MIKOGO SECURITY DOCUMENT
|
|
|
- Theodora Kennedy
- 10 years ago
- Views:
Transcription
1 MIKOGO SECURITY DOCUMENT
2 Table of Contents Page The Most Important Facts in a Nutshell In Detail Application Firewall Compatibility Quality Management: ISO 9001 Certification Data Compression and Encryption Website SSL Encryption Digitally Signed Software Roles and Responsibilities Session Parameters Organizer, Presenter and Participant Privileges Conclusion
3 The Most Important Facts in a Nutshell Data Compression and Encryption All content that is shared with the participant in the meeting is compressed with proprietary compression algorithms. This compressed content can be interpreted only by the appropriate Mikogo participant software. Moreover, Mikogo never sends meeting content in clear text, but encrypts all data using 256-bit AES encryption. Website Encryption The Mikogo website is secured with 128-bit encryption using Secure Sockets Layer (SSL), which is the most widely used Internet standard for securing sensitive web data communications. SSL web server certificates are provided and signed by VeriSign/Thawte. Session ID and Session Password A randomly generated 9-digit session ID is assigned to the session organizer to uniquely identify the session. A session password can be defined for additional security. Sessions can only be joined with the session ID and the session password if any. Roles and Responsibilities There are several roles in a Mikogo session: organizer, presenter and participant. The organizer needs a username and password and is the only user who can start sessions. The presenter has the capability to share data. The presenter determines what is shared in a session and the level of access that the participant will have during a session. The presentation rights can be handed over. Before becoming the presenter, the participant has to explicitly agree to transmit their computer screen. These same explicit agreements are also made when granting remote control rights. It is not possible to view or control the computer screen without the explicit consent of the presenter. Third Party Access Prevention We employ state of the art firewalls, network monitoring, and intrusion detection tools. Strict change management is employed and additional internal security policies and procedures are enforced. No Session Data is stored Dynamic session content displayed during a Mikogo session originates only from the presenter s machine. The participant sees only representations of this data. At the conclusion of a session, all such representations dissipate. 3
4 In Detail Provided by the global online collaboration solutions provider BeamYourScreen ( Mikogo is an innovative desktop sharing tool used for sales, marketing, training, project management and customer support. BeamYourScreen endeavors that the Mikogo services meet the most stringent corporate security requirements. Mikogo assigns data security the highest priority in the design, deployment and maintenance of its network, platform and services. The purpose of this document is to provide information on the data security features and functions that are available in Mikogo and inherent in the underlying communication infrastructure. We discuss the following items in this document: application, firewall compatibility, content security, user interface security, and infrastructure security. Application The Mikogo software communicates with the Mikogo servers located in North America and Europe using proprietary protocols and data exchange methods. It is impossible to participate in a Mikogo session without the close coordination between the Mikogo software and the Mikogo servers. The data in a Mikogo session is shared using the software, which must establish a connection with a Mikogo server. These security features are inherent throughout the session. Each session is dynamic and involves a handshake between the Mikogo software and the Mikogo server, and the communication between these components is by default compressed, encoded, and encrypted. Firewall Compatibility The Mikogo software communicates with the Mikogo servers to establish a reliable and secure connection. When a session is started, the Mikogo software determines the best method for communication. The Mikogo software connects to the Mikogo servers using TCP or http/https protocols over port 80 or 44 In case TCP connections are blocked, the Mikogo software will tunnel all communications using http/https. Regardless of the type of connection that is established when the session is started, firewalls do not have to be specially configured to enable Mikogo sessions. Quality Management: ISO 9001 Certification Any user organizing a Mikogo session, as well as the people joining and participating in the session will be pleased to know that Mikogo has been awarded the ISO 9001 Certification. As one of the most internationally renowned set of requirements for quality management, the ISO 9001 Certification recognizes that an organization s quality management system has the ability to consistently provide products/services that enhances high customer satisfaction and that meet applicable statutory and regulatory requirements. 4
5 Mikogo provides several controls to prevent unwittingly sharing data during a session. The presenter can hide the screen at any time to browse through their own confidential files. The presenter can also hide the desktop s wallpaper, the desktop contents, and the taskbar. Data Compression and Encryption All content that a presenter shares with the participant in a session is only a representation of the original data. In addition, all content that is shared with the participant in the session is compressed with proprietary compression algorithms. This compressed content can be interpreted only by the appropriate Mikogo connection software. Moreover, Mikogo never sends session content in clear text, but encrypts all data using 256-bit AES encryption (Advanced Encryption Standard). Website SSL Encryption Mikogo secures its website with 128-bit encryption using Secure Sockets Layer (SSL), which is the most widely used Internet standard for securing sensitive web data communications. SSL web server certificates are provided and signed by VeriSign/Thawte. Digitally Signed Software All software components provided by Mikogo are digitally signed using VeriSign/Thawte certificates, the leading certificate authority. Mikogo security is also enforced through a variety of mechanisms exposed through the Mikogo user interface. The available options depend on the role a session participant assumes. Roles and Responsibilities There are several roles in a Mikogo session: organizer, presenter and participant. The organizer needs a username and password and is the only user who can start sessions. The participant can participate in a session. Both, organizer and participant can become presenter and show their screens. Session Parameters The organizer can specify a 9-digit session ID or use a randomly generated 9-digit session ID to uniquely identify the session. A session password can be defined for additional security. Sessions can be joined by either entering the session ID manually or by clicking on the join session URL in an invitation or instant message. In either case, it is recommended that the organizer explicitly informs the participant of the existence of the session either by phone or by . Organizer, Presenter and Participant Privileges Only an organizer can start a Mikogo session using a unique username and strong password. The organizer has the first level of control in the session. The viewing direction can be switched by both the organizer and the respective presenter at any time during a Mikogo session and requires the explicit consent of the participant. The presenter has the capability to share data. The presenter determines what is shared in a session and the level of access that the participant will have during a session. The presenter may grant remote control permissions. At any point during such a session the presenter can immediately revoke the participant s remote control privileges by pressing Ctrl+F12 (or Ctrl+ESC on a Mac computer) on the keyboard or by clicking on the M icon in the system tray and selecting Disable Remote Control. This allows full control over what can occur during times of remote control. 5
6 The organizer may actively request remote control privileges. The presenter always has to explicitly agree to grant remote control rights. It is not possible to control the computer without the explicit consent of the presenter. Both, organizer and presenter can switch the viewing direction. However, the participant first has to explicitly agree to become the presenter and to show their computer screen. After the participant has become the presenter for the first time during a session, the organizer can take back presenting rights for themselves and become the presenter again even without the consent of the participant. However, when switching the viewing direction, the organizer always has to explicitly agree to become presenter. Both, organizer and presenter can end the session at any time. Mikogo maintains a distributed network of high-speed switching servers. Session data originating from the presenter s machine and arriving at the participants machines is switched never stored through the Mikogo switching server network. No session data is stored on the Mikogo servers. There is no need to upload content to the Mikogo servers prior to a session. Dynamic session content displayed during a Mikogo session originates only from the presenter s machine. The participant sees only representations of this data. At the conclusion of a session, all such representations dissipate. All that remains of a Mikogo session is ancillary information like billing records, not a record of the conversation itself. BeamYourScreen invests a lot of time and energy into developing, deploying and maintaining a secure environment for the Mikogo services. We employ state of the art firewalls, network monitoring, and intrusion detection tools. Strict change management is employed and additional internal security policies and procedures are enforced. Conclusion BeamYourScreen pays careful attention to the incorporation of security principles and standards in the design and operation of the Mikogo infrastructure and services. The data security of Mikogo will remain the highest priority at BeamYourScreen, enabling us to continue achieving the goal of providing efficient and secure online real-time communication services. 6
BeamYourScreen Security
BeamYourScreen Security Table of Contents BeamYourScreen Security... 1 The Most Important Facts in a Nutshell... 3 Content Security... 3 User Interface Security... 3 Infrastructure Security... 3 In Detail...
Security Overview Introduction Application Firewall Compatibility
Security Overview Introduction ShowMyPC provides real-time communication services to organizations and a large number of corporations. These corporations use ShowMyPC services for diverse purposes ranging
WebEx Security Overview Security Documentation
WebEx Security Overview Security Documentation 8/1/2003: WebEx Communications Inc. WebEx Security Overview WebEx Security Overview Introduction WebEx Communications, Inc. provides real-time communication
Overview... 2. Servers and Infrastructure... 2. Communication channels... 3. Peer-to-Peer connections... 3. Data Compression and Encryption...
Data security is a high priority at Brosix, enabling us to continue achieving the goal of providing efficient and secure online realtime communication services. Table of Contents Overview... 2 Servers
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
The Secure WebEx Meeting Experience
The Secure WebEx Meeting Experience presented by InterCall, a subsidiary of West Corporation, in partnership with WebEx Communications, Inc provides web conferencing services. Because these services are
Mikogo Web Conferencing & Remote Support. User Guide (Windows Version)
Mikogo Web Conferencing & Remote Support User Guide (Windows Version) Table of Contents Register an Account... 3 Download the Software... 3 Start a Session... 4 Informing your Participants to Join the
RIAS stands for Remote Installation Assistance Service by NT-ware to remotely assist you on-site and on-demand. RIAS sessions are useful to guide you
RIAS stands for Remote Installation Assistance Service by NT-ware to remotely assist you on-site and on-demand. RIAS sessions are useful to guide you precisely through the installation routines or configuration
Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration
White Paper Web Conferencing: Unleash the Power of Secure, Real-Time Collaboration This paper focuses on security information for Cisco WebEx Meeting Center, Cisco WebEx Training Center, Cisco WebEx Support
Access Your Cisco Smart Storage Remotely Via WebDAV
Application Note Access Your Cisco Smart Storage Remotely Via WebDAV WebDAV (Web-based Distributed Authoring and Versioning), is a set of extensions to the HTTP(S) protocol that allows a web server to
Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.
Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway
Unleashing the power of real-time collaboration:
Unleashing the power of real-time collaboration: Security overview of Cisco WebEx solutions Whitepaper Unleashing the power of real-time collaboration: Security overview of Cisco WebEx solutions. WebEx
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
WebEx Remote Access White Paper. The CBORD Group, Inc.
WebEx Remote Access White Paper The CBORD Group, Inc. Document Revision: 1 Last revised: October 30, 2007 Changes are periodically made to the information contained in this document. While every effort
Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3
Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 A Note About Ports 5 Connecting
Unleashing the power of secure, real-time collaboration
Unleashing the power of secure, real-time collaboration Cisco WebEx web conferencing security White Paper 1 2010 Cisco and/or its affiliates. All rights reserved. Introduction Enabling real-time collaboration
Mikogo User Guide Windows Version
Mikogo User Guide Windows Version Table of Contents Registration 3 Download & Installation 4 Start a Session 4 Join a Session 5 Features 6 Participant List 6 Switch Presenter 7 Remote Control 7 Whiteboard
Cisco QuickVPN Installation Tips for Windows Operating Systems
Article ID: 2922 Cisco QuickVPN Installation Tips for Windows Operating Systems Objective Cisco QuickVPN is a free software designed for remote access to a network. It is easy to install on a PC and simple
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO
TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,
Mikogo User Guide Linux Version
Mikogo User Guide Linux Version Table of Contents Registration 3 Downloading & Running the Application 4 Start a Session 5 Join a Session 6 Features 7 Participant List 7 Switch Presenter 8 Remote Control
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
Security Policy. Security Policy. www.clickmeeting.com
Security Policy www.clickmeeting.com 1 Introduction ClickMeeting is a worldwide, solid and easy to use SaaS platform. It s core was constructed with the hi-end technology. Data security the highest priority
WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central
WhatsUp Gold v16.2 MSP Edition Deployment Guide This guide provides information about installing and configuring WhatsUp Gold MSP Edition to central and remote sites. Contents Table of Contents Using WhatsUp
USER GUIDE. General Information... 2. The BeAnywhere Service... 2. BeAnywhere Server... 2. BeAnywhere DRIVE... 2. Security... 2
USER GUIDE TABLE OF CONTENTS General Information... 2 The BeAnywhere Service... 2 BeAnywhere Server... 2 BeAnywhere DRIVE... 2 Security... 2 Level 1 User Security... 3 Level 2 Communications Security...
How To Configure SSL VPN in Cyberoam
How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,
IIS 6.0SSL Certificate Deployment Guide
IIS 6.0SSL Certificate Deployment Guide StartCom CA Limited Contents 1.Generate the CSR by customer.... 3 1.1 Generate the private key files and CSR files... 3 1.2 Create a new certificate request... 3
Spreed Keeps Online Meetings Secure. Online meeting controls and security mechanism. www.spreed.com
Spreed Keeps Online Meetings Secure Online meeting controls and security mechanism www.spreed.com Spreed Online Meeting is protected by the most advanced security features. Rest assured that your meetings
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
DSI File Server Client Documentation
Updated 11/23/2009 Page 1 of 10 Table Of Contents 1.0 OVERVIEW... 3 1.0.1 CONNECTING USING AN FTP CLIENT... 3 1.0.2 CONNECTING USING THE WEB INTERFACE... 3 1.0.3 GETTING AN ACCOUNT... 3 2.0 TRANSFERRING
LogMeIn Backup. Getting Started Guide
LogMeIn Backup Getting Started Guide Contents Getting Started with LogMeIn Backup...3 About LogMeIn Backup...3 How does LogMeIn Backup Work, at-a-glance?...3 About Security in LogMeIn Backup...3 LogMeIn
Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations
Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations 11/2010 This document includes the following topics: About this guide (page 2) TeamViewer remote desktop support
TeamViewer Security Information
TeamViewer Security Information 2014 TeamViewer GmbH, Last update: 05/2014 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical
SSL Enforcer Documentation
SSL Enforcer Documentation Introduction Install and Uninstall Getting Started Main Settings Options Log Introduction Today a vast majority of Internet activities like social networking, streaming videos,
Ti m b u k t up ro. Timbuktu Pro and Microsoft System Management Server Integration White Paper. Contents
The #1 Remote Control and File Transfer Software Contents 1 Integration Summary 1 An Introduction to Timbuktu Pro 2 Integration Details 2 SMS Application Distribution Packs for Timbuktu Pro 3 SMS Console
ISL AlwaysOn 1.0 Manual
Contents 2 Table of Contents Foreword 0 Part I Introduction 3 Part II Security Statement 4 Part III System requirements 6 Part IV Setting up ISL AlwaysOn on a computer 7... 1 Register ISL Online account
Mikogo User Guide Mac Version
Mikogo User Guide Mac Version Table of Contents Registration... 3 Download & Installation... 4 Start a Session... 5 Join a Session... 5 Features... 6 Participant List... 6 Switch Presenter... 7 Remote
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Transport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
The Desktop Sharing Handbook. Brad Hards
Brad Hards 2 Contents 1 Introduction 5 2 The Remote Frame Buffer protocol 6 3 Using Desktop Sharing 7 3.1 Managing Desktop Sharing invitations.......................... 9 3.2 Quit Desktop Sharing....................................
INTRODUCTION... 2 Windows 7... 2 Windows 8... 7 Mac OS X... 11 Ubuntu... 15 Advanced routing... 18 Windows... 18 Mac OS X... 18 Ubuntu...
INTRODUCTION... 2 Windows 7... 2 Windows 8... 7 Mac OS X... 11 Ubuntu... 15 Advanced routing... 18 Windows... 18 Mac OS X... 18 Ubuntu... 18 Updated: Juha Jokinen Page (1/18) INTRODUCTION This is a guide
RemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
IBackup Drive User Guide
IBackup Drive User Guide TABLE OF CONTENTS Introduction... 3 Features... 4 Install IBackup Drive... 5 Login to IBackup Drive... 5 About Main Screen... 7 Settings... 8 Toolbar Options... 11 IBackup Drive
TeamViewer Security Information
TeamViewer Security Information 2013 TeamViewer GmbH, Last update: 11/2013 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Mikogo User Guide Linux Version
Mikogo User Guide Linux Version Table of Contents Registration 3 Downloading & Running the Application 3 Enter Your Account Details 4 Start a Session 5 Join a Session 6 Features 7 Participant List 7 Switch
DataTrust Backup Software. Whitepaper Data Security. Version 6.8
Version 6.8 Table of Contents 1 Introduction... 3 2 DataTrust Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 128-bit SSL communication... 4 2.2 Backup data are securely encrypted...
Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
BeamYourScreen User Guide Mac Version
BeamYourScreen User Guide Mac Version Table of Contents Registration 3 Download & Installation 4 Start a Session 5 Join a Session 6 Features 7 Participant List 7 Switch Presenter 8 Remote Control 8 Whiteboard
SSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
NWIMS. Online Backup Security Documentation
NWIMS Online Backup Security Documentation January 2010 Contents This product guide is designed to cover Security of NWIMS Online Backup. Secure 128-bit SSL Communication 2 Backup data area securely encrypted
Biznet GIO Cloud Connecting VM via Windows Remote Desktop
Biznet GIO Cloud Connecting VM via Windows Remote Desktop Introduction Connecting to your newly created Windows Virtual Machine (VM) via the Windows Remote Desktop client is easy but you will need to make
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Ahsay Online Backup. Whitepaper Data Security
Ahsay Online Backup Version 5.x Jun 2006 Table of Content 1 Introduction...3 2 Server Secure, Robust and Reliable...4 2.1 Secure 128-bit SSL communication...4 2.2 Backup data are securely encrypted...4
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.
Enabling Integrated Windows Authentication For CitectSCADA Web Client Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.xx Summary: What is the difference between Basic Authentication and Windows
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
13.1 Backup virtual machines running on VMware ESXi / ESX Server
13 Backup / Restore VMware Virtual Machines Tomahawk Pro This chapter describes how to backup and restore virtual machines running on VMware ESX, ESXi Server or VMware Server 2.0. 13.1 Backup virtual machines
WhatsUpGold. v14.2. Getting Started with WhatsUp Gold MSP Edition
WhatsUpGold v14.2 Getting Started with WhatsUp Gold MSP Edition Getting Started with MSP Edition In This Guide About WhatsUp Gold MSP Edition... 1 User interfaces... 2 About the MSP Edition reporting capabilities...
PrintFleet Enterprise Security Overview
PrintFleet Inc. is committed to providing software products that are secure for use in all network environments. PrintFleet software products only collect the critical imaging device metrics necessary
SSL VPN Setup for Windows
SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through
TeamViewer Security Information
TeamViewer Security Information 2015 TeamViewer GmbH, Last update: 06/2015 Target Group This document is aimed at professional network administrators. The information in this document is of a rather technical
For paid computer support call 604-518-6695 http://www.netdigix.com [email protected]
Setting up your vpn connection on windows 2000 or XP in continuation from installing x.509 certificate on windows (please do not continue if you have not installed your x.509 certificate): Instructions
Configuration Manual
Configuration Manual Page 1 of 20 Table of Contents Chronicall Setup...3 Standard Installation...3 Non-standard Installation (Recording Library on Separate machine)...8 Configuring Call Recording through
Communication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Data Superhero Online Backup Whitepaper Data Security
Data Superhero Online Backup Whitepaper Data Security Cottage Computers Ltd. Page 1 of 5 (April 15, 2008) Table of Contents Contents 1. Data Superhero Offsite Backup Server Secure, Robust and Reliable...
Interacting with Users
7 Interacting with Users 7 Apple Remote Desktop is a powerful tool for interacting with computer users across a network. You can interact by controlling or observing remote screens, text messaging with
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
GTS Software Remote Desktop Services
GTS Software Remote Desktop Services RemoteApp client requirements and hosting environment details CONTENTS Introduction... 2 Client requirements... 2 RD Web Access... 2 Distributed RDP or MSI packages...
REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION
REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION SD007 V4.1 Issue Date 04 July 2014 1) SERVICE OVERVIEW 1.1) SERVICE OVERVIEW Redcentric s managed firewall service (MFS) is based on a hardware firewall appliance
Cyber-Ark Software and the PCI Data Security Standard
Cyber-Ark Software and the PCI Data Security Standard INTER-BUSINESS VAULT (IBV) The PCI DSS Cyber-Ark s View The Payment Card Industry Data Security Standard (PCI DSS) defines security measures to protect
Blaze Vault Online Backup. Whitepaper Data Security
Blaze Vault Online Backup Version 5.x Jun 2006 Table of Content 1 Introduction... 3 2 Blaze Vault Offsite Backup Server Secure, Robust and Reliable... 4 2.1 Secure 256-bit SSL communication... 4 2.2 Backup
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
ProxyCap Help. Table of contents. Configuring ProxyCap. 2015 Proxy Labs
ProxyCap Help 2015 Proxy Labs Table of contents Configuring ProxyCap The Ruleset panel Loading and saving rulesets Delegating ruleset management The Proxies panel The proxy list view Adding, removing and
Shipping Services Files (SSF) Secure File Transmission Account Setup
Company This template is provided to document all of the materials and information needed for configuring secure file transmission for Shipping Services Files. Version 1.3 Page 1 of 5 1. Enter Date Submitted:
What is the Barracuda SSL VPN Server Agent?
The standard communication model for outgoing calls is for the appliance to simply make a direct connection to the destination host. This paradigm does not suit all business needs. The Barracuda SSL VPN
Configuring and Monitoring Citrix Branch Repeater
Configuring and Monitoring Citrix Branch Repeater eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of
Law Conferencing uses the Webinterpoint 8.2 web conferencing platform. This service is completely reservationless and available 24/7.
Law Conferencing uses the Webinterpoint 8.2 web conferencing platform. This service is completely reservationless and available 24/7. This document contains detailed instructions on all features. Table
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Connecting to Remote Desktop Windows Users
Connecting to Remote Desktop Windows Users How to log into the College Network from Home 1. Start the Remote Desktop Connection For Windows XP, Vista and Windows 7 this is found at:- Star t > All Programs
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
SonicWALL SSL VPN 3.5: Virtual Assist
SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Directory and File Transfer Services. Chapter 7
Directory and File Transfer Services Chapter 7 Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP over traditional authentication systems Identify major
CA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
