Network Management & Monitoring
|
|
- Tobias Booth
- 8 years ago
- Views:
Transcription
1 Network Management & Monitoring Overview CSI International 8120 State Route 138 Williamsport, OH (800) USA (740) Main Operator (740) Facsimile sales@csi-international.com info@csi-international.com support@csi-international.com CSI s software solutions are available worldwide through its international distribution network, and directly in North America from CSI and select Business Partners. Delivering what the competition can only promise.
2 TCP/IP for VSE TCP/IP for VSE provides a complete solution for connecting the mainframe to today's Internet world. Our TCP/IP stack provides a seamless interface with the Internet, allowing z/vse mainframe applications to participate fully in the global business arena Built-in tools make z/vse functions and facilities immediately available to network-attached users Optional and third-party products bring the full power and reliability of mainframe computing to the e-commerce world Standard stack features 99Runs on VSE/ESA 1.4 through the latest z/vse versions 99Supports network connections via OSA, OSA-Express, CTCA, CLAW, and equivalent hardware 99Extensive monitoring and tuning capabilities that can be extended to any level of granularity, including specific destination addresses 99Customizable security features protect both network access and configuration information 99Built-in connection management provides request queuing and automatic detection and clean-up of lost connections 99A complete set of servers, including TN3270, FTP, and LPD 99Client software such as FTP, LPR, , and Telnet 99Additional support software, such as PDF creation Additional optional features distributed with TCP/IP for VSE: 99GPS General Print Server 99NFS Network File System 99SSL Secure Sockets Layer 99SecureFTP SSL-enabled FTP server and client 99See-TCP/IP Performance monitor for z/vse and TCP/IP Complement TCP/IP for VSE with these add-on products: 99Entrée Web-based transaction server 99HFS Hierarchical File System
3 TCP/IP for VSE Standard features of TCP/IP for VSE to consider implementing: 99FTP File Transfer Protocol Easy, direct access to VSAM, BIM-Edit, LIBR, Power, ICCF, and other VSE resident files VSAM KSDS files can be retrieved completely or by key range FTPBATCH for quick, easy, efficient batch FTP transfers Automatically send Power files directly to end users Convert text files to PDF format for easy viewing Allow users on Windows to retrieve or store files directly on z/vse Use a PC/Unix-like Hierarchical File System (HFS) on your z/vse system Securely transfer confidential files with the SecureFTP feature 99Telnet TN3270 server Allow users to log directly onto 3270 VTAM applications such as CICS End users use a TN3270 PC client to directly access the z/vse system LPR client for printing directly to printers on remote hosts Automatic printing of Power LST queue entries to remote printers Send your data as normal print text or as a PDF to an LPR server 99 Batch client to most z/vse-resident files directly to remote users PDF generation of text and embedded graphics is also available 99Web Provide static z/vse data to the browser or write your own CGI (Web) programs 99Easy configuration with standard z/vse library members 99Ping, Traceroute, Discover, and other powerful tools are part of the product so that a site can analyze its TCP/IP network from z/vse 99Advanced diagnostics for detailed problem analysis 99User-defined security processing to limit access or functions to a remote user or group of users 99Control message output, and if you have BIM-FAQS, inspect TCP/IP activities and automate z/vse processing (for example, submit a job when an FTP has completed) Create your own TCP/IP applications with the provided Application Programming Interfaces (APIs): 99SOCKET MACRO interface for Assembler programs 99BSD/C interface useable from C, Cobol, Assembler, or any other language that supports standard linkage 99EZASOCKET calls by all languages are also supported for easier portability 99High-Level Preprocessor Interface for Cobol, PL1, or Assembler 99Cryptographic interfaces for using SSL/TLS with strong encryption algorithms like AES, Triple- DES, RSA, or SHA1, MD5, etc. 99Socket interface for REXX programs 99Many examples are available to speed up program development
4 GPS GPS (General Print Server) restores and augments 328x print functionality in the TN3270 environment. Compatible with a wide variety of network operating systems and network-based printers For printers attached directly to the network, GPS implements the HP Jetdirect Sockets protocol to communicate with the printer For other printers, GPS uses the standard LPR/LPD function within TCP/IP for VSE More flexible than TN3270 printer support GPS allows 328x print output to be sent to any TCP/ IP printer Printing occurs without requiring the user to log on to the mainframe for a printer connection. As long as the printer or the associated Line Printer is available, manual intervention is unnecessary. Preserves VTAM LU name privacy for installation-specific security purposes. TN3270E compromises this security measure by allowing users to specify their own LU name. GPS is an optional product that is included with your TCP/IP for VSE distribution simply obtain a product key code for activation
5 SecureFTP provides user authentication, privacy, and integrity for commands and data transmitted using the FTP protocol. Transmit critical files that can contain vital information, such as 99Product ideas or corporate secrets 99Customer names and addresses 99Credit card or Social Security numbers 99Confidential contracts 99Legally protected medical information 99Source code to computer software 99Physical asset locations SecureFTP Implements both the SSL 3.0 and the TLS 1.0 standards for security Industry standard algorithms assure compatibility with a wide variety of other vendors and platforms that also support secure SSL-enabled FTP servers and clients Implements numerous industry protocols, such as 99RFC2246 (Transport Layer Security) 99RFC1321 (MD5 message-digest algorithm) 99RFC2104 (HMAC) 99RFC2459 (X.509v3 PKI certificates) SecureFTP relies on a number of integrated components, including 99PKI (Public Key Infrastructure) for identification 99RSA for key exchange algorithms 99DES for data encryption 99MD5 and SHA-1 for message hashing 99HMAC for message authentication SecureFTP is an optional product that is included with your TCP/IP for VSE distribution simply obtain a product key code for activation
6 See-TCP/IP See-TCP/IP allows you to analyze the activity and performance of your z/vse and TCP/IP systems from an easy-to-use PC graphical user interface. See-TCP/IP answers questions like 99What is the current CPU usage of my z/vse system? 99What was CPU usage yesterday at 3:00 pm? 99What was the CPU trend for the last two months? 99Which partitions are using the most resources? See-TCP/IP collects 99VSE Turbo Dispatcher Statistics CPU waiting-for-work time CPU non-parallel busy time CPU parallel busy time CPU overhead from other LPARs or VM 99VSE System Statistics Start subchannel requests I/O interrupts Phase loads SVC usage Program checks External interrupts 99VSE Partition Statistics Jobname, stepname Start I/O counts CPU usage 99TCP/IP Statistics Graphical display of overall IP activity Detailed information on active connections IP addresses Local and foreign ports Bytes sent and received Retransmits SWS silly window Current and maximum window sizes Historical Reporting Stored in SQL database With graphical display Provides trend analysis
7 See-TCP/IP See-TCP/IP can be used to 99 Graph overall IP datagram activity real-time 99 Show IP datagram activity by Telnet, FTP, HTTP, and any other local IP applications running on z/vse 99 Identify which foreign IP addresses are connected to z/vse See-TCP/IP Screens 99 See-TCP/IP creates graphical and tabular reports on a Windows/XP PC with network access to the z/vse system. 99 See-TCP/IP generates graphical reports of various kinds; for example, line graphs and bar graphs.
8 See-TCP/IP 99 See-TCP/IP collects IP datagrams and sends them to Wireshark, which then displays the information. 99 See-TCP/IP can create tabular reports that show IP connections into z/vse. System Requirements 99 CSI s TCP/IP for VSE (does not run on other TCP/IP stacks) 99 PC running Windows 2000 or above on a network that can access the z/vse system See-TCP/IP is an optional product that is included with your TCP/IP for VSE distribution simply obtain a product key code for activation
9 SSL/TLS SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are integrated with Secure Telnet (TN3270), SecureFTP, and Entrée (CSI s Web-enabled transaction server), providing a complete set of services to secure e-business transactions. Uses data encryption, digital signatures, PKI certificates, and secure hash functions to prevent messages from being camouflaged, passwords from being hacked, and transactions from being denied Implements industry-standard security protocols in the z/vse environment Includes secure versions of TCP/IP applications, such as FTP, TN3270, and the Web server Provides Application Programming Interfaces to enable SSL security in other z/vse TCP/IP applications Exploits hardware-assisted cryptography for block ciphers such as DES and AES, as well as Crypto- Express2 for RSA operations SSL/TLS is an optional product that is included with your TCP/IP for VSE distribution simply obtain a product key code for activation
10 PC/Transfer PC/Transfer is a PC-Host File Transfer System that allows data to be transferred between any PC that is running a 3270 emulator or using a TCP/IP connection, and a host computer running CSI s TCP/IP for VSE and either CICS or Entrée. All transfers can be secured on the host, using sign-on authorization, and an extensive set of security options is available to limit access to host datasets, reports, and members to appropriate PC users The Host Initiated Automatic File Transfer feature (HOSTAFT) allows transfers to be initiated by the host through a batch jobstream or a CICS application program Types of data that can be transferred to and from the PC: 99BIM-EDIT members 99z/VSE Librarian (LIBR) members 99POWER jobs and reports in the RDR, PUN, or LST queues 99VSAM datasets 99VSAM-managed-SAM datasets 99SAM datasets 99BIM-EPIC managed SAM datasets 99CICS transient data (uploads to CICS only) 99CICS temporary storage queues 99Files contained in the z/vse host transfer file (IND$) 99ICCF members (download to PC support only) The host side of PC/Transfer can either run under CICS or Entrée (Entrée is a VTAM/TCP/IP application platform available separately from CSI) The PC-to-host connection can be LU2 or TCP/IP
11 PC/Transfer An online transaction (FTRM) is provided to define to the host the types of transfers that are to be supported and which PC users are allowed to perform them A Transfer Activity Log can be maintained by the host side of PC/Transfer in a VSAM RRDS dataset. An online transaction (FTRL) is provided for viewing this log, which can also be maintained at each PC. Transfers are initiated and controlled by the PC. In this mode, the host side acts as a server, responding to the requests from the PC. Transfers can be performed by request or can be automated Data can be transferred in either EBCDIC or ASCII, with or without CRLF separation A script language is provided for both the PC and the host for use during all downloads. Scripts can be used for record selection and data format conversions, and the PC script can also be used for other file conversions. A PC upload script can be used to concatenate PC files and/or wrap host JCL around files during uploads
CSI International 8120 State Route 138 Williamsport, OH 43164-9767 http://www.csi-international.com
z/vse Software Solutions CSI International 8120 State Route 138 Williamsport, OH 43164-9767 http://www.csi-international.com (800) 795-4914 - USA (740) 420-5400 - Main Operator (740) 333-7335 - Facsimile
More informationERserver. iseries. Securing applications with SSL
ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users
More informationChapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
More informationChapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
More informationSecurity Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
More informationERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
More information3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
More informationNetwork Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
More informationE-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)
E-Commerce Security An e-commerce security system has four fronts: LECTURE 7 (SECURITY) Web Client Security Data Transport Security Web Server Security Operating System Security A safe e-commerce system
More informationCornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
More informationEnterprise Security Critical Standards Summary
Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors
More informationUsing etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
More informationDRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
More informationRELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release 2.12.9 - corrections. ADYTON Release 2.12.
Table of Contents Scope of the Document... 1 [Latest Official] ADYTON Release 2.12.9... 1 ADYTON Release 2.12.4... 1 ADYTON Release 2.9.3... 3 ADYTON Release 2.7.7... 3 ADYTON Release 2.6.2... 4 ADYTON
More informationz/os Firewall Technology Overview
z/os Firewall Technology Overview Mary Sweat E - Mail: sweatm@us.ibm.com Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration
More informationNetwork-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
More informationtechnical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
More informationTransport Layer Security Protocols
SSL/TLS 1 Transport Layer Security Protocols Secure Socket Layer (SSL) Originally designed to by Netscape to secure HTTP Version 2 is being replaced by version 3 Subsequently became Internet Standard known
More informationSecurity. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
More informationTN3270 Security Enhancements
TN3270 Security Enhancements SecureWay Communication Server for OS/390 Copyright IBM Corporation, 1999 1 Support in OS/390 V2.R6 Copyright IBM Corporation, 1999 2 Secure Sockets Layer - What is it? Application
More informationOverview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
More informationNetwork Management Card Security Implementation
[ APPLICATION NOTE #67 ] OFFER AT A GLANCE Offers Involved Network Management Card, APC Security Wizard Applications Configuration and monitoring of network managed devices Broad Customer Problem Secure
More informationSavitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
More informationWS_FTP: The smarter way to transfer files
WS_FTP: The smarter way to transfer files DATA WEB PAGES IMAGES VIDEO GRAPHICS WS_FTP: A Complete and Secure Data Management Solution The files that you transfer every day over the Internet are vulnerable
More informationHow To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
More informationOS/390 Firewall Technology Overview
OS/390 Firewall Technology Overview Mary Sweat E - Mail: sweatm@us.ibm.com Washington System Center OS/390 Firewall/VPN 1 Agenda OS/390 Firewall OS/390 Firewall Features Hardware requirements Software
More informationERserver. iseries. Printing
ERserver iseries Printing ERserver iseries Printing Copyright International Business Machines Corporation 1998, 2001. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure
More informationIBM INFORMATION MANAGEMENT SYSTEMS (IMS ) MIGRATION AND MODERNIZATION - CONVERSION OF HIERARCHICAL DL/1 STRUCTURES TO RDBMS
IBM INFORMATION MANAGEMENT SYSTEMS (IMS ) MIGRATION AND MODERNIZATION - CONVERSION OF HIERARCHICAL DL/1 STRUCTURES TO RDBMS Leverage the technology and operational advantages inherent within the modern
More informationTopics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
More informationSecurity Protocols/Standards
Security Protocols/Standards Security Protocols/Standards Security Protocols/Standards How do we actually communicate securely across a hostile network? Provide integrity, confidentiality, authenticity
More informationTable of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2
Table of Contents 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2 2 Features and Benefits 2-1 Key Features 2-1 Support for the Browser/Server Resource Access Model 2-1 Support for Client/Server
More informationCommunication Systems 16 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009
16 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2009 1 25 Organization Welcome to the New Year! Reminder: Structure of Communication Systems lectures
More informationSecure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
More informationOverview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
More informationLAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS
LAB FORWARD WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS Medical diagnostics are a vital part of the modern healthcare system, and instrument uptime is critical
More informationExperian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
More informationWeb Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University mdahshan@ccis.ksu.edu.sa
More informationDiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
More informationCommunication Security for Applications
Communication Security for Applications Antonio Carzaniga Faculty of Informatics University of Lugano March 10, 2008 c 2008 Antonio Carzaniga 1 Intro to distributed computing: -server computing Transport-layer
More informationOS/390 Firewall Technology Overview
OS/390 Firewall Technology Overview Washington System Center Mary Sweat E - Mail: sweatm@us.ibm.com Agenda Basic Firewall strategies and design Hardware requirements Software requirements Components of
More informationSecure Socket Layer/ Transport Layer Security (SSL/TLS)
Secure Socket Layer/ Transport Layer Security (SSL/TLS) David Sánchez Universitat Pompeu Fabra World Wide Web (www) Client/server services running over the Internet or TCP/IP Intranets nets widely used
More informationNetwork Security Web Security and SSL/TLS. Angelos Keromytis Columbia University
Network Security Web Security and SSL/TLS Angelos Keromytis Columbia University Web security issues Authentication (basic, digest) Cookies Access control via network address Multiple layers SHTTP SSL (TLS)
More informationhow can I optimize performance of my z/vm and Linux on System z environments?
SOLUTION BRIEF Velocity zvps Performance Suite how can I optimize performance of my z/vm and Linux on System z environments? agility made possible Measure, monitor and control the performance of your z/vm,
More informationIntroduction to Mainframe (z/os) Network Management
Introduction to Mainframe (z/os) Network Management Monday, August 10, 1:45-2:45 Session 17736 Dean Butler (butlerde@us.ibm.com) Agenda What is network management? Why manage the network on z/os? z/os
More informationSecurity Engineering Part III Network Security. Security Protocols (I): SSL/TLS
Security Engineering Part III Network Security Security Protocols (I): SSL/TLS Juan E. Tapiador jestevez@inf.uc3m.es Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
More informationAccellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
More informationFL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE. SSL/FTP (File Transfer Protocol over Secure Sockets Layer)
FL EDI SECURE FTP CONNECTIVITY TROUBLESHOOTING GUIDE This troubleshooting guide covers secure file transfers using the SFTP and SSL/FTP file transfer protocols for Claims, POC, and Medical EDI transmissions.
More informationSecurity. Learning Objectives. This module will help you...
Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security
More information7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
More informationTransport Level Security
Transport Level Security Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
More informationNetBrain Security Guidance
NetBrain Security Guidance 1. User Authentication and Authorization 1.1. NetBrain Components NetBrain Enterprise Server includes five components: Customer License Server (CLS), Workspace Server (WSS),
More informationSecuring Ship-to-Shore Data Flow
Securing Ship-to-Shore Data Flow Background on Common File Transfer Methods Today corporations, government entities, and other organizations rely on Electronic File Transfers as an important part of their
More informationINF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
More informationNetwork Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer sheryl@apnic.net Specialties: Network Security IPv6
More informationFINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
More informationNERC CIP Requirements and Lexmark Device Security
Overview The information in this document explains how Lexmark multifunction printers (MFPs) and network printers can assist with compliance to the NERC s Critical Infrastructure Protection (CIP) requirements.
More informationHow to setup Secure FTP with VSE
VSE as server and as client Last formatted on: Thursday, August 06, 2009 Joerg Schmidbauer jschmidb@de.ibm.com Dept. 3229 VSE Development IBM Lab Bo blingen Scho naicherstr. 220 D-71032 Bo blingen Germany
More informationWS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationSecure Use of the New NHS Network (N3): Good Practice Guidelines
Programme NPFIT Document Record ID Key Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0003.01 Prog. Director Mark Ferrar Status Approved Owner Tim Davis Version 1.0 Author Phil Benn Version
More informationAPNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist nurul@apnic.net Specialties: Routing &
More informationCS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
More informationSSL Acceleration: A Technology Primer
SSL Acceleration: A Technology Primer Overview Secure transactions are a necessity with e-commerce and sensitive corporate intranets and extranets. The Secure Sockets Layer (SSL) protocol is the widely
More informationCommunication Systems SSL
Communication Systems SSL Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 Network Security
More informationSSL VPN Technical Primer
4500 Great America Parkway Santa Clara, CA 95054 USA 1-888-NETGEAR (638-4327) E-mail: info@netgear.com www.netgear.com SSL VPN Technical Primer Q U I C K G U I D E Today, small- and mid-sized businesses
More informationWorkflow Solutions Data Collection, Data Review and Data Management
Data Collection, Data Review and Data Management Workflow Finding more efficient ways to support patient needs begins with better workflow management. MGC Diagnostics has developed a complete workflow
More informationExhibit B5b South Dakota. Vendor Questions COTS Software Set
Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event
More informationAT-S63 and AT-S63 NE Version 1.0.0 Management Software for the AT-9400 Series Layer 2+ Gigabit Ethernet Switches Software Release Notes
AT-S63 and AT-S63 NE Version 1.0.0 Management Software for the AT-9400 Series Layer 2+ Gigabit Ethernet Switches Software Release Notes Supported Platforms Please read this document before you begin to
More informationSSL VPN vs. IPSec VPN
SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White
More information2014 IBM Corporation
2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session
More informationLES LOGICIELS MAINFRAME
LES LOGICIELS MAINFRAME PrintSubSystem AFP printing on network printers and AFP2PDF conversion Enterprise Print Manager The OS/390 software printing solution AFP Conversion Module PDF makes mainframe data
More informationSync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
More informationTel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: info@cail.com Website: www.cail.com. CAIL Security Facility
Tel: 905.940.9000 Toll-Free: 800.668.5769 Fax: 905.940.9009 Oct 2005 Email: info@cail.com Website: www.cail.com CAIL Security Facility Table of Contents A. Overview B. CAIL Security Solutions C. Summary
More informationSecure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
More informationImplementing Secure Sockets Layer (SSL) on i
Implementing Secure Sockets Layer (SSL) on i Presented by Barbara Brown Alliance Systems & Programming, Inc. Agenda SSL Concepts History of SSL Digital Certificate Manager Local Certificate Authority Server
More informationSSL Handshake Analysis
SSL Handshake Analysis Computer Measurement Group Webinar Nalini Elkins Inside Products, Inc. nalini.elkins@insidethestack.com Inside Products, Inc. (831) 659-8360 www.insidethestack.com www.ipproblemfinders.com
More informationSecurity Secure Sockets Layer (SSL)
System i Security Secure Sockets Layer (SSL) Version 5 Release 4 System i Security Secure Sockets Layer (SSL) Version 5 Release 4 Note Before using this information and the product it supports, read the
More informationThe Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
More informationWhitepaper : Using Unsniff Network Analyzer to analyze SSL / TLS
Whitepaper : Using Unsniff Network Analyzer to analyze SSL / TLS A number of applications today use SSL and TLS as a security layer. Unsniff allows authorized users to analyze these applications by decrypting
More informationSBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
More informationSecurity Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
More informationReal-Time Communication Security: SSL/TLS. Guevara Noubir noubir@ccs.neu.edu CSU610
Real-Time Communication Security: SSL/TLS Guevara Noubir noubir@ccs.neu.edu CSU610 1 Some Issues with Real-time Communication Session key establishment Perfect Forward Secrecy Diffie-Hellman based PFS
More informationTop 10 Tips for z/os Network Performance Monitoring with OMEGAMON Ernie Gilman
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Ernie Gilman IBM Sr Consulting IT Specialist Session 10723 Agenda Overview of OMEGAMON for Mainframe Networks FP3 and z/os 1.12 1.OSA Express
More informationSecure File Transfer Appliance Security Policy Document Version 1.9. Accellion, Inc.
Secure File Transfer Appliance Security Policy Document Version 1.9 Accellion, Inc. November 11, 2010 Copyright Accellion, Inc. 2010. May be reproduced only in its original entirety [without revision].
More informationSecuring Network Print Jobs
White Paper - Levi, Ray & Shoup, Inc. Securing Network Print Jobs Enterprise Output Management Series LRS White Paper 2002 Levi, Ray & Shoup, Inc. All rights reserved. LRS, VPS, and are registered trademarks
More informationIBM Application Hosting EDI Services Expedite software adds Secure Sockets Layer TCP/IP support
Software Announcement June 1, 2004 Services Expedite software adds Secure Sockets Layer TCP/IP support Overview Services Expedite software for Microsoft Windows, AIX, and OS/400 is being enhanced to support
More informationLab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
More informationSysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
More informationImplementing Secure Sockets Layer on iseries
Implementing Secure Sockets Layer on iseries Presented by Barbara Brown Alliance Systems & Programming, Inc. Agenda SSL Concepts Digital Certificate Manager Local Certificate Authority Server Certificates
More informationGlobal Client Access Managed Communications Solutions. JPMorgan - Global Client Access. Managed Internet Solutions (EC Gateway)
Managed Communications JPMorgan - Global Client Access Managed Internet (EC Gateway) Managed Communications Overview JPMorgan offers a variety of electronic communications services that are reliable and
More informationCross-platform TCP/IP Socket Programming in REXX
Cross-platform TCP/IP Socket programming in REXX Abstract: TCP/IP is the key modern network technology, and the various REXX implementations have useful, if incompatible interfaces to it. In this session,
More informationa) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
More informationJava on z/os. Agenda. Java runtime environments on z/os. Java SDK 5 and 6. Java System Resource Integration. Java Backend Integration
Martina Schmidt martina.schmidt@de.ibm.com Agenda Java runtime environments on z/os Java SDK 5 and 6 Java System Resource Integration Java Backend Integration Java development for z/os 4 1 Java runtime
More informationDSI File Server Client Documentation
Updated 11/23/2009 Page 1 of 10 Table Of Contents 1.0 OVERVIEW... 3 1.0.1 CONNECTING USING AN FTP CLIENT... 3 1.0.2 CONNECTING USING THE WEB INTERFACE... 3 1.0.3 GETTING AN ACCOUNT... 3 2.0 TRANSFERRING
More informationHow to Secure Mainframe FTP
How to Secure Mainframe FTP Stu Henderson (301) 229-7187 stu@stuhenderson.com Scott Myers (408) 973-8374 scott@softwareassist.net 1 AGENDA I. Introduction II. III. IV. How Mainframe FTP is Different Mainframe
More informationMAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
More informationSharing Secrets Using Encryption Facility
Sharing Secrets Using Encryption Facility Eysha S. Powers IBM Corporation Insert Custom Session QR if Desired Tuesday, August 11, 2015: 6:00pm 7:00pm Session Number 17624 Cryptography is used in a variety
More informationNetwork Security - Secure upper layer protocols - Background. Email Security. Question from last lecture: What s a birthday attack? Dr.
Network Security - Secure upper layer protocols - Dr. John Keeney 3BA33 Question from last lecture: What s a birthday attack? might think a m-bit hash is secure but by Birthday Paradox is not the chance
More informationAcano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
More informationComparison of FTP and Signiant
Comparison of FTP and Signiant An In depth Comparison of FTP with Methodologies from Signiant Ian Hamilton, CTO, Signiant Abstract FTP (File Transfer Protocol) is used to perform file transfers over Internet
More information