Project Management and Data Security
|
|
- Luke Rodgers
- 8 years ago
- Views:
Transcription
1 Project Management and Data Security 1 Project Management Agile Project Management Methodology Mediasphere applies a structured approach and Best Practice Project Management in the development of all projects. The single most important stage is developing a clear understanding of the client s project requirements and articulating these as accurate functional requirements. As part of our project management process, our team complete the following tasks and services 1. The application of your stylesheet and logo to the login page and all portal pages including: Home Page Login Page and self-registration pages Training Dashboard Course Dashboard Manager Dashboard Base certificate design 2. The inclusion of the link to your terms and conditions and/or privacy statement 3. The inclusion of your key contact into the site 4. The addition of your Google Analytics code into the portal 5. The build of the database for your InductNow training portal 6. Assistance in setting up your hierarchical Training Group structure 7. The deployment of the standard InductNow modules in the Lion LMS 8. The set-up of alerts 9. The negotiated dates for your webinar training session 10. The negotiated dates for your beta release and site launch The management for the planning, design and deployment of the Training Portal is coordinated by our Project Manager with published production and communication schedules. Most sites can be released within 4 weeks. The Project Management for the planning, design and deployment of the Training Portal includes the following Project Plan. The image below provides an indicative Project Plan Schedule that details the tasks and the workflow that applies to the build of the training portal. 1 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d
2 User Acceptance Testing User Acceptance Testing (UAT), end user testing of the system to ensure data and system functionality. UAT is one of the final stages of the project and occurs before you as the client accepts the new system. The UAT document provides a passed failed pending status on the following elements: 1. Technical performance on the portal 2. Design and usability approval 3. Mapping to deliver the listed client requirements Mediasphere will provide the client with access to their portal on the development server to complete the UAT process at the end of the production schedule. 2 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d
3 Mediasphere maintains a fully functional version on the development server as the client may wish to upgrade aspects of the portal in the future. All upgrades are applied with the same testing regime before being uploaded to the production version of the portal. Implementation Timeline The Project Implementation timeline is negotiated with the client to ensure that both parties can meet the prescribed project deliverables. The project timeline usually takes between 3 to 6 weeks to build the training portal. Project Schedule and Milestones The Project Schedule involves the following tasks: Corporate Induction Project Plan Section 1 - Data Gathering 1. Client to provide site domain name with account details 2. Client to provide desired launch date for portal Beta and live releases 3. Client to provide that will be used as the contact for the site 4. Client to provide logo (in eps or with working files format) and stylesheet 5. Client to provide details of the data integration of the Single-Sign-On, LDAP or webservices 6. Client to consider Training Group names and hierarchy (Client will add these after the training session) 7. Client to provide SSL certificate for the site (if required) 8. Client to provide site terms and conditions and privacy statement that will be added to the link on the login page 9. Client to provide data to be imported into the database in CSV format (if part of the project scope) 10. Client to provide confirmation information on required courses or provide details on what courses Mediasphere will be building as per project quotation Section 2 - Build of the LMS for the Client Project Creation of development site on the server Deployment of specified InductNow and Lion LMS modules Set number of annual Learner Accounts to be assigned to the portal Customise settings to client defaults Add Client Administrator to Portal 3 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d
4 Apply the Design including logo and client stylesheet to the portal Apply the design to Course Dashboard and Certificates Client data and custom programming to integrate client requirements Section 3 - Technical Testing and Client UAT Technical Testing of the Training Portal Client User Acceptance Testing Issue and bug-fixing Build of the Single-Sign-On Facility, LDAP or webservice / API with client database DNS site switchover Client Training (provision of documentation) Support commences with SLA Project Milestones The Project Milestones comprise of the following: Milestone 1: Milestone 2: Milestone 3: Milestone 5: Deployment of the LMS with modules and database on the development server Application of the client design to the training portal The build of the custom programming and data integration and SSL certificate User Acceptance Testing, Training and Site Launch 4 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d
5 Hosting Services and Data Management This proposal includes a license for the Mediasphere Lion LMS Platform which is hosted at Mediasphere data warehouse facility - Rackspace. Rackspace provide the following services: Physical security Keycard protocols, biometric scanning protocols and round-the-clock interior and exterior surveillance monitor access to every one of our data centres. Only authorised data centre personnel are granted access credentials to our data centres. No one else can enter the production area of the data centre without prior clearance and an appropriate escort. Every data centre employee undergoes multiple and thorough background security checks. Conditioned power Should a total utility power outage ever occur, all of our data centres power systems are designed to run uninterrupted, with every server receiving conditioned UPS (Uninterruptible Power Supply) power. Our UPS power subsystem is N+1 redundant, with instantaneous failover if the primary UPS fails. If an extended utility power outage occurs, on-site diesel generators can run indefinitely. Precision environment Network Every data centre's HVAC (Heating Ventilation Air Conditioning) system is N+1 redundant. This ensures that a duplicate system immediately comes online should there be a HVAC system failure. Every 90 seconds, all the air in our data centres is circulated and filtered to remove dust and contaminants. Our advanced fire suppression systems are designed to stop fires from spreading. Dedicated to our customers hosting needs only Always high-performance bandwidth Nine network providers, for multiple redundancies Fibre carriers enter at disparate points to guard against failure Network topology and configuration automatically improves in real time Configuration, co-developed with Cisco, guards against single points of failure at the shared network level (extendable to your VLAN environment) Cisco and Arbor Networks work with us to continually improve monitoring and security Network technicians We require that the networking and security teams working in our data centres be certified. We also require that they be thoroughly experienced in managing and monitoring enterprise-level networks. Our Certified Network Technicians are trained to the highest industry standards. Core routing equipment Only fully redundant, enterprise-class routing equipment is used in Rackspace data centres. Fibre carriers enter our data centres at disparate points to guard against service failure. 5 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d
6 Technical Support Service Level Agreement After the launch of your site, Mediasphere s Support Service Level Agreement (SLA) is initialised. Please refer to the Portal Terms and Conditions agreement for all provisions. Security of Your Training Data Mediasphere understands the critical importance of protecting your data. As Mediasphere, an accredited govt provider, delivers secure online training solutions for major corporations, governments, organisations and education institutions, we provide a high level of security on three levels, hardware, application and database. Identity Theft Protection Identity theft refers to fraud that involves someone pretending to be someone else for their own gain. We apply the current best practice to protect your users identity theft including: Encrypted user password in database with strong encryption technique such as MD5 or SHA-1 Use alpha numeric combination and case sensitive for user passwords. Minimalist approach in storing and displaying user private information. Secure Access Policies All users on your training website will be assigned the privileges based on their user level. This protection provides security with regard to access to administration portal. Your site administrator will have the access rights to add or delete any additional administration accounts. These administration accounts can be set as administrators or editors. There is also the option for your administrator to create additional administration accounts and set permissions and access rights to various modules. SSL Encryption and Certificates Clients may request that Mediasphere add SSL encryption to the administration portal and the front end user portal. The SSL certificates provided by the client encrypt the data on the site. After the secure connection is made, the session key is used to encrypt all transmitted data. SSL allows sensitive information such as credit card numbers, private information and login credentials to be transmitted securely. Normally, data sent between browsers and web servers is sent in plain text leaving you vulnerable to eavesdropping. If an attacker is able to intercept all data being sent between a browser and a web server they can see and use that information. More specifically, SSL is a security protocol. Protocols describe how algorithms should be used; in this case, the SSL protocol determines variables of the encryption for both the link and the data being transmitted. The cost of applying your SSL certificate to your portal is a one-off fee of $550 inc. GST. 1 Session Hijacking Protection Mediasphere uses file system based tracking for all users sessions to mitigate session hijacking and Cross-Server Scripting (XSS) potential. This means that every time a user logs on to your portal, it generates a new session value and stores the value in the database. On every page of training portal 1 Based on the client providing Mediasphere with their SSL Certificate. Mediasphere can guide the process if required. 6 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d
7 where authentication is required, the user session will be compared with the one stored in database. As the session is renewed, this guarantees a user dynamic session value, which makes it harder to duplicate or follow, thus providing a higher level of security. Defamation of Site Protection Mediasphere protects against defamation of the site by preventing unauthorised access to file servers. Our systems feature data validation on all forms and write access on files and folders permission (executable, read and write). The file upload directory has read / write access permissions to prevent malicious users from executing code remotely to gain access to the site. IP Tables Software Firewall Security IP Tables is a software firewall that provides a key layer of security. The software firewall controls all access to and from the server on designated ports, IP addresses and TCP and UDP layers. The firewall allows certain users from range of IP addresses to make requests to a designated port on the server or from server to IP addresses. Load Balancing If your training portal is an enterprise solution with high volumes of traffic, Mediasphere can provide access to load balancing technology for annual upgrade. Load balancing technology provides two identical servers that are configured with identical specification and capacity. With the layer technology, it automates the distribution of website traffic between both servers. With this technology, it is capable to serve millions of user with static HTML request. When it comes to database interaction, generating image, and streaming video we can provide high quality streamed traffic to your users. SQL injection Protection SQL injection is a form of attack on a database-driven web site in which the attacker executes unauthorized SQL commands by taking advantage of insecure code on a system connected to the Internet. SQL Injection is a very common attack on search forms, login forms and most forms that send requests to server to access the server database. Mediasphere guards the input data submitted by user to eliminate unwanted code or SQL commands to be passed into the processing script. This is achieved by including all permissible file extensions (i.e. PDF, jpeg, js) and block all scripting type statements and non-approved file extensions. Data Back Up and Disaster Recovery Your Training portal is supported with a comprehensive and responsive Back-up and Disaster Recovery Program. This program includes the following: The client database is backed up 3 times a day The client files are backed-up once a day These back-ups are then stored for an addition 7 days All data on Rackspace servers are backed-up off network on Mediasphere secure servers once a week and this data is stored for 12 months Production workflows abide by privacy legislation with strict protocols assigned to client database access. 7 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d
8 About Mediasphere Mediasphere Holdings Pty Ltd (ACN ) is a leading elearning and software development company that delivers cloud based training portals and websites for the government, corporate and education sectors. In 2007, Mediasphere was awarded the Mincom Award as the most innovative ICT Company in Queensland and now provides our industry leading software to clients in Australia, New Zealand, China, Japan, North America and Europe. Mediasphere has developed its own SaaS platforms and provides a total solution with e-commerce, e-marketing, custom programming, content development, APIs, webservices, hosting and support services. It has also developed a library of interactive products for the education and corporate sector which is marketed globally. SERVICES Mediasphere s services include: Cloud based corporate induction portals Cloud based assessment and accreditation portals Online assessment, tracking and reporting modules Online course and assessment development services Digital content multimedia design and development iphone, android and tablet applications Access to a suite of compliant workplace courses Corporate websites, member portals and training hubs Government, commercial and educational web and graphic design services Data integration, API and webservices Online e-commerce Solutions 8 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d
9 PRODUCTS AND MARKETS Mediasphere has developed a range of elearning platforms to serve four distinct elearning markets. These markets and matching products include: Market Sector 1. Compliance, Competency and Productivity Training 2. Continuing Professional Development (CPD) Training 3. Certifications, Accreditations and Qualifications Training 4. Custom Training Portals with e-commerce Gateways Market Description Organisations that host online inductions, staff training and contractor / volunteer on-boarding and require our software to manage their portals. Professional organisations and peak bodies that deliver online CPD for the members and stakeholders and require our software to manage their portals. Business, government and tertiary institutions that deliver accredited training with assessors, verifiers and employer dashboards on our software. Business, government, content experts and institutions that market and sell their courses and training events on our software. Mediasphere Online Training Products Mediasphere Lion LMS has developed a range of plugins to provide the exact training platform you require. Contact Mediasphere on for more information on the product suite. 9 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d
10 AWARDS Mediasphere provides the market with elearning solutions and the company has received a range of awards from both industry and government to recognize the innovation and quality: Our awards include: IEAA Excellence Award in International Education, 2009 (Queensland Government Education Department Study Abroad ESOS Compliance Program) Mincom Connect Award 2007 most innovative ICT company in Queensland ICT Premiers Export Award Regional Award AIMIA National Finalist 2005, 2004, 2003 AIIA Award Finalist 2005 IDP Award for Excellence and Innovation in International Education 2003 Australian Flexible Learning Framework Queensland Awards 2003, 2004 Annual Learning Technologies Recognition (ALTR) Award 2004 GOVERNMENT CERTIFICATION GITC FRAMEWORK VERSI ON 5 Mediasphere is accredited as a signatory to Government Information Technology Contracting (GITC) Framework - Version 5 - Q P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d
StratusLIVE for Fundraisers Cloud Operations
6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace
More informationGiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
More informationDigital Asset Management & Digital Rights Management...wrapped in Workflow
Digital Asset Management & Digital Rights Management...wrapped in Workflow LightBox Network Integration Options LightBox Basic Startup time: 10 min. - All LightBox Network / LIVE features - Unlimited users
More informationSecurity Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
More informationContractor Training Management, Online. Induction and Automated Compliance
Contractor Training Management, Online Induction and Automated Compliance COMPLETE CONTRACTOR MANAGEMENT INDUCTNOW CONTRACTOR MANAGEMENT ON-BOARDING AND STAFF INDUCTION PORTALS Create custom groups for
More informationSNAP WEBHOST SECURITY POLICY
SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one
More informationSecurity & Infra-Structure Overview
Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4
More informationKEEN - Reliable Infrastructure, Built to Last
KEEN - Reliable Infrastructure, Built to Last 2 KEEN--Reliable Infrastructure, Built to Last A strong network infrastructure is the underpinning of the Knowledge Elements Education Network (KEEN). It is
More informationSecurity Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
More informationG-Cloud Framework. Page 1. Document for Service Definition Audit management System. In response to G Cloud 6 Requirements
1 G-Cloud Framework Document for Service Definition Audit management System In response to G Cloud 6 Requirements 1 2 Table of Content Audit Management System Minimize the Risk 1.The Audit management System.........
More informationGoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
More informationEnterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
More informationCisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
More informationSECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
More informationHydrant E-Learning Management System (HELMS)
Hydrant E-Learning Management System (HELMS) service definition v6.1 Page 1 Service overview Hydrant offer an e-learning Management System (HELMS) on which a variety of e-learning solutions can be built
More informationBirst Security and Reliability
Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their
More informationSCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service
Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and
More informationSecurity & Infrastructure White Paper
Proofing and approval made easy. Security & Infrastructure White Paper ProofHQ (Approvr Limited) 66 The High Street Northwood Middlesex HA6 1BL United Kingdom Email: contact.us@proofhq.com US: +1 214 519
More informationUnderstanding Sage CRM Cloud
Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4
More informationPremier Services Program (PSP) Tools: Security Overview
Premier Services Program (PSP) Tools: Security Overview Software Version 3.0 Extreme Networks, Inc. 3585 Monroe Street Santa Clara, California 95051 (888) 257-3000 (408) 579-2800 http://www.extremenetworks.com
More informationBOWMAN SYSTEMS SECURING CLIENT DATA
BOWMAN SYSTEMS SECURING CLIENT DATA 2012 Bowman Systems L.L.C. All Rights Reserved. This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More informationInteract Intranet Version 7. Technical Requirements. August 2014. 2014 Interact
Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...
More informationColocation, Hot Seat Services, Disaster Recovery Services, Secure and Controlled Environment
Colocation, Hot Seat Services, Disaster Recovery Services, Secure and Controlled Environment 3 Company Overview Confisio DataCenter was formed to help organisations tackle the ever increasing challenges
More informationData Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
More informationKeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
More informationMAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
More informationWhy SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?
SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several
More informationRetention & Destruction
Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of
More informationAutodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
More informationSecure, Scalable and Reliable Cloud Analytics from FusionOps
White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationQuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
More informationPowerVCS and Security
White Paper Sept. 2009 E. Crane Computing PowerVCS and Security Cloud computing is the newest technology buzz word. But the Cloud is more than a fad -- the concepts and technologies have been evolving
More informationSaaS architecture security
Introduction i2o solutions utilise the software as a service (or SaaS) model because it enables us to provide our customers with a robust, easy to use software platform that facilitates the rapid deployment
More informationGTS Software Remote Desktop Services
GTS Software Remote Desktop Services RemoteApp client requirements and hosting environment details CONTENTS Introduction... 2 Client requirements... 2 RD Web Access... 2 Distributed RDP or MSI packages...
More informationMingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway
Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration
More informationSecurity Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
More informationFMCS SECURE HOSTING GUIDE
FMCS SECURE HOSTING GUIDE October 2015 SHG-MNL-v3.0 CONTENTS INTRODUCTION...4 HOSTING SERVICES...4 Corporate Secure Hosting... 4 Hosting Partner... 4 Hosting Location... 4 Physical Security... 4 Risk and
More informationGTS Software Pty Ltd. Remote Desktop Services
GTS Software Pty Ltd Remote Desktop Services Secure web access to GTS Software applications CONTENTS Overview... 2 What GTS can provide with Remote Desktop Services... 2 Main Features... 3 RD Web Access...
More information<cloud> Secure Hosting Services
Global Resources... Local Knowledge Figtree offers the functionality of Figtree Systems Software without the upfront infrastructure investment. It is the preferred deployment solution for organisations
More informationWhere every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
More informationLIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely
LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely LIVE CHAT CLOUD SECURITY Introduction Security is a top priority online it is vital that
More informationIMPAK FEATURES. It simply works! www.impaksolutions.com. 2012-2013 Tefftnet Inc. dba IMPAK. ALL RIGHTS RESERVED.
IMPAK FEATURES It simply works! www.impaksolutions.com 2012-2013 Tefftnet Inc. dba IMPAK. ALL RIGHTS RESERVED. OVERVIEW The IMPAK Web-Based Facility Management System contains all the features needed for
More informationIBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
More informationDescription of Hosted Services Security
Compliance Management System Description of Hosted Services Security OVIYA SYSTEMS LLC 231 Market Pl, Ste.373, San Ramon, CA 94583 l Disclaimer: All rights reserved worldwide. Reprint only with permission
More informationThe Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationIs Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
More informationCONTENTS. PCI DSS Compliance Guide
CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not
More informationIntunex Oy Skillhive Service Description 1 / 6
Intunex Oy Skillhive Service Description 1 / 6 About Skillhive Skillhive is a social business application designed for connecting and sharing expertise within organizations. Skillhive enables employees
More informationQuestion Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
More informationSecurity. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October 2015. Page 1 of 9
Security CLOUD VIDEO CONFERENCING AND CALLING Whitepaper October 2015 Page 1 of 9 Contents Introduction...3 Security risks when endpoints are placed outside of firewalls...3 StarLeaf removes the risk with
More informationSummary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)
Introduction This document provides a summary of technical information security controls operated by Newcastle University s IT Service (NUIT). These information security controls apply to all NUIT managed
More informationKenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
More informationSAS 70 Type II Audits
Thinking from IntraLinks SAS 70 Type II Audits SAS 70 Type II Audits Ensuring Data Security, Reliability and Integrity If your organization shares sensitive data over the Internet, you need rigorous controls
More informationMcAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationSecurity Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
More informationSERENA SOFTWARE Serena Service Manager Security
SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand
More informationE-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
More informationFINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
More informationSitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
More information12 Security Camera System Best Practices - Cyber Safe
12 Security Camera System Best Practices - Cyber Safe Dean Drako, President and CEO, Eagle Eye Networks Website version of white paper Dean Drako video introduction for cyber security white paper Introduction
More informationFormFire Application and IT Security. White Paper
FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development
More informationRESPONSE TO RFP COMMITTEE MANAGEMENT SOFTWARE SOLUTION. Prepared for Brigham Young University. April 21, 2015
RESPONSE TO RFP COMMITTEE MANAGEMENT SOFTWARE SOLUTION Prepared for Brigham Young University April 21, 2015 Submitted by StreamLink Software, Lauren Nieberding, Sales Manager Company, Product and Service
More informationRecommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
More informationConfiguration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
More informationARCHITECTURAL OVERVIEW E-mail Availability Service (EAS) with ActiveMailbox
ARCHITECTURAL OVERVIEW E-mail Availability Service () with ActiveMailbox E-mail Availability Service () with ActiveMailbox For Microsoft Exchange -Centric Environments The Market Need for Through direct
More informationCNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills
More informationBlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
More informationCollaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%
Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationHosted SharePoint: Questions every provider should answer
Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money
More informationenicq 5 System Administrator s Guide
Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide
More informationConfiguration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
More informationHTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
More informationMedia Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
More informationIBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
More informationAdobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationHosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
More informationXerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations
Xerox FreeFlow Digital Publisher Information Assurance Disclosure Onsite, Cloud and epublishing Configurations May 2016 2016 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks
More informationUCS Level 2 Report Issued to
UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs info@mspalliance.com Welcome to the UCS report which stands for Unified Certification
More informationFileMaker Security Guide The Key to Securing Your Apps
FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account
More informationBasic & Advanced Administration for Citrix NetScaler 9.2
Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios
More informationProjectManager.com Security White Paper
ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for
More informationEverything you need to know!
Everything you need to know! 1 Our Facilities Redback Conferencing is at the forefront of the industry in terms of security for your conferencing services. We use Equinix Sydney IBX Data Centres which
More informationWeb Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
More informationAchieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
More informationHow to complete the Secure Internet Site Declaration (SISD) form
1 How to complete the Secure Internet Site Declaration (SISD) form The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,
More informationTechnical specifications
Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.
More informationTable of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
More informationPotential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
More informationSecurity Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
More informationCloud Contact Center. Security White Paper
Cloud Contact Center Security White Paper Introduction Customers communicate with organizations in a variety of forms from phone conversations to email, web chat and social media. As each interaction may
More informationBroadData Unified Meeting Security Whitepaper v4.2
BroadData Unified Meeting Security Whitepaper v4.2 Introduction As organizations unlock the true potential of meeting over the Web as an alternative to costly and time-consuming travel, they do so in the
More informationBlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
More informationNMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
More information