike Trice, Network Engineer [email protected] Richard Trice, Systems Specialist [email protected] Alabama Supercomputer Authority What is Network Security Network security consists of the provisions
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
White Paper: Secure Printing and Mobile Devices
White Paper: Secure Printing and Mobile Devices Secure Printing and Mobile Devices 1 Introduction... 3 2 The Importance of IT Security... 3 3 Industry Overview... 4 4 Printing and Mobile Security Solutions...
Securing Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table
BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance
