WatchGuard SSL 2.0 New Features
|
|
|
- Jonathan Summers
- 10 years ago
- Views:
Transcription
1 WatchGuard SSL 2.0 New Features For Secure Remote Access, Identity Management, and Network Access Control Introduction WatchGuard SSL 2.0 unifies identity and access management capabilities, with features focused on the integration between the two. WatchGuard SSL 2.0 makes it easier for enterprises to control who has access to what resources at any given time, with powerful integration tools, enhanced security, and reporting technology. This includes: Introduction of access client security (WatchGuard SSL ACS) Enhanced endpoint security with Java and ActiveX controls In-depth graphical reporting tools for increased operational insight Introduction of alerts enabling alarm triggers to be set on system events Support for federated identities using the SAML standard Device-adaptable application portal Multi-domain support allowing per domain configuration and customized graphical interfaces Mid-point security WatchGuard SSL Access Client Security (ACS) WatchGuard SSL 2.0 introduces a feature called WatchGuard SSL access client security (ACS). The ACS consists of three types of controls and is an integrated part of the WatchGuard SSL access client, greatly enhancing security with: Network control Application control End user session notification Network Control Network control allows the system administrator to define how incoming and outgoing requests are to be handled. In combination with the enhanced application connectivity and the network control, system administrators can define split-tunneling handling in a number of ways, such as: Route all traffic through the WatchGuard SSL access point and WatchGuard SSL access client Only route traffic with an internal destination and stop any traffic on other network interfaces this means that a user can only be connected to resources published by WatchGuard SSL. For example, a user would be able to connect to WatchGuard SSL, but not browse the Internet at the same time. page 1
2 Only route traffic with an internal destination through the WatchGuard SSL access point and WatchGuard SSL access client and route other traffic through additional interfaces. Figure 1: An example where the user is only allowed to reach internal applications and non-internal traffic is blocked. Application Control Application control allows the system administrator to define which applications are entitled to use a specific connection. The process includes validation of the application name, location, and checksum. Unauthorized applications are denied access to internal resources. Figure 2: Using application control makes it easy to allow only certain applications access, for example Internet Explorer, Safari, and Firefox, while trojans trying to initiate a connection are stopped. page 2
3 End User Session Notification The system administrator can further increase the security by turning on end user session notification. When end user session notification is turned on the user will be forced to accept each new connection that the WatchGuard SSL access client initiates, similar to how personal firewalls work. Enhanced Endpoint Security WatchGuard SSL 2.0 includes many endpoint security options including: Cross-platform support (ActiveX and Java) Separation of device assessment and session clean-up Real-time session scanning for continuous security New plug-in architecture to support dynamic extensions Cross-Platform Support The endpoint security option in WatchGuard SSL 2.0 includes support for more browsers on more platforms than any other product in its class. WatchGuard SSL 2.0 endpoint security supports the following web browsers: Internet Explorer Firefox Opera Safari Netscape WatchGuard SSL 2.0 endpoint security supports the following operating systems: Windows 2000, Windows XP, Windows Windows Vista Linux Mac OS X WatchGuard SSL 2.0 supports both ActiveX and Java loaders to invoke the endpoint security control on the client, which ensures that Windows users who are not allowed to run ActiveX can still perform an endpoint security scan for optimal protection. This means that device assessment and session clean-up can still be performed on devices with restrictions. Separation of Assessment and Abolishment In WatchGuard SSL 2.0 the assessment piece (endpoint security policy decision) and abolishment (session clean-up) are separated modules allowing better policy enforcement. In WatchGuard SSL 2.0, it is also possible to use abolishment as a policy decision on a per application/resource basis. Real-Time Scan The assessment phase in WatchGuard SSL 2.0 can be configured to run continually while a user is connected to the application portal, thus making real-time security scans at intervals throughout the session possible. This is important for protection against policy violations that occur after the initial assessment has been performed. page 3
4 Plug-in Architecture to Support Dynamic Extensions Extensibility in endpoint security is very important and WatchGuard SSL 2.0 features an architecture allowing for dynamic extensions to both client and server modules, making the possibilities endless. On the server side, modules are often policy validation-focused, such as technology that checks whether or not a range of anti-virus software is updated and running on the client. On the client side, plug-ins are used to expand the gathering of detailed data and extend client platform support. Graphical Reporting WatchGuard SSL 2.0 delivers extensive built-in graphical reporting tools that are easily accessed through the WatchGuard SSL administration service. Reports offer another level of insight into who, what, where, and when the system has been used. This is critical for regulatory compliance and corporate governance. Figure 3: Reporting tools provide the electronic evidence corporations need to show due diligence in compliance efforts. Granular filters can be applied that enable administrators to create customized reports in both real time or over a historical period for trend analysis. Real-time reports are useful for immediate corrective action, while historical reports are useful for future planning. Seven Categories of Reports WatchGuard SSL 2.0 includes seven standard categories of reports: Assessment Reports - Provides reports on assessments (endpoint security checks) that have been performed. page 4
5 Authentication Reports - Provides detailed reports on the use of authentication methods. Authorization Reports - Provides reports on access decisions that have been made by the WatchGuard SSL policy service. Access Reports - Provides reports on application access and the use of the WatchGuard SSL platform by end users. Filters can be applied to find out how many individuals are using a specific application. Audit Reports - Provides in-depth reports on who, what, when, and how access was granted. Abolish Reports - Provides reports on any session clean-up actions that have taken place. System Health and Performance Reports - Provides reports on system-specific events and statistics. Alerts Alerts can be set on system events so administrators can be notified if something occurs, making problem resolution easier and less time-consuming. This tool enables administrators and help desk personnel to work proactively and more quickly respond to incidents. Alerts can be distributed using either SMS (mobile text message) or . The following alerts can be set in the system: User Accounts Account locked for access (User id and reason) Account unlocked for access (User id and reason) Account locked for authentication (User id and reason) Account unlocked for authentication (User id and reason) Account Time-lock locked (User id, reason, and time-locked limit value) Account Time-lock unlocked (User id and reason) Resources Resource host unreachable (Resource host and reason) Resource host reachable (Resource host and reason) System Lost connection to service in WatchGuard SSL network (Display name and reason) Connection to service in WatchGuard SSL network restored (Display name and reason) Lost connection to Directory Service (Reason) Connection to Directory Service restored (Reason) Lost connection to Authentication Method Server (Server host and reason) Connection to Authentication Method Server restored (Server host and reason) Security Issues (Security issue) page 5
6 Alerting Example Juan is trying to access the WatchGuard SSL portal, but his password is rejected. Juan tries to login several times, but each time the password is rejected. 1. Juan s account is locked. 2. WatchGuard SSL sends an alert to the system administrator that Juan s account has been locked. 3. The system administrator unlocks the account and resets his password. 4. The system administrator calls Juan to tell him that his account is active and his password has been reset. 5. Juan successfully logs in. Shared Identities across Domains with Federation Single sign-on across domains and enterprises are considered by many organizations to be the holy grail of IT because it simplifies the user experience, while maintaining high levels of security. With the introduction of the Secure Assertion Mark-up Language (SAML) there is now no obstacle to sharing identities and achieving seamless single sign-on for users. WatchGuard SSL 2.0 provides support for the SAML 2.0 standard supporting both ID-producer and ID-consumer mode, allowing internal users to access external services and external users to access internal applications without any additional sign-on or enrolment requirements. Figure 5: Federated identity allows a single digital identity to be used to access multiple departments, or even businesses, without the need for extra and costly user enrollment. Ideal for sharing identities in B2B partnerships The promises of federated identities across systems include: Scalable and global single sign-on for convenience and reduced administration Eliminated user enrolment and enrolment automation for low-cost management Enhanced security with high usability page 6
7 Adaptive Portal The WatchGuard SSL 2.0 application portal has the ability to adapt to screen resolutions of different devices which improves the usability for individuals with handheld devices. By auto-detecting the type of device the user has, WatchGuard SSL 2.0 automatically adapts the application portal to match the form factor and screen resolution of the device. Enhanced Multi-Domain Support WatchGuard SSL 2.0 delivers enhanced support for deployments where multiple domains are in use (i.e., different URLs). With WatchGuard SSL 2.0 it is possible to apply different graphical interfaces depending on the domain the user requests. This is ideal for service providers and enterprises seeking to offer different interfaces to different services and audiences, such as intranet and extranet access. Mid-Point Integrity In the early stages of wireless networks security was not the primary concern for network connectivity, but because of widespread adoption it has become increasingly important as security threats like Evil Twin threatens the usability of users and enterprises. WEP is commonly used as one security enforcement method but has proven to be insufficient. Neither hidden SSIDs, nor MAC filtering has proven sufficient for securing wireless environments. WatchGuard SSL 2.0 introduces support for WPA (Wi-Fi Protected Access) authentication by using the RADIUS PEAP-MSCHAPv2 authentication protocol, which is supported by many operating systems, wireless access points and platforms. By using PEAP-MSCHAPv2 it is possible to mutually authenticate the wireless access point and the Wireless Client. Figure 6: The WatchGuard SSL implementation of WPA uses server-side certificates to allow the client to authenticate the Wireless Access Point and WatchGuard SSL Authentication Service, but does not require deployment of certificates at the client side. Instead the standard WatchGuard SSL Mobile ID can be used to authenticate the end user. page 7
8 Summary WatchGuard SSL makes it easy for enterprises to maximize security, while minimizing risk and costs. Whether you deal with internal employees, partners, or customers, you need to provide security that is easy to use and comprehensive. WatchGuard SSL 2.0 delivers the most advanced features to secure your enterprise, so you can feel safe in all your transactions. More Information For more information about WatchGuard and the WatchGuard SSL solution, visit ADDRESS: 505 Fifth Avenue South Suite 500 Seattle, WA WEB: U.S. SALES: INTERNATIONAL SALES: ABOUT WATCHGUARD Since 1996, WatchGuard Technologies has provided reliable, easy to manage security appliances to hundreds of thousands of businesses worldwide. Our Firebox X family of unified threat management (UTM) solutions provides the best combination of strong, reliable, multi-layered security with the best ease of use in its class. Our newest product line the WatchGuard SSL makes secure remote access easy and affordable, regardless of the size of your network. All products are backed by LiveSecurity Service, a ground-breaking support and maintenance program. WatchGuard is a privately owned company, headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America. For more information, please visit No express or implied warranties are provided for herein. All specifications are subject to change and any expected future products, features or functionality will be provided on an if and when available basis WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard Logo, Firebox, and LiveSecurity are either registered trademarks or trademarks of WatchGuard Technologies, Inc. in the United States and/or other countries. All other trademarks and tradenames are the property of their respective owners. Part. No. WGCE66561_ page 8
Secure Remote Access Give users in office remote access anytime, anywhere
Secure Remote Access Give users in office remote access anytime, anywhere June 2008 Introduction As organizations strive to increase productivity, secure remote access to network resources becomes increasingly
TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise. Introduction.
TRUSTED IDENTITIES, MANAGED ACCESS Implementing an Identity and Access Management Strategy for the Mobile Enterprise June 2008 Introduction Whether you are looking to securely deliver applications and
Technical Brief ActiveSync Configuration for WatchGuard SSL 100
Introduction Technical Brief ActiveSync Configuration for WatchGuard SSL 100 October 2009 With ActiveSync, users get push functionality to keep email, calendar, tasks, and contacts up to date on a mobile
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
DOWNTIME CAN SPELL DISASTER
DOWNTIME CAN SPELL DISASTER Technical Brief Ensure Network Uptime: High Availability with XTM FireCluster August 2010 Network downtime is expensive for businesses in today s 24/7 global economy. Any malfunctions
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
Clustering and Queue Replication:
Clustering & Queue Replication Clustering and Queue Replication: How WatchGuard XCS Provides Fully Redundant Messaging Security Technical Brief WatchGuard Technologies, Inc. Published: March 2011 Introduction
Configuration Example
Configuration Example Use WatchGuard Application Control with Your Existing Firewall Example configuration files created with WSM v11.10.1 Revised 7/21/2015 Use Case An organization wants to block the
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
When Data Loss Prevention Is Not Enough:
Email Encryption When Data Loss Prevention Is Not Enough: Secure Business Communications with Email Encryption Technical Brief WatchGuard Technologies, Inc. Need for Email Encryption Is at Its Peak Based
WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA 98104 www.watchguard.com
SMALL BUSINESS NETWORK SECURITY GUIDE WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION AUGUST 2004 SMALL BUSINESS NETWORK SECURITY GUIDE: WHY A REAL FIREWALL PROVIDES THE BEST NETWORK PROTECTION
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560
WatchGuard SSL v3.2 Update 1 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 445469 Revision Date 3 April 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard
NETWRIX IDENTITY MANAGEMENT SUITE
NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
White paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
WatchGuard SSL Web UI 3.2 User Guide
WatchGuard SSL Web UI 3.2 User Guide WatchGuard SSL Web UI 3.2 User Guide WatchGuard SSL 100 WatchGuard SSL 560 About this User Guide The WatchGuard SSL Web UI User Guide is updated with each major product
Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
AVG Business SSO Partner Getting Started Guide
AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in
Firebox X550e, Firebox X750e, Firebox X1250e Firebox X5500e, Firebox X6500e, Firebox X8500e, Firebox X8500e-F
Firebox X550e, Firebox X750e, Firebox X1250e Firebox X5500e, Firebox X6500e, Firebox X8500e, Firebox X8500e-F Getting Started The Firebox X Core and Peak e-series is a line of high performance, real-time
How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,
The ForeScout Difference
The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6
WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6 FIREWALL AND VPN APPLIANCES FOR SMALL BUSINESSES AND BRANCH OFFICES Today, complete Internet security goes beyond a firewall. Firebox SOHO 6tc and SOHO 6 are dedicated
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
WatchGuard Gateway AntiVirus
Gateway AntiVirus WatchGuard Gateway AntiVirus Technical Brief WatchGuard Technologies, Inc. Published: March 2011 Malware Continues to Grow New and ever-changing threats appear with alarming regularity,
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
McAfee Security. Management Client
Security Management Center Efficient, centralized management of Next Generation Firewalls in distributed enterprise environments Key Benefits Centralized, single-paneof-glass management of Next Generation
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
ForeScout MDM Enterprise
Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify
Strong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
BlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
WatchGuard Certified Training Partner (WCTP) Program
WatchGuard Certified Training Partner (WCTP) Program Revised: July 2010 Overview The WCTP program is a mutually beneficial partnership between WatchGuard and our most highly qualified business partners.
An Analysis of Propalms TSE and Microsoft Remote Desktop Services
An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Understanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Understanding and Configuring Password Manager for Maximum Benefits
Understanding and Configuring Password Manager for Maximum Benefits Written by Chris Radband, senior professional services consultant, Dell Software Introduction About Password Manager The pain of password
SECURE ACCESS TO THE VIRTUAL DATA CENTER
SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need
File Services. File Services at a Glance
File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using
Strong Authentication for Microsoft TS Web / RD Web
Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS
EXTENDING THREAT PROTECTION AND WHITEPAPER CLOUD-BASED SECURITY SERVICES PROTECT USERS IN ANY LOCATION ACROSS ANY NETWORK It s a phenomenon and a fact: employees are always on today. They connect to the
Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of
Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series
PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
Sophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
Release Notes for Version 1.5.207
Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4
How can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
AD Self-Service Suite for Active Directory
The Dot Net Factory AD Self-Service Suite for Active Directory Version 3.6 The Dot Net Factory, LLC. 2005-2011. All rights reserved. This guide contains proprietary information, which is protected by copyright.
Nokia Call Connect v1.1 for Cisco User s Guide. Part Number: N450000431 Rev 003 Issue 1
Nokia Call Connect v1.1 for Cisco User s Guide Part Number: N450000431 Rev 003 Issue 1 Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without
CA Federation Manager
PRODUCT BRIEF: CA FEDERATION MANAGER CA FEDERATION MANAGER PROVIDES STANDARDS-BASED IDENTITY FEDERATION CAPABILITIES THAT ENABLE THE USERS OF ONE ORGANIZATION TO EASILY AND SECURELY ACCESS THE DATA AND
Administrators Help Manual
Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service
Dell SonicWALL SRA 7.5 Citrix Access
Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Symantec Mobile Management 7.2
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology
ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook
ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access Integration Handbook Document Version 1.1 Released July 16, 2012 ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,
Complete Patch Management
Complete Patch Management Complete - Flexible Unique In- Depth Secunia CSI 7 Corporate Software Inspector Take control of the vulnerability threat and optimize your IT security investments. The Secunia
WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive
Extranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
Agent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper
with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,
DeltaV System Health Monitoring Networking and Security
DeltaV Distributed Control System White Paper DeltaV System Health Monitoring Networking and Security Introduction Emerson Process Management s DeltaV System Health Monitoring service enables you to proactively
Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER USER GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from NetWrix
Managed Security Services for Data
A v a y a G l o b a l S e r v i c e s Managed Security Services for Data P r o a c t i v e l y M a n a g i n g Y o u r N e t w o r k S e c u r i t y 2 4 x 7 x 3 6 5 IP Telephony Contact Centers Unified
PRODUCT CATEGORY BROCHURE
PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size
The governance IT needs Easy user adoption Trusted Managed File Transfer solutions
Product Datasheet The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Full-featured Enterprise-class IT Solution for Managed File Transfer Organizations today must effectively
Software Update Bulletin
Introducing SendSuite Tracking February 2010 Purpose This bulletin is released to advise SendSuite Tracking users of the new features, enhancements, and improvements in the evolution of the Internal Tracking
BYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
Quick Setup Guide. 2 System requirements and licensing. 2011 Kerio Technologies s.r.o. All rights reserved.
Kerio Control VMware Virtual Appliance Quick Setup Guide 2011 Kerio Technologies s.r.o. All rights reserved. This document provides detailed description on installation and basic configuration of the Kerio
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
Leveraging SAML for Federated Single Sign-on:
Leveraging SAML for Federated Single Sign-on: Seamless Integration with Web-based Applications whether cloudbased, private, on-premise, or behind a firewall Single Sign-on Layer v.3.2-006 PistolStar, Inc.
WatchGuard Certified Training Partner (WCTP) Program
WatchGuard Certified Training Partner (WCTP) Program Revised: April 2012 Overview The WCTP program is a mutually beneficial partnership between WatchGuard and our most highly qualified business partners.
Securing Virtualization with Check Point and Consolidation with Virtualized Security
Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized
Best Practices for Secure Remote Access. Aventail Technical White Paper
Aventail Technical White Paper Table of contents Overview 3 1. Strong, secure access policy for the corporate network 3 2. Personal firewall, anti-virus, and intrusion-prevention for all desktops 4 3.
WatchGuard Training. Introduction to WatchGuard Dimension
WatchGuard Training Introduction to WatchGuard Dimension Introduction to WatchGuard Dimension What is WatchGuard Dimension? Deploy WatchGuard Dimension Configure WatchGuard Dimension Use WatchGuard Dimension
Novell Access Manager SSL Virtual Private Network
White Paper www.novell.com Novell Access Manager SSL Virtual Private Network Access Control Policy Enforcement Compliance Assurance 2 Contents Novell SSL VPN... 4 Product Overview... 4 Identity Server...
WatchGuard SSL Web UI 3.1.3 User Guide
WatchGuard SSL Web UI 3.1.3 User Guide WatchGuard SSL Web UI 3.1.3 User Guide WatchGuard SSL 100 WatchGuard SSL 560 About this User Guide The WatchGuard SSL Web UI User Guide is updated with each major
