SOASTA CloudTest Performance Data Retention and Security Policy. Whitepaper
|
|
- Gregory Rich
- 8 years ago
- Views:
Transcription
1 SOASTA CloudTest Performance Data Retention and Security Policy Whitepaper
2 Table of Contents Executive Summary: Data Security SOASTA s Data Retention Policy Test Development Test Metrics Data Encryption Test Infrastructure CloudTest Performance Data Q&A What is Performance Data? What Data is Used During Testing? What Happens to the Response Data Received? How are Log Files or Other Metrics Handled? What Data is Sent Back to the CloudTest Servers? What is the Difference Between Scrubbed and Synthetic Data? How is Data Handled for Testing Real Transactions? How Do We Create Synthetic Data? What Happens to the Data Once the Testing is Over? How is the Test Data Stored in the Cloud? Can Test Result Data be Removed from the Cloud? Can Test Result Data be Exported from the Cloud for Offsite Storage?... 7 About SOASTA, Inc... 7
3 Executive Summary: Data Security Data security is one of the key concerns when it comes to performance testing. Companies do not want their corporate data outside corporate firewalls. SOASTA does not ask customers to export any data or their application outside their firewalls. We can generate synthetic data or use scrubbed data depending on the customer s business and security requirements. We do not save any response data on our CloudTest servers as only key http/https external data is captured for reporting and diagnostic purposes. 1. SOASTA s Data Retention Policy 1.1 Test Development Data that is used for test development by a performance engineer (i.e. HTTP(s) GET/POST requests and responses) is not typically retained by SOASTA. At the customer s request, this data will be deleted immediately after test development. Test definitions (SOASTA test clips) are saved in the SOASTA repository for future testing. These are the steps that comprise the scenario and, while they can be deleted upon request, there is no data or other company private information so they are not typically deleted. 1.2 Test Metrics This includes the performance results of the test(s), such as response times, errors, data transfer rates, etc., as well as infrastructure metrics for any system resources that are monitored as part of the test. Monitored metrics may come from using SOASTA monitoring agents, SSH access to system information or third-party monitoring metrics such as CA s APM (formerly Wily). Test result metrics are kept for a minimum of one year, primarily to allow for comparative reporting over time. At the customer s request, this data (performance metrics and system resource monitors) will be deleted immediately after the customer accepts any test reports that are part of the engagement. PERFORMANCE DATA RETENTION AND SECURITY POLICY WHITEPAPER 3
4 1.3 Data Encryption Passwords and usernames for the SOASTA CloudTest application and for system resource monitors are encrypted. Monitoring passwords or SSH keys are encrypted and stored in the SOASTA Repository. They are not recoverable or viewable once entered. While it is not implemented as the default, CloudTest supports 3DES encryption of these values in accordance with standards such as the FIPS PUB 46-3 Data Encryption Standard. This can be enabled when compliance is necessary. Synthetic seed data that is fabricated for logging into an application or website to emulate real users can be encrypted as well. All information used to set up montors is retained in the SOASTA repository for future testing. At the customer s request, this data, the usernames and passwords, will be deleted immediately after testing. 1.4 Test Infrastructure CloudTest customers have their own tenant (with associated credentials) and this tenant is maintained for at least one year from date of last test. At the customer request, the tenant will be deleted immediately after all testing and reporting has been deemed completed. The actual load generators and results aggregation servers are temporary cloud-based instances and run only during test execution. This provides an additional level of security as all instances are discarded after each test, with only performance metrics retained in the results database. 2. CloudTest Performance Data Q&A 2.1 What is Performance Data? There are many different types of performance data that are leveraged as part of performance testing. Performance data can be broken up into three major categories: master data, user-generated data and external data. Master data typically exists in the customer s database(s) and is required for conducting business (for example usernames, passwords, social security numbers, etc). User-generated data is anything that the user inputs in editable fields on the application (i.e. new address, new address, etc). External data is provided upon execution of the application (i.e. confirmation numbers, session ids, etc). Sample of Master Data SOASTA, Inc. PERFORMANCE DATA RETENTION AND SECURITY POLICY WHITEPAPER 4
5 2.2 What Data is Used During Testing? Data requirements are dependent on the application and the business processes under test. For example, a static site might not require any performance data but just access to the site to make the requests, while a more complex application might require all three types of performance data outlined above. 2.3 What Happens to the Response Data Received? All customer-related response data is discarded from CloudTest servers during load testing. Only performance data related to that response data is retained (response times, errors, etc.). In addition, as noted above, CloudTest servers are temporary instances discarded after each test, with only performance metrics retained in the results database. However, all customer and external data is stored on the CloudTest server during script creation and debugging. The data used to create scripts can be deleted after script creation is completed to ensure no customer data is stored on SOASTA servers. 2.4 How are Log Files or Other Metrics, Which Capture Information About Data Handled? SOASTA does not keep log files or other metrics that capture information about customer data during load tests. But as stated in the previous question we do store this type of data during script creation. Request Response SOASTA, Inc. PERFORMANCE DATA RETENTION AND SECURITY POLICY WHITEPAPER 5
6 2.5 What Data is Sent Back to the CloudTest Servers? During load testing, only key external data is kept, such as http response codes, cookies, session ids, etc. But all data is sent back to the CloudTest servers to parse, at which point it is fully discarded from any SOASTA servers. 2.6 What is the Difference Between Scrubbed and Synthetic Data? Scrubbed data resides in a customer database and has gone through a process so it no longer includes any real customer data; in essence data that has been transformed and/or created from actual customer data. Synthetic data is generated from scratch and is designed to be an accurate representation of the customer s production database. 2.7 How is data handled for testing real transactions? Real transactions, such as purchases or registrations, have an impact on the database. For testing in the lab, there is generally not a problem as the transaction is only using dummy data and may not actually go through the entire end-to-end process, particularly if the actual order process, for example, is handled by a third party. For testing production systems, more thought needs to go into handling the transactions so that orders aren t accidentally placed or any other real user data isn t impacted. There are a number of approaches that can be taken. Common approaches include: a) If there is an online system that dumps into a queue that an Order management system picks up for fulfillment, stopping the queue and removing items before submitting. b) Some companies have already created many test accounts with addresses and credit cards. Typically there are test credit card numbers and test gift cards. There may be other techniques to identify and filter out test orders, as well. Or, there may be a group of cards that are identified as test cards and a specific list of products from which to purchase. For guest checkouts there may be a specific format from which to filter out test orders. c) Virtualizing the very end before a transaction gets sent for processing, or hard-coded switches based on customer account or credit card can prevent fulfillment. Aside from creating bad data in the production database, preventing fulfillment is a primary concern. Most of the time fulfillment is processed to a queue or backend system to avoid fraud and most online purchases are not fulfilled in real-time. Thus, you can stop the fulfillment process and remove the test orders prior to allowing fulfillment to process. d) Continue processing all the way up to submitting the order or transaction, and stop. For example, most of the work for an e-commerce site is done prior to the submit. At the same time, you don t want the order taking process to break, so this approach is less desirable. 2.8 How Do We Create Synthetic Data? SOASTA works closely with your application team to ensure a rich spread of representative data is created. Data is also created to target the business process under test and can expand as testing expands. 2.9 What Happens to the Data Once the Testing is Over? When testing is complete, the CloudTest servers only store performance metric data relevant to the test runs. No corporate data is retained on the CloudTest servers How is the Test Data Stored in the Cloud? For tests executed by SOASTA, the test results are stored in the cloud. The results are on Linux servers that are taken down at the conclusion of the testing event. These servers are only available during testing sessions or when results are being analyzed. In most cases, the result data is stored in a relational database in EC2 in an EBS (elastic block store). At the completion of each testing session, a snapshot of customer data is taken. These snapshots are documented and tied to a customer for data cleansing purposes. This data is only available to SOASTA employees and not available to any customers. SOASTA, Inc. PERFORMANCE DATA RETENTION AND SECURITY POLICY WHITEPAPER 6
7 Sample Performance Metric Data 2.11 Can Test Result Data be Removed from the Cloud? Yes, results can be deleted and removed from the cloud. Results are deleted at the request of the customer. When requested, the results are not deleted until after the result report is completed. Note that once the results are deleted, they are permanently deleted. No backups are made of deleted results. Beyond deleting customer data from the tenant, the hard drive/volume where the data was stored can also be permanently deleted. At the request of the customer SOASTA can facilitate any existing data wiping procedures that are documented and agreed upon prior to an engagement. Typical processes include those that are detailed in documents such as DoD M ( National Industrial Security Program Operating Manual ) or NIST ( Guidelines for Media Sanitization ). This includes any operational cleansing that can be performed from a Linux machine on a mounted disk through use of utilities and processes. Since the disks are not owned by SOASTA destruction of the underlying media is not possible. Note that deleting results limits the ability to compare results from prior and future tests. The only way to compare results once a result is deleted is by looking at the result report Can Test Result Data be Exported from the Cloud for Offsite Storage? Yes. All results are exportable in XML format. Results can be exported from the cloud and moved to a customer-defined location for safekeeping. Depending on the length of the test and amount of performance data related to the test, it can take up to hours to export the data from the cloud and move to a secure location. Optionally, the results can then be deleted from the cloud as well. About SOASTA, Inc. SOASTA is the leader in cloud and mobile testing. Its web and mobile test automation solution, CloudTest, enables developers, QA professionals and IT operations teams to test with unprecedented speed, scale and precision. The innovative product set streamlines test creation, automates provisioning and execution, and distills analytics to deliver actionable intelligence faster. With SOASTA, companies can have confidence that their applications will perform as designed, even in peak traffic. SOASTA s customers include many of today s most successful brands including American Girl, Chegg, Gilt Group, Hallmark, Intuit, Microsoft and Netflix. SOASTA is privately held and headquartered in Mountain View, California. For more information about SOASTA, please visit Headquarters: Castro St, Fourth Floor Mountain View, CA FAX: EMEA: +44 (0) Thames Court 1 Victoria Street Windsor, Berkshire SL4 1YB To learn more visit: soasta.com or us at info@soasta.com 2012 SOASTA. All rights reserved. SOASTA, the SOASTA logo, and SOASTA CloudTest are trademarks of SOASTA. All other product or company names may be trademarks and/or registered trademarks of their respective owners. EST Connect with us:
Cloud Testing Production Applications CloudTest Strategy and Approach
White Paper Cloud Testing Production Applications CloudTest Strategy and Approach Mobile Performance Testing Web Performance Testing Table of Contents Executive Summary... 3 1. Intended Audience... 4 2.
More informationWhitepaper. Continuous Integration Tools Applying Best Practices to the Toolchain
Whitepaper Continuous Integration Tools Applying Best Practices to the Toolchain Table of Contents Introduction... 3 Continuous Integration Tools... 3 Device Test Automation... 3 API / Web Test Automation...
More informationPrinciples of Continuous Integration
Whitepaper Principles of Continuous Integration Best Practices to Simultaneously Improve Speed, Quality and Responsiveness in Mobile Development Table of Contents Mobile Services... 3 Benefits of Continuous
More information8 Common Myths About Performance Testing in Production Don t Let These Misconceptions Keep You From Production Testing.
8 Common Myths About Performance Testing in Production Don t Let These Misconceptions Keep You From Production Testing White Paper Table of Contents Myth #1: Production testing = live testing... 1 Myth
More informationThe New Mandate in Mobile Testing Deliver Continuous Quality with Expertise, Automation and Real Devices
Whitepaper The New Mandate in Mobile Testing Deliver Continuous Quality with Expertise, Automation and Real Devices Mobile Performance Testing Mobile Test Automation Table of Contents Executive Summary...
More informationSOASTA Real User Monitoring Best Practices
mpulse Whitepaper SOASTA Real User Monitoring Best Practices How to Connect Performance Analytics to Business Results SOASTA mpulse Dashboard Contents Digital Performance is User Focused....................
More informationRetail Best Practices Performance Testing Retail Web and Mobile Properties. White Paper
Retail Best Practices Performance Testing Retail Web and Mobile Properties White Paper Table of Contents Executive Summary... 3 1. ecommerce Characteristics... 4 2. What is an Effective Test Strategy...
More informationWhitepaper. The Top 10 Tips to Improve Web Application Performance
Whitepaper The Top 10 Tips to Improve Web Application Performance Table of Contents Testing for the Lifecycle... 3 Tip No. 1: Bandwidth: Make Sure Everyone Can Get In... 4 Tip No. 2: Load Balancing: Make
More informationCloud Storage Backup for Storage as a Service with AT&T
WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,
More informationFive Strategies for Performance Testing Mobile Applications
Five Strategies for Performance Testing Mobile Applications Mobile applications are now mainstream business. Businesses ranging from healthcare providers to retailers and airlines are creating applications
More informationFirst Class Mobile Application Performance Management
First Class Mobile Application Performance Management August 2012 Jim Rapoza ~ Underwritten, in Part, by ~ First Class Mobile Application Performance Management The rise of mobile applications and the
More informatione-commerce Best Practices How Web and Mobile Performance Optimizes Conversion and User Experience
e-commerce Best Practices How Web and Mobile Performance Optimizes Conversion and User Experience Table of Contents Milliseconds Mean Mega-Dollars...4 Pre-Launch: Testing for Performance...5 Post-Launch:
More informationLoad and Performance Load Testing. RadView Software October 2015 www.radview.com
Load and Performance Load Testing RadView Software October 2015 www.radview.com Contents Introduction... 3 Key Components and Architecture... 4 Creating Load Tests... 5 Mobile Load Testing... 9 Test Execution...
More informationAsigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data
Datasheet Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data Ensure the critical data you need to run your operations, serve customers, gain competitive advantage, and
More informationImplementing 2-Legged OAuth in Javascript (and CloudTest)
Implementing 2-Legged OAuth in Javascript (and CloudTest) Introduction If you re reading this you are probably looking for information on how to implement 2-Legged OAuth in Javascript. I recently had to
More informationProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
More information319 MANAGED HOSTING TECHNICAL DETAILS
319 MANAGED HOSTING TECHNICAL DETAILS 319 NetWorks www.319networks.com Table of Contents Architecture... 4 319 Platform... 5 319 Applications... 5 319 Network Stack... 5 319 Cloud Hosting Technical Details...
More informationCloud Computing Trends
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered
More informationChapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok
CLOUD COMPUTING PRACTICE 82 Chapter 9 PUBLIC CLOUD LABORATORY Hand on laboratory based on AWS Sucha Smanchat, PhD Faculty of Information Technology King Mongkut s University of Technology North Bangkok
More informationWeb Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
More informationActive Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
More informationDreamFactory Security Whitepaper Customer Information about Privacy and Security
DreamFactory Security Whitepaper Customer Information about Privacy and Security DreamFactory Software publishes rich applications for salesforce.com. All of our products for salesforce use the DreamFactory
More informationIBM Tealeaf CX. A leading data capture for online Customer Behavior Analytics. Advantages. IBM Software Data Sheet
IBM Tealeaf CX A leading data capture for online Customer Behavior Analytics Advantages Passively captures network traffic without impacting site performance Provides breakthrough visibility into customer
More informationMobile Admin Architecture
Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile
More informationSession Storage in Zend Server Cluster Manager
Session Storage in Zend Server Cluster Manager Shahar Evron Technical Product Manager, Zend Technologies Welcome! All Phones are muted type your questions into the Webex Q&A box A recording of this session
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationNasuni Management Console Guide
Nasuni Management Console Guide Version 5.5 April 2014 2014 Nasuni Corporation All Rights Reserved Document Information Nasuni Management Console Guide Version 5.5 April 2014 Copyright Copyright 2010-2014
More informationCloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.
WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read
More informationMobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
More informationWhite Paper. Quantum StorageCare Guardian
Quantum StorageCare Guardian April 2013 Notice This White Paper contains proprietary information protected by copyright. Information in this White Paper is subject to change without notice and does not
More informationAdobe Marketing Cloud Bloodhound for Mac 3.0
Adobe Marketing Cloud Bloodhound for Mac 3.0 Contents Adobe Bloodhound for Mac 3.x for OSX...3 Getting Started...4 Processing Rules Mapping...6 Enable SSL...7 View Hits...8 Save Hits into a Test...9 Compare
More informationPRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
More informationQuick Start Guide: Utilizing Nessus to Secure Microsoft Azure
Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Introduction Tenable Network Security is the first and only solution to offer security visibility, Azure cloud environment auditing, system
More informationAvailability for the modern datacentre Veeam Availability Suite v8 & Sneakpreview v9
Veeam Summer School Availability for the modern datacentre Veeam Availability Suite v8 & Sneakpreview v9 Jan van Leuken System Engineer Benelux, Veeam Software jan.vanleuken@veeam.com +31 (0)615 83 50
More informationBackup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
More informationWhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program
WhiteHat Security White Paper Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program October 2015 The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information
More informationCONFIGURING AND USING WEBDAV IN LENOVO EMC LIFELINE
White Paper CONFIGURING AND USING WEBDAV IN LENOVO EMC LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Enabling WebDAV on Your Lenovo Network Storage Device 1 Accessing Shares from Your Computer
More informationAutomatic Hotspot Logon
WHITE PAPER: for VPN Setup Features of the integrated, dynamic NCP Personal Firewall Solution Table of Contents 1. Insecure mobile computing via Wi-Fi networks (hotspots)...1 1.1 Basic hotspot functionality...
More informationSecuring Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
More informationEffective storage management and data protection for cloud computing
IBM Software Thought Leadership White Paper September 2010 Effective storage management and data protection for cloud computing Protecting data in private, public and hybrid environments 2 Effective storage
More informationEZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
More informationIntroducing Cloud Backup for MS SQL Server The Cloudberry Lab Whitepaper
Introducing Cloud Backup for MS SQL Server The Cloudberry Lab Whitepaper The need for backup By performing timely backups, your valuable data is reliably protected against possible loss, corruption and
More informationHow Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
More informationThreatMetrix Persona DB Technical Brief
ThreatMetrix Persona DB Technical Brief Private and Scalable Entity/Attribute Database Persona DB is part of the TrustDefender Cybercrime Prevention Platform from ThreatMetrix. It s an extensible, enterprise-accessible
More informationIBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
More informationWhite Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
More informationAdministration Guide NetIQ Privileged Account Manager 3.0.1
Administration Guide NetIQ Privileged Account Manager 3.0.1 December 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use
More informationReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0
ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,
More informationPEPPERDATA IN MULTI-TENANT ENVIRONMENTS
..................................... PEPPERDATA IN MULTI-TENANT ENVIRONMENTS technical whitepaper June 2015 SUMMARY OF WHAT S WRITTEN IN THIS DOCUMENT If you are short on time and don t want to read the
More informationPaxata Security Overview
Paxata Security Overview Ensuring your most trusted data remains secure Nenshad Bardoliwalla Co-Founder and Vice President of Products nenshad@paxata.com Table of Contents: Introduction...3 Secure Data
More informationComprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM
Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM Virtualization is changing the way companies design, run, and manage their IT environments. Today, virtual machines (VM) are
More informationIBM Tealeaf CX. A leading information source for online Customer Experience Management. Highlights
IBM Tealeaf CX A leading information source for online Customer Experience Management Highlights Passively captures network traffic without impacting site performance. Provides breakthrough visibility
More informationBest Practices for Trialing the Intronis Cloud Backup and Recovery Solution
Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Intronis Cloud Backup and Recovery is a file based backup application that allows users to back up their critical data to the
More informationAddressing Legal Discovery & Compliance Requirements
Addressing Legal Discovery & Compliance Requirements A Comparison of and Archiving In today s digital landscape, the legal, regulatory and business requirements for email archiving continue to grow in
More informationThe problem with privileged users: What you don t know can hurt you
The problem with privileged users: What you don t know can hurt you FOUR STEPS TO Why all the fuss about privileged users? Today s users need easy anytime, anywhere access to information and services so
More informationSmartGlance Mobile Reporting Architecture and Data Security
White Paper SmartGlance Mobile Reporting Architecture and Data Security Authors: Saadi Kermani, Manager Industry Applications & Solutions, Invensys Operations Management Bimal Mehta, Director, Industry
More informationefolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
More informationAutodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
More informationDionseq Uatummy Odolorem Vel Layered Security Approach
A P P L I C A T I O N B R I E F Aciduisismodo Hitachi Content Dolore Platform Eolore Dionseq Uatummy Odolorem Vel Layered Security Approach Highly Scalable, Cloud-enabled Platform Ensures Data Safety with
More informationHow to Unlock Agility by Backing up to, from, and in the Cloud
WHITE PAPER: HOW TO UNLOCK AGILITY BY BACKING UP TO, FROM,....... AND.... IN.. THE.... CLOUD....................... How to Unlock Agility by Backing up to, from, and in the Cloud Who should read this paper
More informationEXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
More informationOracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i
Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i $Q2UDFOH7HFKQLFDO:KLWHSDSHU 0DUFK Secure Web.Show_Document() calls to Oracle Reports Server 6i Introduction...3 solution
More informationTECHNOLOGY WHITE PAPER Jan 2016
TECHNOLOGY WHITE PAPER Jan 2016 Technology Stack C# PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache CloudWatch Paypal Overview
More informationThe governance IT needs Easy user adoption Trusted Managed File Transfer solutions
Product Datasheet The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Full-featured Enterprise-class IT Solution for Managed File Transfer Organizations today must effectively
More informationInstallation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
More informationIBM Tealeaf CX. A leading information source for online Customer Experience Management. Highlights. IBM Software Industry Solutions
IBM Tealeaf CX A leading information source for online Customer Experience Management Highlights Passively captures network traffic without impacting site per formance. Provides breakthrough visibility
More informationVANGUARD ONLINE BACKUP
VANGUARD ONLINE BACKUP Product Description Vanguard Online Backup is a world class solution that automates off-site and on-site backups. The application combines an easy to use interface with powerful
More informationPortal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More informationModern IT Operations Management. Why a New Approach is Required, and How Boundary Delivers
Modern IT Operations Management Why a New Approach is Required, and How Boundary Delivers TABLE OF CONTENTS EXECUTIVE SUMMARY 3 INTRODUCTION: CHANGING NATURE OF IT 3 WHY TRADITIONAL APPROACHES ARE FAILING
More informationTECHNOLOGY WHITE PAPER Jun 2012
TECHNOLOGY WHITE PAPER Jun 2012 Technology Stack C# Windows Server 2008 PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache
More informationNMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
More informationMike Chyi, Micro Focus Solution Consultant May 12, 2010
Mike Chyi, Micro Focus Solution Consultant May 12, 2010 Agenda Load Testing Overview, Best Practice: Performance Testing with Diagnostics Demo (?), Q&A Load Testing Overview What is load testing? Type
More informationM Y S E C U R E B A C K U P S E R V E R E D I T I O N. p r o d u c t o v e r v i e w O N L I N E S E R V E R B A C K U P
O N L I N E S E R V E R B A C K U P Business-class Server Backup that allows you to remotely backup a server online. Features advanced compression and de-duplication to speed backups and minimize space.
More informationProduct Brief. it s Backed Up
Product Brief it s Backed Up IT Authorities, Inc. 1/11/2010 Table of Contents Contents Table of Contents... 2 it s Backed Up... 3 Backup... 3 Backup, Continued... 4 Backup, Continued... 5 Application Aware
More informationA Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security
More informationZerto Virtual Manager Administration Guide
Zerto Virtual Manager Administration Guide AWS Environment ZVR-ADVA-4.0U2-01-23-07-15 Copyright 2015, Zerto Ltd. All rights reserved. Information in this document is subject to change without notice and
More informationEnsuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
More informationFrequently Asked Questions
Table of contents 1. Agent Technology...3 1.1. Has the Knoa agent been tested with standard set of services on the PC?... 3 1.2. Do users need to do anything to activate the Agent?...3 1.3. Does the Knoa
More informationUsing a VPN with Niagara Systems. v0.3 6, July 2013
v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel
More informationMigrating to vcloud Automation Center 6.1
Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
More informationXerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
More informationIaaS Configuration for Cloud Platforms
vrealize Automation 6.2.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
More informationReady, Set, Go! or Slow?
Leveraging the Cloud for On-Demand Performance Testing COLLABORATIVE WHITEPAPER SERIES New user behaviors that businesses are introducing to their web sites are driving more volume than ever before. Product
More informationFilr 2.0 Administration Guide. April 2016
Filr 2.0 Administration Guide April 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy,
More informationSAS Information Delivery Portal
SAS Information Delivery Portal Table of Contents Introduction...1 The State of Enterprise Information...1 Information Supply Chain Technologies...2 Making Informed Business Decisions...3 Gathering Business
More informationSPHOL207: Database Snapshots with SharePoint 2013
2013 SPHOL207: Database Snapshots with SharePoint 2013 Hands-On Lab Lab Manual This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site
More informationCloud Portal Office Security Whitepaper. October 2013
Cloud Portal Office Security Whitepaper October 2013 Table of Contents Introduction... 2 Accessing Cloud Portal Office... 2 Account Authentication and Authorization... 2 Strong Password Policies... 3 Single
More informationEffective Storage Management for Cloud Computing
IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations
More informationNetop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing
Netop Environment Security Unified security to all Netop products while leveraging the benefits of cloud computing Contents Introduction... 2 AWS Infrastructure Security... 3 Standards - Compliancy...
More informationStreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
More informationManaged Services PKI 60-day Trial Quick Start Guide
Entrust Managed Services PKI Managed Services PKI 60-day Trial Quick Start Guide Document issue: 3.0 Date of issue: Nov 2011 Copyright 2011 Entrust. All rights reserved. Entrust is a trademark or a registered
More informationProtecting Microsoft SQL Server with Asigra Cloud Backup
Technical Note Protecting Microsoft SQL Server with Asigra Cloud Backup Table of Contents Introduction 3 Overview - Asigra Cloud Backup Software Platform 3 Microsoft SQL Server Backup Set in Asigra DS-Client
More informationCA Performance Management r2.x Implementation Proven Professional Exam
CA Performance Management r2.x Implementation Proven Professional Exam (CAT-440) Study Guide Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION 2015 CA. All rights reserved. CA confidential & proprietary
More informationCRM. itouch Vision. This document gives an overview of OneTouch Cloud CRM and discusses the different features and functionality.
itouch Vision CRM This document gives an overview of OneTouch Cloud CRM and discusses the different features and functionality. For further information, about implementation and pricing please contact us.
More informationData Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description
Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.
More informationNEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
More informationDATA BACKUP & RESTORE
DATA BACKUP & RESTORE Verizon Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable. Offsite backup is
More informationServer Installation Manual 4.4.1
Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:
More information