Information Rights Management
|
|
|
- Willis Clark
- 10 years ago
- Views:
Transcription
1 Information Rights Management EDRM Enterprise Digital Rights Management vs DFP Data Flow Protection E.ON IS, Thilo Müller April 2008 EIC 2008
2 Agenda E.ON IS Introduction DRM and DFP Definition Use Case Challenges Vision Comparison - Classification Conclusion EIC /2008 Thilo Müller DRM/DFP Seite 2
3 Service Offering Portfolio Solutions and Processes E.ON IS: one of the top Full Service IT-Provider for the European energy industry EIC /2008 Thilo Müller DRM/DFP Seite 3
4 E.ON IS Group - Overview EIC /2008 Thilo Müller DRM/DFP Seite 4
5 Identity E.ON IS Central LDAP Meta Directory, Synchronisation between ADs, HR, Authorisation and Group Management for Applications PKI: Base infrastructure, accompanying PKI deployments Authentication from in- and outside the network External Authentication Remote Access WLAN Guest network authentication Innovation Projects involving OTP, 802.1x Encryption: Notebooks, folders, mails and archives Digital Signature: Centralized service for lawful signing documents, bills, credit notes EIC /2008 Thilo Müller DRM/DFP Seite 5
6 Protection is (slowly) climbing the OSI-layers DRM/DFP 2010? Firewall IPaddress Port-security Pre 1980 Web(Proxy)login Web(Proxy)login 7. Application Network process to application 6. Presentation Data representation and encryption 5. Session Interhost communication Segments 4. Transport End-to-end connections and reliability 3. Network Path determination and logical addressing (IP) Frames 2. Data link Physical addressing (MAC & LLC) Bits 1. Physical Media, signal and binary transmission Protect the data itself, not the system IT has to provide user friendly, seamless methods for defining protection rules for digital data for end users EIC /2008 Thilo Müller DRM/DFP Seite 6
7 Part 1 - EDRM Agenda E.ON IS Introduction EDRM Definition Use Case Product example : MS RMS Challenges Integration, User Interaction Vision RBAC, external Partners Conclusion EIC /2008 Thilo Müller DRM/DFP Seite 7
8 EDRM Definition EDRM means Enterprise Digital Rights Management The protection is document centric A document owner defines who can do what with a document Defined rights include read, edit, print, copy and paste, printscreen and can include time constraints EIC /2008 Thilo Müller DRM/DFP Seite 8
9 Use Case EDRM Confidential Documents from HR, Merger and Aquisitions Protection against document copying or copy and pasting, Trojan attacks forwarding of confidential documents EIC /2008 Thilo Müller DRM/DFP Seite 9
10 MS RMS Solution Seamless Integration in MS environment Already integrated in Vista and Office 2007 PKI integrated, No CRLs needed, AD integrated FIPS140 compliant EIC /2008 Thilo Müller DRM/DFP Seite 10
11 EDRM product example MS RMS Microsoft Rights Management Services (RMS) allows users to encrypt data content and assign usage rights. These usage rights are specified down to the level of individual user or group of users and are retained in the structure of the document itself. Applicable controls: User access controls within a document or other materials Use restrictions within a document on a user basis Controls that prevents unauthorised copying Restrictions that prevent tampering with original content Deliver the ability to revoke access to the content These controls are enforced natively through the Microsoft Windows Client, which controls the Office product suite. Source : Microsoft EIC /2008 Thema Thilo Müller Datum DRM/DFP Bereich Seite 11
12 EDRM - RMS Architecture overview RAC Database Active Directory 1. The author receives a certificate from the RMS before using RMS for the first time RMS 2. The author defines rights using a RMS enabled application. The document is protected and encrypted. RAC RAC 3. The document is distributed 4. The receiver opens the document with a RMS enabled application which checks the user license and the user rights at the RMS server. Author Receiver 5. The RMS RMS Application gains access using the given policy. CLC EIC /2008 Thilo Müller DRM/DFP Seite 12
13 EDRM Integration, RMS Architecture overview Certification UK Certification GER Certification n MS SQL MS SQL MS SQL Forrest UK Forrest GER Forrest n Licensing Cluster MS SQL Central AD Repository, user permission check for licensing EIC /2008 Thilo Müller DRM/DFP Seite 13
14 EDRM Vision Integration with RBAC HR users gets document to HR documents Documents are automatically EDRM protected. Automatic EDRM protection for incoming s and content/context specific for documents Documents are downloaded using a Portal and automatically protected using EDRM. User registration and authorisation can be managed by the Portal Integration of external partners EIC /2008 Thilo Müller DRM/DFP Seite 14
15 Part 2 - DFP Agenda E.ON IS Introduction DFP Definition Use Case - USB Protection Product example - Verdasys Digital Guardian Challenges Integration, User Interaction Vision Self Monitoring Clients, Intelligent Data Tagging Conclusion EIC /2008 Thilo Müller DRM/DFP Seite 15
16 Definition DFP Data Flow Protection DFP heads at the protection of the movement of data DFP is primarily client specific Specific rules for the client are centrally defined. The user action like moving files or burning cds is monitored, logged or even stopped EIC /2008 Thilo Müller DRM/DFP Seite 16
17 Use Case DFP Prevent for example usage of USB memory sticks without encryption in general or just prohibit storage of classified data Different ways to address and to handle this issue like: Allow only a defined set of devices, like e.g. encrypted USB sticks If the USB device does not support encryption, data will be transparently encrypted (company key) without any necessary user interaction Action is totally stopped Users can be prompted with a message that either this action will be completely blocked or a warning message will be shown, but action can still be performed Actions could be controlled upon file operations (read, write, execute, etc.) EIC /2008 Thilo Müller DRM/DFP Seite 17
18 DFP product example Verdasys Digital Guardian Protected Client Local Disk Tagged Data copied/moved/saved as to local disk must only be stored in a defined folder! e.g. SAN Storage TAG Allowed! TAG TAG Action! Filer Control Flow of Files Secure Files are encrypted locally using the corporate File & Folder Encryption tool TAG Sensitive Documents are marked ( Tagged ) in the NTFS File System! Tags must be persistent! USB Stick with Encryption Standard USB Stick without Encryption Control Usage of USB Devices EIC /2008 Thilo Müller DRM/DFP Seite 18
19 Challenges DFP The client behavior is logged. The logging data is critical because user actions are monitored. Germany has strict laws for recording employee actions. The introduction of such monitoring tools involve the work concil / Betriebsrat. Separation of power for administration has to be used. The client should not be slowed down. The ruleset has to be specific. The user is confronted with new error messages / system behavior. How is the data classified? Depending on team folder z:\team\unit EIC /2008 Thilo Müller DRM/DFP Seite 19
20 DFP Vision Additionally to the folder where the data is stored, the content of the document content could influence the classification. According to rules and using encryption, the tagging can be expanded through local user groups. The document classification could be expanded using a document database with similar documents. EIC /2008 Thilo Müller DRM/DFP Seite 20
21 Comparison EDRM / DFP - classification Protect every document in the enterprise? closed user group no important document leaves the company, define processes for external communication (Portal?) Protect only confidential documents? according to BND 5% are important (German Secret Service) EDRM use case, user interaction, user schemata, only online usage Content Use filters like mastercard, text confidential, spam filter techniques Context Where is the document stored, which way did it take in the enterprise EIC /2008 Thilo Müller DRM/DFP Seite 21
22 Conclusion We see an urgent need for an enterprise wide USB protection and see advantages in an DFP solution which is not bound to one interface like USB or Firewire We see a need for the protection of data using EDRM for but the integration in our architecture has to be simplified maybe using RBAC Both products complement each other. Both products will merge to one suite in the future where data is classified after content and context and protected at application level. EIC /2008 Thilo Müller DRM/DFP Seite 22
23 No protection against analog attacks EIC /2008 Thilo Müller DRM/DFP Seite 23
24 Questions - RMS Contact Frank Thilo Müller Security Engineer Volker Schwarzhaupt Head of Identity Management E.ON IS Information Rights Management Group, XING EIC /2008 Thilo Müller DRM/DFP Seite 24
25 Backup Slides Please overwrite text EIC /2008 Thilo Müller DRM/DFP Seite 25
26 RMS process - First Time Authentication RMS 3. Connecting first time RMS MS SQL E.ON PKI Certificate Delivery and maintenance Process lockbox machine certificate 1. Smartcard Login AD 4. Generating machine certificate and installing RMS client 2. Successful authentification Certificate Issuance E.ON PKI EIC /2008 Thilo Müller DRM/DFP Seite 26
27 RMS process User registration User 1 1.E.ON PKI 4.user certificate RAC lockbox 2.machine certificate 5. First RMS usage CLC RMS MS SQL RAC 3.user certificates CLC User 2 RAC machine certificate CLC User XXXX CLC E.ON PKI lockbox machine certificate E.ON PKI RAC CLC E.ON PKI lockbox EIC /2008 Thilo Müller DRM/DFP Seite 27 RAC CLC
28 RMS process User registration User 1 1.E.ON PKI 4.user certificate RAC lockbox 2.machine certificate 5. First RMS usage CLC RMS MS SQL RAC 3.user certificates CLC User 2 RAC machine certificate CLC User XXXX CLC E.ON PKI lockbox machine certificate E.ON PKI RAC CLC E.ON PKI lockbox EIC /2008 Thilo Müller DRM/DFP Seite 28 RAC CLC
29 DRM Delivery Process 1 Offline process 5.Check permissions RMS MS SQL 4. decrypts publishing license 6. encrypts use license RAC RAC sender and receiver user certificate 3. receiver requests use license by sending encrypted publishing license 7.Use license per user E.ON PKI lockbox machine certificate 1.RMS enabled application defines policy 2. Document is delivered to receiver with publishing license 8.DRM application lockbox decrypts use license, user is bound to policy, offline usage now possible EIC /2008 Thilo Müller DRM/DFP Seite 29
30 Terminology Review Lockbox: unique per-machine security DLL Stores machine s private key RAC: user s RM Account Certificate Identity of the user [one per user] CLC: user s Client Licensor Certificate Copy of RMS server s public key for publishing [one per user] Also contains publishing keypair for the user PL: document s Publishing License Where rights and content key are stored [one per document] UL: Use License Where user s copy of content key is stored [one per document per user] EIC /2008 Thilo Müller DRM/DFP Seite 30
31 Topology Generic Architecture Certification A Certification B Certification n MS SQL MS SQL MS SQL Forest A Forest B Forest n Licensing Cluster MS SQL Central AD Repository, user permission check for licensing EIC /2008 Thilo Müller DRM/DFP Seite 31
32 Architecture Certificate A MS SQL Exchange server keys and establish trust Two virtual s Certificate B MS SQL Two virtual s Forest A Connector synchronizing adresses Location? 2-n virtual s HSM Licensing MS SQL High Security Module appliances protect keys and improve encryption performanc e HSM Forest B Connector synchronizing adresses At least two virtual s Central AD Repositor EIC /2008 Thilo Müller DRM/DFP Seite 32 y
33 DFP Solution Architecture ~ 100 Digital Guardian Agents Data base Laptop Activity Monitoring Web-Based Administrative Access Digital Guardian (DG ) Policies and Rules PC Digital Guardian Management Console (DGMC) EIC /2008 Thilo Müller DRM/DFP Seite 33
Active Directory Rights Management Services integration (AD RMS)
MOSS Information Rights Management Ashish Bahuguna [email protected] Active Directory Rights Management Services integration (AD RMS) Agenda AD RMS Overview AD RMS Architecture Components MOSS
Rights Management Services
www.css-security.com 425.216.0720 WHITE PAPER Microsoft Windows (RMS) provides authors and owners the ability to control how they use and distribute their digital content when using rights-enabled applications,
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities.
A8.1 Asset Management Responsibility for assets: To identify organisational assets and define appropriate protection responsibilities. 8.1.1 Inventory of assets. Tripwire IP360 provides comprehensive host
ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server
ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server Inhalte Teil 01 Network Architecture Standards Network Components and Terminology Network Architecture Network Media Access Control Methods
Understanding Northwestern University s contract with Symantec. Symantec Solutions for Cost Reduction & Optimization
Understanding Northwestern University s contract with Symantec Symantec Solutions for Cost Reduction & Optimization Chris Hagelin and Shane Scholes Symantec Account Manager and Symantec Sales Engineer
Using BitLocker As Part Of A Customer Data Protection Program: Part 1
Using BitLocker As Part Of A Customer Data Protection Program: Part 1 Tech Tip by Philip Cox Source: searchsecuritychannel.com As an information security consultant, one of my jobs is to help my clients
Email Security Solutions
TECHNOLOGY REPORT Email Security Solutions 1 TECHNOLOGY REPORT SUPPLEMENT EMAIL SECURITY TECHNOLOGY REPORT IF YOUR EMAIL IS SO CRITICAL, CAN YOU BE SURE IT S REALLY REALLY PRIVATE? FIND THE FULL RESULTS
MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Architecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide
WHITE Deployment PAPERGuide Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide An Acronis White Paper Copyright Acronis, Inc., 2000 2011 Deployment Guide Table of contents About
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Secure any data, anywhere. The Vera security architecture
2015 VERA TECHNICAL WHITEPAPER Secure any data, anywhere. The Vera security architecture At Vera TM, we believe that enterprise security perimeters are porous and data will travel. In a world of continuous
Installation and Configuration Guide
Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
A new Secure Remote Access Platform from Giritech. Page 1
A new Secure Remote Access Platform from Giritech Page 1 Remote users have preferences G/On 5 works for Windows, Mac and Linux The G/On Client user experience is specific to the operating system Users
Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan
The Truth about Data Loss Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan RSA Data Loss Prevention Data Breaches Overview RSA DLP Solution Five Critical Factors
Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015
Mobile OTPK Technology for Online Digital Signatures Dec 15, 2015 Presentation Agenda The presentation will cover Background Traditional PKI What are the issued faced? Alternative technology Introduction
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity
Innovative Secure Boot System (SBS) with a smartcard.
Managed Security Services Desktop Security Services Secure Notebook Desktop Security Services. Secure Notebook. Today s business environment demands mobility, and the notebook computer has become an indispensable
5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007
5053A: Designing a Messaging Infrastructure Using Microsoft Exchange Server 2007 Course Number: 5053A Course Length: 3 Days Course Overview This three-day instructor-led course provides students with the
MCITP MCITP: Enterprise Administrator on Windows Server 2008 (5 Modules)
MCITP Windows 2008 Enterprise Edition is considered as Microsoft s most reliable, scalable and high-performing server operating system. It has been designed to simplify the process of Migration from the
70-662: Deploying Microsoft Exchange Server 2010
70-662: Deploying Microsoft Exchange Server 2010 Course Introduction Course Introduction Chapter 01 - Active Directory and Supporting Infrastructure Active Directory and Supporting Infrastructure Network
Deploying Microsoft Windows Rights Management Services
Deploying Microsoft Windows Rights Management Services Key Data Course #: 2827A Number of Days: 3 Format: Instructor-Led Certification Exams: None Elements of this syllabus are subject to change. This
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2
DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...
The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximise their productivity and they expect that enterprise collaboration and communication tools should
Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximise their productivity and they expect that enterprise collaboration and communication tools should
The Encryption Anywhere Data Protection Platform
The Encryption Anywhere Data Protection Platform A Technical White Paper 5 December 2005 475 Brannan Street, Suite 400, San Francisco CA 94107-5421 800-440-0419 415-683-2200 Fax 415-683-2349 For more information,
Installation Guide. Tech Excel January 2009
Installation Guide Tech Excel January 2009 Copyright 1998-2009 TechExcel, Inc. All Rights Reserved. TechExcel, Inc., TechExcel, ServiceWise, AssetWise, FormWise, KnowledgeWise, ProjectPlan, DownloadPlus,
Frequently Asked Questions
Table of contents 1. Agent Technology...3 1.1. Has the Knoa agent been tested with standard set of services on the PC?... 3 1.2. Do users need to do anything to activate the Agent?...3 1.3. Does the Knoa
סילבוס -MCITP מנהלי רשתות
סילבוס -MCITP מנהלי רשתות 1.Planning and Maintaining a Microsoft Windows Server 2008 Network Infrastructure Implementing and Configuring a Windows Deployment Infrastructure Deploying Windows in a Windows
CRYPTAS it-security GmbH
Winmagic SecureDoc Enterprise Server 4.3.1 Common functionality CRYPTAS it-security GmbH Modecenterstrasse 22/B2 A-1030 Wien www.cryptas.com Knowlegde Guide Vienna, December 2007 Winmagic SecureDoc Enterprise
Royal Mail Group. getting started. with Symantec Endpoint Encryption. A user guide from Royal Mail Technology
getting started with Symantec Endpoint Encryption A user guide from Royal Mail Technology For further help, contact the IT Helpdesk on 5415 2555 (01246 282555) March 2010 Contents 1 Introduction to Symantec
Sage CRM Technical Specification
Sage CRM Technical Specification Client Software This document outlines the recommended minimum software and hardware requirements for running Sage CRM. Please note that while the document refers to Sage
Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure. Addressing the Concerns of the IT Professional Rob Weber February 2015
Whitepaper Enhancing BitLocker Deployment and Management with SimplySecure Addressing the Concerns of the IT Professional Rob Weber February 2015 Page 2 Table of Contents What is BitLocker?... 3 What is
GRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
Archive One Policy V4.2 Quick Start Guide October 2005
Archive One Policy V4.2 Quick Start Guide October 2005 Archive One Policy Quick Start Guide V4.2 Page 1 of 33 CONTENTS Introduction... 3 Components...3 Before You Start...4 System Requirements...5 Prerequisites...7
The All-in-One Support Solution. Easy & Secure. Secure Advisor
The All-in-One Support Solution. Easy & Secure. Secure Advisor Secure Advisor - A Perfect Solution for Online Support Fast and easy remote support from anywhere Problems that often sound complicated on
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
Connectivity. SWIFTNet Link 7.0. Functional Overview
Connectivity SWIFTNet Link 7.0 Functional Overview December 2010 SWIFTNet Link 7.0 Table of Contents 1 Introduction... 3 2 Enhancements and features... 4 2.1 Message and File Copy... 4 2.2 Message and
SINGLE COURSE. 136 Total Hours. After completing this course, students will be able to:
NH204-1314 Designing and Implementing Server Infrastructure 136 Total Hours COURSE TITLE: Designing and Implementing Server Infrastructure COURSE OVERVIEW: After completing this course, students will be
Access Control Policy. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012
Access Control Policy Document Status Security Classification Version 1.0 Level 4 - PUBLIC Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention Change
Patch Management SoftwareTechnical Specs
Patch Management SoftwareTechnical Specs 1. Scalable: a. The PMS (Patch Management Software)must be scalable(can grow as network grows). b. The PMSmust be able to support more than 10k nodes from a single
NetWrix SQL Server Change Reporter
NetWrix SQL Server Change Reporter Version 2.2 Administrator Guide Contents NetWrix SQL Server Change Reporter Administrator Guide 1. INTRODUCTION... 3 1.1 KEY FEATURES... 3 1.2 LICENSING... 4 1.3 HOW
Full disk encryption with Sophos Safeguard Enterprise With Two-Factor authentication of Users Using SecurAccess by SecurEnvoy
Full disk encryption with Sophos Safeguard Enterprise With Two-Factor authentication of Users Using SecurAccess by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview
The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should
www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon
Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor
Windows Web Based VPN Connectivity Details & Instructions
VPN Client Overview UMDNJ s Web based VPN utilizes an SSL (Secure Socket Layer) Based Cisco Application that provides VPN functionality without having to install a full client for end users running Microsoft
Quick Start - Generic NAS File Archiver
Page 1 of 19 Quick Start - Generic NAS File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2:
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory
Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory Course Number: 6426A Course Length: 3 Days Course Overview This three-day instructor-led course provides
Vembu NetworkBackup v3.1.1 GA
Vembu NetworkBackup v3.1.1 GA VEMBU TECHNOLOGIES www.vembu.com TRUSTED BY OVER 25,000 BUSINESSES Vembu NetworkBackup v3.1.1 GA - Release Notes With enhanced features and fixes boosting stability and performance,
Agency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
PRIME IDENTITY MANAGEMENT CORE
PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It
VAULTIVE & MICROSOFT: COMPLEMENTARY ENCRYPTION SOLUTIONS. White Paper
COMPLEMENTARY ENCRYPTION SOLUTIONS White Paper Table of Contents Section I: Vaultive & Microsoft: Complementary Encryption Solutions... 2 Section II: Vaultive is a Microsoft ISV Partner... Appendix A:
This course is intended for IT professionals who are responsible for the Exchange Server messaging environment in an enterprise.
10233A: Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Course Number: 10233A Course Length: 5 Day Course Overview This instructor-led course provides you with the knowledge
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
Sage CRM Technical Specification
Sage CRM Technical Specification Client Software This document outlines the recommended minimum software and hardware requirements for running Sage CRM. Please note that while the document refers to Sage
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.
MXMedia CipherStream Preliminary Assessment 1.0 Author: T +44 1256 844161 F +44 1256 844162 www.farncombe.com Copyright 2012 Farncombe Belvedere Basing View Basingstoke RG21 4HG This document and the information
Benefit. Allows you to integrate RES PowerFuse with application virtualization technologies other than SoftGrid (e.g. Citrix XenApp, VMWare Thinapp).
Core (1/2) Access Control Access to settings and applications can be based on Organizational Units in Directory Services like (Active Directory and Novell) or through users and groups in the domain. This
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Sisense. Product Highlights. www.sisense.com
Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze
FUSION Installation Guide
FUSION Installation Guide Version 1.0 Page 1 of 74 Content 1.0 Introduction... 3 2.0 FUSION Server Software Installation... 3 3.0 FUSION Client Software Installation... 10 4.0 FUSION NIM Software Installation...
Project management integrated into Outlook
Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: October 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com
Project Title: Judicial Branch Enterprise Document Management System RFP Number: FIN122210CK Appendix D Technical Features List
FEAT891 Medium Recoverable using backup The solution shall be recoverable from backup storage media storage media. FEAT893 Desired Medium Support Load Sharing High Availability The solution should utilize
RES PowerFuse Version Comparison Chart (1/9)
RES PowerFuse Version Comparison Chart (1/9) Alerting Allows you to set up notifications of specific events, which can consist of sending e-mails to one or more recipients, sending SNMP notifications (
Chapter 7 Managing Users, Authentication, and Certificates
Chapter 7 Managing Users, Authentication, and Certificates This chapter contains the following sections: Adding Authentication Domains, Groups, and Users Managing Certificates Adding Authentication Domains,
Yiwo Tech Development Co., Ltd. EaseUS Todo Backup. Reliable Backup & Recovery Solution. EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1
EaseUS Todo Backup Reliable Backup & Recovery Solution EaseUS Todo Backup Solution Guide. All Rights Reserved Page 1 Part 1 Overview EaseUS Todo Backup Solution Guide. All Rights Reserved Page 2 Introduction
Remote Access Clients for Windows
Remote Access Clients for Windows E80.60 Release Notes 3 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation
Introduction. Part I Introduction to Exchange Server 2010 1
Contents Introduction xxix Part I Introduction to Exchange Server 2010 1 Chapter 1 Introduction to Exchange Server 2010 3 Part II Brief History of Exchange Servers 4 New Features in Exchange Server 2010
Top 7 Tips for Better Business Continuity
Top 7 Tips for Better Business Continuity With Hosted Fax www.biscom.com [email protected] (+1) 800-477-2472 or (+1) 978-250-1800 Introduction Biscom s Secure File Transfer (Biscom SFT) solution enables
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
SafeNet Data Encryption and Control. Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud
SafeNet Data Encryption and Control Securing data over its lifecycle, wherever it resides from the data center to endpoints and into the cloud Ensure Data Protection with Data Encryption and Control Across
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2
Microsoft Exchange About this Course This five-day, instructor-led course provides you with the knowledge and skills to design and deploy messaging solutions with Server 2010. This course describes how
Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition
Common Criteria Security Target For XenApp 6.0 for Windows Server 2008 R2 Platinum Edition Version 1-0 7 February 2011 2011 Citrix Systems, Inc. All rights reserved. Summary of Amendments Version 1-0 7
SecureAge SecureDs Data Breach Prevention Solution
SecureAge SecureDs Data Breach Prevention Solution In recent years, major cases of data loss and data leaks are reported almost every week. These include high profile cases like US government losing personal
SOOKASA WHITEPAPER SECURITY SOOKASA.COM
SOOKASA WHITEPAPER SECURITY SOOKASA.COM Sookasa Overview Sookasa was founded in 2012 by a team of leading security experts. The company s patented file-level encryption enables enterprises to protect data
Online Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Content Distribution Management
Digitizing the Olympics was truly one of the most ambitious media projects in history, and we could not have done it without Signiant. We used Signiant CDM to automate 54 different workflows between 11
About Recovery Manager for Active
Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System
endpoint www.egosecure.com Antivirus Application Control Removable Device Encryption enjoy Data protection
Egosecure endpoint Access Control Antivirus Content Analysis & Filter Application Control Removable Device Encryption Folder ENCRyPTION Mobile Device Management Power Management enjoy Data protection Facts
Configuring and Administering Windows 7
Configuring and Administering Windows 7 Length: 5 days Overview This five-day instructor-led course provides students with the knowledge and skills to configure and administer Microsoft Windows 7 as a
Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 MOC 10233
Designing and Deploying Messaging Solutions with Microsoft Exchange Server 2010 Service Pack 2 MOC 10233 Course Outline Module 1: Introduction to Designing a Microsoft Exchange Server 2010 Deployment This
