SOASTA CloudTest Performance Data Retention and Security Policy. Whitepaper
|
|
|
- Gregory Rich
- 10 years ago
- Views:
Transcription
1 SOASTA CloudTest Performance Data Retention and Security Policy Whitepaper
2 Table of Contents Executive Summary: Data Security SOASTA s Data Retention Policy Test Development Test Metrics Data Encryption Test Infrastructure CloudTest Performance Data Q&A What is Performance Data? What Data is Used During Testing? What Happens to the Response Data Received? How are Log Files or Other Metrics Handled? What Data is Sent Back to the CloudTest Servers? What is the Difference Between Scrubbed and Synthetic Data? How is Data Handled for Testing Real Transactions? How Do We Create Synthetic Data? What Happens to the Data Once the Testing is Over? How is the Test Data Stored in the Cloud? Can Test Result Data be Removed from the Cloud? Can Test Result Data be Exported from the Cloud for Offsite Storage?... 7 About SOASTA, Inc... 7
3 Executive Summary: Data Security Data security is one of the key concerns when it comes to performance testing. Companies do not want their corporate data outside corporate firewalls. SOASTA does not ask customers to export any data or their application outside their firewalls. We can generate synthetic data or use scrubbed data depending on the customer s business and security requirements. We do not save any response data on our CloudTest servers as only key http/https external data is captured for reporting and diagnostic purposes. 1. SOASTA s Data Retention Policy 1.1 Test Development Data that is used for test development by a performance engineer (i.e. HTTP(s) GET/POST requests and responses) is not typically retained by SOASTA. At the customer s request, this data will be deleted immediately after test development. Test definitions (SOASTA test clips) are saved in the SOASTA repository for future testing. These are the steps that comprise the scenario and, while they can be deleted upon request, there is no data or other company private information so they are not typically deleted. 1.2 Test Metrics This includes the performance results of the test(s), such as response times, errors, data transfer rates, etc., as well as infrastructure metrics for any system resources that are monitored as part of the test. Monitored metrics may come from using SOASTA monitoring agents, SSH access to system information or third-party monitoring metrics such as CA s APM (formerly Wily). Test result metrics are kept for a minimum of one year, primarily to allow for comparative reporting over time. At the customer s request, this data (performance metrics and system resource monitors) will be deleted immediately after the customer accepts any test reports that are part of the engagement. PERFORMANCE DATA RETENTION AND SECURITY POLICY WHITEPAPER 3
4 1.3 Data Encryption Passwords and usernames for the SOASTA CloudTest application and for system resource monitors are encrypted. Monitoring passwords or SSH keys are encrypted and stored in the SOASTA Repository. They are not recoverable or viewable once entered. While it is not implemented as the default, CloudTest supports 3DES encryption of these values in accordance with standards such as the FIPS PUB 46-3 Data Encryption Standard. This can be enabled when compliance is necessary. Synthetic seed data that is fabricated for logging into an application or website to emulate real users can be encrypted as well. All information used to set up montors is retained in the SOASTA repository for future testing. At the customer s request, this data, the usernames and passwords, will be deleted immediately after testing. 1.4 Test Infrastructure CloudTest customers have their own tenant (with associated credentials) and this tenant is maintained for at least one year from date of last test. At the customer request, the tenant will be deleted immediately after all testing and reporting has been deemed completed. The actual load generators and results aggregation servers are temporary cloud-based instances and run only during test execution. This provides an additional level of security as all instances are discarded after each test, with only performance metrics retained in the results database. 2. CloudTest Performance Data Q&A 2.1 What is Performance Data? There are many different types of performance data that are leveraged as part of performance testing. Performance data can be broken up into three major categories: master data, user-generated data and external data. Master data typically exists in the customer s database(s) and is required for conducting business (for example usernames, passwords, social security numbers, etc). User-generated data is anything that the user inputs in editable fields on the application (i.e. new address, new address, etc). External data is provided upon execution of the application (i.e. confirmation numbers, session ids, etc). Sample of Master Data SOASTA, Inc. PERFORMANCE DATA RETENTION AND SECURITY POLICY WHITEPAPER 4
5 2.2 What Data is Used During Testing? Data requirements are dependent on the application and the business processes under test. For example, a static site might not require any performance data but just access to the site to make the requests, while a more complex application might require all three types of performance data outlined above. 2.3 What Happens to the Response Data Received? All customer-related response data is discarded from CloudTest servers during load testing. Only performance data related to that response data is retained (response times, errors, etc.). In addition, as noted above, CloudTest servers are temporary instances discarded after each test, with only performance metrics retained in the results database. However, all customer and external data is stored on the CloudTest server during script creation and debugging. The data used to create scripts can be deleted after script creation is completed to ensure no customer data is stored on SOASTA servers. 2.4 How are Log Files or Other Metrics, Which Capture Information About Data Handled? SOASTA does not keep log files or other metrics that capture information about customer data during load tests. But as stated in the previous question we do store this type of data during script creation. Request Response SOASTA, Inc. PERFORMANCE DATA RETENTION AND SECURITY POLICY WHITEPAPER 5
6 2.5 What Data is Sent Back to the CloudTest Servers? During load testing, only key external data is kept, such as http response codes, cookies, session ids, etc. But all data is sent back to the CloudTest servers to parse, at which point it is fully discarded from any SOASTA servers. 2.6 What is the Difference Between Scrubbed and Synthetic Data? Scrubbed data resides in a customer database and has gone through a process so it no longer includes any real customer data; in essence data that has been transformed and/or created from actual customer data. Synthetic data is generated from scratch and is designed to be an accurate representation of the customer s production database. 2.7 How is data handled for testing real transactions? Real transactions, such as purchases or registrations, have an impact on the database. For testing in the lab, there is generally not a problem as the transaction is only using dummy data and may not actually go through the entire end-to-end process, particularly if the actual order process, for example, is handled by a third party. For testing production systems, more thought needs to go into handling the transactions so that orders aren t accidentally placed or any other real user data isn t impacted. There are a number of approaches that can be taken. Common approaches include: a) If there is an online system that dumps into a queue that an Order management system picks up for fulfillment, stopping the queue and removing items before submitting. b) Some companies have already created many test accounts with addresses and credit cards. Typically there are test credit card numbers and test gift cards. There may be other techniques to identify and filter out test orders, as well. Or, there may be a group of cards that are identified as test cards and a specific list of products from which to purchase. For guest checkouts there may be a specific format from which to filter out test orders. c) Virtualizing the very end before a transaction gets sent for processing, or hard-coded switches based on customer account or credit card can prevent fulfillment. Aside from creating bad data in the production database, preventing fulfillment is a primary concern. Most of the time fulfillment is processed to a queue or backend system to avoid fraud and most online purchases are not fulfilled in real-time. Thus, you can stop the fulfillment process and remove the test orders prior to allowing fulfillment to process. d) Continue processing all the way up to submitting the order or transaction, and stop. For example, most of the work for an e-commerce site is done prior to the submit. At the same time, you don t want the order taking process to break, so this approach is less desirable. 2.8 How Do We Create Synthetic Data? SOASTA works closely with your application team to ensure a rich spread of representative data is created. Data is also created to target the business process under test and can expand as testing expands. 2.9 What Happens to the Data Once the Testing is Over? When testing is complete, the CloudTest servers only store performance metric data relevant to the test runs. No corporate data is retained on the CloudTest servers How is the Test Data Stored in the Cloud? For tests executed by SOASTA, the test results are stored in the cloud. The results are on Linux servers that are taken down at the conclusion of the testing event. These servers are only available during testing sessions or when results are being analyzed. In most cases, the result data is stored in a relational database in EC2 in an EBS (elastic block store). At the completion of each testing session, a snapshot of customer data is taken. These snapshots are documented and tied to a customer for data cleansing purposes. This data is only available to SOASTA employees and not available to any customers. SOASTA, Inc. PERFORMANCE DATA RETENTION AND SECURITY POLICY WHITEPAPER 6
7 Sample Performance Metric Data 2.11 Can Test Result Data be Removed from the Cloud? Yes, results can be deleted and removed from the cloud. Results are deleted at the request of the customer. When requested, the results are not deleted until after the result report is completed. Note that once the results are deleted, they are permanently deleted. No backups are made of deleted results. Beyond deleting customer data from the tenant, the hard drive/volume where the data was stored can also be permanently deleted. At the request of the customer SOASTA can facilitate any existing data wiping procedures that are documented and agreed upon prior to an engagement. Typical processes include those that are detailed in documents such as DoD M ( National Industrial Security Program Operating Manual ) or NIST ( Guidelines for Media Sanitization ). This includes any operational cleansing that can be performed from a Linux machine on a mounted disk through use of utilities and processes. Since the disks are not owned by SOASTA destruction of the underlying media is not possible. Note that deleting results limits the ability to compare results from prior and future tests. The only way to compare results once a result is deleted is by looking at the result report Can Test Result Data be Exported from the Cloud for Offsite Storage? Yes. All results are exportable in XML format. Results can be exported from the cloud and moved to a customer-defined location for safekeeping. Depending on the length of the test and amount of performance data related to the test, it can take up to hours to export the data from the cloud and move to a secure location. Optionally, the results can then be deleted from the cloud as well. About SOASTA, Inc. SOASTA is the leader in cloud and mobile testing. Its web and mobile test automation solution, CloudTest, enables developers, QA professionals and IT operations teams to test with unprecedented speed, scale and precision. The innovative product set streamlines test creation, automates provisioning and execution, and distills analytics to deliver actionable intelligence faster. With SOASTA, companies can have confidence that their applications will perform as designed, even in peak traffic. SOASTA s customers include many of today s most successful brands including American Girl, Chegg, Gilt Group, Hallmark, Intuit, Microsoft and Netflix. SOASTA is privately held and headquartered in Mountain View, California. For more information about SOASTA, please visit Headquarters: Castro St, Fourth Floor Mountain View, CA FAX: EMEA: +44 (0) Thames Court 1 Victoria Street Windsor, Berkshire SL4 1YB To learn more visit: soasta.com or us at [email protected] 2012 SOASTA. All rights reserved. SOASTA, the SOASTA logo, and SOASTA CloudTest are trademarks of SOASTA. All other product or company names may be trademarks and/or registered trademarks of their respective owners. EST Connect with us:
Cloud Testing Production Applications CloudTest Strategy and Approach
White Paper Cloud Testing Production Applications CloudTest Strategy and Approach Mobile Performance Testing Web Performance Testing Table of Contents Executive Summary... 3 1. Intended Audience... 4 2.
Whitepaper. Continuous Integration Tools Applying Best Practices to the Toolchain
Whitepaper Continuous Integration Tools Applying Best Practices to the Toolchain Table of Contents Introduction... 3 Continuous Integration Tools... 3 Device Test Automation... 3 API / Web Test Automation...
Principles of Continuous Integration
Whitepaper Principles of Continuous Integration Best Practices to Simultaneously Improve Speed, Quality and Responsiveness in Mobile Development Table of Contents Mobile Services... 3 Benefits of Continuous
8 Common Myths About Performance Testing in Production Don t Let These Misconceptions Keep You From Production Testing.
8 Common Myths About Performance Testing in Production Don t Let These Misconceptions Keep You From Production Testing White Paper Table of Contents Myth #1: Production testing = live testing... 1 Myth
SOASTA Real User Monitoring Best Practices
mpulse Whitepaper SOASTA Real User Monitoring Best Practices How to Connect Performance Analytics to Business Results SOASTA mpulse Dashboard Contents Digital Performance is User Focused....................
Cloud Storage Backup for Storage as a Service with AT&T
WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,
Five Strategies for Performance Testing Mobile Applications
Five Strategies for Performance Testing Mobile Applications Mobile applications are now mainstream business. Businesses ranging from healthcare providers to retailers and airlines are creating applications
Load and Performance Load Testing. RadView Software October 2015 www.radview.com
Load and Performance Load Testing RadView Software October 2015 www.radview.com Contents Introduction... 3 Key Components and Architecture... 4 Creating Load Tests... 5 Mobile Load Testing... 9 Test Execution...
Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data
Datasheet Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data Ensure the critical data you need to run your operations, serve customers, gain competitive advantage, and
Implementing 2-Legged OAuth in Javascript (and CloudTest)
Implementing 2-Legged OAuth in Javascript (and CloudTest) Introduction If you re reading this you are probably looking for information on how to implement 2-Legged OAuth in Javascript. I recently had to
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
319 MANAGED HOSTING TECHNICAL DETAILS
319 MANAGED HOSTING TECHNICAL DETAILS 319 NetWorks www.319networks.com Table of Contents Architecture... 4 319 Platform... 5 319 Applications... 5 319 Network Stack... 5 319 Cloud Hosting Technical Details...
Cloud Computing Trends
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered
Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok
CLOUD COMPUTING PRACTICE 82 Chapter 9 PUBLIC CLOUD LABORATORY Hand on laboratory based on AWS Sucha Smanchat, PhD Faculty of Information Technology King Mongkut s University of Technology North Bangkok
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.
Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Active Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: [email protected] Online Support: [email protected] CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
DreamFactory Security Whitepaper Customer Information about Privacy and Security
DreamFactory Security Whitepaper Customer Information about Privacy and Security DreamFactory Software publishes rich applications for salesforce.com. All of our products for salesforce use the DreamFactory
IBM Tealeaf CX. A leading data capture for online Customer Behavior Analytics. Advantages. IBM Software Data Sheet
IBM Tealeaf CX A leading data capture for online Customer Behavior Analytics Advantages Passively captures network traffic without impacting site performance Provides breakthrough visibility into customer
Mobile Admin Architecture
Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile
Session Storage in Zend Server Cluster Manager
Session Storage in Zend Server Cluster Manager Shahar Evron Technical Product Manager, Zend Technologies Welcome! All Phones are muted type your questions into the Webex Q&A box A recording of this session
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Nasuni Management Console Guide
Nasuni Management Console Guide Version 5.5 April 2014 2014 Nasuni Corporation All Rights Reserved Document Information Nasuni Management Console Guide Version 5.5 April 2014 Copyright Copyright 2010-2014
Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.
WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
White Paper. Quantum StorageCare Guardian
Quantum StorageCare Guardian April 2013 Notice This White Paper contains proprietary information protected by copyright. Information in this White Paper is subject to change without notice and does not
Adobe Marketing Cloud Bloodhound for Mac 3.0
Adobe Marketing Cloud Bloodhound for Mac 3.0 Contents Adobe Bloodhound for Mac 3.x for OSX...3 Getting Started...4 Processing Rules Mapping...6 Enable SSL...7 View Hits...8 Save Hits into a Test...9 Compare
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure
Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Introduction Tenable Network Security is the first and only solution to offer security visibility, Azure cloud environment auditing, system
Availability for the modern datacentre Veeam Availability Suite v8 & Sneakpreview v9
Veeam Summer School Availability for the modern datacentre Veeam Availability Suite v8 & Sneakpreview v9 Jan van Leuken System Engineer Benelux, Veeam Software [email protected] +31 (0)615 83 50
Backup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program
WhiteHat Security White Paper Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program October 2015 The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information
CONFIGURING AND USING WEBDAV IN LENOVO EMC LIFELINE
White Paper CONFIGURING AND USING WEBDAV IN LENOVO EMC LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Enabling WebDAV on Your Lenovo Network Storage Device 1 Accessing Shares from Your Computer
Automatic Hotspot Logon
WHITE PAPER: for VPN Setup Features of the integrated, dynamic NCP Personal Firewall Solution Table of Contents 1. Insecure mobile computing via Wi-Fi networks (hotspots)...1 1.1 Basic hotspot functionality...
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
Effective storage management and data protection for cloud computing
IBM Software Thought Leadership White Paper September 2010 Effective storage management and data protection for cloud computing Protecting data in private, public and hybrid environments 2 Effective storage
EZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
Introducing Cloud Backup for MS SQL Server The Cloudberry Lab Whitepaper
Introducing Cloud Backup for MS SQL Server The Cloudberry Lab Whitepaper The need for backup By performing timely backups, your valuable data is reliably protected against possible loss, corruption and
How Drive Encryption Works
WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................
ThreatMetrix Persona DB Technical Brief
ThreatMetrix Persona DB Technical Brief Private and Scalable Entity/Attribute Database Persona DB is part of the TrustDefender Cybercrime Prevention Platform from ThreatMetrix. It s an extensible, enterprise-accessible
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
White Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
Administration Guide NetIQ Privileged Account Manager 3.0.1
Administration Guide NetIQ Privileged Account Manager 3.0.1 December 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use
ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0
ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,
PEPPERDATA IN MULTI-TENANT ENVIRONMENTS
..................................... PEPPERDATA IN MULTI-TENANT ENVIRONMENTS technical whitepaper June 2015 SUMMARY OF WHAT S WRITTEN IN THIS DOCUMENT If you are short on time and don t want to read the
Paxata Security Overview
Paxata Security Overview Ensuring your most trusted data remains secure Nenshad Bardoliwalla Co-Founder and Vice President of Products [email protected] Table of Contents: Introduction...3 Secure Data
Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM
Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM Virtualization is changing the way companies design, run, and manage their IT environments. Today, virtual machines (VM) are
Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution
Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Intronis Cloud Backup and Recovery is a file based backup application that allows users to back up their critical data to the
Addressing Legal Discovery & Compliance Requirements
Addressing Legal Discovery & Compliance Requirements A Comparison of and Archiving In today s digital landscape, the legal, regulatory and business requirements for email archiving continue to grow in
The problem with privileged users: What you don t know can hurt you
The problem with privileged users: What you don t know can hurt you FOUR STEPS TO Why all the fuss about privileged users? Today s users need easy anytime, anywhere access to information and services so
SmartGlance Mobile Reporting Architecture and Data Security
White Paper SmartGlance Mobile Reporting Architecture and Data Security Authors: Saadi Kermani, Manager Industry Applications & Solutions, Invensys Operations Management Bimal Mehta, Director, Industry
efolder BDR for Veeam Cloud Connection Guide
efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
Dionseq Uatummy Odolorem Vel Layered Security Approach
A P P L I C A T I O N B R I E F Aciduisismodo Hitachi Content Dolore Platform Eolore Dionseq Uatummy Odolorem Vel Layered Security Approach Highly Scalable, Cloud-enabled Platform Ensures Data Safety with
How to Unlock Agility by Backing up to, from, and in the Cloud
WHITE PAPER: HOW TO UNLOCK AGILITY BY BACKING UP TO, FROM,....... AND.... IN.. THE.... CLOUD....................... How to Unlock Agility by Backing up to, from, and in the Cloud Who should read this paper
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i
Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i $Q2UDFOH7HFKQLFDO:KLWHSDSHU 0DUFK Secure Web.Show_Document() calls to Oracle Reports Server 6i Introduction...3 solution
TECHNOLOGY WHITE PAPER Jan 2016
TECHNOLOGY WHITE PAPER Jan 2016 Technology Stack C# PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache CloudWatch Paypal Overview
The governance IT needs Easy user adoption Trusted Managed File Transfer solutions
Product Datasheet The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Full-featured Enterprise-class IT Solution for Managed File Transfer Organizations today must effectively
Installation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
IBM Tealeaf CX. A leading information source for online Customer Experience Management. Highlights. IBM Software Industry Solutions
IBM Tealeaf CX A leading information source for online Customer Experience Management Highlights Passively captures network traffic without impacting site per formance. Provides breakthrough visibility
VANGUARD ONLINE BACKUP
VANGUARD ONLINE BACKUP Product Description Vanguard Online Backup is a world class solution that automates off-site and on-site backups. The application combines an easy to use interface with powerful
Portal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
Modern IT Operations Management. Why a New Approach is Required, and How Boundary Delivers
Modern IT Operations Management Why a New Approach is Required, and How Boundary Delivers TABLE OF CONTENTS EXECUTIVE SUMMARY 3 INTRODUCTION: CHANGING NATURE OF IT 3 WHY TRADITIONAL APPROACHES ARE FAILING
TECHNOLOGY WHITE PAPER Jun 2012
TECHNOLOGY WHITE PAPER Jun 2012 Technology Stack C# Windows Server 2008 PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache
NMS300 Network Management System
NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate
Mike Chyi, Micro Focus Solution Consultant May 12, 2010
Mike Chyi, Micro Focus Solution Consultant May 12, 2010 Agenda Load Testing Overview, Best Practice: Performance Testing with Diagnostics Demo (?), Q&A Load Testing Overview What is load testing? Type
M Y S E C U R E B A C K U P S E R V E R E D I T I O N. p r o d u c t o v e r v i e w O N L I N E S E R V E R B A C K U P
O N L I N E S E R V E R B A C K U P Business-class Server Backup that allows you to remotely backup a server online. Features advanced compression and de-duplication to speed backups and minimize space.
Product Brief. it s Backed Up
Product Brief it s Backed Up IT Authorities, Inc. 1/11/2010 Table of Contents Contents Table of Contents... 2 it s Backed Up... 3 Backup... 3 Backup, Continued... 4 Backup, Continued... 5 Application Aware
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway
A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security
Zerto Virtual Manager Administration Guide
Zerto Virtual Manager Administration Guide AWS Environment ZVR-ADVA-4.0U2-01-23-07-15 Copyright 2015, Zerto Ltd. All rights reserved. Information in this document is subject to change without notice and
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Frequently Asked Questions
Table of contents 1. Agent Technology...3 1.1. Has the Knoa agent been tested with standard set of services on the PC?... 3 1.2. Do users need to do anything to activate the Agent?...3 1.3. Does the Knoa
Using a VPN with Niagara Systems. v0.3 6, July 2013
v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel
Migrating to vcloud Automation Center 6.1
Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
IaaS Configuration for Cloud Platforms
vrealize Automation 6.2.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
Filr 2.0 Administration Guide. April 2016
Filr 2.0 Administration Guide April 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy,
SAS Information Delivery Portal
SAS Information Delivery Portal Table of Contents Introduction...1 The State of Enterprise Information...1 Information Supply Chain Technologies...2 Making Informed Business Decisions...3 Gathering Business
SPHOL207: Database Snapshots with SharePoint 2013
2013 SPHOL207: Database Snapshots with SharePoint 2013 Hands-On Lab Lab Manual This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site
Effective Storage Management for Cloud Computing
IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations
StreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
Managed Services PKI 60-day Trial Quick Start Guide
Entrust Managed Services PKI Managed Services PKI 60-day Trial Quick Start Guide Document issue: 3.0 Date of issue: Nov 2011 Copyright 2011 Entrust. All rights reserved. Entrust is a trademark or a registered
Protecting Microsoft SQL Server with Asigra Cloud Backup
Technical Note Protecting Microsoft SQL Server with Asigra Cloud Backup Table of Contents Introduction 3 Overview - Asigra Cloud Backup Software Platform 3 Microsoft SQL Server Backup Set in Asigra DS-Client
CA Performance Management r2.x Implementation Proven Professional Exam
CA Performance Management r2.x Implementation Proven Professional Exam (CAT-440) Study Guide Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION 2015 CA. All rights reserved. CA confidential & proprietary
CRM. itouch Vision. This document gives an overview of OneTouch Cloud CRM and discusses the different features and functionality.
itouch Vision CRM This document gives an overview of OneTouch Cloud CRM and discusses the different features and functionality. For further information, about implementation and pricing please contact us.
Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description
Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
DATA BACKUP & RESTORE
DATA BACKUP & RESTORE Verizon Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable. Offsite backup is
Server Installation Manual 4.4.1
Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:
