Project Management and Data Security

Size: px
Start display at page:

Download "Project Management and Data Security"

Transcription

1 Project Management and Data Security 1 Project Management Agile Project Management Methodology Mediasphere applies a structured approach and Best Practice Project Management in the development of all projects. The single most important stage is developing a clear understanding of the client s project requirements and articulating these as accurate functional requirements. As part of our project management process, our team complete the following tasks and services 1. The application of your stylesheet and logo to the login page and all portal pages including: Home Page Login Page and self-registration pages Training Dashboard Course Dashboard Manager Dashboard Base certificate design 2. The inclusion of the link to your terms and conditions and/or privacy statement 3. The inclusion of your key contact into the site 4. The addition of your Google Analytics code into the portal 5. The build of the database for your InductNow training portal 6. Assistance in setting up your hierarchical Training Group structure 7. The deployment of the standard InductNow modules in the Lion LMS 8. The set-up of alerts 9. The negotiated dates for your webinar training session 10. The negotiated dates for your beta release and site launch The management for the planning, design and deployment of the Training Portal is coordinated by our Project Manager with published production and communication schedules. Most sites can be released within 4 weeks. The Project Management for the planning, design and deployment of the Training Portal includes the following Project Plan. The image below provides an indicative Project Plan Schedule that details the tasks and the workflow that applies to the build of the training portal. 1 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d

2 User Acceptance Testing User Acceptance Testing (UAT), end user testing of the system to ensure data and system functionality. UAT is one of the final stages of the project and occurs before you as the client accepts the new system. The UAT document provides a passed failed pending status on the following elements: 1. Technical performance on the portal 2. Design and usability approval 3. Mapping to deliver the listed client requirements Mediasphere will provide the client with access to their portal on the development server to complete the UAT process at the end of the production schedule. 2 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d

3 Mediasphere maintains a fully functional version on the development server as the client may wish to upgrade aspects of the portal in the future. All upgrades are applied with the same testing regime before being uploaded to the production version of the portal. Implementation Timeline The Project Implementation timeline is negotiated with the client to ensure that both parties can meet the prescribed project deliverables. The project timeline usually takes between 3 to 6 weeks to build the training portal. Project Schedule and Milestones The Project Schedule involves the following tasks: Corporate Induction Project Plan Section 1 - Data Gathering 1. Client to provide site domain name with account details 2. Client to provide desired launch date for portal Beta and live releases 3. Client to provide that will be used as the contact for the site 4. Client to provide logo (in eps or with working files format) and stylesheet 5. Client to provide details of the data integration of the Single-Sign-On, LDAP or webservices 6. Client to consider Training Group names and hierarchy (Client will add these after the training session) 7. Client to provide SSL certificate for the site (if required) 8. Client to provide site terms and conditions and privacy statement that will be added to the link on the login page 9. Client to provide data to be imported into the database in CSV format (if part of the project scope) 10. Client to provide confirmation information on required courses or provide details on what courses Mediasphere will be building as per project quotation Section 2 - Build of the LMS for the Client Project Creation of development site on the server Deployment of specified InductNow and Lion LMS modules Set number of annual Learner Accounts to be assigned to the portal Customise settings to client defaults Add Client Administrator to Portal 3 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d

4 Apply the Design including logo and client stylesheet to the portal Apply the design to Course Dashboard and Certificates Client data and custom programming to integrate client requirements Section 3 - Technical Testing and Client UAT Technical Testing of the Training Portal Client User Acceptance Testing Issue and bug-fixing Build of the Single-Sign-On Facility, LDAP or webservice / API with client database DNS site switchover Client Training (provision of documentation) Support commences with SLA Project Milestones The Project Milestones comprise of the following: Milestone 1: Milestone 2: Milestone 3: Milestone 5: Deployment of the LMS with modules and database on the development server Application of the client design to the training portal The build of the custom programming and data integration and SSL certificate User Acceptance Testing, Training and Site Launch 4 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d

5 Hosting Services and Data Management This proposal includes a license for the Mediasphere Lion LMS Platform which is hosted at Mediasphere data warehouse facility - Rackspace. Rackspace provide the following services: Physical security Keycard protocols, biometric scanning protocols and round-the-clock interior and exterior surveillance monitor access to every one of our data centres. Only authorised data centre personnel are granted access credentials to our data centres. No one else can enter the production area of the data centre without prior clearance and an appropriate escort. Every data centre employee undergoes multiple and thorough background security checks. Conditioned power Should a total utility power outage ever occur, all of our data centres power systems are designed to run uninterrupted, with every server receiving conditioned UPS (Uninterruptible Power Supply) power. Our UPS power subsystem is N+1 redundant, with instantaneous failover if the primary UPS fails. If an extended utility power outage occurs, on-site diesel generators can run indefinitely. Precision environment Network Every data centre's HVAC (Heating Ventilation Air Conditioning) system is N+1 redundant. This ensures that a duplicate system immediately comes online should there be a HVAC system failure. Every 90 seconds, all the air in our data centres is circulated and filtered to remove dust and contaminants. Our advanced fire suppression systems are designed to stop fires from spreading. Dedicated to our customers hosting needs only Always high-performance bandwidth Nine network providers, for multiple redundancies Fibre carriers enter at disparate points to guard against failure Network topology and configuration automatically improves in real time Configuration, co-developed with Cisco, guards against single points of failure at the shared network level (extendable to your VLAN environment) Cisco and Arbor Networks work with us to continually improve monitoring and security Network technicians We require that the networking and security teams working in our data centres be certified. We also require that they be thoroughly experienced in managing and monitoring enterprise-level networks. Our Certified Network Technicians are trained to the highest industry standards. Core routing equipment Only fully redundant, enterprise-class routing equipment is used in Rackspace data centres. Fibre carriers enter our data centres at disparate points to guard against service failure. 5 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d

6 Technical Support Service Level Agreement After the launch of your site, Mediasphere s Support Service Level Agreement (SLA) is initialised. Please refer to the Portal Terms and Conditions agreement for all provisions. Security of Your Training Data Mediasphere understands the critical importance of protecting your data. As Mediasphere, an accredited govt provider, delivers secure online training solutions for major corporations, governments, organisations and education institutions, we provide a high level of security on three levels, hardware, application and database. Identity Theft Protection Identity theft refers to fraud that involves someone pretending to be someone else for their own gain. We apply the current best practice to protect your users identity theft including: Encrypted user password in database with strong encryption technique such as MD5 or SHA-1 Use alpha numeric combination and case sensitive for user passwords. Minimalist approach in storing and displaying user private information. Secure Access Policies All users on your training website will be assigned the privileges based on their user level. This protection provides security with regard to access to administration portal. Your site administrator will have the access rights to add or delete any additional administration accounts. These administration accounts can be set as administrators or editors. There is also the option for your administrator to create additional administration accounts and set permissions and access rights to various modules. SSL Encryption and Certificates Clients may request that Mediasphere add SSL encryption to the administration portal and the front end user portal. The SSL certificates provided by the client encrypt the data on the site. After the secure connection is made, the session key is used to encrypt all transmitted data. SSL allows sensitive information such as credit card numbers, private information and login credentials to be transmitted securely. Normally, data sent between browsers and web servers is sent in plain text leaving you vulnerable to eavesdropping. If an attacker is able to intercept all data being sent between a browser and a web server they can see and use that information. More specifically, SSL is a security protocol. Protocols describe how algorithms should be used; in this case, the SSL protocol determines variables of the encryption for both the link and the data being transmitted. The cost of applying your SSL certificate to your portal is a one-off fee of $550 inc. GST. 1 Session Hijacking Protection Mediasphere uses file system based tracking for all users sessions to mitigate session hijacking and Cross-Server Scripting (XSS) potential. This means that every time a user logs on to your portal, it generates a new session value and stores the value in the database. On every page of training portal 1 Based on the client providing Mediasphere with their SSL Certificate. Mediasphere can guide the process if required. 6 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d

7 where authentication is required, the user session will be compared with the one stored in database. As the session is renewed, this guarantees a user dynamic session value, which makes it harder to duplicate or follow, thus providing a higher level of security. Defamation of Site Protection Mediasphere protects against defamation of the site by preventing unauthorised access to file servers. Our systems feature data validation on all forms and write access on files and folders permission (executable, read and write). The file upload directory has read / write access permissions to prevent malicious users from executing code remotely to gain access to the site. IP Tables Software Firewall Security IP Tables is a software firewall that provides a key layer of security. The software firewall controls all access to and from the server on designated ports, IP addresses and TCP and UDP layers. The firewall allows certain users from range of IP addresses to make requests to a designated port on the server or from server to IP addresses. Load Balancing If your training portal is an enterprise solution with high volumes of traffic, Mediasphere can provide access to load balancing technology for annual upgrade. Load balancing technology provides two identical servers that are configured with identical specification and capacity. With the layer technology, it automates the distribution of website traffic between both servers. With this technology, it is capable to serve millions of user with static HTML request. When it comes to database interaction, generating image, and streaming video we can provide high quality streamed traffic to your users. SQL injection Protection SQL injection is a form of attack on a database-driven web site in which the attacker executes unauthorized SQL commands by taking advantage of insecure code on a system connected to the Internet. SQL Injection is a very common attack on search forms, login forms and most forms that send requests to server to access the server database. Mediasphere guards the input data submitted by user to eliminate unwanted code or SQL commands to be passed into the processing script. This is achieved by including all permissible file extensions (i.e. PDF, jpeg, js) and block all scripting type statements and non-approved file extensions. Data Back Up and Disaster Recovery Your Training portal is supported with a comprehensive and responsive Back-up and Disaster Recovery Program. This program includes the following: The client database is backed up 3 times a day The client files are backed-up once a day These back-ups are then stored for an addition 7 days All data on Rackspace servers are backed-up off network on Mediasphere secure servers once a week and this data is stored for 12 months Production workflows abide by privacy legislation with strict protocols assigned to client database access. 7 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d

8 About Mediasphere Mediasphere Holdings Pty Ltd (ACN ) is a leading elearning and software development company that delivers cloud based training portals and websites for the government, corporate and education sectors. In 2007, Mediasphere was awarded the Mincom Award as the most innovative ICT Company in Queensland and now provides our industry leading software to clients in Australia, New Zealand, China, Japan, North America and Europe. Mediasphere has developed its own SaaS platforms and provides a total solution with e-commerce, e-marketing, custom programming, content development, APIs, webservices, hosting and support services. It has also developed a library of interactive products for the education and corporate sector which is marketed globally. SERVICES Mediasphere s services include: Cloud based corporate induction portals Cloud based assessment and accreditation portals Online assessment, tracking and reporting modules Online course and assessment development services Digital content multimedia design and development iphone, android and tablet applications Access to a suite of compliant workplace courses Corporate websites, member portals and training hubs Government, commercial and educational web and graphic design services Data integration, API and webservices Online e-commerce Solutions 8 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d

9 PRODUCTS AND MARKETS Mediasphere has developed a range of elearning platforms to serve four distinct elearning markets. These markets and matching products include: Market Sector 1. Compliance, Competency and Productivity Training 2. Continuing Professional Development (CPD) Training 3. Certifications, Accreditations and Qualifications Training 4. Custom Training Portals with e-commerce Gateways Market Description Organisations that host online inductions, staff training and contractor / volunteer on-boarding and require our software to manage their portals. Professional organisations and peak bodies that deliver online CPD for the members and stakeholders and require our software to manage their portals. Business, government and tertiary institutions that deliver accredited training with assessors, verifiers and employer dashboards on our software. Business, government, content experts and institutions that market and sell their courses and training events on our software. Mediasphere Online Training Products Mediasphere Lion LMS has developed a range of plugins to provide the exact training platform you require. Contact Mediasphere on for more information on the product suite. 9 P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d

10 AWARDS Mediasphere provides the market with elearning solutions and the company has received a range of awards from both industry and government to recognize the innovation and quality: Our awards include: IEAA Excellence Award in International Education, 2009 (Queensland Government Education Department Study Abroad ESOS Compliance Program) Mincom Connect Award 2007 most innovative ICT company in Queensland ICT Premiers Export Award Regional Award AIMIA National Finalist 2005, 2004, 2003 AIIA Award Finalist 2005 IDP Award for Excellence and Innovation in International Education 2003 Australian Flexible Learning Framework Queensland Awards 2003, 2004 Annual Learning Technologies Recognition (ALTR) Award 2004 GOVERNMENT CERTIFICATION GITC FRAMEWORK VERSI ON 5 Mediasphere is accredited as a signatory to Government Information Technology Contracting (GITC) Framework - Version 5 - Q P a g e M e d i a s p h e r e A l l R i g h t s R e s e r v e d

StratusLIVE for Fundraisers Cloud Operations

StratusLIVE for Fundraisers Cloud Operations 6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace

More information

GiftWrap 4.0 Security FAQ

GiftWrap 4.0 Security FAQ GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels

More information

Digital Asset Management & Digital Rights Management...wrapped in Workflow

Digital Asset Management & Digital Rights Management...wrapped in Workflow Digital Asset Management & Digital Rights Management...wrapped in Workflow LightBox Network Integration Options LightBox Basic Startup time: 10 min. - All LightBox Network / LIVE features - Unlimited users

More information

Security Whitepaper: ivvy Products

Security Whitepaper: ivvy Products Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security

More information

Contractor Training Management, Online. Induction and Automated Compliance

Contractor Training Management, Online. Induction and Automated Compliance Contractor Training Management, Online Induction and Automated Compliance COMPLETE CONTRACTOR MANAGEMENT INDUCTNOW CONTRACTOR MANAGEMENT ON-BOARDING AND STAFF INDUCTION PORTALS Create custom groups for

More information

SNAP WEBHOST SECURITY POLICY

SNAP WEBHOST SECURITY POLICY SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one

More information

Security & Infra-Structure Overview

Security & Infra-Structure Overview Security & Infra-Structure Overview Contents KantanMT Platform Security... 2 Customer Data Protection... 2 Application Security... 2 Physical and Environmental Security... 3 ecommerce Transactions... 4

More information

KEEN - Reliable Infrastructure, Built to Last

KEEN - Reliable Infrastructure, Built to Last KEEN - Reliable Infrastructure, Built to Last 2 KEEN--Reliable Infrastructure, Built to Last A strong network infrastructure is the underpinning of the Knowledge Elements Education Network (KEEN). It is

More information

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1

Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1 JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us

More information

G-Cloud Framework. Page 1. Document for Service Definition Audit management System. In response to G Cloud 6 Requirements

G-Cloud Framework. Page 1. Document for Service Definition Audit management System. In response to G Cloud 6 Requirements 1 G-Cloud Framework Document for Service Definition Audit management System In response to G Cloud 6 Requirements 1 2 Table of Content Audit Management System Minimize the Risk 1.The Audit management System.........

More information

GoodData Corporation Security White Paper

GoodData Corporation Security White Paper GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share

More information

Enterprise level security, the Huddle way.

Enterprise level security, the Huddle way. Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

Hydrant E-Learning Management System (HELMS)

Hydrant E-Learning Management System (HELMS) Hydrant E-Learning Management System (HELMS) service definition v6.1 Page 1 Service overview Hydrant offer an e-learning Management System (HELMS) on which a variety of e-learning solutions can be built

More information

Birst Security and Reliability

Birst Security and Reliability Birst Security and Reliability Birst is Dedicated to Safeguarding Your Information 2 Birst is Dedicated to Safeguarding Your Information To protect the privacy of its customers and the safety of their

More information

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service Hosted Cloud Storage Service: Scope of Service 1. Definitions 1.1 For the purposes of this Schedule: Access Account is an End User account with Data Storage requiring authentication via a username and

More information

Security & Infrastructure White Paper

Security & Infrastructure White Paper Proofing and approval made easy. Security & Infrastructure White Paper ProofHQ (Approvr Limited) 66 The High Street Northwood Middlesex HA6 1BL United Kingdom Email: contact.us@proofhq.com US: +1 214 519

More information

Understanding Sage CRM Cloud

Understanding Sage CRM Cloud Understanding Sage CRM Cloud Data centre and platform security whitepaper Document version 2016 Table of Contents 1.0 Introduction 3 2.0 Sage CRM Cloud Data centre Infrastructure 4 2.1 Site location 4

More information

Premier Services Program (PSP) Tools: Security Overview

Premier Services Program (PSP) Tools: Security Overview Premier Services Program (PSP) Tools: Security Overview Software Version 3.0 Extreme Networks, Inc. 3585 Monroe Street Santa Clara, California 95051 (888) 257-3000 (408) 579-2800 http://www.extremenetworks.com

More information

BOWMAN SYSTEMS SECURING CLIENT DATA

BOWMAN SYSTEMS SECURING CLIENT DATA BOWMAN SYSTEMS SECURING CLIENT DATA 2012 Bowman Systems L.L.C. All Rights Reserved. This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact

Interact Intranet Version 7. Technical Requirements. August 2014. 2014 Interact Interact Intranet Version 7 Technical Requirements August 2014 2014 Interact Definitions... 3 Licenses... 3 On-Premise... 3 Cloud... 3 Pulic Cloud... 3 Private Cloud... 3 Perpetual... 3 Self-Hosted...

More information

Colocation, Hot Seat Services, Disaster Recovery Services, Secure and Controlled Environment

Colocation, Hot Seat Services, Disaster Recovery Services, Secure and Controlled Environment Colocation, Hot Seat Services, Disaster Recovery Services, Secure and Controlled Environment 3 Company Overview Confisio DataCenter was formed to help organisations tackle the ever increasing challenges

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

KeyLock Solutions Security and Privacy Protection Practices

KeyLock Solutions Security and Privacy Protection Practices KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Secure, Scalable and Reliable Cloud Analytics from FusionOps

Secure, Scalable and Reliable Cloud Analytics from FusionOps White Paper Secure, Scalable and Reliable Cloud Analytics from FusionOps A FusionOps White Paper FusionOps 265 Santa Ana Court Sunnyvale, CA 94085 www.fusionops.com World-class security... 4 Physical Security...

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

QuickBooks Online: Security & Infrastructure

QuickBooks Online: Security & Infrastructure QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...

More information

PowerVCS and Security

PowerVCS and Security White Paper Sept. 2009 E. Crane Computing PowerVCS and Security Cloud computing is the newest technology buzz word. But the Cloud is more than a fad -- the concepts and technologies have been evolving

More information

SaaS architecture security

SaaS architecture security Introduction i2o solutions utilise the software as a service (or SaaS) model because it enables us to provide our customers with a robust, easy to use software platform that facilitates the rapid deployment

More information

GTS Software Remote Desktop Services

GTS Software Remote Desktop Services GTS Software Remote Desktop Services RemoteApp client requirements and hosting environment details CONTENTS Introduction... 2 Client requirements... 2 RD Web Access... 2 Distributed RDP or MSI packages...

More information

Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway

Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway Mingyu Web Application Firewall (DAS- WAF) - - - All transparent deployment for Web application gateway All transparent deployment Full HTTPS site defense Prevention of OWASP top 10 Website Acceleration

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

FMCS SECURE HOSTING GUIDE

FMCS SECURE HOSTING GUIDE FMCS SECURE HOSTING GUIDE October 2015 SHG-MNL-v3.0 CONTENTS INTRODUCTION...4 HOSTING SERVICES...4 Corporate Secure Hosting... 4 Hosting Partner... 4 Hosting Location... 4 Physical Security... 4 Risk and

More information

GTS Software Pty Ltd. Remote Desktop Services

GTS Software Pty Ltd. Remote Desktop Services GTS Software Pty Ltd Remote Desktop Services Secure web access to GTS Software applications CONTENTS Overview... 2 What GTS can provide with Remote Desktop Services... 2 Main Features... 3 RD Web Access...

More information

<cloud> Secure Hosting Services

<cloud> Secure Hosting Services Global Resources... Local Knowledge Figtree offers the functionality of Figtree Systems Software without the upfront infrastructure investment. It is the preferred deployment solution for organisations

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely

LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely LIVE CHAT CLOUD SECURITY Introduction Security is a top priority online it is vital that

More information

IMPAK FEATURES. It simply works! www.impaksolutions.com. 2012-2013 Tefftnet Inc. dba IMPAK. ALL RIGHTS RESERVED.

IMPAK FEATURES. It simply works! www.impaksolutions.com. 2012-2013 Tefftnet Inc. dba IMPAK. ALL RIGHTS RESERVED. IMPAK FEATURES It simply works! www.impaksolutions.com 2012-2013 Tefftnet Inc. dba IMPAK. ALL RIGHTS RESERVED. OVERVIEW The IMPAK Web-Based Facility Management System contains all the features needed for

More information

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]

IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public] IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System

More information

Description of Hosted Services Security

Description of Hosted Services Security Compliance Management System Description of Hosted Services Security OVIYA SYSTEMS LLC 231 Market Pl, Ste.373, San Ramon, CA 94583 l Disclaimer: All rights reserved worldwide. Reprint only with permission

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not

More information

CONTENTS. PCI DSS Compliance Guide

CONTENTS. PCI DSS Compliance Guide CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not

More information

Intunex Oy Skillhive Service Description 1 / 6

Intunex Oy Skillhive Service Description 1 / 6 Intunex Oy Skillhive Service Description 1 / 6 About Skillhive Skillhive is a social business application designed for connecting and sharing expertise within organizations. Skillhive enables employees

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October 2015. Page 1 of 9

Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October 2015. Page 1 of 9 Security CLOUD VIDEO CONFERENCING AND CALLING Whitepaper October 2015 Page 1 of 9 Contents Introduction...3 Security risks when endpoints are placed outside of firewalls...3 StarLeaf removes the risk with

More information

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service) Introduction This document provides a summary of technical information security controls operated by Newcastle University s IT Service (NUIT). These information security controls apply to all NUIT managed

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

SAS 70 Type II Audits

SAS 70 Type II Audits Thinking from IntraLinks SAS 70 Type II Audits SAS 70 Type II Audits Ensuring Data Security, Reliability and Integrity If your organization shares sensitive data over the Internet, you need rigorous controls

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Security Information & Policies

Security Information & Policies Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER

More information

SERENA SOFTWARE Serena Service Manager Security

SERENA SOFTWARE Serena Service Manager Security SERENA SOFTWARE Serena Service Manager Security 2014-09-08 Table of Contents Who Should Read This Paper?... 3 Overview... 3 Security Aspects... 3 Reference... 6 2 Serena Software Operational Security (On-Demand

More information

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY) E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

Sitefinity Security and Best Practices

Sitefinity Security and Best Practices Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management

More information

12 Security Camera System Best Practices - Cyber Safe

12 Security Camera System Best Practices - Cyber Safe 12 Security Camera System Best Practices - Cyber Safe Dean Drako, President and CEO, Eagle Eye Networks Website version of white paper Dean Drako video introduction for cyber security white paper Introduction

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

RESPONSE TO RFP COMMITTEE MANAGEMENT SOFTWARE SOLUTION. Prepared for Brigham Young University. April 21, 2015

RESPONSE TO RFP COMMITTEE MANAGEMENT SOFTWARE SOLUTION. Prepared for Brigham Young University. April 21, 2015 RESPONSE TO RFP COMMITTEE MANAGEMENT SOFTWARE SOLUTION Prepared for Brigham Young University April 21, 2015 Submitted by StreamLink Software, Lauren Nieberding, Sales Manager Company, Product and Service

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

ARCHITECTURAL OVERVIEW E-mail Availability Service (EAS) with ActiveMailbox

ARCHITECTURAL OVERVIEW E-mail Availability Service (EAS) with ActiveMailbox ARCHITECTURAL OVERVIEW E-mail Availability Service () with ActiveMailbox E-mail Availability Service () with ActiveMailbox For Microsoft Exchange -Centric Environments The Market Need for Through direct

More information

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99% Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

enicq 5 System Administrator s Guide

enicq 5 System Administrator s Guide Vermont Oxford Network enicq 5 Documentation enicq 5 System Administrator s Guide Release 2.0 Published November 2014 2014 Vermont Oxford Network. All Rights Reserved. enicq 5 System Administrator s Guide

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity

HTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon

More information

Media Shuttle s Defense-in- Depth Security Strategy

Media Shuttle s Defense-in- Depth Security Strategy Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among

More information

IBM Connections Cloud Security

IBM Connections Cloud Security IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application

More information

Adobe Systems Incorporated

Adobe Systems Incorporated Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2014 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

Xerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations

Xerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations Xerox FreeFlow Digital Publisher Information Assurance Disclosure Onsite, Cloud and epublishing Configurations May 2016 2016 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks

More information

UCS Level 2 Report Issued to

UCS Level 2 Report Issued to UCS Level 2 Report Issued to MSPAlliance Unified Certification Standard (UCS) Report Copyright 2014 www.mspalliance.com/ucs info@mspalliance.com Welcome to the UCS report which stands for Unified Certification

More information

FileMaker Security Guide The Key to Securing Your Apps

FileMaker Security Guide The Key to Securing Your Apps FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account

More information

Basic & Advanced Administration for Citrix NetScaler 9.2

Basic & Advanced Administration for Citrix NetScaler 9.2 Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios

More information

ProjectManager.com Security White Paper

ProjectManager.com Security White Paper ProjectManager.com Security White Paper Standards & Practices www.projectmanager.com Introduction ProjectManager.com (PM) developed its Security Framework to continue to provide a level of security for

More information

Everything you need to know!

Everything you need to know! Everything you need to know! 1 Our Facilities Redback Conferencing is at the forefront of the industry in terms of security for your conferencing services. We use Equinix Sydney IBX Data Centres which

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

How to complete the Secure Internet Site Declaration (SISD) form

How to complete the Secure Internet Site Declaration (SISD) form 1 How to complete the Secure Internet Site Declaration (SISD) form The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,

More information

Technical specifications

Technical specifications Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.

More information

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility. FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer

More information

Potential Targets - Field Devices

Potential Targets - Field Devices Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to

More information

Security Overview Enterprise-Class Secure Mobile File Sharing

Security Overview Enterprise-Class Secure Mobile File Sharing Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud

More information

Cloud Contact Center. Security White Paper

Cloud Contact Center. Security White Paper Cloud Contact Center Security White Paper Introduction Customers communicate with organizations in a variety of forms from phone conversations to email, web chat and social media. As each interaction may

More information

BroadData Unified Meeting Security Whitepaper v4.2

BroadData Unified Meeting Security Whitepaper v4.2 BroadData Unified Meeting Security Whitepaper v4.2 Introduction As organizations unlock the true potential of meeting over the Web as an alternative to costly and time-consuming travel, they do so in the

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information