Security. CLOUD VIDEO CONFERENCING AND CALLING Whitepaper. October Page 1 of 9
|
|
|
- Letitia Carter
- 10 years ago
- Views:
Transcription
1 Security CLOUD VIDEO CONFERENCING AND CALLING Whitepaper October 2015 Page 1 of 9
2 Contents Introduction...3 Security risks when endpoints are placed outside of firewalls...3 StarLeaf removes the risk with seamless firewall traversal...4 The risks associated with automatic answer...4 StarLeaf does not allow automatic answer...4 Authentication, encryption, and recording devices...5 StarLeaf authentication...5 The shortfalls in encryption for video users...5 StarLeaf encryption locks out the potential for attack...5 Passwords...5 Existing Security the closed network...6 Secure external calling for closed networks...6 Private Direct Media...6 Data center security...7 Monitoring...8 Disaster planning...8 Disaster recovery...8 Conclusion...8 Page 2 of 9
3 Introduction Business applications delivered from the cloud should be compelling for all companies no matter their size or geographic spread. The cloud offers on-demand services, 24x7 support, a pay-as-you-go/ pay-as-you-use pricing model, and will effortlessly scale to meet spikes in demand. So while service availability, high-performance, and security are key considerations, the real benefit of the cloud is a financial one. Placing infrastructure, the system core, in the cloud at geographically dispersed Points of Presence (PoPs) provides access to its rich functionality over the Internet. For end users this means that there is little or no capital investment in on-premise infrastructure. Costs are reduced further with no management burden placed upon internal IT resources. However, when considering business video for mainstream communication, security, performance and reliability must be assessed. In this paper we look at the common security flaws and the areas of risk that exist today. We explain how StarLeaf eliminates risks, to ensure an open and secure environment for all internal and external video calls. Also, we outline how the StarLeaf Cloud guards against service downtime to provide resilience and high availability on a 24x7 global basis. Security risks when endpoints are placed outside of firewalls The first area of concern is the positioning of endpoints outside of a company s firewall. This is common practice as it provides the easiest way to enable video calling with other organizations, and external bridging services. Many end users omit to change default logins, which then allows hackers easy access to the equipment. Furthermore, these endpoints can be maliciously targeted for denial of service attacks. Placement of endpoints outside of firewalls also exposes any vulnerability in the software, to allow hackers to do irreparable system damage. Historically, video conferencing equipment has been of a proprietary nature, and deployed in such low volumes that it has avoided the attention of Internet hackers. Today, there is growing evidence that this is no longer the case; as companies increase their deployments of both software clients and personal devices, alongside increased use of video conferencing rooms, hackers are taking notice and beginning to target the equipment. A new problem for endpoints that are outside of firewalls is H.323 spammers. This problem manifests itself as multiple nuisance calls to H.323 video endpoints. The spammers are actually looking for dialtone for the purpose of commiting toll fraud. While these criminals are unlikely to be successful in comminting toll fraud through an H.323 video endpoint, the resulting inconvenience and the need to decommission equipment will definitely result in financial loss. What s more damning is that the tools used to identify vulnerable systems are readily available. Using the same tools, and in seconds, StarLeaf s security expert was able to identify 150,000 exposed and vulnerable H.323 Cisco/Tandberg, Lifesize and Polycom endpoints. Page 3 of 9
4 StarLeaf removes the risk with seamless firewall traversal StarLeaf removes the need to place endpoints on the public Internet. Instead, all StarLeaf endpoints are designed to connect from within the end user s private network, behind the resident firewall. This provides easy and direct business-to-business video calling, without compromising on security. This is made possible by StarLeaf s firewall/nat traversal solution. StarLeaf hardware and software endpoints automatically connect out through firewalls, requiring only a single port to connect securely to the StarLeaf cloud. This one connection is further secured by TLS (Transport Layer Security cryptographic protocol that provides communication security over the internet) which handles all client to server communications; signaling, media, software upgrades, etc. StarLeaf calls traverse the company firewall seamlessly StarLeaf data center Company A Company B StarLeaf user initiates call to a partner company. Media and signalling are both encrypted when the call is set up. The risks associated with automatic answer There is a real and serious security risk when endpoints are set to automatically answer incoming calls. Unfortunately, some video systems have automatic answer set as a default by the manufacturer. Even when it is not, users typically set endpoints to auto answer because it is simply easier for the end user. Furthermore, users may think they have switched everything off when they physically switch the TV screens off. Yet, this is not the case, unless the video system is shut down, automatic answer will remain on, allowing anyone to purposefully or accidentally dial into the video conferencing room and remain unseen. StarLeaf does not allow automatic answer Knowing the risks associated with automatic answer, StarLeaf users and administrators do not have access to auto answer. Instead, StarLeaf s ease-of-use ensures that anyone can make and receive calls, and in times of absence there is video mail that enables video messages to be left. Page 4 of 9
5 Authentication, encryption, and recording devices Understanding the security risks has allowed StarLeaf to engineer an entirely secure cloud-based video conferencing system. The issue of authentication is often overlooked in video conferencing, because you can see the person at the other end. Consequently, you may think that this is the only authentication you need. Not so, when you consider the possibility that someone can intercept your call and remain unobserved, this is best described as a man-in-the-middle attack. This is made possible because existing video conferencing devices do not guarantee that the communication channel is secure from end-to-end. It is entirely feasible for a hacker to negotiate a separate and independent connection with each of the attendees. This can be achieved through standard off the shelf hardware or the use of malicious software, devised and written by the hacker. Once a call has been intercepted, the hacker is free to remain on the call unobserved, and in addition can record the video conference, capturing all video, audio and data. Where a call is being recorded using the Starleaf recording feature, all participants in the call will be aware that they are being recorded. StarLeaf authentication Authentication with the StarLeaf cloud service requires a signed certificate that all StarLeaf endpoints (hardware and software) have burned into them at the point of manufacture. All StarLeaf cloud servers also have signed certificates that are required by the StarLeaf endpoints to guarantee that they are connected directly to a genuine server. Consequently our secure and encrypted connection cannot be negotiated by anything other than an authorized StarLeaf device, thus preventing a manin-the-middle attack. The shortfalls in encryption for video users Video systems use the Advanced Encryption Standard (AES) to encrypt the media, to prevent unauthorized persons from listening to or seeing your interactions. However, most video systems do not also encrypt the signaling. These unencrypted signals make it possible for hackers to see the conference ID and PIN numbers, providing them with all that they need to gain access to meetings that take place on a bridge/mcu. StarLeaf encryption locks out the potential for attack Every call made by a StarLeaf endpoint is authenticated and encrypted, both media and signaling. When you call from StarLeaf to any other video device it WILL use encryption if the recipient device supports it. Encryption cannot be disabled on StarLeaf calls. Passwords Key to the StarLeaf system is that all passwords, sent on the network, are never sent in plain text, only in industry standard PBKDF2 (Password-Based Key Derivation Function) hash format. Page 5 of 9
6 Existing Security the closed network There are many user organizations that acknowledge the weaknesses of the traditional video architecture, and have therefore decided to run a closed network. While this may achieve the goals of keeping the network secure, it vastly reduces the value of the investment made in the technology, by isolating anyone inside the network. In this case, many organizations deploy a firewall traversal strategy, often predetermining a white list of approved IP addresses those pre authorized to connect into the company. This is a sound strategy, but one that requires constant maintenance. Particularly when you consider that many home broadband connections get new IP addresses on a daily or weekly basis. A VPN connection provides a solution to this high-maintenance situation, and allows for both hardware and software based video devices to connect to the network. However, this approach requires the end user to master the intricacies of VPN connectivity from their laptop, access and navigate the video dial plan and in some cases download and install the video software. Most executives, remote and home workers would consider this set-up too difficult, cumbersome and complex for them to use video. Therefore, scaling video communications into the hands of those that need it most creates an increased cost and management burden for IT support. Secure external calling for closed networks The StarLeaf Cloud allows an organization to securely open their network to external video calls. As the StarLeaf network is fully owned and operated by StarLeaf with known Points of Presence, StarLeaf customers only need to open their firewall to a single IP or DNS name further enhancing their security. Then users on the Internet, be they customers, vendors or remote employees, can communicate securely from remote locations into the corporate network. If ever there is a security breach, such as theft of a home user s equipment or a mobile worker s laptop or ipad, that worker s StarLeaf account can be either removed or have its credentials changed immediately to disable any unauthorized calls into or out of the organization, all without impact to any other users. Private Direct Media Uniquely amongst end-to-end cloud video conferencing service providers, Starleaf allows for private direct media. This means that where the media for a call can be routed directly between the two endpoints in a point-to-point call, it will be. In this case, the media for that call will not leave the customer s own network. Page 6 of 9
7 Data center security Any service based applications that are delivered from the cloud, need to provide high and continuous availability, backed-up by system engineered redundancy. Without adequate provision of redundancy, an end user may experience temporary or prolonged loss of service. The StarLeaf cloud solution is fail-safe. Its data centers all benefit from physical security as well as system redundancy throughout. All StarLeaf data centers are supplied with at least two independent, generator backed, power feeds. This ensures that the failure of either of these power feeds will not lead to a service outage at that data center. All StarLeaf data centers are provisioned with at least two independent network feeds. This ensures that the failure of either of these network feeds will not lead to a service outage at that Point of Presence. Consequently failover to standby servers occurs in the event of any abnormal outages or component failure. In addition, StarLeaf has deployed virtualization technology that allows for the migration of both services and individual customer dial plans in times of system failure. All StarLeaf systems are backedup daily, thereby ensuring customer configurations are protected and up-to-date. Furthermore StarLeaf has multiple geographically dispersed Points of Presence (PoPs) and it is possible for all users to be moved between them as required to protect against any catastrophic local events that prevent access to a whole data center. Where possible, StarLeaf data centers adhere to the relevant local standards for compliance. For example: Payment Card Industry Data Security Standard (PCI DSS) FIPS (Federal Information Processing Standard) Encryption SOC3 Systrust for Service Organizations BS EN ISO 9001:2008 ISO/IEC 27001:2005 Page 7 of 9
8 Monitoring The entire StarLeaf Cloud is monitored 24/7 by StarLeaf s in-house Network Operations Team. A plethora of metrics are continuously monitored to ensure the smooth-running of the system. Wherever possible, potential service issues are anticipated and resolved in advance. For example, while the service would continue to run if there was a hardware failure, the automatic monitoring of the system would alert the StarLeaf Network Operations Team to the failure and mitigation actions would be undertaken. Disaster planning If the possibility of a disaster affecting a data center is identifed (for example a forecast extreme weather event) StarLeaf will take action in advance to mitigate risk Where a risk is identified, StarLeaf will move the customers hosted in the at-risk location to another data center in advance of the at-risk event Customers will be notified of these actions Disaster recovery The StarLeaf Cloud is fully backed up and backup data is held securely in multiple locations In the exceptional case of failure at any one of its data centers, where an unplanned event causes loss of access to a StarLeaf point of presence, customers will be restored from a backup to an alternate data center StarLeaf endpoints will automatically connect to the new data center with no user input required Conclusion We are faced with a dilemma when it comes to video communications. The wider we open ourselves up to communicating with video the greater the benefit, but also the greater the risk. We don t want anyone eavesdropping on our communications or making unsolicited calls. StarLeaf makes it easy to open up the world of video without opening up any vulnerability and as a cloud-based solution it can be considered totally secure with both media and signaling encrypted. Page 8 of 9
StarLeaf Connectivity Services. Deployment Guide
StarLeaf Connectivity Services Deployment Guide 31 July 2015 Contents Terminology 4 Why are Connectivity Services needed? 4 What are Connectivity Services? 4 Calling scenarios 5 Architecture 7 Security
Global Network. Whitepaper. September 2014. Page 1 of 9
Global Network Whitepaper September 2014 Page 1 of 9 Contents 1. Overview...2 2. Global Connectivity, Quality of Service and Reliability...2 2.1 Exceptional Quality...3 2.2 Resilience and Reliability...3
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications. www.vidyo.com 1.866.99.VIDYO
TECHNICAL NOTE Secure VidyoConferencing SM Protecting your communications 2012 Vidyo, Inc. All rights reserved. Vidyo, VidyoTechnology, VidyoConferencing, VidyoLine, VidyoRouter, VidyoPortal,, VidyoRouter,
nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
1 Introduction 2. 2 Document Disclaimer 2
Important: We take great care to ensure that all parties understand and appreciate the respective responsibilities relating to an infrastructure-as-a-service or self-managed environment. This document
Blue Jeans Network Security Features
Technical Guide Blue Jeans Network Security Features Blue Jeans Network understands an organization s need for secure communications. The Blue Jeans cloud-based video conferencing platform provides users
Avaya TM G700 Media Gateway Security. White Paper
Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
StratusLIVE for Fundraisers Cloud Operations
6465 College Park Square Virginia Beach, VA 23464 757-273-8219 (main) 757-962-6989 (fax) stratuslive.com Contents Security Services... 3 Rackspace Multi Layered Approach to Security... 3 Network... 3 Rackspace
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
Session 11 : (additional) Cloud Computing Advantages and Disadvantages
INFORMATION STRATEGY Session 11 : (additional) Cloud Computing Advantages and Disadvantages Tharaka Tennekoon B.Sc (Hons) Computing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Cloud
Polycom Recommended Best Security Practices for Unified Communications
Polycom Recommended Best Security Practices for Unified Communications October 2015 Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
The evolution of data connectivity
Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
A Guide to Common Cloud Security Concerns. Why You Can Stop Worrying and Start Benefiting from SaaS
A Guide to Common Cloud Security Concerns Why You Can Stop Worrying and Start Benefiting from SaaS T he headlines read like a spy novel: Russian hackers access the President s email. A cyber attack on
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
Board Portal Security: How to keep one step ahead in an ever-evolving game
Board Portal Security: How to keep one step ahead in an ever-evolving game The views and opinions expressed in this paper are those of the author and do not necessarily reflect the official policy or position
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications
Polycom Recommended Best Security Practices for Unified Communications March 2012 Unified Communications (UC) can be viewed as another set of data and protocols utilizing IP networks. From a security perspective,
Brochure Achieving security with cloud data protection. Autonomy LiveVault
Achieving security with cloud data protection Autonomy LiveVault Can cloud backup be secure? Today, more and more companies recognize the value and convenience of using cloud backup to protect their server
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?
SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several
University of Pittsburgh Security Assessment Questionnaire (v1.5)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.5) Directions and Instructions for completing this assessment The answers provided
SecurityMetrics Vision whitepaper
SecurityMetrics Vision whitepaper 1 SecurityMetrics Vision: Network Threat Sensor for Small Businesses Small Businesses at Risk for Data Theft Small businesses are the primary target for card data theft,
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
IP Ports and Protocols used by H.323 Devices
IP Ports and Protocols used by H.323 Devices Overview: The purpose of this paper is to explain in greater detail the IP Ports and Protocols used by H.323 devices during Video Conferences. This is essential
Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools
White Paper Solving the Online File-Sharing Problem Replacing Rogue Tools with the Right Tools Introduction The modern workforce is on the hunt for tools that help them get stuff done. When the technology
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
THE ENTERPRISE GUIDE TO VIDEO CONFERENCING. Prepared by: Steve Smith MITP MIET MIEEE Technical Director Astro Communications Ltd.
Prepared by: Steve Smith MITP MIET MIEEE Technical Director Astro Communications Ltd Date: 18/02/2014 THE ENTERPRISE GUIDE TO VIDEO CONFERENCING This document is intended for anyone considering video conferencing
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Achieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
PATCH MANAGER what does it do?
PATCH MANAGER what does it do? PATCH MANAGER SAAS maps all your physical assets and physical infrastructure such as network and power cabling, racks, servers, switches, UPS and generators. It provides
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
GiftWrap 4.0 Security FAQ
GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels
VoIP Deployment Options
AN ATLANTIC-IT.NET WHITEPAPER VoIP Deployment Options Whether cloud-based or on premises, IP-based voice platforms can deliver a wide range of significant business benefits. 2 VoIP Deployment Options EXECUTIVE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
Security and Risk Analysis of VoIP Networks
Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: [email protected] Abstract This paper address all
TOP SECRETS OF CLOUD SECURITY
TOP SECRETS OF CLOUD SECURITY Protect Your Organization s Valuable Content Table of Contents Does the Cloud Pose Special Security Challenges?...2 Client Authentication...3 User Security Management...3
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
FMCS SECURE HOSTING GUIDE
FMCS SECURE HOSTING GUIDE October 2015 SHG-MNL-v3.0 CONTENTS INTRODUCTION...4 HOSTING SERVICES...4 Corporate Secure Hosting... 4 Hosting Partner... 4 Hosting Location... 4 Physical Security... 4 Risk and
Data Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Prashant M. Patil Asst. Professor. ASM s, Institute of Management & Computer Studies (IMCOST), Thane (w), India E_mail: [email protected] ABSTRACT
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Alliance Key Manager Cloud HSM Frequently Asked Questions
Key Management Alliance Key Manager Cloud HSM Frequently Asked Questions FAQ INDEX This document contains a collection of the answers to the most common questions people ask about Alliance Key Manager
Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack
DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014 Protecting the Information that Secures the Homeland This page
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
6 Steps to SIP trunking security. How securing your network secures your phone lines.
6 Steps to SIP trunking security How securing your network secures your phone lines. The myths about SIP trunking can be misleading. There are stories that SIP has set off a cyber crime wave of corporate
Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting
Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order
10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group
10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group Presented by: Michael Flavin and Stan Stahl Saalex Information Technology Overview Saalex Information
IOCOM Whitepaper: Connecting to Third Party Organizations
IOCOM Whitepaper: Connecting to Third Party Organizations September 2008 IOCOM www.iocom.com 312-786-9169 Table of Contents 1. Executive Summary 2. Goals 3. Scenarios for Enterprise Connectivity over IOCOM
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications
Draft ITU-T Recommendation X.805 (Formerly X.css), architecture for systems providing end-to-end communications Summary This Recommendation defines the general security-related architectural elements that
Skoot Secure File Transfer
Page 1 Skoot Secure File Transfer Sharing information has become fundamental to organizational success. And as the value of that information whether expressed as mission critical or in monetary terms increases,
Stable and Secure Network Infrastructure Benchmarks
Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day
CyberSource Payment Security. with PCI DSS Tokenization Guidelines
CyberSource Payment Security Compliance The PCI Security Standards Council has published guidelines on tokenization, providing all merchants who store, process, or transmit cardholder data with guidance
PCI Compliance. Top 10 Questions & Answers
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
QuickBooks Online: Security & Infrastructure
QuickBooks Online: Security & Infrastructure May 2014 Contents Introduction: QuickBooks Online Security and Infrastructure... 3 Security of Your Data... 3 Access Control... 3 Privacy... 4 Availability...
TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4
TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6 TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4 Cloud services (Data Centre) and related Functional requirement Cloud services as a Control
Skype for Business Migration Strategies
Connecting meeting rooms Whitepaper Contents Overview...3 Doing nothing...4 Bridging the gap...5 Leverage current meeting room systems... 6 Making the switch...8 One world, one experience...9 In summary...10
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
State of Texas. TEX-AN Next Generation. NNI Plan
State of Texas TEX-AN Next Generation NNI Plan Table of Contents 1. INTRODUCTION... 1 1.1. Purpose... 1 2. NNI APPROACH... 2 2.1. Proposed Interconnection Capacity... 2 2.2. Collocation Equipment Requirements...
Making the leap to the cloud: IS my data private and secure?
Making the leap to the cloud: IS my data private and secure? tax & accounting MAKING THE LEAP TO THE CLOUD: IS MY DATA PRIVATE AND SECURE? Cloud computing: What s in it for me? The more you know about
CONTENTS. PCI DSS Compliance Guide
CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
How To Protect Your Data From Being Hacked
Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW
Famly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Video Conferencing Glossary
Video Conferencing Glossary A guide to the most commonly used terms in video conferencing. 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0-9 360p 480 x 360 pixels. This resolution is optimal
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com
Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract
INFORMATION SECURITY PROGRAM
Approved 1/30/15 by Dr. MaryLou Apple, President MSCC Policy No. 1:08:00:02 MSCC Gramm-Leach-Bliley INFORMATION SECURITY PROGRAM January, 2015 Version 1 Table of Contents A. Introduction Page 1 B. Security
SaaS Security for the Confirmit CustomerSat Software
SaaS Security for the Confirmit CustomerSat Software July 2015 Arnt Feruglio Chief Operating Officer The Confirmit CustomerSat Software Designed for The Web. From its inception in 1997, the architecture
Evaluating IaaS security risks
E-Guide This expert tip examines the risks organizations need to be aware of when evaluating IaaS solutions, and highlights the key architectural and process components of access management services that
Addressing Cloud Computing Security Considerations
Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft
Building Energy Security Framework
Building Energy Security Framework Philosophy, Design, and Implementation Building Energy manages multiple subsets of customer data. Customers have strict requirements for regulatory compliance, privacy
Video Conferencing and Security
Video Conferencing and Security Using the Open Internet and Encryption for Secure Video Communications & Guidelines for Selecting the Right Level of Security for Your Organization 1 Table of Contents 1.
SNAP WEBHOST SECURITY POLICY
SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one
