SOASTA CloudTest Performance Data Retention and Security Policy. Whitepaper

Size: px
Start display at page:

Download "SOASTA CloudTest Performance Data Retention and Security Policy. Whitepaper"

Transcription

1 SOASTA CloudTest Performance Data Retention and Security Policy Whitepaper

2 Table of Contents Executive Summary: Data Security SOASTA s Data Retention Policy Test Development Test Metrics Data Encryption Test Infrastructure CloudTest Performance Data Q&A What is Performance Data? What Data is Used During Testing? What Happens to the Response Data Received? How are Log Files or Other Metrics Handled? What Data is Sent Back to the CloudTest Servers? What is the Difference Between Scrubbed and Synthetic Data? How is Data Handled for Testing Real Transactions? How Do We Create Synthetic Data? What Happens to the Data Once the Testing is Over? How is the Test Data Stored in the Cloud? Can Test Result Data be Removed from the Cloud? Can Test Result Data be Exported from the Cloud for Offsite Storage?... 7 About SOASTA, Inc... 7

3 Executive Summary: Data Security Data security is one of the key concerns when it comes to performance testing. Companies do not want their corporate data outside corporate firewalls. SOASTA does not ask customers to export any data or their application outside their firewalls. We can generate synthetic data or use scrubbed data depending on the customer s business and security requirements. We do not save any response data on our CloudTest servers as only key http/https external data is captured for reporting and diagnostic purposes. 1. SOASTA s Data Retention Policy 1.1 Test Development Data that is used for test development by a performance engineer (i.e. HTTP(s) GET/POST requests and responses) is not typically retained by SOASTA. At the customer s request, this data will be deleted immediately after test development. Test definitions (SOASTA test clips) are saved in the SOASTA repository for future testing. These are the steps that comprise the scenario and, while they can be deleted upon request, there is no data or other company private information so they are not typically deleted. 1.2 Test Metrics This includes the performance results of the test(s), such as response times, errors, data transfer rates, etc., as well as infrastructure metrics for any system resources that are monitored as part of the test. Monitored metrics may come from using SOASTA monitoring agents, SSH access to system information or third-party monitoring metrics such as CA s APM (formerly Wily). Test result metrics are kept for a minimum of one year, primarily to allow for comparative reporting over time. At the customer s request, this data (performance metrics and system resource monitors) will be deleted immediately after the customer accepts any test reports that are part of the engagement. PERFORMANCE DATA RETENTION AND SECURITY POLICY WHITEPAPER 3

4 1.3 Data Encryption Passwords and usernames for the SOASTA CloudTest application and for system resource monitors are encrypted. Monitoring passwords or SSH keys are encrypted and stored in the SOASTA Repository. They are not recoverable or viewable once entered. While it is not implemented as the default, CloudTest supports 3DES encryption of these values in accordance with standards such as the FIPS PUB 46-3 Data Encryption Standard. This can be enabled when compliance is necessary. Synthetic seed data that is fabricated for logging into an application or website to emulate real users can be encrypted as well. All information used to set up montors is retained in the SOASTA repository for future testing. At the customer s request, this data, the usernames and passwords, will be deleted immediately after testing. 1.4 Test Infrastructure CloudTest customers have their own tenant (with associated credentials) and this tenant is maintained for at least one year from date of last test. At the customer request, the tenant will be deleted immediately after all testing and reporting has been deemed completed. The actual load generators and results aggregation servers are temporary cloud-based instances and run only during test execution. This provides an additional level of security as all instances are discarded after each test, with only performance metrics retained in the results database. 2. CloudTest Performance Data Q&A 2.1 What is Performance Data? There are many different types of performance data that are leveraged as part of performance testing. Performance data can be broken up into three major categories: master data, user-generated data and external data. Master data typically exists in the customer s database(s) and is required for conducting business (for example usernames, passwords, social security numbers, etc). User-generated data is anything that the user inputs in editable fields on the application (i.e. new address, new address, etc). External data is provided upon execution of the application (i.e. confirmation numbers, session ids, etc). Sample of Master Data SOASTA, Inc. PERFORMANCE DATA RETENTION AND SECURITY POLICY WHITEPAPER 4

5 2.2 What Data is Used During Testing? Data requirements are dependent on the application and the business processes under test. For example, a static site might not require any performance data but just access to the site to make the requests, while a more complex application might require all three types of performance data outlined above. 2.3 What Happens to the Response Data Received? All customer-related response data is discarded from CloudTest servers during load testing. Only performance data related to that response data is retained (response times, errors, etc.). In addition, as noted above, CloudTest servers are temporary instances discarded after each test, with only performance metrics retained in the results database. However, all customer and external data is stored on the CloudTest server during script creation and debugging. The data used to create scripts can be deleted after script creation is completed to ensure no customer data is stored on SOASTA servers. 2.4 How are Log Files or Other Metrics, Which Capture Information About Data Handled? SOASTA does not keep log files or other metrics that capture information about customer data during load tests. But as stated in the previous question we do store this type of data during script creation. Request Response SOASTA, Inc. PERFORMANCE DATA RETENTION AND SECURITY POLICY WHITEPAPER 5

6 2.5 What Data is Sent Back to the CloudTest Servers? During load testing, only key external data is kept, such as http response codes, cookies, session ids, etc. But all data is sent back to the CloudTest servers to parse, at which point it is fully discarded from any SOASTA servers. 2.6 What is the Difference Between Scrubbed and Synthetic Data? Scrubbed data resides in a customer database and has gone through a process so it no longer includes any real customer data; in essence data that has been transformed and/or created from actual customer data. Synthetic data is generated from scratch and is designed to be an accurate representation of the customer s production database. 2.7 How is data handled for testing real transactions? Real transactions, such as purchases or registrations, have an impact on the database. For testing in the lab, there is generally not a problem as the transaction is only using dummy data and may not actually go through the entire end-to-end process, particularly if the actual order process, for example, is handled by a third party. For testing production systems, more thought needs to go into handling the transactions so that orders aren t accidentally placed or any other real user data isn t impacted. There are a number of approaches that can be taken. Common approaches include: a) If there is an online system that dumps into a queue that an Order management system picks up for fulfillment, stopping the queue and removing items before submitting. b) Some companies have already created many test accounts with addresses and credit cards. Typically there are test credit card numbers and test gift cards. There may be other techniques to identify and filter out test orders, as well. Or, there may be a group of cards that are identified as test cards and a specific list of products from which to purchase. For guest checkouts there may be a specific format from which to filter out test orders. c) Virtualizing the very end before a transaction gets sent for processing, or hard-coded switches based on customer account or credit card can prevent fulfillment. Aside from creating bad data in the production database, preventing fulfillment is a primary concern. Most of the time fulfillment is processed to a queue or backend system to avoid fraud and most online purchases are not fulfilled in real-time. Thus, you can stop the fulfillment process and remove the test orders prior to allowing fulfillment to process. d) Continue processing all the way up to submitting the order or transaction, and stop. For example, most of the work for an e-commerce site is done prior to the submit. At the same time, you don t want the order taking process to break, so this approach is less desirable. 2.8 How Do We Create Synthetic Data? SOASTA works closely with your application team to ensure a rich spread of representative data is created. Data is also created to target the business process under test and can expand as testing expands. 2.9 What Happens to the Data Once the Testing is Over? When testing is complete, the CloudTest servers only store performance metric data relevant to the test runs. No corporate data is retained on the CloudTest servers How is the Test Data Stored in the Cloud? For tests executed by SOASTA, the test results are stored in the cloud. The results are on Linux servers that are taken down at the conclusion of the testing event. These servers are only available during testing sessions or when results are being analyzed. In most cases, the result data is stored in a relational database in EC2 in an EBS (elastic block store). At the completion of each testing session, a snapshot of customer data is taken. These snapshots are documented and tied to a customer for data cleansing purposes. This data is only available to SOASTA employees and not available to any customers. SOASTA, Inc. PERFORMANCE DATA RETENTION AND SECURITY POLICY WHITEPAPER 6

7 Sample Performance Metric Data 2.11 Can Test Result Data be Removed from the Cloud? Yes, results can be deleted and removed from the cloud. Results are deleted at the request of the customer. When requested, the results are not deleted until after the result report is completed. Note that once the results are deleted, they are permanently deleted. No backups are made of deleted results. Beyond deleting customer data from the tenant, the hard drive/volume where the data was stored can also be permanently deleted. At the request of the customer SOASTA can facilitate any existing data wiping procedures that are documented and agreed upon prior to an engagement. Typical processes include those that are detailed in documents such as DoD M ( National Industrial Security Program Operating Manual ) or NIST ( Guidelines for Media Sanitization ). This includes any operational cleansing that can be performed from a Linux machine on a mounted disk through use of utilities and processes. Since the disks are not owned by SOASTA destruction of the underlying media is not possible. Note that deleting results limits the ability to compare results from prior and future tests. The only way to compare results once a result is deleted is by looking at the result report Can Test Result Data be Exported from the Cloud for Offsite Storage? Yes. All results are exportable in XML format. Results can be exported from the cloud and moved to a customer-defined location for safekeeping. Depending on the length of the test and amount of performance data related to the test, it can take up to hours to export the data from the cloud and move to a secure location. Optionally, the results can then be deleted from the cloud as well. About SOASTA, Inc. SOASTA is the leader in cloud and mobile testing. Its web and mobile test automation solution, CloudTest, enables developers, QA professionals and IT operations teams to test with unprecedented speed, scale and precision. The innovative product set streamlines test creation, automates provisioning and execution, and distills analytics to deliver actionable intelligence faster. With SOASTA, companies can have confidence that their applications will perform as designed, even in peak traffic. SOASTA s customers include many of today s most successful brands including American Girl, Chegg, Gilt Group, Hallmark, Intuit, Microsoft and Netflix. SOASTA is privately held and headquartered in Mountain View, California. For more information about SOASTA, please visit Headquarters: Castro St, Fourth Floor Mountain View, CA FAX: EMEA: +44 (0) Thames Court 1 Victoria Street Windsor, Berkshire SL4 1YB To learn more visit: soasta.com or us at info@soasta.com 2012 SOASTA. All rights reserved. SOASTA, the SOASTA logo, and SOASTA CloudTest are trademarks of SOASTA. All other product or company names may be trademarks and/or registered trademarks of their respective owners. EST Connect with us:

Cloud Testing Production Applications CloudTest Strategy and Approach

Cloud Testing Production Applications CloudTest Strategy and Approach White Paper Cloud Testing Production Applications CloudTest Strategy and Approach Mobile Performance Testing Web Performance Testing Table of Contents Executive Summary... 3 1. Intended Audience... 4 2.

More information

Whitepaper. Continuous Integration Tools Applying Best Practices to the Toolchain

Whitepaper. Continuous Integration Tools Applying Best Practices to the Toolchain Whitepaper Continuous Integration Tools Applying Best Practices to the Toolchain Table of Contents Introduction... 3 Continuous Integration Tools... 3 Device Test Automation... 3 API / Web Test Automation...

More information

Principles of Continuous Integration

Principles of Continuous Integration Whitepaper Principles of Continuous Integration Best Practices to Simultaneously Improve Speed, Quality and Responsiveness in Mobile Development Table of Contents Mobile Services... 3 Benefits of Continuous

More information

8 Common Myths About Performance Testing in Production Don t Let These Misconceptions Keep You From Production Testing.

8 Common Myths About Performance Testing in Production Don t Let These Misconceptions Keep You From Production Testing. 8 Common Myths About Performance Testing in Production Don t Let These Misconceptions Keep You From Production Testing White Paper Table of Contents Myth #1: Production testing = live testing... 1 Myth

More information

The New Mandate in Mobile Testing Deliver Continuous Quality with Expertise, Automation and Real Devices

The New Mandate in Mobile Testing Deliver Continuous Quality with Expertise, Automation and Real Devices Whitepaper The New Mandate in Mobile Testing Deliver Continuous Quality with Expertise, Automation and Real Devices Mobile Performance Testing Mobile Test Automation Table of Contents Executive Summary...

More information

SOASTA Real User Monitoring Best Practices

SOASTA Real User Monitoring Best Practices mpulse Whitepaper SOASTA Real User Monitoring Best Practices How to Connect Performance Analytics to Business Results SOASTA mpulse Dashboard Contents Digital Performance is User Focused....................

More information

Retail Best Practices Performance Testing Retail Web and Mobile Properties. White Paper

Retail Best Practices Performance Testing Retail Web and Mobile Properties. White Paper Retail Best Practices Performance Testing Retail Web and Mobile Properties White Paper Table of Contents Executive Summary... 3 1. ecommerce Characteristics... 4 2. What is an Effective Test Strategy...

More information

Whitepaper. The Top 10 Tips to Improve Web Application Performance

Whitepaper. The Top 10 Tips to Improve Web Application Performance Whitepaper The Top 10 Tips to Improve Web Application Performance Table of Contents Testing for the Lifecycle... 3 Tip No. 1: Bandwidth: Make Sure Everyone Can Get In... 4 Tip No. 2: Load Balancing: Make

More information

Cloud Storage Backup for Storage as a Service with AT&T

Cloud Storage Backup for Storage as a Service with AT&T WHITE PAPER: CLOUD STORAGE BACKUP FOR STORAGE AS A SERVICE........ WITH..... AT&T........................... Cloud Storage Backup for Storage as a Service with AT&T Who should read this paper Customers,

More information

Five Strategies for Performance Testing Mobile Applications

Five Strategies for Performance Testing Mobile Applications Five Strategies for Performance Testing Mobile Applications Mobile applications are now mainstream business. Businesses ranging from healthcare providers to retailers and airlines are creating applications

More information

First Class Mobile Application Performance Management

First Class Mobile Application Performance Management First Class Mobile Application Performance Management August 2012 Jim Rapoza ~ Underwritten, in Part, by ~ First Class Mobile Application Performance Management The rise of mobile applications and the

More information

e-commerce Best Practices How Web and Mobile Performance Optimizes Conversion and User Experience

e-commerce Best Practices How Web and Mobile Performance Optimizes Conversion and User Experience e-commerce Best Practices How Web and Mobile Performance Optimizes Conversion and User Experience Table of Contents Milliseconds Mean Mega-Dollars...4 Pre-Launch: Testing for Performance...5 Post-Launch:

More information

Load and Performance Load Testing. RadView Software October 2015 www.radview.com

Load and Performance Load Testing. RadView Software October 2015 www.radview.com Load and Performance Load Testing RadView Software October 2015 www.radview.com Contents Introduction... 3 Key Components and Architecture... 4 Creating Load Tests... 5 Mobile Load Testing... 9 Test Execution...

More information

Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data

Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data Datasheet Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data Ensure the critical data you need to run your operations, serve customers, gain competitive advantage, and

More information

Implementing 2-Legged OAuth in Javascript (and CloudTest)

Implementing 2-Legged OAuth in Javascript (and CloudTest) Implementing 2-Legged OAuth in Javascript (and CloudTest) Introduction If you re reading this you are probably looking for information on how to implement 2-Legged OAuth in Javascript. I recently had to

More information

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION

More information

319 MANAGED HOSTING TECHNICAL DETAILS

319 MANAGED HOSTING TECHNICAL DETAILS 319 MANAGED HOSTING TECHNICAL DETAILS 319 NetWorks www.319networks.com Table of Contents Architecture... 4 319 Platform... 5 319 Applications... 5 319 Network Stack... 5 319 Cloud Hosting Technical Details...

More information

Cloud Computing Trends

Cloud Computing Trends UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered

More information

Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok

Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok CLOUD COMPUTING PRACTICE 82 Chapter 9 PUBLIC CLOUD LABORATORY Hand on laboratory based on AWS Sucha Smanchat, PhD Faculty of Information Technology King Mongkut s University of Technology North Bangkok

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

DreamFactory Security Whitepaper Customer Information about Privacy and Security

DreamFactory Security Whitepaper Customer Information about Privacy and Security DreamFactory Security Whitepaper Customer Information about Privacy and Security DreamFactory Software publishes rich applications for salesforce.com. All of our products for salesforce use the DreamFactory

More information

IBM Tealeaf CX. A leading data capture for online Customer Behavior Analytics. Advantages. IBM Software Data Sheet

IBM Tealeaf CX. A leading data capture for online Customer Behavior Analytics. Advantages. IBM Software Data Sheet IBM Tealeaf CX A leading data capture for online Customer Behavior Analytics Advantages Passively captures network traffic without impacting site performance Provides breakthrough visibility into customer

More information

Mobile Admin Architecture

Mobile Admin Architecture Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile

More information

Session Storage in Zend Server Cluster Manager

Session Storage in Zend Server Cluster Manager Session Storage in Zend Server Cluster Manager Shahar Evron Technical Product Manager, Zend Technologies Welcome! All Phones are muted type your questions into the Webex Q&A box A recording of this session

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Nasuni Management Console Guide

Nasuni Management Console Guide Nasuni Management Console Guide Version 5.5 April 2014 2014 Nasuni Corporation All Rights Reserved Document Information Nasuni Management Console Guide Version 5.5 April 2014 Copyright Copyright 2010-2014

More information

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.

Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization. WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read

More information

Mobile Admin Security

Mobile Admin Security Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing

More information

White Paper. Quantum StorageCare Guardian

White Paper. Quantum StorageCare Guardian Quantum StorageCare Guardian April 2013 Notice This White Paper contains proprietary information protected by copyright. Information in this White Paper is subject to change without notice and does not

More information

Adobe Marketing Cloud Bloodhound for Mac 3.0

Adobe Marketing Cloud Bloodhound for Mac 3.0 Adobe Marketing Cloud Bloodhound for Mac 3.0 Contents Adobe Bloodhound for Mac 3.x for OSX...3 Getting Started...4 Processing Rules Mapping...6 Enable SSL...7 View Hits...8 Save Hits into a Test...9 Compare

More information

PRIVACY, SECURITY AND THE VOLLY SERVICE

PRIVACY, SECURITY AND THE VOLLY SERVICE PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers

More information

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Introduction Tenable Network Security is the first and only solution to offer security visibility, Azure cloud environment auditing, system

More information

Availability for the modern datacentre Veeam Availability Suite v8 & Sneakpreview v9

Availability for the modern datacentre Veeam Availability Suite v8 & Sneakpreview v9 Veeam Summer School Availability for the modern datacentre Veeam Availability Suite v8 & Sneakpreview v9 Jan van Leuken System Engineer Benelux, Veeam Software jan.vanleuken@veeam.com +31 (0)615 83 50

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program WhiteHat Security White Paper Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program October 2015 The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information

More information

CONFIGURING AND USING WEBDAV IN LENOVO EMC LIFELINE

CONFIGURING AND USING WEBDAV IN LENOVO EMC LIFELINE White Paper CONFIGURING AND USING WEBDAV IN LENOVO EMC LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Enabling WebDAV on Your Lenovo Network Storage Device 1 Accessing Shares from Your Computer

More information

Automatic Hotspot Logon

Automatic Hotspot Logon WHITE PAPER: for VPN Setup Features of the integrated, dynamic NCP Personal Firewall Solution Table of Contents 1. Insecure mobile computing via Wi-Fi networks (hotspots)...1 1.1 Basic hotspot functionality...

More information

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide

More information

Effective storage management and data protection for cloud computing

Effective storage management and data protection for cloud computing IBM Software Thought Leadership White Paper September 2010 Effective storage management and data protection for cloud computing Protecting data in private, public and hybrid environments 2 Effective storage

More information

EZblue BusinessServer The All - In - One Server For Your Home And Business

EZblue BusinessServer The All - In - One Server For Your Home And Business EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan

More information

Introducing Cloud Backup for MS SQL Server The Cloudberry Lab Whitepaper

Introducing Cloud Backup for MS SQL Server The Cloudberry Lab Whitepaper Introducing Cloud Backup for MS SQL Server The Cloudberry Lab Whitepaper The need for backup By performing timely backups, your valuable data is reliably protected against possible loss, corruption and

More information

How Drive Encryption Works

How Drive Encryption Works WHITE PAPER: HOW DRIVE ENCRYPTION WORKS........................................ How Drive Encryption Works Who should read this paper Security and IT administrators Content Introduction to Drive Encryption.........................................................................................

More information

ThreatMetrix Persona DB Technical Brief

ThreatMetrix Persona DB Technical Brief ThreatMetrix Persona DB Technical Brief Private and Scalable Entity/Attribute Database Persona DB is part of the TrustDefender Cybercrime Prevention Platform from ThreatMetrix. It s an extensible, enterprise-accessible

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

White Paper. How Streaming Data Analytics Enables Real-Time Decisions

White Paper. How Streaming Data Analytics Enables Real-Time Decisions White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream

More information

Administration Guide NetIQ Privileged Account Manager 3.0.1

Administration Guide NetIQ Privileged Account Manager 3.0.1 Administration Guide NetIQ Privileged Account Manager 3.0.1 December 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use

More information

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0

ReadyNAS Replicate. Software Reference Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10727-01 v1.0 ReadyNAS Replicate Software Reference Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10727-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced,

More information

PEPPERDATA IN MULTI-TENANT ENVIRONMENTS

PEPPERDATA IN MULTI-TENANT ENVIRONMENTS ..................................... PEPPERDATA IN MULTI-TENANT ENVIRONMENTS technical whitepaper June 2015 SUMMARY OF WHAT S WRITTEN IN THIS DOCUMENT If you are short on time and don t want to read the

More information

Paxata Security Overview

Paxata Security Overview Paxata Security Overview Ensuring your most trusted data remains secure Nenshad Bardoliwalla Co-Founder and Vice President of Products nenshad@paxata.com Table of Contents: Introduction...3 Secure Data

More information

Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM

Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM Comprehensive VMware Virtual Machine Protection with Asigra Cloud Backup TM Virtualization is changing the way companies design, run, and manage their IT environments. Today, virtual machines (VM) are

More information

IBM Tealeaf CX. A leading information source for online Customer Experience Management. Highlights

IBM Tealeaf CX. A leading information source for online Customer Experience Management. Highlights IBM Tealeaf CX A leading information source for online Customer Experience Management Highlights Passively captures network traffic without impacting site performance. Provides breakthrough visibility

More information

Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution

Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Intronis Cloud Backup and Recovery is a file based backup application that allows users to back up their critical data to the

More information

Addressing Legal Discovery & Compliance Requirements

Addressing Legal Discovery & Compliance Requirements Addressing Legal Discovery & Compliance Requirements A Comparison of and Archiving In today s digital landscape, the legal, regulatory and business requirements for email archiving continue to grow in

More information

The problem with privileged users: What you don t know can hurt you

The problem with privileged users: What you don t know can hurt you The problem with privileged users: What you don t know can hurt you FOUR STEPS TO Why all the fuss about privileged users? Today s users need easy anytime, anywhere access to information and services so

More information

SmartGlance Mobile Reporting Architecture and Data Security

SmartGlance Mobile Reporting Architecture and Data Security White Paper SmartGlance Mobile Reporting Architecture and Data Security Authors: Saadi Kermani, Manager Industry Applications & Solutions, Invensys Operations Management Bimal Mehta, Director, Industry

More information

efolder BDR for Veeam Cloud Connection Guide

efolder BDR for Veeam Cloud Connection Guide efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Dionseq Uatummy Odolorem Vel Layered Security Approach

Dionseq Uatummy Odolorem Vel Layered Security Approach A P P L I C A T I O N B R I E F Aciduisismodo Hitachi Content Dolore Platform Eolore Dionseq Uatummy Odolorem Vel Layered Security Approach Highly Scalable, Cloud-enabled Platform Ensures Data Safety with

More information

How to Unlock Agility by Backing up to, from, and in the Cloud

How to Unlock Agility by Backing up to, from, and in the Cloud WHITE PAPER: HOW TO UNLOCK AGILITY BY BACKING UP TO, FROM,....... AND.... IN.. THE.... CLOUD....................... How to Unlock Agility by Backing up to, from, and in the Cloud Who should read this paper

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i

Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i Oracle Forms Services Secure Web.Show_Document() calls to Oracle Reports Server 6i $Q2UDFOH7HFKQLFDO:KLWHSDSHU 0DUFK Secure Web.Show_Document() calls to Oracle Reports Server 6i Introduction...3 solution

More information

TECHNOLOGY WHITE PAPER Jan 2016

TECHNOLOGY WHITE PAPER Jan 2016 TECHNOLOGY WHITE PAPER Jan 2016 Technology Stack C# PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache CloudWatch Paypal Overview

More information

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Product Datasheet The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Full-featured Enterprise-class IT Solution for Managed File Transfer Organizations today must effectively

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

IBM Tealeaf CX. A leading information source for online Customer Experience Management. Highlights. IBM Software Industry Solutions

IBM Tealeaf CX. A leading information source for online Customer Experience Management. Highlights. IBM Software Industry Solutions IBM Tealeaf CX A leading information source for online Customer Experience Management Highlights Passively captures network traffic without impacting site per formance. Provides breakthrough visibility

More information

VANGUARD ONLINE BACKUP

VANGUARD ONLINE BACKUP VANGUARD ONLINE BACKUP Product Description Vanguard Online Backup is a world class solution that automates off-site and on-site backups. The application combines an easy to use interface with powerful

More information

Portal Administration. Administrator Guide

Portal Administration. Administrator Guide Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information

Modern IT Operations Management. Why a New Approach is Required, and How Boundary Delivers

Modern IT Operations Management. Why a New Approach is Required, and How Boundary Delivers Modern IT Operations Management Why a New Approach is Required, and How Boundary Delivers TABLE OF CONTENTS EXECUTIVE SUMMARY 3 INTRODUCTION: CHANGING NATURE OF IT 3 WHY TRADITIONAL APPROACHES ARE FAILING

More information

TECHNOLOGY WHITE PAPER Jun 2012

TECHNOLOGY WHITE PAPER Jun 2012 TECHNOLOGY WHITE PAPER Jun 2012 Technology Stack C# Windows Server 2008 PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

Mike Chyi, Micro Focus Solution Consultant May 12, 2010

Mike Chyi, Micro Focus Solution Consultant May 12, 2010 Mike Chyi, Micro Focus Solution Consultant May 12, 2010 Agenda Load Testing Overview, Best Practice: Performance Testing with Diagnostics Demo (?), Q&A Load Testing Overview What is load testing? Type

More information

M Y S E C U R E B A C K U P S E R V E R E D I T I O N. p r o d u c t o v e r v i e w O N L I N E S E R V E R B A C K U P

M Y S E C U R E B A C K U P S E R V E R E D I T I O N. p r o d u c t o v e r v i e w O N L I N E S E R V E R B A C K U P O N L I N E S E R V E R B A C K U P Business-class Server Backup that allows you to remotely backup a server online. Features advanced compression and de-duplication to speed backups and minimize space.

More information

Product Brief. it s Backed Up

Product Brief. it s Backed Up Product Brief it s Backed Up IT Authorities, Inc. 1/11/2010 Table of Contents Contents Table of Contents... 2 it s Backed Up... 3 Backup... 3 Backup, Continued... 4 Backup, Continued... 5 Application Aware

More information

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway Table of Contents Introduction... 3 Implementing Best Practices with the Websense Web Security

More information

Zerto Virtual Manager Administration Guide

Zerto Virtual Manager Administration Guide Zerto Virtual Manager Administration Guide AWS Environment ZVR-ADVA-4.0U2-01-23-07-15 Copyright 2015, Zerto Ltd. All rights reserved. Information in this document is subject to change without notice and

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Frequently Asked Questions

Frequently Asked Questions Table of contents 1. Agent Technology...3 1.1. Has the Knoa agent been tested with standard set of services on the PC?... 3 1.2. Do users need to do anything to activate the Agent?...3 1.3. Does the Knoa

More information

Using a VPN with Niagara Systems. v0.3 6, July 2013

Using a VPN with Niagara Systems. v0.3 6, July 2013 v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel

More information

Migrating to vcloud Automation Center 6.1

Migrating to vcloud Automation Center 6.1 Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

IaaS Configuration for Cloud Platforms

IaaS Configuration for Cloud Platforms vrealize Automation 6.2.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Ready, Set, Go! or Slow?

Ready, Set, Go! or Slow? Leveraging the Cloud for On-Demand Performance Testing COLLABORATIVE WHITEPAPER SERIES New user behaviors that businesses are introducing to their web sites are driving more volume than ever before. Product

More information

Filr 2.0 Administration Guide. April 2016

Filr 2.0 Administration Guide. April 2016 Filr 2.0 Administration Guide April 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy,

More information

SAS Information Delivery Portal

SAS Information Delivery Portal SAS Information Delivery Portal Table of Contents Introduction...1 The State of Enterprise Information...1 Information Supply Chain Technologies...2 Making Informed Business Decisions...3 Gathering Business

More information

SPHOL207: Database Snapshots with SharePoint 2013

SPHOL207: Database Snapshots with SharePoint 2013 2013 SPHOL207: Database Snapshots with SharePoint 2013 Hands-On Lab Lab Manual This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site

More information

Cloud Portal Office Security Whitepaper. October 2013

Cloud Portal Office Security Whitepaper. October 2013 Cloud Portal Office Security Whitepaper October 2013 Table of Contents Introduction... 2 Accessing Cloud Portal Office... 2 Account Authentication and Authorization... 2 Strong Password Policies... 3 Single

More information

Effective Storage Management for Cloud Computing

Effective Storage Management for Cloud Computing IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations

More information

Netop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing

Netop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing Netop Environment Security Unified security to all Netop products while leveraging the benefits of cloud computing Contents Introduction... 2 AWS Infrastructure Security... 3 Standards - Compliancy...

More information

StreamServe Persuasion SP5 StreamStudio

StreamServe Persuasion SP5 StreamStudio StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other

More information

Managed Services PKI 60-day Trial Quick Start Guide

Managed Services PKI 60-day Trial Quick Start Guide Entrust Managed Services PKI Managed Services PKI 60-day Trial Quick Start Guide Document issue: 3.0 Date of issue: Nov 2011 Copyright 2011 Entrust. All rights reserved. Entrust is a trademark or a registered

More information

Protecting Microsoft SQL Server with Asigra Cloud Backup

Protecting Microsoft SQL Server with Asigra Cloud Backup Technical Note Protecting Microsoft SQL Server with Asigra Cloud Backup Table of Contents Introduction 3 Overview - Asigra Cloud Backup Software Platform 3 Microsoft SQL Server Backup Set in Asigra DS-Client

More information

CA Performance Management r2.x Implementation Proven Professional Exam

CA Performance Management r2.x Implementation Proven Professional Exam CA Performance Management r2.x Implementation Proven Professional Exam (CAT-440) Study Guide Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION 2015 CA. All rights reserved. CA confidential & proprietary

More information

CRM. itouch Vision. This document gives an overview of OneTouch Cloud CRM and discusses the different features and functionality.

CRM. itouch Vision. This document gives an overview of OneTouch Cloud CRM and discusses the different features and functionality. itouch Vision CRM This document gives an overview of OneTouch Cloud CRM and discusses the different features and functionality. For further information, about implementation and pricing please contact us.

More information

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description

Data Backup and Restore (DBR) Overview... 2. Detailed Description... 3. Pricing... 5 SLAs... 5 Service Matrix... 6. Service Description Service Description Data Backup and Restore (DBR) Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable.

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

DATA BACKUP & RESTORE

DATA BACKUP & RESTORE DATA BACKUP & RESTORE Verizon Terremark s Data Backup & Restore provides secure, streamlined online-offsite data storage and retrieval that is highly scalable and easily customizable. Offsite backup is

More information

Server Installation Manual 4.4.1

Server Installation Manual 4.4.1 Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:

More information