Datasheet FUJITSU Security Solution Compliant Archiving SecDocs V2.3
|
|
- Clare Cobb
- 8 years ago
- Views:
Transcription
1 Datasheet FUJITSU Security Solution Compliant Archiving SecDocs V2.3 An archiving middleware based on open standards which preserves the evidentiary value powered by OpenLimit Digital Long-Term Archiving Archiving documents in digital fmats offers many benefits in comparison to paper-bound archives. Stage is very cost-efficient, and digital documents can be transferred both faster and cheaper. Digital documents do not suffer from physical aging which can render documents unreadable due to paper ink decomposition. Digital archives must fulfill two basic requirements in der to be able to fully replace paper bound archives. First, document fmats need to be guaranteed and stable, to be independent from some particular software f reading. Using standardized fmats like PDF/A and TIFF is a widely accepted choice to fulfill this requirement. In addition, it must be possible to assert that a document has not been modified, and that signatures in the document are authentic. Digital signatures and tamper-proof stage media provide protection, but only f a limited period: Media have a limited lifetime, and digital signatures get weaker over time due to technical progress.. Preserving the Evidentiary Value This is where SecDocs comes into play: It allows archiving documents in a fmat which retains the evidentiary value f arbitrary long retention periods. SecDocs is based on results of the research projects ArchiSig (digital oversigning) and ArchiSafe (secure long-term stage) which have been funded by the German Department of Commerce and which are now part of the Technical Directive TR SecDocs is designed as a middleware component which is used over Web Services (SOAP V1.1). This allows an easy integration into existing IT architectures and processes. As a stage system SecDocs can use ETERNUS CS8000 systems with ViNS NetApp s NAS filer, the SoftWORM feature SnapLock can provide additional protection against accidental intentional manipulation of documents in the archive. The security kernel of SecDocs is provided by OpenLimit, an internationally leading provider of certified software f digital signatures. This component was certified by the German Bundesamt für Sicherheit in der Infmationstechnik (BSI) accding to Common Criteria level EAL4+. The security target is based on the Protection Profile f ArchiSafe-compliant Middleware, but also includes elements from the technical directive TR (Preserving Evidentiary Value of Cryptographically Signed Documents). Page 1 of 5
2 Features and benefits Main features Permanent Protection of Document Integrity Documents are sealed with digital time-stamps Digital signatures f the document are verified Preservation of evidentiary value due to oversigning Interfaces and Open Standards Both archiving and administration is perfmed with SOAP V1.1 web services Access over HTTP(S) Proof of document integrity is done with RFC 4998 compliant evidence recds Documents are sted as XML files Benefits Ptable proof of document integrity, independent of stage location Permanent proof of authenticity, even if cryptographic certificates are no longer valid available Easy integration into existing IT landscape Can be implemented as a Cloud service Document integrity can be verified outside the archive from a copy of the document and a copy of the evidence recd Document types and metadata can be designed as desired Role Concept and Multitenancy Many tenants can use the same archive, completely segregated from each other Permissions f archiving operations can be freely assigned to different roles The archive can be implemented as a central service f several different IP processes Different tasks and responsibilities can be assigned to different business processes Price Concept pay per use License fees depend on number of documents in the archive Certified Security Kernel The components f signature verification and sealing is certified against Common Criteria EAL4+. New in SecDocs V2.3: Archiving big objects Transfer and sealing of objects up to 50GB Extension of use is possible at any time Security certified by BSI Archiving of media data (audio, video) and container objects Page 2 of 5
3 Topics Functional Overview SecDocs archives any type of documents, sealing them with a time stamp which is digitally signed by a time stamping authity. There is no need f a secret key within SecDocs which would need to be protected from unauthized access. F archived and sealed documents, the proof that they have not been tampered with can be perfmed at any time. The use of time stamps instead of conventional digital signatures allows an over-signing as proposed in the ArchiSig concept, preserving the evidentiary value. The security margin of all cryptographic algithms diminishes over time, due to increasing CPU power cryptographic research. This leads to a situation, where digital signatures are no longer tamper-proof. By over-signing the documents with a new time stamp the documents can be re-sealed, befe the iginal time stamp could be fged. The resulting chain of time stamps can be used to prove that every sealing was perfmed at a point in time where the algithm used was sufficiently secure. SecDocs delivers added value f documents which have been digitally signed, too. The algithms used f digital signatures are subject to aging as well and are getting weaker over time. By verifying the signatures while accepting documents f archiving and sealing the verification repts together with the documents, SecDocs preserves the proof of authenticity of digital signatures f the whole retention period. SecDocs stes the time stamps in a standardized fmat of Evidence Recds (RFC 4998). Using an evidence recd, the integrity of a document can be proven independently of the stage location (e.g. on media which are protected against overwriting). A document and the cresponding evidence recd can be retrieved from the document and fwarded to third parties. Even without access to the archive, and without examining the security management of the archive, the third party can verify the integrity of the document since the time of the first sealing, using just the document and the evidence recd. Interfaces and Open Standards SecDocs is an autonomous component, designed to be used over the net and integrated into existing IT processes. Usage f archiving and sealing of documents, and the administration during operation are perfmed over web services interfaces (SOAP 1.1). High availability and higher archiving throughput can be achieved by connecting me than one server to the same archive. The archived documents are sted on a NFS file system, the WORM feature NetApp SnapLock can optionally be activated. F an efficient management of internal data SecDocs needs a data base (Oracle 11g Release 2 MySQL as of version 5.5). The operation of SecDocs with web services and the HTTP(S) transpt protocol enable SecDocs to perfm as a central archiving service. The SOAP applications can be running on the same server, within the same internal netwk, they can be distributed wld-wide. An authentication function makes sure that only authized users have access to a SecDocs archive. To archive documents in SecDocs, customer specific XML schemas can be registered. Every incoming document is validated against the registered schemas, during this process customer-specified elements are evaluated (meta data, digital signatures). Binary content, e.g. PDF-A files, can be embedded in Base64-encoding. SecDocs detects any digital signatures which are embedded in PDF documents, these are validated in the same way as attached signatures. F searching within the archive, SecDocs provides SPARQL, a standardized query language which is designed f web services. Role Concept and Multitenancy In one SecDocs archive, documents of several tenants can be archived, totally segregated from each other. F every tenant, there is a role of an administrat, who e.g. can register document types, and define different ganizations with separate archiving locations. Within each ganization, the operations of the archiving service can be freely distributed to different roles, allowing f example to assign a special role f deleting documents from the archive. Transparentes Pricing concept: Pay per use The licensing scheme f SecDocs reflects the active usage of an archive, counting documents when they are added. Therefe, extending the use f new ganisatiions processes is easily possible. On the other hand, running expenses are reduced if no new documents are added to the archive, even if the current set of documents remains accessible. Certified Security Kernel The security kernel of SecDocs is certified based on the Common Criteria Protection Profile f an ArchiSafe Compliant Middleware f Enabling the Long-Term Preservation of Electronic Documents accding to EAL4+. Certificates issued by the German Bundesamt für Sicherheit in der Infmationstechnik (BSI) are recognized internationally and assert the confmance with the protection profile. Page 3 of 5
4 Technical Details Technical Requirements Hardware Server Process RAM Stage Stage requirement after installation Technical Requirements Software Operating System Data base Interfaces Archiving Document Types Administration Suppted Algithms Documentation x86 Server, 64 Bit At least 2GHz At least 16GB NetApp NAS filer, optionally with SnapLock ETERNUS CS8000 with ViNS 1.5GB (without data base) Red Hat Enterprise Linux 6 update 5 64 Bit (AMD64/x64) newer SuSE SLES 11 SP3 64bit (AMD64/x64) newer Oracle 11g Release 2 Standard Edition Enterprise Edition MySQL as of version Web services with SOAP 1.1 over HTTP(S) Any, per customer specified XML schemas Web services with SOAP 1.1 over HTTP(S) Hash Algithmen SHA-1 (no longer suited f QES), SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD (no longer suited f QES) Signature Types CMS, PKCS#7, PKCS#1, DSA, ECDSA, XML-DSIG, Timestamps Padding Methods PSS-Padding, PKCS#1 Version 1.5, DinSig-Padding SecDocs V2.3 User Guide SecDocs V2.3 Installation Guide SecDocs V2.3 Return Values OpenLimit Middleware V3 Server Administration Guide OpenLimit Middleware V3 Server Additional Infmation OpenLimit Middleware MigSafe/OverSign Return Values Conditions Ordering and Delivery This software product is supplied to the customer under the conditions f the use of software products against installments a single payment This software product can be obtained from your local Fujitsu regional office. Page 4 of 5
5 Me infmation Fujitsu products, solutions & services Products In addition to Compliant Archiving, Fujitsu offers a full ptfolio of other computing products: Stage systems: ETERNUS Server: PRIMERGY, PRIMEQUEST, Fujitsu SPARC M10, BS2000 Mainframe Client Computing Devices: LIFEBOOK, STYLISTIC, ESPRIMO, FUTRO, CELSIUS Peripherals: Fujitsu Displays, Accessies Software Netwk Solutions Infrastructure Solutions are customer offerings created by bringing Fujitsu s products, services and technologies together with those from partners. Industry Solutions are tailed to meet the needs of specific verticals. Business and Technology Solutions provide a variety of technologies developed to tackle specific business issues such as security and sustainability, across many verticals. Services Application Services suppt the development, integration, testing, deployment and on-going management of both custom developed and packaged applications. Business Services respond to the challenge of planning, delivering and operating IT in a complex and changing IT environment. Managed Infrastructure Services enable customers to deliver the optimal IT environment to meet their needs. Me infmation To learn me about Fujitsu, please contact your Fujitsu sales representative, Fujitsu business partner, visit our website. Archiving Fujitsu green policy innovation Fujitsu Green Policy Innovation is our wldwide project f reducing burdens on the environment. Using our global knowhow, we aim to resolve issues of environmental energy efficiency through IT. Please find further infmation at: Copyright 2015 Fujitsu Technology Solutions GmbH Fujitsu, the Fujitsu logo and SecDocs are trademarks registered trademarks of Fujitsu Limited in Japan and other countries. Disclaimer Technical data subject to modification and delivery subject to availability. Any liability that the data and illustrations are complete, actual crect is excluded. Designations may be trademarks and/ copyrights of the respective manufacturer, the use of which by third parties f their own purposes may infringe the rights of such owner. Contact Fujitsu Technology Solutions GmbH Mies-van-der-Rohe-Straße 8, München Website: EN Page 5 of 5
The Challenge Handling a lot of paper documents
The Challenge Handling a lot of paper documents Handling a lot of paper documents is becoming increasingly challenging in a company. There are two typical scenarios. A lot of documents are received, created
More informationDatasheet FUJITSU Software ServerView Cloud Monitoring Manager V1.0
Datasheet FUJITSU Software ServerView Cloud Monitoring Manager V1.0 Datasheet FUJITSU Software ServerView Cloud Monitoring Manager V1.0 A Monitoring Cloud Service for Enterprise OpenStack Systems Cloud
More informationDatasheet Fujitsu Cloud Infrastructure Management Software V1
Datasheet Fujitsu Cloud Infrastructure Management Software V1 Efficient infrastructure utilization, private cloud creation support, and reduced administration. Cloud Foundation for Iaas Fujitsu supports
More informationThe Advantages of Using Fujitsu As a Backup and Archiving Software
The Solution for IT Archives A Guideline for Trusted long-term Storage with Fujitsu IT Archiving Trusted long-term Storage Archiving for compliance purposes These days, paper archives are kept in many
More informationDatasheet FUJITSU Integrated System PRIMEFLEX for Hadoop
Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop is a powerful and scalable platform analyzing big data volumes at high velocity FUJITSU Integrated System PRIMEFLEX Your fast track to datacenter
More informationDatasheet FUJITSU Software Systemwalker Runbook Automation V15
Datasheet FUJITSU Software Systemwalker Runbook Automation V15 Automation of various data center operations and cloud operation tasks as operations flows By automating the operation tasks that used to
More informationDatasheet FUJITSU Software Systemwalker Software Configuration Manager V15
Datasheet FUJITSU Software Systemwalker Software Configuration Manager V15 Patch application and automatic collection of information about cloud resources In modern company IT departments, virtualization
More informationData Sheet FUJITSU Support Pack Hardware
Data Sheet FUJITSU Support Pack Hardware Maintenance Services for IT Hardware INTRODUCTION Fujitsu offers - with its Fujitsu Support Pack Hardware - support services for hardware which cover diagnostics
More informationDatasheet FUJITSU Cloud Monitoring Service
Datasheet FUJITSU Cloud Monitoring Service FUJITSU Cloud Monitoring Service powered by CA Technologies offers a single, unified interface for tracking all the vital, dynamic resources your business relies
More informationDatasheet Fujitsu ETERNUS LT20 S2
Datasheet Fujitsu ETERNUS LT20 S2 Economy System Ideal for Small Businesses and Branch Offices ETERNUS LT TAPE LIBRARY SYSTEM The affordable ETERNUS LT tape systems offer impressive scalability and reliability.
More informationDatasheet FUJITSU Integrated System PRIMEFLEX for Hadoop
Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop FUJITSU Integrated System PRIMEFLEX for Hadoop is a powerful and scalable platform analyzing big data volumes at high velocity FUJITSU Integrated
More informationData Sheet Fujitsu ETERNUS CS High End V5.1 Data Protection Appliance
Data Sheet Fujitsu ETERNUS CS High End V5.1 Data Protection Appliance Radically simplifying data protection ETERNUS CS Data Protection Appliances The Fujitsu ETERNUS CS storage solutions, comprising ETERNUS
More informationDatasheet. FUJITSU Storage ETERNUS SF Storage Cruiser V16.0 ETERNUS SF AdvancedCopy Manager V16.0 ETERNUS SF Express V16.0
Datasheet FUJITSU Storage ETERNUS SF Storage Cruiser V16.0 ETERNUS SF AdvancedCopy Manager V16.0 ETERNUS SF Express V16.0 Central console and advanced management functions for ETERNUS DX storage environments..
More informationSystem Requirements. SAS Profitability Management 2.2. Deployment
System Requirements SAS Profitability Management 2.2 This document provides the requirements f installing and running SAS Profitability Management 2.2 software. You must update your computer to meet these
More informationWhite Paper PalmSecure truedentity
White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server
More informationRSA Digital Certificate Solution
RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong
More informationOracle Primavera Portfolio Management 9.0
Primavera Ptfolio Management Oracle Primavera Ptfolio Management 9.0 This file provides the following infmation about Primavera Ptfolio Management: Technical Suppt DVD Content Technical Requirements and
More informationIn accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), REGULATION
In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), the Minister of Telecommunications and Information Society hereby promulgates REGULATION
More informationOB10 - Digital Signing and Verification
Global Headquarters 90 Fetter Lane London EC4A 1EN Tel: +44 (0) 870 165 7410 Fax: +44 (0) 207 240 2696 OB10 - Digital Signing and Verification www.ob10.com Version 2.4 March 2013 Summary In order to comply
More informationHow to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server
How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time
More informationFujitsu Interstage Big Data Parallel Processing Server V1.0
Datasheet Fujitsu Interstage Big Data Pa Parallel lel Processing Server V1.0 V1 Datasheet Fujitsu Interstage Big Data Parallel Processing Server V1.0 Availability vailability and processing performance
More informationoutdoor units indoor units VRF network systems Max. controllable Max. controllable 1,600 Max. controllable
Software Energy Saving & Various Managements Large buildings multiple buildings can be batch controlled and monited. System Controller meets the diverse needs f building air conditioning from detailed
More informationManaged Solution Center s TSM Managed Services FAQ
Managed Solution Center s TSM Managed Services FAQ Frequently Asked Questions 1. Will this invalidate our IBM Warranty / Maintenance? No. IBM warranty will not be affected as TSM code is not being modified
More informationSystem Requirements and Platform Support Guide
Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationCommon Criteria Protection Profile. ArchiSafe Compliant Middleware (ACM_PP)
Common Criteria Protection Profile for an ArchiSafe Compliant Middleware for Enabling the Long-Term Preservation of Electronic Documents (ACM_PP) Version Date Author Remarks 1.0.0 31/10/08 Dr. Wolf Zimmer
More informationELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM
W H I T E P A P E R ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM This white paper is written for senior executives,
More informationAutomation for Electronic Forms, Documents and Business Records (NA)
Automation for Electronic Forms, Documents and Business Records (NA) White Paper Learn more. www.alphatrust.com Automation for Electronic Forms, Documents and Business Records (NA) White Paper About AlphaTrust
More informationArchiSafe. The Archive with Legal Compliance. Dir. & Prof. Dr. Siegfried Hackel. Federal Ministry of Economics and Technology
ArchiSafe The Archive with Legal Compliance Federal Ministry of Economics and Technology Dir. & Prof. Dr. Siegfried Hackel Vers_E_2008-03-13 Page 1 The PTB... is Germany s national metrology institute
More informationAGENDA ITEM 15-16 : ELECTRONIC SIGNATURE
SCREENING CHAPTER 10 Country Session: 13- Content Legislation Main Points of Turkish Electronic Signature Legislation Electronic Certificate Service Providers and Market Standardization Aspect of Electronic
More informationConfiguring NetFlow on Cisco ASR 9000 Series Aggregation Services Router
Configuring NetFlow on Cisco ASR 9000 Series Aggregation Services Router This module describes the configuration of NetFlow on the Cisco ASR 9000 Series Aggregation Services Router. A NetFlow flow is a
More informationSWIFTNet Online Operations Manager
Messaging SWIFTNet 7.0 SWIFTNet Online Operations Manager Quick Overview December 2010 Table of Contents Preface... 3 1 Introduction... 4 1.1 Background... 4 1.2 SWIFTNet Online Operations Manager... 4
More informationTechNote 0006: Digital Signatures in PDF/A-1
TechNote 0006: Digital Signatures in PDF/A-1 Digital signatures are primarily used to check the integrity of the signed part of the document. They also can be used to authenticate the signer s identity
More informationData Sheet FUJITSU Storage ETERNUS CS800 S5
Data Sheet FUJITSU Storage ETERNUS CS800 S5 Data Sheet FUJITSU Storage ETERNUS CS800 S5 Data Protection Appliance: Backup to Disk with Deduplication ETERNUS CS Backup Appliance The ETERNUS CS portfolio
More informationAdditional Information. OpenLimit Middleware Version 3 Server Product Version: 1.2 Help Manual. Date: 23.03.2012 Document version: 1.
Additional Information OpenLimit Middleware Version 3 Server Product Version: 1.2 Help Manual Date: 23.03.2012 Document version: 1.1 OpenLimit SignCubes AG 2012 This documentation is the intellectual property
More informationACE Management Server Deployment Guide VMware ACE 2.0
Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.
More informationHow To Backup To Disk With Deduplication On An Fujitsu Ecson Cser800 S4 Data Protection Appliance
Data Sheet Fujitsu ETERNUS CS800 S4 Data Protection Appliance: Backup to Disk with Deduplication ETERNUS CS Backup Appliance Many IT departments are looking for solutions that provide faster backup and
More informationd3 Document Management Solution
d3 Document Management Solution Asseco SEE is the d.velop Competence Center for the region. In addition to providing analysis, implementation and support services, Asseco also offers training courses for
More informationOnline signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08
Online signature API Version 0.20, 2015-04-08 Terms used in this document Onnistuu.fi, the website https://www.onnistuu.fi/ Client, online page or other system using the API provided by Onnistuu.fi. End
More informationSecure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
More informationSecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
More informationETSI TS 102 778 V1.1.1 (2009-04) Technical Specification
TS 102 778 V1.1.1 (2009-04) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1 2 TS 102 778 V1.1.1 (2009-04)
More informationHOB Remote Desktop VPN Secure access for remote workers and business partners to your enterprise network
HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Tel: +49 9103 / 715-0 Fax: +49 9103 / 715-271 E-Mail: support@hobsoft.com Internet: www.hobsoft.com HOB Remote Desktop VPN Secure access for remote
More informationFact Sheet Fujitsu Global Cloud Platform Infrastructure as a Service (Iaas)
Fact Sheet Fujitsu Global Cloud Platform Infrastructure as a Service (Iaas) Flexible and Secure IT that Stays Aligned with Your Business You have a business to run and a hugely complex infrastructure to
More informationDatasheet FUJITSU Storage ETERNUS LT250 TAPE LIBRARY
Datasheet FUJITSU Storage ETERNUS LT250 TAPE LIBRARY ETERNUS LT TAPE LIBRARY SYSTEM ETERNUS LT tape library systems from Fujitsu have impressive scalability, reliability and technical brilliance. They
More informationSystem Requirements. SAS Profitability Management 2.21. Deployment
System Requirements SAS Profitability Management 2.2 This document provides the requirements for installing and running SAS Profitability Management. You must update your computer to meet the minimum requirements
More informationContents Overview of RD Web Access... 2. What is RD Web Access?... 2 What are the benefits of RD Web Access versus thin client?...
Purpose & Scope The purpose of this document is to provide business advantages, system administrat installation, and end-user access procedures f the use of Remote Desktop (RD) Web Access f Instrument
More informationETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved
ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance esignature Standards Framework Certificate Authority Time-stamping Signing Servers Validation
More informationHow To Use An Fujitsu Ces800 S5 Backup Appliance
Data Sheet FUJITSU Storage ETERNUS CS800 S5 Data Sheet FUJITSU Storage ETERNUS CS800 S5 Data Protection Appliance: Backup to Disk with Deduplication ETERNUS CS Backup Appliance The FUJITSU Storage ETERNUS
More informationDigital Signature Verification using Historic Data
Digital Signature Verification using Historic Data Digital signatures are now relatively common; however historic verification of digitally signed data is not so widely understood. As more data is held
More informationCisco ACE Web Application Firewall
Cisco ACE Web Application Firewall Product Overview The Cisco ACE Web Application Firewall (Figure 1) is the newest component of the Cisco Application Control Engine (ACE) family of products. Many ganizations
More informationCloud Computing Risks
ISSA PREEMINENT TRUSTED GLOBAL INFORMATION SECURITY COMMUNITY Cloud Computing Risks By Richard Mosher ISSA member, Kansas City, USA Chapter Cloud computing risks still include data privacy, availability,
More informationIdentikey Server Performance and Deployment Guide 3.1
Identikey Server Performance and Deployment Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is'
More informationvrealize Business System Requirements Guide
vrealize Business System Requirements Guide vrealize Business Advanced and Enterprise 8.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
More informationTaking the Open Source Road
The National Security Agency s Review of Emerging Technologies Taking the Open Source Road Raising the Bar in Operating System Security Cryptographic Binding of Metadata Providing a Secure Foundation with
More informationDescription of the Technical Component:
Confirmation concerning Products for Qualified Electronic Signatures according to 15 Sec. 7 S. 1, 17 Sec. 4 German Electronic Signature Act 1 and 11 Sec. 2 and 15 German Electronic Signature Ordinance
More informationDell Statistica. Statistica Document Management System (SDMS) Requirements
Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDATASHEET FUJITSU ETERNUS LT250 TAPE LIBRARY
DATASHEET FUJITSU ETERNUS LT250 TAPE LIBRARY HIGHLY RELIABLE, LARGE-CAPACITY TAPE LIBRARY FOR CONSOLIDATED BACKUP OF MID-RANGE SYSTEM. ETERNUS LT TAPE LIBRARY SYSTEM ETERNUS LT tape library systems from
More informationClustering for Load Balancing and Fail Over
Clustering f Balancing and Fail Over Last updated: 16/07/2015 Table of contents 1 Introduction...3 2 HTTP-Based Scenarios...5 2.1 Leverage LB Stickiness Options 1.A...5 2.1.1 Option 1.A.1 IP- Based...5
More informationLOCAL AREA NETWORK (LAN) SUPPORT SERIES
LOCAL AREA NETWORK (LAN) SUPPORT SERIES Occ. Wk Prob. Effective Code No. Class Title Area Area Period Date 4826(3291) Local Area Netwk (LAN) Suppt Specialist I 02 734 6 mo. 12/23/96 4827(3291) Local Area
More informationOctopus F100/200/400/650 Octopus F IP-Netpackage Octophon F630 TDM Operating Instructions ================!" ==
Octopus F100/200/400/650 Octopus F IP-Netpackage Octophon F630 TDM Operating Instructions ================!" == Imptant infmation Imptant infmation Q F safety reasons, the telephone should only be supplied
More informationUnderstanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions
A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
More informationDigital Identity Management
Digital Identity Management Techniques and Policies E. Bertino CS Department and ECE School CERIAS Purdue University bertino@cs.purdue.edu Digital Identity Management What is DI? Digital identity (DI)
More informationEnglish ETERNUS CS800 S3. Backup Exec OST Guide
English ETERNUS CS800 S3 Backup Exec OST Guide Edition April 2012 Comments Suggestions Corrections The User Documentation Department would like to know your opinion on this manual. Your feedback helps
More informationCLOUDSERVICES www.signamus.de
CLOUDSERVICES Overview SIGNAMUS Cloudservices The name SIGNAMUS [lat. "we sign"] combines the different AuthentiDate web services. Depending on use cases the different functions of SIGNAMUS Cloudservices
More informationData Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review
Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the
More informationAbout Oracle Universal Online Archive (Oracle UOA)
Oracle Universal Online Archive Release Notes 10g Release 3 (10.2.2.1.0) January 2009 Note: This document is accurate at the time of publication. Oracle will update the documentation periodically after
More informationFact Sheet In-Memory Analysis
Fact Sheet In-Memory Analysis 1 Copyright Yellowfin International 2010 Contents In Memory Overview...3 Benefits...3 Agile development & rapid delivery...3 Data types supported by the In-Memory Database...4
More informationDigital Signature: Efficient, Cut Cost and Manage Risk. Formula for Strong Digital Security
Digital Signature: Efficient, Cut Cost and Manage Risk Formula for Strong Digital Security Signature Rafidah Ariffin A person s name written in a distinctive way, pattern or characteristic as a form of
More informationPerformance with the Oracle Database Cloud
An Oracle White Paper September 2012 Performance with the Oracle Database Cloud Multi-tenant architectures and resource sharing 1 Table of Contents Overview... 3 Performance and the Cloud... 4 Performance
More informationContent Distribution Management
Digitizing the Olympics was truly one of the most ambitious media projects in history, and we could not have done it without Signiant. We used Signiant CDM to automate 54 different workflows between 11
More informationSecurity-Product by IT SOLUTIONS. Email security at the highest level JULIA. E-Mail Security. Cloud Security
Security-Product by IT SOLUTIONS Email security at the highest level Cloud Security JULIA MailOffice E-Mail Security wedn Sign Sig To Global protection for your emails Convenience Statistics module: graphic
More informatione-szigno Digital Signature Application
MICROSEC Software Development Ltd. e-szigno Digital Signature Application Microsec Software Development Ltd. www.e-szigno.hu www.microsec.hu 1031 Budapest, Záhony utca 7. (+36-1) 505-4444 Cg. 01-09-078353
More informationPGP Command Line Version 10.2 Release Notes
PGP Command Line Version 10.2 Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP Command Line. Symantec
More informationPRIMEFLEX vshape gets your data center into shape. Immediately.
PRIMEFLEX vshape gets your data center into shape. Immediately. Just imagine that you could make the complexity of your IT infrastructure simply disappear. Just by installing a reference architecture.
More informationData Sheet FUJITSU Storage ETERNUS LT20 S2 Tape System
Data Sheet FUJITSU Storage ETERNUS LT20 S2 Tape System Data Sheet FUJITSU Storage ETERNUS LT20 S2 Tape System Economy System Ideal for Small Businesses and Branch Offices ETERNUS LT Tape Storage The affordable
More informationDNSSEC Policy and Practice Statement.amsterdam
DNSSEC Policy and Practice Statement.amsterdam Contact T +31 26 352 55 00 support@sidn.nl www.sidn.nl Offices Meander 501 6825 MD Arnhem Mailing address Postbus 5022 6802 EA Arnhem May 24, 2016 Public
More informationproprietary stream processi technology ena es large amounts of data to be processed in real real-time and analyzed quickly.
Datasheet Fujitsu Interstage Big Data Complex Event Processing Server V1 V1.0 Datasheet Fujitsu Interstage Big Data Complex Event Processing Server V1.0 High--Performance Performance Complex Event Processing
More informationDocumentation. HiPath 500, HiPath 3000, HiPath 5000 OpenStage 30 T. User Guide. Communication for the open minded
Documentation HiPath 500, HiPath 3000, HiPath 5000 OpenStage 30 T User Guide Communication f the open minded Siemens Enterprise Communications www.siemens-enterprise.com Imptant infmation Imptant infmation
More informationSecurity Target (ST)
Security Target (ST) Electronic Signature Application BKK OPENLiMiT base components 2.0 Version 2.0.2.1 Certification ID: BSI-DSZ-CC-0367 OPENLiMiT SignCubes AG Zuger Str. 76 B 6411 Baar Switzerland for
More informationCertificate SAP INTEGRATION CERTIFICATION
Certificate SAP INTEGRATION CERTIFICATION SAP SE hereby confirms that the enterprise storage solution E-Series of the company NetApp Inc. has been certified for operating SAP HANA. This certificate confirms
More informationServer based signature service. Overview
1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...
More informationNAS Storage needs to be purchased; Will not be offered IAAS - Utility SMTP Per SMTP account Per server
Service Category Services UOM Remarks IAAS - Compute Small (1vCPU 2GB vram) per VM IAAS - Compute Medium (2vCPU 4GB vram) per VM IAAS - Compute Large (4vCPU 8GB vram) per VM IAAS - Compute XLarge (8vCPU
More informationPatterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
More informationGS8. Modular gateway. Benefits. Description. Key Features
Modular gateway Benefits Connects directly to IP analog PBX to simplify wiring Connects to traditional phone systems with analog circuits Compatible with open standards SIP netwks Connect to wireless and
More informationAvaya 3901, 3902, 3903, and 3904 Digital Deskphones User Guide. Avaya Communication Server 1000
Avaya 3901, 3902, 3903, and 3904 Digital Deskphones User Guide Avaya Communication Server 1000 Document Status: Standard Document Version: 02.01 Part Code: NN42370-107 Date: March 2013 2013 Avaya Inc.
More informationWhite Paper DocuWare Cloud. Version 2.0
White Paper DocuWare Cloud Version 2.0 May 2015 Impressum: DocuWare GmbH Therese-Giehse-Platz 2 D-82110 Germering Telephone: +49.89.89 44 33-0 Fax: +49.89.8 41 99 66 E-Mail: infoline@docuware.com Disclaimer:
More informationTrue Authentication & Compliant Archiving
Fujitsu Forum Munich 2013 True Authentication & Compliant Archiving 0 FUJITSU LIMITED 2013 Fujitsu Technology and Services Vision Create innovation through people Power business and society with information
More informationIntroduction to Red Hat Storage. January, 2012
Introduction to Red Hat Storage January, 2012 1 Today s Speakers 2 Heather Wellington Tom Trainer Storage Program Marketing Manager Storage Product Marketing Manager Red Hat Acquisition of Gluster What
More informationPAYROLL SERIES. Promotional Line: 146, 323
PAYROLL SERIES Occ. Wk Prob. Effective Code No. Class Title Area Area Period Date 0792 Payroll Clerk 04 352 6 mo. 03/25/99 4065 (3293) Payroll Specialist I 04 352 6 mo. 03/25/99 4066 (3293) Payroll Specialist
More informationData Sheet Fujitsu ETERNUS CS800 S4
Data Sheet Fujitsu ETERNUS CS800 S4 Data Protection Appliance: Backup to Disk with Deduplication ETERNUS CS Backup Appliance Many IT departments are looking for solutions that provide faster backup and
More informationSymantec AntiVirus for Network Attached Storage 5.1
Getting Started Symantec AntiVirus for Network Attached Storage 5.1 This chapter includes the following topics: About Symantec AntiVirus for Network Attached Storage 5.1 About documentation What s new
More informationSAFE Digital Signatures in PDF
SAFE Digital Signatures in PDF Ed Chase Adobe Systems Digital Signatures in PDF Digital Signature Document Digital ID Doc Digest Signer s digital identity is bound to document Modifying document invalidates
More informationnovdocx (en) 11 December 2007 XIII XIIIMonitor
XIIIMonit Chapter 58, Understanding the Monit Agent Consoles, on page 965 Chapter 59, Configuring the Monit Agent, on page 969 Chapter 60, Configuring the Monit Application, on page 991 Chapter 61, Using
More informationElectronic Signature. István Zsolt BERTA istvan@berta.hu. Public Key Cryptographic Primi4ves
Electronic Signature István Zsolt BERTA istvan@berta.hu Public Key Cryptographic Primi4ves 1 Electronic Signatures - Contents 1. Public key cryptography primiaves 2. CerAficates, CerAficate AuthoriAes,
More informationbla bla OPEN-XCHANGE Open-Xchange Hardware Needs
bla bla OPEN-XCHANGE Open-Xchange Hardware Needs OPEN-XCHANGE: Open-Xchange Hardware Needs Publication date Wednesday, 8 January version. . Hardware Needs with Open-Xchange.. Overview The purpose of this
More informationORACLE VIRTUAL DESKTOP INFRASTRUCTURE
ORACLE VIRTUAL DESKTOP INFRASTRUCTURE HIGHLY SECURE AND MOBILE ACCESS TO VIRTUALIZED DESKTOP ENVIRONMENTS KEY FEATURES Centralized virtual desktop management and hosting Facilitates access to VDI desktops
More informationAssessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements
/ WHITE PAPER Assessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements The 21 CFR Part 11 rule states that the FDA view is that the risks of falsification, misinterpretation,
More informationPDF Signer User Manual
PDF Signer User Manual Introduction The main function of PDF Signer is to sign PDF documents using X.509 digital certificates. Using this product you can quickly sign multiple PDF files (bulk sign) by
More informationData Sheet FUJITSU Thin Client FUTRO A300
Data Sheet FUJITSU Thin Client FUTRO A300 Data Sheet FUJITSU Thin Client FUTRO A300 Convincing Simplicity The FUJITSU FUTRO A300 is your easy-to-use thin client for highly secure server-based computing
More information