VERISIGN OPENHYBRID CLOUD SIGNALLING API SPECIFICATION
|
|
|
- Bennett Garrison
- 10 years ago
- Views:
Transcription
1 TECHNICAL PAPER VERISIGN OPENHYBRID CLOUD SIGNALLING API SPECIFICATION Version 1.0 January 2015 VerisignInc.com
2 LEGAL DISCLAIMER COPYRIGHT NOTIFICATION Copyright 2015 VeriSign, Inc. All rights reserved as an unpublished work. VERISIGN; the Verisign logo; and other trademarks, service marks and Verisign designs are registered or unregistered trademarks of VeriSign, Inc. and its subsidiaries in the United States and foreign countries. Copyright laws and international treaties protect this document and any Verisign product to which it relates. VERISIGN PROPRIETARY INFORMATION This document is the property of VeriSign, Inc. It may be used by the recipient only for the purpose for which it was transmitted and will be returned upon request or when no longer needed by the recipient. It may not be copied or communicated without the prior written consent of Verisign. DISCLAIMER AND LIMITATION OF LIABILITY VeriSign, Inc. has made efforts to ensure the accuracy and completeness of the information in this document. However, VeriSign, Inc. makes no warranties of any kind (whether express, implied or statutory) with respect to the information contained herein. VeriSign, Inc. assumes no liability to any party for any loss or damage (whether direct or indirect) caused by any errors, omissions or statements of any kind contained in this document. Further, VeriSign, Inc. assumes no liability arising from the application or use of the product or service described herein and specifically disclaims any representation that the products or services described herein do not infringe upon any existing or future intellectual property rights. Nothing herein grants the reader any license to make, use or sell equipment or products constructed in accordance with this document. Finally, all rights and privileges related to any intellectual property right described herein are vested in the patent, trademark or service mark owner and no other person may exercise such rights without express permission, authority or license secured from the patent, trademark or service mark owner. Verisign reserves the right to make changes to any information herein without further notice. NOTICE AND CAUTION Concerning U.S. Patent or Trademark Rights Verisign and other trademarks, service marks and logos are registered or unregistered trademarks of Verisign and its subsidiaries in the United States and in foreign countries. The inclusion in this document, the associated on-line file or the associated software of any information covered by any other patent, trademark or service mark rights does not constitute nor imply a grant of or authority to exercise, any right or privilege protected by such patent, trademark or service mark. All such rights and privileges are vested in the patent, trademark or service mark owner and no other person may exercise such rights without express permission, authority or license secured from the patent, trademark or service mark owner. 2 Verisign Public Verisign OpenHybrid Cloud Signalling API Specification
3 CONTENTS 1 OVERVIEW API Specification API Authentication Model API Call Rate Limits POST Alert RESTful API POST IP Lists RESTful API 6 2 USE CASES Signal threat activity from on-premise DDoS appliance Signal threat activity from on-premise network or security appliances Signal performance impact from public cloud environments or purpose-built monitoring platforms Future Enhancements 8 REVISION HISTORY Revision Date Author(s) Description 1.0 Verisign Public Verisign OpenHybrid Cloud Signalling API Specification 3
4 1 OVERVIEW This document defines a method by which a device or application may share information relating to DDoS attacks to other devices, applications or services such as a Cloud DDoS protection service. This method will allow for a standards-based, vendor-agnostic approach to DDoS threat mitigation utilising multiple layers of protection to respond to the DDoS threat. The dissemination of threat information will occur utilising RESTful communications between devices/ applications via a Restful API. 1.1 API Specification DDoS attacks cause resource exhaustion at multiple layers within a customer s environment affecting devices, applications and services. These elements may be required from time to time to signal to an upstream component or provider that the resource is under exhaustion and necessary action may be needed to respond to the on-going threat. The POST Alert API is designed to signal the resource exhaustion and the need for a mitigative response by sending appropriate information about the affected resource and attack parameters. The POST IP Lists API is designed to send the upstream component or provider a list of IPs that should be white or black listed when a mitigation is performed on behalf of the source. 1.2 API Authentication Model When using this RESTful API the suggested form of Authentication is via an OAuth 2.0 access token or an API key. In addition, a unique Source ID should be provided to identify the device/application sending the request. 1.3 API Call Rate Limits To ensure the receiving service is not overwhelmed with signal requests, it is generally recommended to implement a rate limit such as no more than 100 requests per minute per user. 1.4 POST Alert RESTful API The Post Alert API includes information on the type of threat/attack and the service/destination impacted. The suggested format for the API parameters is JSON and the date/time format is UTC. Method: POST Request: Parameters for this request. 4 Verisign Public Verisign OpenHybrid Cloud Signalling API Specification
5 Name Type Required Default Value Description source_id string true A string that uniquely identifies the source sending the request. Examples of sources include on-premise DDoS devices, firewalls or load balancers or devices in a cloud environment where the service/destination is being hosted. incident_id string true A string that uniquely identifies the alert from a given source. alert_type string false Description of the type of attack that caused the alert. This data will assist in the mitigation of the attack. start_time string true The start time of the attack. source_ip(s) string false 1 or more IPs/CIDRs that are sending traffic to destination. (suggest limiting to 60 characters). destination string true Either the Domain Name, IP or CIDR of the service/ application that is receiving the traffic and needs protection. destination_ port destination_ protocol integer false The port of the customer service/application that is receiving the traffic (suggest between 0 to 65535). integer false The protocol impacted by the attack. misc_info string false Information that will be useful for the mitigation in the format of pipe delimited name value pairs. For example, providing threshold information to describe the impact of the attack on the service/ application: cpu_utilization_threshold:95 current_cpu_ utilization:98 bandwidth_usage_threshold:90 current_ bandwidth_usage:95. (suggest limiting the size of this field to 1,000 characters). Verisign Public Verisign OpenHybrid Cloud Signalling API Specification 5
6 Example Request: Method Request Body POST { source_id : acme1234, incident_id : , alert_type : SYN-FLOOD, start_time : :50:55, source_ips : 172.X.X.X, 173.X.X.X, destination : /24, destination_port : 80, destination_protocol : HTTP, misc_info : { cpu_utilization_threshold:95 current_cpu_ utilization:98 bandwidth_usage_threshold:90 current_bandwidth_usage:95 Response: Data alert_id Description Alert ID that uniquely identifies the Alert within the receiving device Example Response: Response Status HTTP Response Status Code Request Body Success 201 { alert_id : Error 400 { errors : [{ code : 400, message : source_id is required. ] 1.5 POST IP Lists RESTful API The Post IP Lists API includes information on the IPs that should be white or black listed when mitigating an attack. The suggested format for the API parameters is JSON. Method: POST Request: Parameters for this request. 6 Verisign Public Verisign OpenHybrid Cloud Signalling API Specification
7 Name Type Required Default Value Description source_id string false A string that uniquely identifies the source sending the request. Examples of sources include on-premise DDoS devices, firewalls or load balancers or devices in a cloud environment where the service/destination is being hosted. Providing this ID will allow the receiving service to link the list of IPs to a specific source so that attacks reported by that source will have the list applied during mitigation. type string true The type of the list being created. Values accepted are Blacklist or Whitelist. ips string true The IPs or prefixes that need to be utilised for the purpose mentioned in the type of the request. Example Request: Method Request Body POST { source_id : acme1234, type : Whitelist, ips : 11.x.x.x, 11.x.x.0/24, Response: Data iplist_id type Description An ID that uniquely identifies the list within the receiving device The type of list. Values are: Blacklist Whitelist Example Response: Response Status HTTP Response Status Code Request Body Success 201 { iplist_id : type : Whitelist: Error 400 { errors : [{ code : 400, message : IP addresses invalid. ] Verisign Public Verisign OpenHybrid Cloud Signalling API Specification 7
8 2 USE CASES 2.1 Signal threat activity from on-premise DDoS appliance On-premise DDoS appliances that integrate with this API can send threat signals to cloud providers about an ongoing DDoS attack reaching a threshold. This would necessitate the need for the cloud provider to step in and take over the DDoS mitigation and bring to effect the scale required to deal with volumetric DDoS attacks. 2.2 Signal threat activity from on-premise network or security appliances On-premise devices such as Routers, Firewalls, IDS/IPS etc. typically are not designed to withstand volumetric DDoS attack activity and can get easily exhausted. Integrating with the API can allow customers to send signals from various layers within their network environment thereby achieving more comprehensive security posture. 2.3 Signal performance impact from public cloud environments or purpose-built monitoring platforms Customers with services or applications deployed in public cloud environments or in data centres can utilise the API to integrate with their existing monitoring services and indicate performance impact due to a potential DDoS activity. This would signal to the upstream cloud protection provider to take the necessary action to mitigate the threat. 2.4 Future Enhancements API can be further enhanced to signal more advanced information related to on-going threats such as details about on-going attack counter-measures being applied etc. 8 Verisign Public Verisign OpenHybrid Cloud Signalling API Specification
9 NOTES Verisign Public Verisign OpenHybrid Cloud Signalling API Specification 9
10 VerisignInc.com 2015 VeriSign, Inc. All rights reserved. VERISIGN and other trademarks, service marks and designs are registered or unregistered trademarks of VeriSign, Inc. and its subsidiaries in the United States and in other countries. All other trademarks are property of their respective owners. Verisign Public VRSN_DDoS-PS_CloudSignAPI_Specs_201501
Extended Validation SSL
AUTHENTICATION GUIDE Extended Validation SSL Authentication Requirements VeriSign, Inc. Copyright 2006 VeriSign, Inc. All rights reserved. The information in this document belongs to VeriSign. It may not
A10 Thunder TPS Hybrid DDoS Protection Deployment with Verisign OpenHybrid
A10 Thunder TPS Hybrid DDoS Protection Deployment with Verisign OpenHybrid Thunder TPS Signals DDoS Attack Information to Verisign s OpenHybrid, Creating a Powerful, Hybrid, DDoS Protection Solution DEPLOYMENT
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
Extended Validation SSL
AUTHENTICATION GUIDE Extended Validation SSL Authentication Requirements VeriSign, Inc. Copyright 2007 VeriSign, Inc. All rights reserved. The information in this document belongs to VeriSign. It may not
AvePoint CRM Migration Manager for Microsoft Dynamics CRM. Release Notes
AvePoint CRM Migration Manager for Microsoft Release Notes AvePoint CRM Migration Manager 3.1.1 for Microsoft Release Date: July 16, 2014 Required Minimum Version for Direct Update New License Required?
A Layperson s Guide To DoS Attacks
A Layperson s Guide To DoS Attacks A Rackspace Whitepaper A Layperson s Guide to DoS Attacks Cover Table of Contents 1. Introduction 2 2. Background on DoS and DDoS Attacks 3 3. Types of DoS Attacks 4
Synology SSO Server. Development Guide
Synology SSO Server Development Guide THIS DOCUMENT CONTAINS PROPRIETARY TECHNICAL INFORMATION WHICH IS THE PROPERTY OF SYNOLOGY INCORPORATED AND SHALL NOT BE REPRODUCED, COPIED, OR USED AS THE BASIS FOR
Remote Firewall Deployment
StoneGate How-To Remote Firewall Deployment StoneGate Firewall 3.0 and Management Center 3.5 Table of Contents The Scenario............................... page 3 Adjusting the Access Rules and NAT rules..........
How To Reduce Pci Dss Scope
WHITE PAPER Intel Expressway Tokenization Broker PCI DSS Reducing PCI DSS Scope: The Gateway Approach Challenge: Payment applications that handle credit card numbers pull connected systems into PCI DSS
NSFOCUS Web Application Firewall White Paper
White Paper NSFOCUS Web Application Firewall White Paper By NSFOCUS White Paper - 2014 NSFOCUS NSFOCUS is the trademark of NSFOCUS Information Technology Co., Ltd. NSFOCUS enjoys all copyrights with respect
Security Analytics Engine 1.0. Help Desk User Guide
2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
PingFederate. Windows Live Cloud Identity Connector. User Guide. Version 1.0
Windows Live Cloud Identity Connector Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Windows Live Cloud Identity Connector User Guide Version 1.0 April, 2011 Ping Identity
McAfee Network Security Platform Administration Course
McAfee Network Security Platform Administration Course Intel Security Education Services Administration Course The McAfee Network Security Platform Administration course from McAfee Education Services
Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to
Placing the BlackBerry Enterprise Server for Microsoft Exchange in a demilitarized zone
Placing the for Originally posted: June 2002 Affected software versions BlackBerry Enterprise version 2.0 for Microsoft Exchange version 2.1 for Microsoft Exchange version 3.5 for Microsoft Exchange Summary
VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK
HANDBOOK VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK CONSIDERATIONS FOR SERVICE ADOPTION Version 1.0 July 2014 VerisignInc.com CONTENTS 1. WHAT IS A DDOS PROTECTION SERVICE? 3 2. HOW CAN VERISIGN
An Oracle White Paper June 2014. RESTful Web Services for the Oracle Database Cloud - Multitenant Edition
An Oracle White Paper June 2014 RESTful Web Services for the Oracle Database Cloud - Multitenant Edition 1 Table of Contents Introduction to RESTful Web Services... 3 Architecture of Oracle Database Cloud
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
F5 Silverline Web Application Firewall Onboarding: Technical Note
F5 Silverline Web Application Firewall Onboarding: Technical Note F5 Silverline Web Application Firewall Onboarding With organizations transitioning application workloads to the cloud, traditional centralized
SafeNet Cisco AnyConnect Client. Configuration Guide
SafeNet Cisco AnyConnect Client Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and
docs.rackspace.com/api
docs.rackspace.com/api Rackspace Cloud Backup Release (2015-09-09) 2015 Rackspace US, Inc. This document is intended for software developers who are interested in developing applications using the Rackspace
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
Dell One Identity Cloud Access Manager 7.0.2. Installation Guide
Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
RSA SecurID Software Token Security Best Practices Guide
RSA SecurID Software Token Security Best Practices Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA, the RSA
Polycom RealPresence DMA 7000 System, Virtual Edition
Getting Started Guide v. 6.1.2 October 2014 3725-76312-001B Polycom RealPresence DMA 7000 System, Virtual Edition The Polycom RealPresence DMA 7000 System is also known and certified as the DMA System.
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
LAN API FOR DOORBIRD AND BIRDGUARD
OVERVIEW LAN API FOR DOORBIRD AND BIRDGUARD Revision: 0.4 Date: 19th of January 2019 This document specifies the external API of Bird Home Automation products. The interface provides the functionality
All copyright, trade mark, design rights, patent and other intellectual property rights (registered or unregistered) in the Content belongs to us.
LEO Pharma Terms of use We/ Us/ Our You/Your Website Content LEO Laboratories Limited a company registered in the United kingdom under number 662129) known as LEO Pharma (LEO Pharma) and companies affiliated
Internet Redundancy How To. Version 8.0.0
Internet Redundancy How To Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. 1.2. 1.3. 1.4. About this Document... Examples used in this Guide... Documentation Sources... About the AXS GUARD...
INTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter
INTEGRATION GUIDE DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained
F5 Silverline DDoS Protection Onboarding: Technical Note
F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection onboarding F5 Networks is the first leading application services company to offer a single-vendor hybrid solution
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
How To Block A Ddos Attack On A Network With A Firewall
A Prolexic White Paper Firewalls: Limitations When Applied to DDoS Protection Introduction Firewalls are often used to restrict certain protocols during normal network situations and when Distributed Denial
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
AvePoint Record Rollback for Microsoft Dynamics CRM
AvePoint Record Rollback for Microsoft Dynamics Release Notes 1 AvePoint Record Rollback 3.1.2 for Microsoft Dynamics Release Date: January 30, 2014 Required Minimum Version for Direct Update Supported
LifeSize UVC Access Deployment Guide
LifeSize UVC Access Deployment Guide November 2013 LifeSize UVC Access Deployment Guide 2 LifeSize UVC Access LifeSize UVC Access is a standalone H.323 gatekeeper that provides services such as address
Logging and Alerting for the Cloud
Logging and Alerting for the Cloud What you need to know about monitoring and tracking across your enterprise The need for tracking and monitoring is pervasive throughout many aspects of an organization:
DeltaV System Health Monitoring Networking and Security
DeltaV Distributed Control System White Paper DeltaV System Health Monitoring Networking and Security Introduction Emerson Process Management s DeltaV System Health Monitoring service enables you to proactively
UTM Quick Installation Guide
www.allo.com Version 2.0 1 Copy Right Copyright 2014 Allo. All rights reserved. No part of this publication may be copied, distributed, transmitted, transcribed, stored in a retrieval system, or translated
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within
docs.rackspace.com/api
docs.rackspace.com/api Rackspace Cloud Big Data Release (2015-06-30) 2015 Rackspace US, Inc. This document is intended for software developers who are interested in developing applications using the Rackspace
axsguard Gatekeeper Internet Redundancy How To v1.2
axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH
SyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System
SyAM Software* Server Monitor Local/Central* on a Microsoft* Windows* Operating System with Internal Storage Focusing on IPMI Out of Band Management Recipe ID: 19SYAM190000000011-01 Contents Hardware Components...3
Enterprise Self Service Quick start Guide
Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: [email protected] Online Support: [email protected] 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.
DameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
Best Practices for Log File Management (Compliance, Security, Troubleshooting)
Log Management: Best Practices for Security and Compliance The Essentials Series Best Practices for Log File Management (Compliance, Security, Troubleshooting) sponsored by Introduction to Realtime Publishers
IP Office Avaya Radvision Interoperation Notes
Avaya Radvision Interoperation Notes Issue 1d (02 October 2012) 2012 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security
IBM Managed Security Services (Cloud Computing) hosted e-mail and Web security - express managed Web security INTC-8608-01 CE 12-2010 Page 1 of 8 Table of Contents 1. Scope of Services...3 2. Definitions...3
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
Polycom RealPresence DMA 7000 System, Virtual Edition
Getting Started Guide v. 6.1 June 2014 3725-76312-001A Polycom RealPresence DMA 7000 System, Virtual Edition Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be reproduced,
Designing a CA Single Sign-On Architecture for Enhanced Security
WHITE PAPER FEBRUARY 2015 Designing a CA Single Sign-On Architecture for Enhanced Security Using existing settings for a higher-security architecture 2 WHITE PAPER: DESIGNING A CA SSO ARCHITECTURE FOR
Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS
Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
RackConnect User Guide
RackConnect User Guide Updated: November 8, 2011 RackConnect User Guide Page 2 of 15 DISCLAIMER This RackConnect User Guide (the Guide ) is for informational purposes only and is provided AS IS. The information
Application Note. Receiving Analog In-Band CPID with the Dialogic 1000 Media Gateway Series
Application Note Receiving Analog In-Band CPID with the Dialogic 1000 Media Gateway Series Application Note Receiving Analog In-Band CPID with the Dialogic 1000 Media Gateway Series Executive Summary A
Web Security Firewall Setup. Administrator Guide
Web Security Firewall Setup Administrator Guide Web Security Firewall Setup Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,
AvePoint Record Rollback for Microsoft Dynamics CRM. Release Notes
AvePoint Record Rollback for Microsoft Dynamics Release Notes Table of Contents What s New in This Doucment... 3 AvePoint Record Rollback 3.1.3 for Microsoft Dynamics... 4 AvePoint Record Rollback 3.1.2
.Trustwave.com Updated October 9, 2007. Secure Web Gateway SNMP Monitoring and SWG MIB
.Trustwave.com Updated October 9, 2007 Secure Web Gateway SNMP Monitoring and SWG MIB Legal Notice Copyright 2013 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Reference Architecture: Enterprise Security For The Cloud
Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application
SafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT
DDoS Protection How Cisco IT Protects Against Distributed Denial of Service Attacks A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge: Prevent low-bandwidth DDoS attacks coming from a broad
Flexible Routing and Load Control on Back-End Servers. Controlling the Request Load and Quality of Service
ORACLE TRAFFIC DIRECTOR KEY FEATURES AND BENEFITS KEY FEATURES AND BENEFITS FAST, RELIABLE, EASY-TO-USE, SECURE, AND SCALABLE LOAD BALANCER [O.SIDEBAR HEAD] KEY FEATURES Easy to install, configure, and
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
JUNOS DDoS SECURE. Advanced DDoS Mitigation Technology
JUNOS DDoS SECURE Advanced DDoS Mitigation Technology Biography Nguyen Tien Duc [email protected], +84 903344505 Consulting Engineer- Viet Nam CISSP # 346725 CISA # 623462 2 Copyright 2013 Juniper Networks,
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
Application Note. Intelligent Application Gateway with SA server using AD password and OTP
Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto
December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure
December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation
Contents Firewall Monitor Overview Getting Started Setting Up Firewall Monitor Attack Alerts Viewing Firewall Monitor Attack Alerts
Firewall Monitor Contents Firewall Monitor Overview...1 Getting Started...1 Setting Up Firewall Monitor Attack Alerts...2 Configuring/Editing Attack Alerts...3 Enabling Attack Notification...4 Configuring
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
DocAve for Office 365 Sustainable Adoption
DocAve for Office 365 Sustainable Adoption Quick Start Guide Issued October 2015 1 Table of Contents Submitting Documentation Feedback to AvePoint... 3 1. Request a DocAve License from AvePoint... 4 2.
INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN
INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data
Types of cyber-attacks. And how to prevent them
Types of cyber-attacks And how to prevent them Introduction Today s cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual
Therm-App Software Development Kit License Agreement
Therm-App Software Development Kit License Agreement 1. Introduction 1.1 Opgal is providing you with the Therm-App Software Development Kit intended for Android application developers (referred to in this
Title page. Alcatel-Lucent 5620 SERVICE AWARE MANAGER 13.0 R7
Title page Alcatel-Lucent 5620 SERVICE AWARE MANAGER 13.0 R7 APPLICATION API DEVELOPER GUIDE 3HE-10590-AAAA-TQZZA Issue 1 December 2015 Legal notice Legal notice Alcatel, Lucent, Alcatel-Lucent and the
Strong Authentication for Microsoft TS Web / RD Web
Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
IBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1
IBM Proventia Management SiteProtector Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1 Copyright Statement Copyright IBM Corporation 1994, 2010. IBM Global Services Route
Strong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag
Application Firewall Overview Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents IAG Application Firewall: An Overview... 1 Features and Benefits... 2
Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview
Dell One Identity Cloud Access Manager 8.0.1 - SonicWALL Integration Overview May 2015 Overview Functional highlights Functional details Legal notices Overview Support for Dell SonicWALL malware detection
You are authorised to view and download one copy to a local hard drive or disk, print and make copies of such printouts, provided that:
Terms of Use The Standard Bank of South Africa Limited ( Standard Bank ) maintains this demonstration trading platform (the "Demo Trading Platform") and the virtual services/products ("Virtual Services")
Application Note: GateManager Internet requirement and port settings
Application Note: GateManager Internet requirement and port settings Informational document regards GateManager Internet requirement. Who to read this document: This document is intended for the person
Object Level Authentication
Toad Intelligence Central Version 2.5 New in This Release Wednesday, 4 March 2015 New features in this release of Toad Intelligence Central: Object level authentication - Where authentication is required
Solving the SMS Revenue Leakage Challenge
Whitepaper Table of Contents 1 Background 2 SMS fraud technical overview 3 Affected parties 4 Common methodologies 5 Ways to control the different types of SMS fraud Solving the SMS Revenue Leakage Challenge
SafeNet Authentication Service
SafeNet Authentication Service All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to
Intel Internet of Things (IoT) Developer Kit
Intel Internet of Things (IoT) Developer Kit IoT Cloud-Based Analytics User Guide September 2014 IoT Cloud-Based Analytics User Guide Introduction Table of Contents 1.0 Introduction... 4 1.1. Revision
StarLeaf Connectivity Services. Deployment Guide
StarLeaf Connectivity Services Deployment Guide 31 July 2015 Contents Terminology 4 Why are Connectivity Services needed? 4 What are Connectivity Services? 4 Calling scenarios 5 Architecture 7 Security
Beyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
SonicWALL Global Management System Reporting User Guide. Version 2.5
SonicWALL Global Management System Reporting User Guide Version 2.5 Copyright Information 2003 SonicWALL, Inc. All rights reserved. Under the copyright laws, this manual or the software described within,
Spotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System
ICE MFT (SFTP SERVER) KEYBOARD-INTERACTIVE MODE REQUIREMENT
Document title ICE MFT (SFTP SERVER) KEYBOARD-INTERACTIVE MODE REQUIREMENT Version Date 1.0 1 Sep 2014 2013 IntercontinentalExchange Group, Inc. The information and materials contained in this document
MS Skype for Business and Lync. Integration Guide
MS Skype for Business and Lync Integration Guide June 03, 2016 Contents Introduction 4 How to use StarLeaf with Microsoft Skype for Business 2015 Server 5 Pre-requisites 5 Step One: Federate between the
