Secure Messaging Challenge Technical Demonstration
|
|
- Ethan Gilbert
- 8 years ago
- Views:
Transcription
1 Secure Messaging Challenge Technical Demonstration The Open Group EMA Forum
2 Boeing s Messaging Needs Provide access to strongly encrypted outside the enterprise Reduce complexity of deploying secure Present a single solution which can span the enterprise Provide broadly acceptable solution to customers, partners, suppliers
3 Technical Requirements Use X.509 v3 CA Services Self-signed or purchased commercial certificates RSA algorithm with minimum 1024-bit key length Provide standards-based directory services accessible via the public Internet Certificate stored in standard usercertificate attribute Provide S/MIME compliant messaging client capable of requesting certificates from the directory Provide S/MIME compliant system Follow current standards regarding S/MIME, X.509 v3 and LDAP v3 COTS or open source products only
4 Scope Organization 2 Intranet Challenge Boundary Organization 1 Intranet Request to LDAP proxy with recipient's address External LDAP Proxy Internal LDAP Proxy LDAP Server with User Entries & Certificates LDAP Server or Proxy x509 v3 Public Key Desktop PC Desktop PC Network Firewall Public Network Network Firewall S/MIME Compliant Server Normal Message Route Normal Message Route Messaging Backbone Services Exchange Server
5 Deliverables Toolkit PKI Overview Certificate practices, guidelines and recommendations Lessons Learned Example architectures Comprehensive testing results Peer reviewed report of findings and recommendations
6 EMA Challenge Timeline Recruiting Scope Initial Architecture Testing and Validation Reporting and Demonstration Deployment Jul Sep Oct Nov Dec Jan Feb Mar Apr
7 Lynx Systems Lotus Notes and Test Solution A: Server: Lotus Notes Client: Lotus Notes LDAP: Lotus Notes Microsoft Exchange Test Solution B: Server: Microsoft Exchange 2000 Client: Microsoft Outlook 2000 SR1 and Security Patch LDAP: Linux with Open LDAP PKI Self-Signed Signed Root Certificate Authority on Microsoft Windows 2000 CA Server, Standalone
8 Server Lotus Notes DMZ A Notebook Mobile User Intranet Firewall Notebook Work Station Firewall Internet MS Windows 2000 PKI Linux Server + Open LDAP DMZ B Server Exchange
9 Boeing Demo Environment Messaging Environment Server: Microsoft Exchange 2000, and Key Management Server Client: Outlook 2000 SP2 Directory Environment Windows 2000 Active Directory PKI Environment Boeing Self-signed Root Microsoft Windows 2000 Standalone Subordinate CA Server LDAP presence Internal and External LDAP Proxy Servers Maxware Virtual Directory
10 Boeing Demo Environment Boeing Test Self-Sign Root Certificate Authority Internet Microsoft Windows 2000 Test Standalone Subordinate Certificate Authority External LDAP Proxy Maxware Virtual Directory Internal LDAP Proxy Maxware Virtual Directory Microsoft Windows 2000 Active Directory Microsoft Exchange 2000 Workstation With Microsoft Outlook 2000 SP2 Firewall Microsoft Exchange 2000 Key Management Server
11 SMTP/Vendor Certificate Architecture Messaging Environment Server: Sendmail and POP3 daemon on Linux Client: Outlook 2000 SP2 Directory Environment Directory.verisign verisign.com Directory server for Verisign issued certificates PKI Environment Purchased Verisign Class 1 X.509 V.3 certificates
12 SMTP/Vendor Certificate Architecture Purchased user certificates from directory.verisign.com Internet Workstation with Microsoft Outlook 2000 SP2 Linux with Sendmail 8.11 & POP3 daemon
13 Demonstration Scenario 1 Boeing Exchange to Lynx Exchange Directory lookup Send/Receive encrypted message Scenario 2 Lynx Notes to Smtptestbed.com Directory lookup Send/Receive encrypted message Scenario 3 Smtptestbed.com to Boeing Exchange Directory lookup Send/Receive encrypted message Scenario 4 Lynx Exchange to Lynx Notes Directory lookup Send/Receive encrypted message
14 Lynx Test Environment Demonstration Environment Notebook Mobile User Intranet Server Lotus Notes DMZ A Notebook Firewall Boeing Test Environment MS Windows 2000 PKI Linux Server + Open LDAP DMZ B Server Exchange Internet Boeing Test Self-Sign Root Certificate Authority Microsoft Windows 2000 Test Standalone Subordinate Certificate Authority SMTPTESTBED.COM Test Environment External LDAP Proxy Maxware Virtual Directory Internal LDAP Proxy Maxware Virtual Directory Firewall Microsoft Windows 2000 Active Directory Microsoft Exchange 2000 Workstation With Microsoft Outlook 2000 SP2 Workstation with Microsoft Outlook 2000 SP2 Linux with Sendmail 8.11 & POP3 Daemon Purchased user certificates can be found at directory.verisign.com Microsoft Exchange 2000 Key Management Server
15 Scenario 1 Boeing to Lynx Exchange Directory Lookup
16 Scenario 1 Boeing to Lynx Exchange Read Encrypted Message
17 Scenario 2 Lynx Notes to Smtptestbed.com Directory Lookup
18 Scenario 2 Lynx Notes to Smtptestbed.com Read Encrypted Message
19 Scenario 3 Smtptestbed.com to Boeing Directory Lookup
20 Scenario 3 Smtptestbed.com to Boeing Recipient Read Encrypted Message
21 Scenario 4 Lynx Exchange to Notes Encrypted Message
22 Scenario 4 Lynx Microsoft Exchange to Lotus Notes Encrypted Mail
Secure Messaging. Which kind of solution is the best for you? Agenda. Joachim Ringelnatz. Background Information. Standard Solutions
Secure Messaging CU IT-Security noventum consulting GmbH Which kind of solution is the best for you? LKBQ EFKD FPPR OBKL QEFK DFPP ROBY RQKL QEFK DFPK LQXI TXVP PROB. Joachim Ringelnatz Agenda Background
More informationExostar LDAP Proxy / SecureEmail Setup Guide. This document provides information on the following topics:
This document provides information on the following topics: Email Encryption set-up Outlook 2003 Email Encryption set-up Outlook 2007 Email Encryption set-up Outlook 2010 Email Encryption set-up Outlook
More informationAT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationCOMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
More informationAnalysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
More informationInstalling your Digital Certificate & Using on MS Out Look 2007.
Installing your Digital Certificate & Using on MS Out Look 2007. Note: This technical paper is only to guide you the steps to follow on how to configure and use digital signatures. Therefore Certificate
More informationACTIVE MICROSOFT CERTIFICATIONS:
Last Activity Recorded : August 30, 2012 Microsoft Certification ID : 30999 BERT VAN HOVE BARON EMPAINLAAN 68 MECHELEN, 2800 BE bert@road2result.be ACTIVE MICROSOFT CERTIFICATIONS: Microsoft Certified
More informationCase 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
More informationEnhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
More informationThe GlobalCerts TM SecureMail Gateway TM
Glob@lCerts PRODUCT OVERVIEW: The GlobalCerts TM SecureMail Gateway TM Automatic encryption and decryption is unique to the SecureMail Gateway. The GlobalCerts SecureMail Gateway is based on a network
More informationSpine Warranted Environment Specification
Spine Warranted Environment Specification 2015 Richard Trusson June 2015 1 Copyright 2015, Health and Social Care Information Centre. Contents Introduction 3 Scope 3 Intended Audience 4 Approach 4 Changes
More informationGlobalSign Enterprise Solutions
GlobalSign Enterprise Solutions Secure Email & Key Recovery Using GlobalSign s Auto Enrollment Gateway (AEG) 1 v.1.2 Table of Contents Table of Contents... 2 Introduction... 3 The Benefits of Secure Email...
More informationHow To Get A Certificate From Ms.Net For A Server Server
Last Activity Recorded : December 19, 2014 Microsoft Certification ID : 2665612 MARC GROTE Wittorfer Strasse 4 Bardowick, Lower Saxony 21357 DE grotem@it-training-grote.de ACTIVE MICROSOFT CERTIFICATIONS:
More informationACTIVE MICROSOFT CERTIFICATIONS:
Last Activity Recorded : August 04, 2011 Microsoft Certification ID : 483228 KENT NORDSTROM Asbergsvagen 27 Soderhamn, 82637 SW kent@xpservices.se ACTIVE MICROSOFT CERTIFICATIONS: Microsoft Certified Solutions
More informationACTIVE MICROSOFT CERTIFICATIONS:
Last Activity Recorded : May 30, 2014 Microsoft Certification ID : 375009 SUSANNE SCHNEIDER KAISERSTRASSE 53 REUTLINGEN, 72764 DE SUSANNE.SCHNEIDER@KIT-KOM.DE *Charter- Certification that was achieved
More informationAgriLife Information Technology IT General Session January 2010
AgriLife Information Technology IT General Session January 2010 Agenda Topics Year in Review Enterprise IT Services Update FirstCall Overview and Next Steps Sophos Antivirus Initiative Update Information/
More information2014 IBM Corporation
2014 IBM Corporation This is the 27 th Q&A event prepared by the IBM License Metric Tool Central Team (ICT) Currently we focus on version 9.x of IBM License Metric Tool (ILMT) The content of today s session
More informationPatch Management Overview Report Date generated: 24 Jul 2014 09:41AM G Lighting Site: Stl Office Device: VAULT Missing Security Update for Windows Server 2003 (KB2982792) Windows Malicious Software Removal
More informationE-mail encryption with business partners
(Guideline for ) Date: 2013-07-15 Document type: user description Version: 3.2 : Editorial team PKI cio.siemens.com Table of contents 1. Intention of the document:... 3 2. Prerequisites on business partner
More informationCENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY 2015. Small Commercial Service (SCS-1) GSR
JULY 2015 Area (RS-1) GSR GSR (LCS-1) Texarkana Incorporated July-15 $0.50690/Ccf $0.45450/Ccf $0.00000/Ccf $2.85090/MMBtu $17.52070/MMBtu Texarkana Unincorporated July-15 $0.56370/Ccf $0.26110/Ccf $1.66900/Ccf
More informationSecurity Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
More informationCarillon eshop User s Guide
Carillon eshop User s Guide Prepared by: Carillon Information Security, Inc. Version: 3.0 Updated on: 2015-01-29 Status: PUBLIC Contents Carillon eshop User Guide 1 Introduction... 4 1.1 Prerequisites...
More informationCenters for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS)
1 ebxml Case Study 2 3 4 5 Centers for Disease Control and Prevention, Public Health Information Network Messaging System (PHINMS) 4 October 2003 6 7 8 9 10 11 12 13 14 15 16 17 Document identifier: (Word)
More informationDeploying Microsoft Windows Rights Management Services
Deploying Microsoft Windows Rights Management Services Key Data Course #: 2827A Number of Days: 3 Format: Instructor-Led Certification Exams: None Elements of this syllabus are subject to change. This
More informationPTC Creo 2.0 Hardware Support Dell
PTC Creo 2.0 Hardware Support Dell Last updated: February 2, 2016 The Desktop Virtualization Environment Support Dell table displays at the end of this document, after the standard Creo certification table.
More informationSAP NetWeaver Identity Management Experiences from an Implementation at Colgate-Palmolive Company
[ [ SAP NetWeaver Identity Management Experiences from an Implementation at Colgate-Palmolive Company Sarah Henriquez Senior Manager IT Risk Management, Colgate-Palmolive Kristian Lehment Product Manager
More informationConfigure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows
Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows SecureZIP for Windows interoperates with leading PKI vendors including Entrust, VeriSign, and RSA to enable the
More informationQuickstream Connectivity Options
A division of Westpac Banking Corporation ABN 33 007 457 141 Quickstream Connectivity Options Document History Date 25-Jun-2003 1-Jul-2003 3-July-2003 18-July-2003 18-Aug-2003 8-Sep-2003 19-Sep-2003 31-Oct-2003
More informationEMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on August 16, 2012
EMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on August 16, 2012 This report provides information about software releases, including release dates, any announced
More informationAshley Institute of Training Schedule of VET Tuition Fees 2015
Ashley Institute of Training Schedule of VET Fees Year of Study Group ID:DECE15G1 Total Course Fees $ 12,000 29-Aug- 17-Oct- 50 14-Sep- 0.167 blended various $2,000 CHC02 Best practice 24-Oct- 12-Dec-
More informationPrivaSphere Gateway Certificate Authority (GW CA)
PrivaSphere Gateway Certificate Authority (GW CA) Send and receive secure emails with your email program through restricting firewalls using SMIME gateway functionalities. PrivaSphere Secure Messaging
More informationClient side. DESlock + Data Encryption
Data Encryption DESlock + is a simple-to-use encryption application for companies large and small. Take advantage of the optimized setup that speeds up the time to adoption for admins. The client side
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
More information5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007
5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007 Course Number: 5053A Course Length: 3 Days Course Overview This three-day instructor-led course provides students with the
More informationDepartment of Defense SHA-256 Migration Overview
Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA Timothy.Fong@osd.mil General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto
More informationBad Honnef 14.-15. September 2010. Reiner Schmitt. schmitt consulting. your license. our business
Bad Honnef 14.-15. September 2010 Reiner Schmitt schmitt consulting your license. our business Agenda 1. Responsibilities @ SAP AG 2. Motivation / Challenges for Software License & Asset 3. Transparency
More informationDigital Certificate Discovery for Health Care Providers
Provider Directories Initiative Overview PD PD PD PD PD PD PD January 20, 2012 Table of Contents 1 Introduction to the S&I Framework 2 3 What is unique about the S&I Framework Introduction to Provider
More informationTrends in Global Capacity Availability and Trading. Bruce Girdlestone VP Network Trading Band-X
Trends in Global Capacity Availability and Trading Bruce Girdlestone VP Network Trading Band-X Topics The Trading of Bandwidth International Deployment of Capacity An imbalance in supply and demand A new
More informationEMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on February 21, 2013
EMC Software Release and Service Dates for NetWorker and NetWorker Modules Last Updated on February 21, 2013 This report provides information about software releases, including release dates, any announced
More informationCouncil, 6 February 2014. IT Report. Executive summary and recommendations. Introduction
Council, 6 February 2014 IT Report Executive summary and recommendations Introduction The report sets out the main activities of the IT Department since the last meeting of Council. It includes statistical
More informationMS-10135 - Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010
MS-10135 - Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Introduction This course will provide you with the knowledge and skills to configure and manage a Microsoft Exchange
More informationThe Egyptian IPv6 TF
The Egyptian IPv6 TF Update and Lessons Learned Nezar Nabil Sami Egyptian National S&T Information Network (ENSTINET) nns@sti.sci.eg Road Map Quick Overview E-IPv6 Milestones E-IPv6 Test Bed Lessons Learned
More informationCommittee of the Whole. January 22, 2014
Committee of the Whole January 22, 2014 Drivers for 2003 IT Outsourcing Cost savings - privatization model ($2- $3MM/year) Cost avoidance Data center lease with County expiring ($3.5MM) Disaster recovery
More informationAccess to Front Office services
Electricity Transmission System Operator Access to Front Office services Supported Configuration Version 1.4, 2009-07-16 Page : 2/5 CONTENT 1. Purpose of the document 3 2. Operating systems supported for
More information20415 - Implementing a Desktop Infrastructure
20415 - Implementing a Desktop Infrastructure Duration: 5 days Course Price: $2,975 Software Assurance Eligible Course Description Course Overview This 5-day instructor-led training course provides you
More informationHow to use Certificate in Microsoft Outlook
How to use Certificate in Microsoft Outlook Macau Post esigntrust Version. 2006-01.01p Agenda Configure Microsoft Outlook for using esigntrust Certificate Use certificate to sign e-mail Use Microsoft Outlook
More informationDeep Security Vulnerability Protection Summary
Deep Security Vulnerability Protection Summary Trend Micro, Incorporated This documents outlines the process behind rules creation and answers common questions about vulnerability coverage for Deep Security
More informationS/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: October 08, 2014
S/MIME on Good for Enterprise MS Online Certificate Status Protocol Installation and Configuration Notes Updated: October 08, 2014 Installing the Online Responder service... 1 Preparing the environment...
More informationHuman Resources Management System Pay Entry Calendar
Human Resources Management System Pay Entry Calendar http://www1.umn.edu/ohr/payroll/calendars/index.html Important Information The system is unavailable for entry, due to maintenance, during the following
More informationOutlook Anywhere Local Client Setup Instructions
Outlook Anywhere Local Client Setup Instructions Before you start please note: The minimum system requirements are as per below. Please do not underestimate the importance of these minimum requirements.
More informationPowerSteering Hosting/Cloud Investments
Do the right work. Do the work right. cloud-based project, portfolio and work management software PowerSteering Hosting/Cloud Investments Sean Nathaniel, VP of Product Development 9/17/2013 How to Participate
More informationHow to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson Copyright Information
More informationCraven County Information Technology Who are we?
Who are we? Made up of IT and GIS personnel Eight computer related professionals Five GIS (Geographic Information Systems) & Tax Mapping Professionals All working to provide employees and citizens a dependable,
More informationTest Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability. Version 1.0.3
Test Plan for Department of Defense (DoD) Public Key Infrastructure (PKI) Interagency/Partner Interoperability Version 1.0.3 Prepared for: Department of Defense (DoD) PKI August 27, 2008 Page 1 Table of
More informationVMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.
VMware Virtual Desktop Infrastructure (VDI) - The Best Strategy for Managing Desktop Environments Mike Coleman, VMware (mcoleman@vmware.com) Copyright 2008 EMC Corporation. All rights reserved. Agenda
More informationDeep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison
Deep Security/Intrusion Defense Firewall - IDS/IPS Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security and Intrusion Defense Firewall. The document
More informationComputing & Telecommunications Services Monthly Report March 2015
March 215 Monthly Report Computing & Telecommunications Services Monthly Report March 215 CaTS Help Desk (937) 775-4827 1-888-775-4827 25 Library Annex helpdesk@wright.edu www.wright.edu/cats/ Last Modified
More informationRSA Digital Certificate Solution
RSA Digital Certificate Solution Create and strengthen layered security Trust is a vital component of modern computing, whether it is between users, devices or applications in today s organizations, strong
More informationSAP Business Planning and Consolidation Version 10.0 for NetWeaver. Platform Information, Support Pack Dates and Maintenance Dates.
Version 10.0 for NetWeaver Platform Information, Support Pack Dates and Maintenance Dates May 4, 2016 Disclaimer This PAM represents current planning for SAP Business Planning and Consolidation Version
More informationThe proposed Project Phase work II is expected to be completed in July of 2008
REPORT TO THE CITY COUNCIL AGENDA ITEM NO. August 22, 2007 COUNCIL MEETING APPROVED BY FROM: BRUCE A. RUDD, Assistant City Manager DEPARTMENT DIRECTOR CITY MANAGER SUBJECT: ISD Network Migration Project
More informationEmployers Compliance with the Health Insurance Act Annual Report 2015
Employers Compliance with the Health Insurance Act Annual Report 2015 ea Health Council Health Council: Employers Compliance with the Health Insurance Act 1970 Annual Report 2015 Contact us: If you would
More informationHow To Deploy Cisco Jabber For Windows 2.5.1 On A Server Or A Network (For A Non-Profit) For A Corporate Network (A.Net) For Free (For Non Profit) For An Enterprise) Or
Deployment Models Cisco Jabber for Windows provides two deployment models, on-premises or cloud-based. Learn about each deployment model and review the available options for on-premises and cloud-based
More informationEnterprise Security Critical Standards Summary
Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors
More informationLeveraging Technology For ICD-10 Program Management Using MS SharePoint 2010. Poster Presentation by Maithili Vadula
Leveraging Technology For ICD-10 Program Management Using MS SharePoint 2010 Poster Presentation by Maithili Vadula ICD-10 Project using SharePoint: Project Background: New structure for coding diagnosis
More informationDigital certificates and SSL
Digital certificates and SSL 20 out of 33 rated this helpful Applies to: Exchange Server 2013 Topic Last Modified: 2013-08-26 Secure Sockets Layer (SSL) is a method for securing communications between
More informationDeep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison
Deep Security Intrusion Detection & Prevention (IDS/IPS) Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison
More informationDeploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
More informationCitrix MetaFrame XP Security Standards and Deployment Scenarios
Citrix MetaFrame XP Security Standards and Deployment Scenarios Including Common Criteria Information MetaFrame XP Server for Windows with Feature Release 3 Citrix Systems, Inc. Information in this document
More informationDeploying iphone and ipad Apple Configurator
Deploying iphone and ipad Apple Configurator ios devices can be configured for enterprise deployment using a wide variety of tools and methods. End users can set up devices manually with a few simple instructions
More information6445A - Implementing and Administering Small Business Server 2008
6445A - Implementing and Administering Small Business Server 2008 Table of Contents Introduction Audience At Clinic Completion Prerequisites Microsoft Certified Professional Exams Student Materials Course
More informationHybrid Architecture. Office 365. On-premises Exchange org (Exchange 2007+) Provisioned via DirSync. Secure Mail flow
Hybrid Deployment Hybrid Architecture Provisioned via DirSync Exchange 2010 (HUB/CAS) Exchange 2013 CAS & MBX Secure Mail flow Exchange Federation (Free/Busy, Mail Tips, Archive, etc.) Mailbox data via
More informationKaspersky Endpoint Security 10 for Windows. Deployment guide
Kaspersky Endpoint Security 10 for Windows Deployment guide Introduction Typical Corporate Network Network servers Internet Gateway Workstations Mail servers Portable media Malware Intrusion Routes Viruses
More informationCA Email Supervision Architecture Stack
SOLUTION BRIEF SEPTEMBER 2014 CA Email Supervision Architecture Stack Leo Garcia CA Technologies, Sr Services Consultant 2 SOLUTION BRIEF: CA EMAIL SUPERVISION ARCHITECTURE STACK ca.com Executive Summary
More informationNeuroworks / Sleepworks Microsoft Windows Update Guide
Neuroworks / Sleepworks Microsoft Windows Update Guide Document #: Date: Revision: Change order: DCMX-038621 16-Oct-2015 ZE DCO#13693 Revision History: Refer to Appendix A I certify that, in my capacity
More informationFeature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
More informationMcAfee Endpoint Protection Products
McAfee Total Protection Security Overview for MEEC Sumeet Gohri, CISSP Sr. Sales Engineer GovED + Healthcare McAfee, Inc. Agenda Protection Challenges McAfee Protection Products McAfee epo walkthrough
More informationMS-10135: Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010. Course Objectives. Price. Duration. Methods of Delivery
MS-10135: Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 This five-day instructor led course will provide you with the knowledge and skills to configure and manage an Exchange
More informationUsing MobileIron Sentry for Control and Visibility into ActiveSync Devices
Smart about Smartphones Vol. 4 Using MobileIron Sentry for Control and Visibility into ActiveSync Devices Introduction With the rising popularity of Apple ios, Android, Windows Mobile and Symbian devices
More informationCiphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
More informationDeploying and Managing a Public Key Infrastructure
Deploying and Managing a Public Key Infrastructure 2821: Deploying and Managing a Public Key Infrastructure (4 Days) About this Course This four-day, instructor-led course provides students with the knowledge
More informationMS 10135B Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010
MS 10135B Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Description: Days: 5 Prerequisites: This course will provide you with the knowledge and skills to configure and manage
More informationA new Secure Remote Access Platform from Giritech. Page 1
A new Secure Remote Access Platform from Giritech Page 1 Remote users have preferences G/On 5 works for Windows, Mac and Linux The G/On Client user experience is specific to the operating system Users
More informationwww.novell.com/documentation Administration Guide Certificate Server 3.3.8 May 2013
www.novell.com/documentation Administration Guide Certificate Server 3.3.8 May 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
More informationSoftline VIP Payroll System Requirements v2.9a January 2010
i Softline VIP Payroll System Requirements v2.9a January 2010 Table of Contents Introduction... 1 Assumptions... 1 Standalone Requirements... 2 Note:Peer-to-peer Network Installations... 2 Peer-to-peer
More informationAuditing Microsoft Exchange. Presented by Brian Thomas, featuring Shohn Trojacek from PivotPoint Solutions
Auditing Microsoft Exchange Presented by Brian Thomas, featuring Shohn Trojacek from PivotPoint Solutions March 17, 2011 Presenters Brian Thomas, CISA, CISSP Weaver Partner, IT Advisory Services Provides
More informationAxway Validation Authority Suite
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
More informationGeneral Specifications
General Specifications GS 33Q02N81-31E LPC7800 VTSPortal Basic Pack LPC7801 VTSPortal Multiple Client Builder License GENERAL The primary objective of the Yokogawa Versatile Terminal Service Application
More informationLinux Collaboration Solution to Replace Microsoft Office
Linux Collaboration Solution to Replace Microsoft Office Problem with Traditional Collaboration Solutions E-Mail/ Calendar E-Meeting Teamroom Document Management E-Learning Instant Messaging John D. John
More informationCost effective methods of test environment management. Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA
Cost effective methods of test environment management Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA 2013 Agenda Basic complexity Dynamic needs for test environments Traditional
More informationAlcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration
Alcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration September, 2009 TC1312 Alcatel-Lucent Office Offer - All Rights Reserved Alcatel-Lucent 2009
More informationMOC 6436A: Designing Active Directory Infrastructure and Services in Windows Server 2008
MOC 6436A: Designing Active Directory Infrastructure and Services in Windows Server 2008 Course Number: 6436A Course Length: 5 Days Course Overview At the end of this five-day course, students will learn
More informationPOSTX SECURE BUSINESS COMMUNICATION
POSTX SECURE BUSINESS COMMUNICATION Businesses must provide a secure and private environment for electronic communication INTRODUCTION As customers increasingly select the Internet as their preferred communication
More informationConsumer ID Theft Total Costs
Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially
More informationSharePoint 2013 Infrastructure Planning
SharePoint 2013 Infrastructure Planning SharePoint Configuration March 3, 2014 SharePoint 2013 Infrastructure Planning Confidential and Proprietary Information Entire contents Scholantis Learning Software
More informationDiploma in Computer Science
SPECIALIST PROFILE Personal Details Reference: Job Title: Nationality: IT Experience: Qualifications: Languages: CN5191 Senior Linux Engineer British 22 years RedHat Certified Engineer Diploma in Computer
More informationMCITPEXCH - Exchange Bootcamp Design, Configure, and Manage (10135/10233)
MCITPEXCH - Exchange Bootcamp Design, Configure, and Manage (10135/10233) Table of Contents Introduction Audience At Course Completion Prerequisites Microsoft Certified Professional Exams Student Materials
More informationImplementing and Managing Microsoft Desktop Virtualization
Implementing and Managing Microsoft Desktop Virtualization Course 10324: 5 days, Instructor-led Course Description This five-day, instructor-led course provides you with the knowledge and skills to implement
More informationCAFIS REPORT 2015.10
CAFIS REPORT 2015.10 INDEX Message CAFIS Inbound 03-06 07-08 CAFIS Arch 09-10 CAFIS Brain 11-12 CAFIS Global 13-14 What We Do 15-16 About CAFIS 17-18 Services for Member Stores 19-34 Services for Card
More informationEMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support
EMC Celerra Version 5.6 Technical Primer: Public Key Infrastructure Support Technology Concepts and Business Considerations Abstract Encryption plays an increasingly important role in IT infrastructure
More information