Datasheet FUJITSU Security Solution Compliant Archiving SecDocs V2.3

Size: px
Start display at page:

Download "Datasheet FUJITSU Security Solution Compliant Archiving SecDocs V2.3"

Transcription

1 Datasheet FUJITSU Security Solution Compliant Archiving SecDocs V2.3 An archiving middleware based on open standards which preserves the evidentiary value powered by OpenLimit Digital Long-Term Archiving Archiving documents in digital fmats offers many benefits in comparison to paper-bound archives. Stage is very cost-efficient, and digital documents can be transferred both faster and cheaper. Digital documents do not suffer from physical aging which can render documents unreadable due to paper ink decomposition. Digital archives must fulfill two basic requirements in der to be able to fully replace paper bound archives. First, document fmats need to be guaranteed and stable, to be independent from some particular software f reading. Using standardized fmats like PDF/A and TIFF is a widely accepted choice to fulfill this requirement. In addition, it must be possible to assert that a document has not been modified, and that signatures in the document are authentic. Digital signatures and tamper-proof stage media provide protection, but only f a limited period: Media have a limited lifetime, and digital signatures get weaker over time due to technical progress.. Preserving the Evidentiary Value This is where SecDocs comes into play: It allows archiving documents in a fmat which retains the evidentiary value f arbitrary long retention periods. SecDocs is based on results of the research projects ArchiSig (digital oversigning) and ArchiSafe (secure long-term stage) which have been funded by the German Department of Commerce and which are now part of the Technical Directive TR SecDocs is designed as a middleware component which is used over Web Services (SOAP V1.1). This allows an easy integration into existing IT architectures and processes. As a stage system SecDocs can use ETERNUS CS8000 systems with ViNS NetApp s NAS filer, the SoftWORM feature SnapLock can provide additional protection against accidental intentional manipulation of documents in the archive. The security kernel of SecDocs is provided by OpenLimit, an internationally leading provider of certified software f digital signatures. This component was certified by the German Bundesamt für Sicherheit in der Infmationstechnik (BSI) accding to Common Criteria level EAL4+. The security target is based on the Protection Profile f ArchiSafe-compliant Middleware, but also includes elements from the technical directive TR (Preserving Evidentiary Value of Cryptographically Signed Documents). Page 1 of 5

2 Features and benefits Main features Permanent Protection of Document Integrity Documents are sealed with digital time-stamps Digital signatures f the document are verified Preservation of evidentiary value due to oversigning Interfaces and Open Standards Both archiving and administration is perfmed with SOAP V1.1 web services Access over HTTP(S) Proof of document integrity is done with RFC 4998 compliant evidence recds Documents are sted as XML files Benefits Ptable proof of document integrity, independent of stage location Permanent proof of authenticity, even if cryptographic certificates are no longer valid available Easy integration into existing IT landscape Can be implemented as a Cloud service Document integrity can be verified outside the archive from a copy of the document and a copy of the evidence recd Document types and metadata can be designed as desired Role Concept and Multitenancy Many tenants can use the same archive, completely segregated from each other Permissions f archiving operations can be freely assigned to different roles The archive can be implemented as a central service f several different IP processes Different tasks and responsibilities can be assigned to different business processes Price Concept pay per use License fees depend on number of documents in the archive Certified Security Kernel The components f signature verification and sealing is certified against Common Criteria EAL4+. New in SecDocs V2.3: Archiving big objects Transfer and sealing of objects up to 50GB Extension of use is possible at any time Security certified by BSI Archiving of media data (audio, video) and container objects Page 2 of 5

3 Topics Functional Overview SecDocs archives any type of documents, sealing them with a time stamp which is digitally signed by a time stamping authity. There is no need f a secret key within SecDocs which would need to be protected from unauthized access. F archived and sealed documents, the proof that they have not been tampered with can be perfmed at any time. The use of time stamps instead of conventional digital signatures allows an over-signing as proposed in the ArchiSig concept, preserving the evidentiary value. The security margin of all cryptographic algithms diminishes over time, due to increasing CPU power cryptographic research. This leads to a situation, where digital signatures are no longer tamper-proof. By over-signing the documents with a new time stamp the documents can be re-sealed, befe the iginal time stamp could be fged. The resulting chain of time stamps can be used to prove that every sealing was perfmed at a point in time where the algithm used was sufficiently secure. SecDocs delivers added value f documents which have been digitally signed, too. The algithms used f digital signatures are subject to aging as well and are getting weaker over time. By verifying the signatures while accepting documents f archiving and sealing the verification repts together with the documents, SecDocs preserves the proof of authenticity of digital signatures f the whole retention period. SecDocs stes the time stamps in a standardized fmat of Evidence Recds (RFC 4998). Using an evidence recd, the integrity of a document can be proven independently of the stage location (e.g. on media which are protected against overwriting). A document and the cresponding evidence recd can be retrieved from the document and fwarded to third parties. Even without access to the archive, and without examining the security management of the archive, the third party can verify the integrity of the document since the time of the first sealing, using just the document and the evidence recd. Interfaces and Open Standards SecDocs is an autonomous component, designed to be used over the net and integrated into existing IT processes. Usage f archiving and sealing of documents, and the administration during operation are perfmed over web services interfaces (SOAP 1.1). High availability and higher archiving throughput can be achieved by connecting me than one server to the same archive. The archived documents are sted on a NFS file system, the WORM feature NetApp SnapLock can optionally be activated. F an efficient management of internal data SecDocs needs a data base (Oracle 11g Release 2 MySQL as of version 5.5). The operation of SecDocs with web services and the HTTP(S) transpt protocol enable SecDocs to perfm as a central archiving service. The SOAP applications can be running on the same server, within the same internal netwk, they can be distributed wld-wide. An authentication function makes sure that only authized users have access to a SecDocs archive. To archive documents in SecDocs, customer specific XML schemas can be registered. Every incoming document is validated against the registered schemas, during this process customer-specified elements are evaluated (meta data, digital signatures). Binary content, e.g. PDF-A files, can be embedded in Base64-encoding. SecDocs detects any digital signatures which are embedded in PDF documents, these are validated in the same way as attached signatures. F searching within the archive, SecDocs provides SPARQL, a standardized query language which is designed f web services. Role Concept and Multitenancy In one SecDocs archive, documents of several tenants can be archived, totally segregated from each other. F every tenant, there is a role of an administrat, who e.g. can register document types, and define different ganizations with separate archiving locations. Within each ganization, the operations of the archiving service can be freely distributed to different roles, allowing f example to assign a special role f deleting documents from the archive. Transparentes Pricing concept: Pay per use The licensing scheme f SecDocs reflects the active usage of an archive, counting documents when they are added. Therefe, extending the use f new ganisatiions processes is easily possible. On the other hand, running expenses are reduced if no new documents are added to the archive, even if the current set of documents remains accessible. Certified Security Kernel The security kernel of SecDocs is certified based on the Common Criteria Protection Profile f an ArchiSafe Compliant Middleware f Enabling the Long-Term Preservation of Electronic Documents accding to EAL4+. Certificates issued by the German Bundesamt für Sicherheit in der Infmationstechnik (BSI) are recognized internationally and assert the confmance with the protection profile. Page 3 of 5

4 Technical Details Technical Requirements Hardware Server Process RAM Stage Stage requirement after installation Technical Requirements Software Operating System Data base Interfaces Archiving Document Types Administration Suppted Algithms Documentation x86 Server, 64 Bit At least 2GHz At least 16GB NetApp NAS filer, optionally with SnapLock ETERNUS CS8000 with ViNS 1.5GB (without data base) Red Hat Enterprise Linux 6 update 5 64 Bit (AMD64/x64) newer SuSE SLES 11 SP3 64bit (AMD64/x64) newer Oracle 11g Release 2 Standard Edition Enterprise Edition MySQL as of version Web services with SOAP 1.1 over HTTP(S) Any, per customer specified XML schemas Web services with SOAP 1.1 over HTTP(S) Hash Algithmen SHA-1 (no longer suited f QES), SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD (no longer suited f QES) Signature Types CMS, PKCS#7, PKCS#1, DSA, ECDSA, XML-DSIG, Timestamps Padding Methods PSS-Padding, PKCS#1 Version 1.5, DinSig-Padding SecDocs V2.3 User Guide SecDocs V2.3 Installation Guide SecDocs V2.3 Return Values OpenLimit Middleware V3 Server Administration Guide OpenLimit Middleware V3 Server Additional Infmation OpenLimit Middleware MigSafe/OverSign Return Values Conditions Ordering and Delivery This software product is supplied to the customer under the conditions f the use of software products against installments a single payment This software product can be obtained from your local Fujitsu regional office. Page 4 of 5

5 Me infmation Fujitsu products, solutions & services Products In addition to Compliant Archiving, Fujitsu offers a full ptfolio of other computing products: Stage systems: ETERNUS Server: PRIMERGY, PRIMEQUEST, Fujitsu SPARC M10, BS2000 Mainframe Client Computing Devices: LIFEBOOK, STYLISTIC, ESPRIMO, FUTRO, CELSIUS Peripherals: Fujitsu Displays, Accessies Software Netwk Solutions Infrastructure Solutions are customer offerings created by bringing Fujitsu s products, services and technologies together with those from partners. Industry Solutions are tailed to meet the needs of specific verticals. Business and Technology Solutions provide a variety of technologies developed to tackle specific business issues such as security and sustainability, across many verticals. Services Application Services suppt the development, integration, testing, deployment and on-going management of both custom developed and packaged applications. Business Services respond to the challenge of planning, delivering and operating IT in a complex and changing IT environment. Managed Infrastructure Services enable customers to deliver the optimal IT environment to meet their needs. Me infmation To learn me about Fujitsu, please contact your Fujitsu sales representative, Fujitsu business partner, visit our website. Archiving Fujitsu green policy innovation Fujitsu Green Policy Innovation is our wldwide project f reducing burdens on the environment. Using our global knowhow, we aim to resolve issues of environmental energy efficiency through IT. Please find further infmation at: Copyright 2015 Fujitsu Technology Solutions GmbH Fujitsu, the Fujitsu logo and SecDocs are trademarks registered trademarks of Fujitsu Limited in Japan and other countries. Disclaimer Technical data subject to modification and delivery subject to availability. Any liability that the data and illustrations are complete, actual crect is excluded. Designations may be trademarks and/ copyrights of the respective manufacturer, the use of which by third parties f their own purposes may infringe the rights of such owner. Contact Fujitsu Technology Solutions GmbH Mies-van-der-Rohe-Straße 8, München Website: EN Page 5 of 5

The Challenge Handling a lot of paper documents

The Challenge Handling a lot of paper documents The Challenge Handling a lot of paper documents Handling a lot of paper documents is becoming increasingly challenging in a company. There are two typical scenarios. A lot of documents are received, created

More information

Datasheet FUJITSU Software ServerView Cloud Monitoring Manager V1.0

Datasheet FUJITSU Software ServerView Cloud Monitoring Manager V1.0 Datasheet FUJITSU Software ServerView Cloud Monitoring Manager V1.0 Datasheet FUJITSU Software ServerView Cloud Monitoring Manager V1.0 A Monitoring Cloud Service for Enterprise OpenStack Systems Cloud

More information

Datasheet Fujitsu Cloud Infrastructure Management Software V1

Datasheet Fujitsu Cloud Infrastructure Management Software V1 Datasheet Fujitsu Cloud Infrastructure Management Software V1 Efficient infrastructure utilization, private cloud creation support, and reduced administration. Cloud Foundation for Iaas Fujitsu supports

More information

The Advantages of Using Fujitsu As a Backup and Archiving Software

The Advantages of Using Fujitsu As a Backup and Archiving Software The Solution for IT Archives A Guideline for Trusted long-term Storage with Fujitsu IT Archiving Trusted long-term Storage Archiving for compliance purposes These days, paper archives are kept in many

More information

Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop

Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop is a powerful and scalable platform analyzing big data volumes at high velocity FUJITSU Integrated System PRIMEFLEX Your fast track to datacenter

More information

Datasheet FUJITSU Software Systemwalker Runbook Automation V15

Datasheet FUJITSU Software Systemwalker Runbook Automation V15 Datasheet FUJITSU Software Systemwalker Runbook Automation V15 Automation of various data center operations and cloud operation tasks as operations flows By automating the operation tasks that used to

More information

Datasheet FUJITSU Software Systemwalker Software Configuration Manager V15

Datasheet FUJITSU Software Systemwalker Software Configuration Manager V15 Datasheet FUJITSU Software Systemwalker Software Configuration Manager V15 Patch application and automatic collection of information about cloud resources In modern company IT departments, virtualization

More information

Data Sheet FUJITSU Support Pack Hardware

Data Sheet FUJITSU Support Pack Hardware Data Sheet FUJITSU Support Pack Hardware Maintenance Services for IT Hardware INTRODUCTION Fujitsu offers - with its Fujitsu Support Pack Hardware - support services for hardware which cover diagnostics

More information

Datasheet FUJITSU Cloud Monitoring Service

Datasheet FUJITSU Cloud Monitoring Service Datasheet FUJITSU Cloud Monitoring Service FUJITSU Cloud Monitoring Service powered by CA Technologies offers a single, unified interface for tracking all the vital, dynamic resources your business relies

More information

Datasheet Fujitsu ETERNUS LT20 S2

Datasheet Fujitsu ETERNUS LT20 S2 Datasheet Fujitsu ETERNUS LT20 S2 Economy System Ideal for Small Businesses and Branch Offices ETERNUS LT TAPE LIBRARY SYSTEM The affordable ETERNUS LT tape systems offer impressive scalability and reliability.

More information

Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop

Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop Datasheet FUJITSU Integrated System PRIMEFLEX for Hadoop FUJITSU Integrated System PRIMEFLEX for Hadoop is a powerful and scalable platform analyzing big data volumes at high velocity FUJITSU Integrated

More information

Data Sheet Fujitsu ETERNUS CS High End V5.1 Data Protection Appliance

Data Sheet Fujitsu ETERNUS CS High End V5.1 Data Protection Appliance Data Sheet Fujitsu ETERNUS CS High End V5.1 Data Protection Appliance Radically simplifying data protection ETERNUS CS Data Protection Appliances The Fujitsu ETERNUS CS storage solutions, comprising ETERNUS

More information

Datasheet. FUJITSU Storage ETERNUS SF Storage Cruiser V16.0 ETERNUS SF AdvancedCopy Manager V16.0 ETERNUS SF Express V16.0

Datasheet. FUJITSU Storage ETERNUS SF Storage Cruiser V16.0 ETERNUS SF AdvancedCopy Manager V16.0 ETERNUS SF Express V16.0 Datasheet FUJITSU Storage ETERNUS SF Storage Cruiser V16.0 ETERNUS SF AdvancedCopy Manager V16.0 ETERNUS SF Express V16.0 Central console and advanced management functions for ETERNUS DX storage environments..

More information

System Requirements. SAS Profitability Management 2.2. Deployment

System Requirements. SAS Profitability Management 2.2. Deployment System Requirements SAS Profitability Management 2.2 This document provides the requirements f installing and running SAS Profitability Management 2.2 software. You must update your computer to meet these

More information

White Paper PalmSecure truedentity

White Paper PalmSecure truedentity White Paper PalmSecure truedentity Fujitsu PalmSecure truedentity is used for mutual service and user authentication. The user's identity always remains in the possession of the user. A truedentity server

More information

RSA Digital Certificate Solution

RSA Digital Certificate Solution RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong

More information

Oracle Primavera Portfolio Management 9.0

Oracle Primavera Portfolio Management 9.0 Primavera Ptfolio Management Oracle Primavera Ptfolio Management 9.0 This file provides the following infmation about Primavera Ptfolio Management: Technical Suppt DVD Content Technical Requirements and

More information

In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), REGULATION

In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), REGULATION In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), the Minister of Telecommunications and Information Society hereby promulgates REGULATION

More information

OB10 - Digital Signing and Verification

OB10 - Digital Signing and Verification Global Headquarters 90 Fetter Lane London EC4A 1EN Tel: +44 (0) 870 165 7410 Fax: +44 (0) 207 240 2696 OB10 - Digital Signing and Verification www.ob10.com Version 2.4 March 2013 Summary In order to comply

More information

How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server

How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server How to Time Stamp PDF and Microsoft Office 2010/2013 Documents with the Time Stamp Server Introduction Time stamping is an important mechanism for the long-term preservation of digital signatures, time

More information

Fujitsu Interstage Big Data Parallel Processing Server V1.0

Fujitsu Interstage Big Data Parallel Processing Server V1.0 Datasheet Fujitsu Interstage Big Data Pa Parallel lel Processing Server V1.0 V1 Datasheet Fujitsu Interstage Big Data Parallel Processing Server V1.0 Availability vailability and processing performance

More information

outdoor units indoor units VRF network systems Max. controllable Max. controllable 1,600 Max. controllable

outdoor units indoor units VRF network systems Max. controllable Max. controllable 1,600 Max. controllable Software Energy Saving & Various Managements Large buildings multiple buildings can be batch controlled and monited. System Controller meets the diverse needs f building air conditioning from detailed

More information

Managed Solution Center s TSM Managed Services FAQ

Managed Solution Center s TSM Managed Services FAQ Managed Solution Center s TSM Managed Services FAQ Frequently Asked Questions 1. Will this invalidate our IBM Warranty / Maintenance? No. IBM warranty will not be affected as TSM code is not being modified

More information

System Requirements and Platform Support Guide

System Requirements and Platform Support Guide Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Common Criteria Protection Profile. ArchiSafe Compliant Middleware (ACM_PP)

Common Criteria Protection Profile. ArchiSafe Compliant Middleware (ACM_PP) Common Criteria Protection Profile for an ArchiSafe Compliant Middleware for Enabling the Long-Term Preservation of Electronic Documents (ACM_PP) Version Date Author Remarks 1.0.0 31/10/08 Dr. Wolf Zimmer

More information

ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM

ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM W H I T E P A P E R ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM This white paper is written for senior executives,

More information

Automation for Electronic Forms, Documents and Business Records (NA)

Automation for Electronic Forms, Documents and Business Records (NA) Automation for Electronic Forms, Documents and Business Records (NA) White Paper Learn more. www.alphatrust.com Automation for Electronic Forms, Documents and Business Records (NA) White Paper About AlphaTrust

More information

ArchiSafe. The Archive with Legal Compliance. Dir. & Prof. Dr. Siegfried Hackel. Federal Ministry of Economics and Technology

ArchiSafe. The Archive with Legal Compliance. Dir. & Prof. Dr. Siegfried Hackel. Federal Ministry of Economics and Technology ArchiSafe The Archive with Legal Compliance Federal Ministry of Economics and Technology Dir. & Prof. Dr. Siegfried Hackel Vers_E_2008-03-13 Page 1 The PTB... is Germany s national metrology institute

More information

AGENDA ITEM 15-16 : ELECTRONIC SIGNATURE

AGENDA ITEM 15-16 : ELECTRONIC SIGNATURE SCREENING CHAPTER 10 Country Session: 13- Content Legislation Main Points of Turkish Electronic Signature Legislation Electronic Certificate Service Providers and Market Standardization Aspect of Electronic

More information

Configuring NetFlow on Cisco ASR 9000 Series Aggregation Services Router

Configuring NetFlow on Cisco ASR 9000 Series Aggregation Services Router Configuring NetFlow on Cisco ASR 9000 Series Aggregation Services Router This module describes the configuration of NetFlow on the Cisco ASR 9000 Series Aggregation Services Router. A NetFlow flow is a

More information

SWIFTNet Online Operations Manager

SWIFTNet Online Operations Manager Messaging SWIFTNet 7.0 SWIFTNet Online Operations Manager Quick Overview December 2010 Table of Contents Preface... 3 1 Introduction... 4 1.1 Background... 4 1.2 SWIFTNet Online Operations Manager... 4

More information

TechNote 0006: Digital Signatures in PDF/A-1

TechNote 0006: Digital Signatures in PDF/A-1 TechNote 0006: Digital Signatures in PDF/A-1 Digital signatures are primarily used to check the integrity of the signed part of the document. They also can be used to authenticate the signer s identity

More information

Data Sheet FUJITSU Storage ETERNUS CS800 S5

Data Sheet FUJITSU Storage ETERNUS CS800 S5 Data Sheet FUJITSU Storage ETERNUS CS800 S5 Data Sheet FUJITSU Storage ETERNUS CS800 S5 Data Protection Appliance: Backup to Disk with Deduplication ETERNUS CS Backup Appliance The ETERNUS CS portfolio

More information

Additional Information. OpenLimit Middleware Version 3 Server Product Version: 1.2 Help Manual. Date: 23.03.2012 Document version: 1.

Additional Information. OpenLimit Middleware Version 3 Server Product Version: 1.2 Help Manual. Date: 23.03.2012 Document version: 1. Additional Information OpenLimit Middleware Version 3 Server Product Version: 1.2 Help Manual Date: 23.03.2012 Document version: 1.1 OpenLimit SignCubes AG 2012 This documentation is the intellectual property

More information

ACE Management Server Deployment Guide VMware ACE 2.0

ACE Management Server Deployment Guide VMware ACE 2.0 Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.

More information

How To Backup To Disk With Deduplication On An Fujitsu Ecson Cser800 S4 Data Protection Appliance

How To Backup To Disk With Deduplication On An Fujitsu Ecson Cser800 S4 Data Protection Appliance Data Sheet Fujitsu ETERNUS CS800 S4 Data Protection Appliance: Backup to Disk with Deduplication ETERNUS CS Backup Appliance Many IT departments are looking for solutions that provide faster backup and

More information

d3 Document Management Solution

d3 Document Management Solution d3 Document Management Solution Asseco SEE is the d.velop Competence Center for the region. In addition to providing analysis, implementation and support services, Asseco also offers training courses for

More information

Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08

Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08 Online signature API Version 0.20, 2015-04-08 Terms used in this document Onnistuu.fi, the website https://www.onnistuu.fi/ Client, online page or other system using the API provided by Onnistuu.fi. End

More information

Secure cloud access system using JAR ABSTRACT:

Secure cloud access system using JAR ABSTRACT: Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the

More information

ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification

ETSI TS 102 778 V1.1.1 (2009-04) Technical Specification TS 102 778 V1.1.1 (2009-04) Technical Specification Electronic Signatures and Infrastructures (ESI); PDF Advanced Electronic Signature Profiles; CMS Profile based on ISO 32000-1 2 TS 102 778 V1.1.1 (2009-04)

More information

HOB Remote Desktop VPN Secure access for remote workers and business partners to your enterprise network

HOB Remote Desktop VPN Secure access for remote workers and business partners to your enterprise network HOB GmbH & Co. KG Schwadermühlstr. 3 90556 Cadolzburg Tel: +49 9103 / 715-0 Fax: +49 9103 / 715-271 E-Mail: support@hobsoft.com Internet: www.hobsoft.com HOB Remote Desktop VPN Secure access for remote

More information

Fact Sheet Fujitsu Global Cloud Platform Infrastructure as a Service (Iaas)

Fact Sheet Fujitsu Global Cloud Platform Infrastructure as a Service (Iaas) Fact Sheet Fujitsu Global Cloud Platform Infrastructure as a Service (Iaas) Flexible and Secure IT that Stays Aligned with Your Business You have a business to run and a hugely complex infrastructure to

More information

Datasheet FUJITSU Storage ETERNUS LT250 TAPE LIBRARY

Datasheet FUJITSU Storage ETERNUS LT250 TAPE LIBRARY Datasheet FUJITSU Storage ETERNUS LT250 TAPE LIBRARY ETERNUS LT TAPE LIBRARY SYSTEM ETERNUS LT tape library systems from Fujitsu have impressive scalability, reliability and technical brilliance. They

More information

System Requirements. SAS Profitability Management 2.21. Deployment

System Requirements. SAS Profitability Management 2.21. Deployment System Requirements SAS Profitability Management 2.2 This document provides the requirements for installing and running SAS Profitability Management. You must update your computer to meet the minimum requirements

More information

Contents Overview of RD Web Access... 2. What is RD Web Access?... 2 What are the benefits of RD Web Access versus thin client?...

Contents Overview of RD Web Access... 2. What is RD Web Access?... 2 What are the benefits of RD Web Access versus thin client?... Purpose & Scope The purpose of this document is to provide business advantages, system administrat installation, and end-user access procedures f the use of Remote Desktop (RD) Web Access f Instrument

More information

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved

ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance esignature Standards Framework Certificate Authority Time-stamping Signing Servers Validation

More information

How To Use An Fujitsu Ces800 S5 Backup Appliance

How To Use An Fujitsu Ces800 S5 Backup Appliance Data Sheet FUJITSU Storage ETERNUS CS800 S5 Data Sheet FUJITSU Storage ETERNUS CS800 S5 Data Protection Appliance: Backup to Disk with Deduplication ETERNUS CS Backup Appliance The FUJITSU Storage ETERNUS

More information

Digital Signature Verification using Historic Data

Digital Signature Verification using Historic Data Digital Signature Verification using Historic Data Digital signatures are now relatively common; however historic verification of digitally signed data is not so widely understood. As more data is held

More information

Cisco ACE Web Application Firewall

Cisco ACE Web Application Firewall Cisco ACE Web Application Firewall Product Overview The Cisco ACE Web Application Firewall (Figure 1) is the newest component of the Cisco Application Control Engine (ACE) family of products. Many ganizations

More information

Cloud Computing Risks

Cloud Computing Risks ISSA PREEMINENT TRUSTED GLOBAL INFORMATION SECURITY COMMUNITY Cloud Computing Risks By Richard Mosher ISSA member, Kansas City, USA Chapter Cloud computing risks still include data privacy, availability,

More information

Identikey Server Performance and Deployment Guide 3.1

Identikey Server Performance and Deployment Guide 3.1 Identikey Server Performance and Deployment Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is'

More information

vrealize Business System Requirements Guide

vrealize Business System Requirements Guide vrealize Business System Requirements Guide vrealize Business Advanced and Enterprise 8.2.1 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Taking the Open Source Road

Taking the Open Source Road The National Security Agency s Review of Emerging Technologies Taking the Open Source Road Raising the Bar in Operating System Security Cryptographic Binding of Metadata Providing a Secure Foundation with

More information

Description of the Technical Component:

Description of the Technical Component: Confirmation concerning Products for Qualified Electronic Signatures according to 15 Sec. 7 S. 1, 17 Sec. 4 German Electronic Signature Act 1 and 11 Sec. 2 and 15 German Electronic Signature Ordinance

More information

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Dell Statistica. Statistica Document Management System (SDMS) Requirements Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

DATASHEET FUJITSU ETERNUS LT250 TAPE LIBRARY

DATASHEET FUJITSU ETERNUS LT250 TAPE LIBRARY DATASHEET FUJITSU ETERNUS LT250 TAPE LIBRARY HIGHLY RELIABLE, LARGE-CAPACITY TAPE LIBRARY FOR CONSOLIDATED BACKUP OF MID-RANGE SYSTEM. ETERNUS LT TAPE LIBRARY SYSTEM ETERNUS LT tape library systems from

More information

Clustering for Load Balancing and Fail Over

Clustering for Load Balancing and Fail Over Clustering f Balancing and Fail Over Last updated: 16/07/2015 Table of contents 1 Introduction...3 2 HTTP-Based Scenarios...5 2.1 Leverage LB Stickiness Options 1.A...5 2.1.1 Option 1.A.1 IP- Based...5

More information

LOCAL AREA NETWORK (LAN) SUPPORT SERIES

LOCAL AREA NETWORK (LAN) SUPPORT SERIES LOCAL AREA NETWORK (LAN) SUPPORT SERIES Occ. Wk Prob. Effective Code No. Class Title Area Area Period Date 4826(3291) Local Area Netwk (LAN) Suppt Specialist I 02 734 6 mo. 12/23/96 4827(3291) Local Area

More information

Octopus F100/200/400/650 Octopus F IP-Netpackage Octophon F630 TDM Operating Instructions ================!" ==

Octopus F100/200/400/650 Octopus F IP-Netpackage Octophon F630 TDM Operating Instructions ================! == Octopus F100/200/400/650 Octopus F IP-Netpackage Octophon F630 TDM Operating Instructions ================!" == Imptant infmation Imptant infmation Q F safety reasons, the telephone should only be supplied

More information

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions

Understanding Digital Certificates & Secure Sockets Layer A Fundamental Requirement for Internet Transactions A Fundamental Requirement for Internet Transactions May 2007 Copyright 2007 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.

More information

Digital Identity Management

Digital Identity Management Digital Identity Management Techniques and Policies E. Bertino CS Department and ECE School CERIAS Purdue University bertino@cs.purdue.edu Digital Identity Management What is DI? Digital identity (DI)

More information

English ETERNUS CS800 S3. Backup Exec OST Guide

English ETERNUS CS800 S3. Backup Exec OST Guide English ETERNUS CS800 S3 Backup Exec OST Guide Edition April 2012 Comments Suggestions Corrections The User Documentation Department would like to know your opinion on this manual. Your feedback helps

More information

CLOUDSERVICES www.signamus.de

CLOUDSERVICES www.signamus.de CLOUDSERVICES Overview SIGNAMUS Cloudservices The name SIGNAMUS [lat. "we sign"] combines the different AuthentiDate web services. Depending on use cases the different functions of SIGNAMUS Cloudservices

More information

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review

Data Sheet: Archiving Symantec Enterprise Vault Discovery Accelerator Accelerate e-discovery and simplify review Accelerate e-discovery and simplify review Overview provides IT/Legal liaisons, investigators, lawyers, paralegals and HR professionals the ability to search, preserve and review information across the

More information

About Oracle Universal Online Archive (Oracle UOA)

About Oracle Universal Online Archive (Oracle UOA) Oracle Universal Online Archive Release Notes 10g Release 3 (10.2.2.1.0) January 2009 Note: This document is accurate at the time of publication. Oracle will update the documentation periodically after

More information

Fact Sheet In-Memory Analysis

Fact Sheet In-Memory Analysis Fact Sheet In-Memory Analysis 1 Copyright Yellowfin International 2010 Contents In Memory Overview...3 Benefits...3 Agile development & rapid delivery...3 Data types supported by the In-Memory Database...4

More information

Digital Signature: Efficient, Cut Cost and Manage Risk. Formula for Strong Digital Security

Digital Signature: Efficient, Cut Cost and Manage Risk. Formula for Strong Digital Security Digital Signature: Efficient, Cut Cost and Manage Risk Formula for Strong Digital Security Signature Rafidah Ariffin A person s name written in a distinctive way, pattern or characteristic as a form of

More information

Performance with the Oracle Database Cloud

Performance with the Oracle Database Cloud An Oracle White Paper September 2012 Performance with the Oracle Database Cloud Multi-tenant architectures and resource sharing 1 Table of Contents Overview... 3 Performance and the Cloud... 4 Performance

More information

Content Distribution Management

Content Distribution Management Digitizing the Olympics was truly one of the most ambitious media projects in history, and we could not have done it without Signiant. We used Signiant CDM to automate 54 different workflows between 11

More information

Security-Product by IT SOLUTIONS. Email security at the highest level JULIA. E-Mail Security. Cloud Security

Security-Product by IT SOLUTIONS. Email security at the highest level JULIA. E-Mail Security. Cloud Security Security-Product by IT SOLUTIONS Email security at the highest level Cloud Security JULIA MailOffice E-Mail Security wedn Sign Sig To Global protection for your emails Convenience Statistics module: graphic

More information

e-szigno Digital Signature Application

e-szigno Digital Signature Application MICROSEC Software Development Ltd. e-szigno Digital Signature Application Microsec Software Development Ltd. www.e-szigno.hu www.microsec.hu 1031 Budapest, Záhony utca 7. (+36-1) 505-4444 Cg. 01-09-078353

More information

PGP Command Line Version 10.2 Release Notes

PGP Command Line Version 10.2 Release Notes PGP Command Line Version 10.2 Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP Command Line. Symantec

More information

PRIMEFLEX vshape gets your data center into shape. Immediately.

PRIMEFLEX vshape gets your data center into shape. Immediately. PRIMEFLEX vshape gets your data center into shape. Immediately. Just imagine that you could make the complexity of your IT infrastructure simply disappear. Just by installing a reference architecture.

More information

Data Sheet FUJITSU Storage ETERNUS LT20 S2 Tape System

Data Sheet FUJITSU Storage ETERNUS LT20 S2 Tape System Data Sheet FUJITSU Storage ETERNUS LT20 S2 Tape System Data Sheet FUJITSU Storage ETERNUS LT20 S2 Tape System Economy System Ideal for Small Businesses and Branch Offices ETERNUS LT Tape Storage The affordable

More information

DNSSEC Policy and Practice Statement.amsterdam

DNSSEC Policy and Practice Statement.amsterdam DNSSEC Policy and Practice Statement.amsterdam Contact T +31 26 352 55 00 support@sidn.nl www.sidn.nl Offices Meander 501 6825 MD Arnhem Mailing address Postbus 5022 6802 EA Arnhem May 24, 2016 Public

More information

proprietary stream processi technology ena es large amounts of data to be processed in real real-time and analyzed quickly.

proprietary stream processi technology ena es large amounts of data to be processed in real real-time and analyzed quickly. Datasheet Fujitsu Interstage Big Data Complex Event Processing Server V1 V1.0 Datasheet Fujitsu Interstage Big Data Complex Event Processing Server V1.0 High--Performance Performance Complex Event Processing

More information

Documentation. HiPath 500, HiPath 3000, HiPath 5000 OpenStage 30 T. User Guide. Communication for the open minded

Documentation. HiPath 500, HiPath 3000, HiPath 5000 OpenStage 30 T. User Guide. Communication for the open minded Documentation HiPath 500, HiPath 3000, HiPath 5000 OpenStage 30 T User Guide Communication f the open minded Siemens Enterprise Communications www.siemens-enterprise.com Imptant infmation Imptant infmation

More information

Security Target (ST)

Security Target (ST) Security Target (ST) Electronic Signature Application BKK OPENLiMiT base components 2.0 Version 2.0.2.1 Certification ID: BSI-DSZ-CC-0367 OPENLiMiT SignCubes AG Zuger Str. 76 B 6411 Baar Switzerland for

More information

Certificate SAP INTEGRATION CERTIFICATION

Certificate SAP INTEGRATION CERTIFICATION Certificate SAP INTEGRATION CERTIFICATION SAP SE hereby confirms that the enterprise storage solution E-Series of the company NetApp Inc. has been certified for operating SAP HANA. This certificate confirms

More information

Server based signature service. Overview

Server based signature service. Overview 1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...

More information

NAS Storage needs to be purchased; Will not be offered IAAS - Utility SMTP Per SMTP account Per server

NAS Storage needs to be purchased; Will not be offered IAAS - Utility SMTP Per SMTP account Per server Service Category Services UOM Remarks IAAS - Compute Small (1vCPU 2GB vram) per VM IAAS - Compute Medium (2vCPU 4GB vram) per VM IAAS - Compute Large (4vCPU 8GB vram) per VM IAAS - Compute XLarge (8vCPU

More information

Patterns for Secure Boot and Secure Storage in Computer Systems

Patterns for Secure Boot and Secure Storage in Computer Systems Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de

More information

GS8. Modular gateway. Benefits. Description. Key Features

GS8. Modular gateway. Benefits. Description. Key Features Modular gateway Benefits Connects directly to IP analog PBX to simplify wiring Connects to traditional phone systems with analog circuits Compatible with open standards SIP netwks Connect to wireless and

More information

Avaya 3901, 3902, 3903, and 3904 Digital Deskphones User Guide. Avaya Communication Server 1000

Avaya 3901, 3902, 3903, and 3904 Digital Deskphones User Guide. Avaya Communication Server 1000 Avaya 3901, 3902, 3903, and 3904 Digital Deskphones User Guide Avaya Communication Server 1000 Document Status: Standard Document Version: 02.01 Part Code: NN42370-107 Date: March 2013 2013 Avaya Inc.

More information

White Paper DocuWare Cloud. Version 2.0

White Paper DocuWare Cloud. Version 2.0 White Paper DocuWare Cloud Version 2.0 May 2015 Impressum: DocuWare GmbH Therese-Giehse-Platz 2 D-82110 Germering Telephone: +49.89.89 44 33-0 Fax: +49.89.8 41 99 66 E-Mail: infoline@docuware.com Disclaimer:

More information

True Authentication & Compliant Archiving

True Authentication & Compliant Archiving Fujitsu Forum Munich 2013 True Authentication & Compliant Archiving 0 FUJITSU LIMITED 2013 Fujitsu Technology and Services Vision Create innovation through people Power business and society with information

More information

Introduction to Red Hat Storage. January, 2012

Introduction to Red Hat Storage. January, 2012 Introduction to Red Hat Storage January, 2012 1 Today s Speakers 2 Heather Wellington Tom Trainer Storage Program Marketing Manager Storage Product Marketing Manager Red Hat Acquisition of Gluster What

More information

PAYROLL SERIES. Promotional Line: 146, 323

PAYROLL SERIES. Promotional Line: 146, 323 PAYROLL SERIES Occ. Wk Prob. Effective Code No. Class Title Area Area Period Date 0792 Payroll Clerk 04 352 6 mo. 03/25/99 4065 (3293) Payroll Specialist I 04 352 6 mo. 03/25/99 4066 (3293) Payroll Specialist

More information

Data Sheet Fujitsu ETERNUS CS800 S4

Data Sheet Fujitsu ETERNUS CS800 S4 Data Sheet Fujitsu ETERNUS CS800 S4 Data Protection Appliance: Backup to Disk with Deduplication ETERNUS CS Backup Appliance Many IT departments are looking for solutions that provide faster backup and

More information

Symantec AntiVirus for Network Attached Storage 5.1

Symantec AntiVirus for Network Attached Storage 5.1 Getting Started Symantec AntiVirus for Network Attached Storage 5.1 This chapter includes the following topics: About Symantec AntiVirus for Network Attached Storage 5.1 About documentation What s new

More information

SAFE Digital Signatures in PDF

SAFE Digital Signatures in PDF SAFE Digital Signatures in PDF Ed Chase Adobe Systems Digital Signatures in PDF Digital Signature Document Digital ID Doc Digest Signer s digital identity is bound to document Modifying document invalidates

More information

novdocx (en) 11 December 2007 XIII XIIIMonitor

novdocx (en) 11 December 2007 XIII XIIIMonitor XIIIMonit Chapter 58, Understanding the Monit Agent Consoles, on page 965 Chapter 59, Configuring the Monit Agent, on page 969 Chapter 60, Configuring the Monit Application, on page 991 Chapter 61, Using

More information

Electronic Signature. István Zsolt BERTA istvan@berta.hu. Public Key Cryptographic Primi4ves

Electronic Signature. István Zsolt BERTA istvan@berta.hu. Public Key Cryptographic Primi4ves Electronic Signature István Zsolt BERTA istvan@berta.hu Public Key Cryptographic Primi4ves 1 Electronic Signatures - Contents 1. Public key cryptography primiaves 2. CerAficates, CerAficate AuthoriAes,

More information

bla bla OPEN-XCHANGE Open-Xchange Hardware Needs

bla bla OPEN-XCHANGE Open-Xchange Hardware Needs bla bla OPEN-XCHANGE Open-Xchange Hardware Needs OPEN-XCHANGE: Open-Xchange Hardware Needs Publication date Wednesday, 8 January version. . Hardware Needs with Open-Xchange.. Overview The purpose of this

More information

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE

ORACLE VIRTUAL DESKTOP INFRASTRUCTURE ORACLE VIRTUAL DESKTOP INFRASTRUCTURE HIGHLY SECURE AND MOBILE ACCESS TO VIRTUALIZED DESKTOP ENVIRONMENTS KEY FEATURES Centralized virtual desktop management and hosting Facilitates access to VDI desktops

More information

Assessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements

Assessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements / WHITE PAPER Assessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements The 21 CFR Part 11 rule states that the FDA view is that the risks of falsification, misinterpretation,

More information

PDF Signer User Manual

PDF Signer User Manual PDF Signer User Manual Introduction The main function of PDF Signer is to sign PDF documents using X.509 digital certificates. Using this product you can quickly sign multiple PDF files (bulk sign) by

More information

Data Sheet FUJITSU Thin Client FUTRO A300

Data Sheet FUJITSU Thin Client FUTRO A300 Data Sheet FUJITSU Thin Client FUTRO A300 Data Sheet FUJITSU Thin Client FUTRO A300 Convincing Simplicity The FUJITSU FUTRO A300 is your easy-to-use thin client for highly secure server-based computing

More information