Thomas College Private College Enhances Security, Performance, and Reporting Capability

Size: px
Start display at page:

Download "Thomas College Private College Enhances Security, Performance, and Reporting Capability"

Transcription

1 Microsoft.com Home Site Map Search Microsoft.com for: Go ISA Server Home Site Map Worldwide Free Newsletters Product Information How to Buy Technical Resources Downloads Support Community Partners Windows Server System Thomas College Private College Enhances Security, Performance, and Reporting Capability Posted: November 18, 2004 Thomas College is a small, private, career-oriented college with an enrollment of more than 1,100 undergraduate, graduate, and continuing education students. In 1997, Thomas was one of the first colleges in the United States to deploy a Web-based information systems infrastructure. A few years later, the College deployed Microsoft Internet Security and Acceleration (ISA) Server 2000 to safeguard its systems from outside threats. Based on its success with ISA Server 2000, the College recently upgraded to ISA Server 2004 to add application-layer filtering, high-performance Web caching, and advanced logging and reporting features. As a result, Thomas is able to provide added protection for its Web-based applications, provide students and employees with high performance and secure Internet access, and more effectively identify and address potential threats. Situation Located on 70 acres overlooking the Kennebec River in Waterville, Maine, Solution Overview Customer Profile Thomas College, a small private college in Maine, has more than 1,100 undergraduate, graduate, and continuing education students and offers degrees in business, technology, education, political science, and psychology. Business Situation As the scope and nature of its Internet use expanded, Thomas College needed additional security features, such as application-layer inspection and advanced logging and Solution Description Thomas College deployed Microsoft Internet and Acceleration Server (ISA) 2004 as a perimeter firewall, Web proxy, Web cache, and Web filter, as well as for secure Web server publishing. Benefits More in-depth inspection of Web traffic Increased performance Comprehensive logging Built-in log querying Customized reporting Software and Services Microsoft Internet Security and Acceleration Server 2004 Microsoft Windows Server 2003 Standard Edition Vertical Industries Colleges Country/Region United States Page 1 of 5

2 Thomas College is a small, private, career-oriented college with total enrollment of more than 1,100 undergraduate, graduate, and continuing education students. Thomas was one of the first colleges in the United States to build a Web-based information systems infrastructure to enable students, faculty, and administrators to access and run more than 900 of the College's core business and academic applications through a Web browser. To enhance accessibility while safeguarding those systems from external attacks, the College implemented Microsoft Internet Security and Acceleration (ISA) Server The College chose ISA Server for its: Tight integration with Microsoft Windows -based client workstations. Support for other operating systems. Favorable price/performance ratio. Support for fast Hypertext Transfer Protocol (HTTP) proxy, which constitutes the majority of the College's traffic. Because Thomas maintains a health center and also manages financial aid transactions, it has to meet a growing number of healthcare, financial, and academic regulations. In 2004, the College decided to update its firewall protection to gain additional capabilities, such as application-layer inspection, secure Web server publishing, and advanced logging and "We are audited annually in each regulatory area, so it is important that we safeguard the security of our systems and can easily produce reports documenting security," says Christopher Rhoda, Vice President for IT Services, Thomas College. Solution The College decided to upgrade to ISA Server 2004, running on the Microsoft Windows Server 2003 operating system the foundation of Microsoft Windows Server System integrated server software. By upgrading to ISA Server 2004, the College gained: The ability to view all traffic in and out of its network A new easier-to-use management interface Application-layer filtering "With application-layer filtering we can look inside Internet traffic and see Page 2 of 5

3 exactly what the application is, rather than just whether there's traffic on it or not," says Rhoda. Thomas is using ISA Server 2004 as a perimeter firewall, Web proxy, Web cache, and Web filter, as well as for secure Web server publishing. The system safeguards its internal administrative systems, and controls access to its extranet. On the extranet students and alumni can view private data, such as their own address and phone records and their own grades. Faculty can also view class information, such as the list of students enrolled in their classes. We really push ISA Server 2004, and it performs great for us, I can't imagine our network without it. Christopher Rhoda Vice President for IT Services, Thomas College Benefits By upgrading to ISA Server 2004, the College gained deeper firewall safeguards, higher performance, built-in log querying, and customized More In-depth Inspection of Web Traffic Complete stateful inspection of Web traffic and the application-layer filtering feature in ISA Server 2004 help to provide Thomas with increased security against external attacks. The new unified rule structure makes it easier to identify potential threats so that administrators can take action to avoid them. "The more areas ISA Server can inspect and identify, the more things we can build rules against," says Rhoda. Increased Performance for Internal and External Users The high-performance Web caching in ISA Server 2004 accelerates Web performance for those accessing the Internet from campus and for external users. "ISA Server 2004 supports both forward caching for outgoing requests to the Internet, and reverse caching for incoming requests to our Web servers," says Rhoda. Built-in Log Querying and Customized Reporting "The logging feature in ISA Server 2004 is one of the primary reasons we selected it," Rhoda says. "The ISA Server log identifies every piece of traffic that comes in or goes out of our campus. If we get a notice that someone on our network has illegally used a copyrighted software package, we can query the log based on any field recorded, verify the event, identify the user, and apply the appropriate sanctions." Page 3 of 5

4 ISA Server 2004 reports are customizable, so the College can add more information and meet different needs for each entity to which it reports. "We really push ISA Server 2004, and it performs great for us," says Rhoda. "I can't imagine our network without it." Microsoft Windows Server System Microsoft Windows Server System integrated server infrastructure software is designed to support end-to-end solutions built on Windows Server It creates an infrastructure based on integrated innovation, Microsoft's holistic approach to building products and solutions that are intrinsically designed to work together and interact seamlessly with other data and applications across your IT environment. This helps you reduce the costs of ongoing operations, deliver a more secure and reliable IT infrastructure, and drive valuable new capabilities for the future growth of your business. For more information about Windows Server System, go to: For More Information For more information about Microsoft products and services, call the Microsoft Sales Information Center at (800) In Canada, call the Microsoft Canada Information Centre at (877) Customers who are deaf or hard-of-hearing can reach Microsoft text telephone (TTY/TDD) services at (800) in the United States or (905) in Canada. Outside the 50 United States and Canada, please contact your local Microsoft subsidiary. To access information using the World Wide Web, go to: For more information about Thomas College, call (207) or visit the Web site at: Microsoft Corporation. All rights reserved. This case study is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Microsoft, Windows, Windows Server and Windows Server System are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Press contact: rrt@wagged.com Page 4 of 5

5 Manage Your Profile Contact Us 2004 Microsoft Corporation. All rights reserved. Terms of Use Trademarks Privacy Statement Page 5 of 5

Firewalls for small business

Firewalls for small business By James Thomas DTEC 6823 Summer 2004 What is a firewall? Firewalls for small business A firewall is either hardware, software or a combination of both that is used to prevent, block or should I say try

More information

What s New in ISA Server 2004 ISA Server 2004 contains a fullfeatured,

What s New in ISA Server 2004 ISA Server 2004 contains a fullfeatured, Microsoft Internet Security and Acceleration (ISA) Server 2004 is the advanced application-layer inspection firewall, VPN, and Web cache solution that enables enterprise customers to maximize existing

More information

F5 and Microsoft Exchange Security Solutions

F5 and Microsoft Exchange Security Solutions F5 PARTNERSHIP SOLUTION GUIDE F5 and Microsoft Exchange Security Solutions Deploying a service-oriented perimeter for Microsoft Exchange WHAT'S INSIDE Pre-Authentication Mobile Device Security Web Application

More information

Large Nonprofit Hospital Improves Communications with Messaging Solution

Large Nonprofit Hospital Improves Communications with Messaging Solution Microsoft Windows Server System Customer Solution Case Study Large Nonprofit Hospital Improves Communications with Messaging Solution Overview Country or Region: United States Industry: Healthcare Customer

More information

Inspection of Encrypted HTTPS Traffic

Inspection of Encrypted HTTPS Traffic Technical Note Inspection of Encrypted HTTPS Traffic StoneGate version 5.0 SSL/TLS Inspection T e c h n i c a l N o t e I n s p e c t i o n o f E n c r y p t e d H T T P S T r a f f i c 1 Table of Contents

More information

Web Security Firewall Setup. Administrator Guide

Web Security Firewall Setup. Administrator Guide Web Security Firewall Setup Administrator Guide Web Security Firewall Setup Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,

More information

Controlling and Managing Security with Performance Tools

Controlling and Managing Security with Performance Tools Security Management Tactics for the Network Administrator The Essentials Series Controlling and Managing Security with Performance Tools sponsored by Co ntrolling and Managing Security with Performance

More information

V1.4. Spambrella Email Continuity SaaS. August 2

V1.4. Spambrella Email Continuity SaaS. August 2 V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable

More information

IBM Security Intrusion Prevention Solutions

IBM Security Intrusion Prevention Solutions IBM Security Intrusion Prevention Solutions Sarah Cucuz sarah.cucuz@spyders.ca IBM Software Solution Brief IBM Security intrusion prevention solutions In-depth protection for networks, servers, endpoints

More information

Credit Suisse Develops and Deploys SOX 404 Compliance Solution using SQL Server 2005

Credit Suisse Develops and Deploys SOX 404 Compliance Solution using SQL Server 2005 Microsoft SQL Server 2005 Customer Solution Case Study Credit Suisse Develops and Deploys SOX 404 Compliance Solution using SQL Server 2005 Overview Country or Region: Switzerland Industry: Financial Services

More information

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents

More information

Knit Set Dresses for Success with Microsoft Windows Small Business Server 2003

Knit Set Dresses for Success with Microsoft Windows Small Business Server 2003 Microsoft Windows Small Business Server 2003 Customer Solution Case Study Knit Set Dresses for Success with Microsoft Overview Canada Retail Knit-Set Canada Ltd. imports ladies sweaters made in Korea and

More information

Dow Corning Uses Enterprise Rights Management to Help Protect Intellectual Property

Dow Corning Uses Enterprise Rights Management to Help Protect Intellectual Property Dow Corning Uses Enterprise Rights Management to Help Protect Intellectual Property Overview Country or Region: United States Industry: Manufacturing Customer Profile Dow Corning is a global leader in

More information

Intro to Firewalls. Summary

Intro to Firewalls. Summary Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006 Reverse Shells Enable Attackers To Operate From Your Network Richard Hammer August 2006 Reverse Shells? Why should you care about reverse shells? How do reverse shells work? How do reverse shells get installed

More information

Document Management Software Provider Designs for Identity and Access Flexibility

Document Management Software Provider Designs for Identity and Access Flexibility Microsoft Windows Server System Partner Solution Case Study Document Management Software Provider Designs for Identity and Access Flexibility Overview Country or Region: Canada Industry: Professional Services

More information

Making Data Available on the Web

Making Data Available on the Web Making Data Available on the Web By Simba Technologies Inc. SimbaEngine ODBC SDK Introduction Many companies use web-based services to automate business processes like sales, track items like packages,

More information

Netsweeper Whitepaper

Netsweeper Whitepaper Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826 5222 F: +1 (519) 826 5228 Netsweeper Whitepaper Deploying Netsweeper Internet Content

More information

New Mexico Utility Modernizes Communication and Collaboration with Cloud Services

New Mexico Utility Modernizes Communication and Collaboration with Cloud Services Microsoft Office 365 Customer Solution Case Study New Mexico Utility Modernizes Communication and Collaboration with Cloud Services Overview Country or Region: United States Industry: Government Customer

More information

ISP Reduces Time for System Management Task by 99 Percent Using Analyzer Tool

ISP Reduces Time for System Management Task by 99 Percent Using Analyzer Tool Microsoft Exchange Server 2003 Customer Solution Case Study ISP Reduces Time for System Management Task by 99 Percent Using Analyzer Tool Overview Country or Region: Hong Kong SAR Industry: Utilities Customer

More information

Email Security Solutions

Email Security Solutions TECHNOLOGY REPORT Email Security Solutions 1 TECHNOLOGY REPORT SUPPLEMENT EMAIL SECURITY TECHNOLOGY REPORT IF YOUR EMAIL IS SO CRITICAL, CAN YOU BE SURE IT S REALLY REALLY PRIVATE? FIND THE FULL RESULTS

More information

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work. Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using

More information

Monitoring Nginx Server

Monitoring Nginx Server Monitoring Nginx Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Healthcare Security and HIPAA Compliance with A10

Healthcare Security and HIPAA Compliance with A10 WHITE PAPER Healthcare Security and HIPAA Compliance with A10 Contents Moving Medicine to the Cloud: the HIPAA Challenge...3 HIPAA History and Standards...3 HIPAA Compliance and the A10 Solution...4 164.308

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work How Firewalls Work By: Jeff Tyson If you have been using the internet for any length of time, and especially if

More information

New Portal Solution and Collaborative Environment Empowers Teamwork and Increases Productivity across Vanderbilt University Law School Community

New Portal Solution and Collaborative Environment Empowers Teamwork and Increases Productivity across Vanderbilt University Law School Community Microsoft Office System Customer Solution Case Study New Portal Solution and Collaborative Environment Empowers Teamwork and Increases Productivity across Vanderbilt University Law School Community Overview

More information

Security Services. Benefits. The CA Advantage. Overview

Security Services. Benefits. The CA Advantage. Overview PRODUCT BRIEF: CA SITEMINDER FEDERATION SECURITY SERVICES CA SiteMinder Federation Security Services CA SITEMINDER FEDERATION SECURITY SERVICES EXTENDS THE WEB SINGLE SIGN-ON EXPERIENCE PROVIDED BY CA

More information

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT Open Space Security Cyber-attacks are real. Today alone, Lab technology prevented nearly 3 million of them aimed at our customers worldwide.

More information

WatchGuard SSL 2.0 New Features

WatchGuard SSL 2.0 New Features WatchGuard SSL 2.0 New Features For Secure Remote Access, Identity Management, and Network Access Control Introduction WatchGuard SSL 2.0 unifies identity and access management capabilities, with features

More information

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide

Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide Citrix NetScaler and Microsoft SharePoint 2013 Hybrid Deployment Guide 2013 Deployment Guide Table of Contents Overview 3 SharePoint Hybrid Deployment Overview 3 Workflow 4 Step by Step Configuration on

More information

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series

PRODUCT CATEGORY BROCHURE. Juniper Networks SA Series PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

Xerox SMart esolutions. Security White Paper

Xerox SMart esolutions. Security White Paper Xerox SMart esolutions Security White Paper 1 Xerox SMart esolutions White Paper Network and data security is one of the many challenges that businesses face on a daily basis. Recognizing this, Xerox Corporation

More information

ON Semiconductor identified the following critical needs for its solution:

ON Semiconductor identified the following critical needs for its solution: Microsoft Business Intelligence Microsoft Office Business Scorecards Accelerator Case study Harnesses the Power of Business Intelligence to Drive Success Execution excellence is an imperative in order

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

Securing and Accelerating Databases In Minutes using GreenSQL

Securing and Accelerating Databases In Minutes using GreenSQL Securing and Accelerating Databases In Minutes using GreenSQL Unified Database Security All-in-one database security and acceleration solution Simplified management, maintenance, renewals and threat update

More information

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

Microsoft Exchange Server 2003 Customer Solution Case Study

Microsoft Exchange Server 2003 Customer Solution Case Study Microsoft Exchange Server 2003 Customer Solution Case Study University of Houston Provides Fast, Reliable E-Mail with Remote Access Capabilities Overview Country: United States Industry: Education Customer

More information

Installation Guide Supplement

Installation Guide Supplement Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,

More information

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY ADMINISTRATION TOOLS Stormshield Network Security solutions simplify

More information

Trouble Shooting SiteManager to GateManager access

Trouble Shooting SiteManager to GateManager access Trouble Shooting SiteManager to GateManager access If you are unsure if a SiteManager will be able to access the GateManager through the corporate firewall, or you experience connection issues, this document

More information

APPLICATION DELIVERY

APPLICATION DELIVERY RIVERBED DELIVERY THE FIRST DELIVERY CONTROLLER (ADC) DESIGNED FOR ANY CLOUD OR Greater flexibility VIRTUALIZED ENVIRONMENT GARTNER MAGIC QUADRANT RECOGNITION We re a Visionary in the 2012 Magic Quadrant

More information

Get started with cloud hybrid search for SharePoint

Get started with cloud hybrid search for SharePoint Get started with cloud hybrid search for SharePoint This document supports a preliminary release of the cloud hybrid search feature for SharePoint 2013 with August 2015 PU and for SharePoint 2016 Preview,

More information

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration

More information

Institute Cuts Costs, Boosts Efficiency with Exchange Server Unified Messaging

Institute Cuts Costs, Boosts Efficiency with Exchange Server Unified Messaging Microsoft Exchange Server 2007 Customer Solution Case Study Institute Cuts Costs, Boosts Efficiency with Exchange Server Unified Messaging Overview Country or Region: United States Industry: Education

More information

Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag

Application Firewall Overview. Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Application Firewall Overview Published: February 2007 For the latest information, please see http://www.microsoft.com/iag Contents IAG Application Firewall: An Overview... 1 Features and Benefits... 2

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services Product Highlights Intrusion Prevention System Dectects and prevents known and unknown attacks/ exploits/vulnerabilities, preventing outbreaks and keeping your network safe. Gateway Anti Virus Protection

More information

Health Insurance Company Uses the Cloud to Reduce Mobile Development Time by Half

Health Insurance Company Uses the Cloud to Reduce Mobile Development Time by Half Windows Azure Customer Solution Case Study Health Insurance Company Uses the Cloud to Reduce Mobile Development Time by Half Overview Country or Region: United States Industry: Healthcare Customer Profile

More information

How To Buy Nitro Security

How To Buy Nitro Security McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security

More information

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ALCATEL-LUCENT OPENTOUCH SESSION BORDER CONTROLLER A SECURE SOLUTION FOR BORDERLESS CONVERSATIONS APPLICATION

More information

How To Create An Online Learning Portal For A University

How To Create An Online Learning Portal For A University Microsoft Higher Education Customer Solution Case Study University Launches Online Courses, Measures Learning Outcomes with Education Portal Overview Country or Region: United States Industry: Education

More information

Healthcare Provider Chooses Office 365 to Meet Compliance Needs, Boost Communications

Healthcare Provider Chooses Office 365 to Meet Compliance Needs, Boost Communications Microsoft Office 365 Customer Solution Case Study Healthcare Provider Chooses Office 365 to Meet Compliance Needs, Boost Communications Overview Country or Region: United States Industry: Healthcare Customer

More information

Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment to your existing messaging solution

Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment to your existing messaging solution Smart SOA application integration with WebSphere software To support your business objectives Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment

More information

How To Improve Your Data Center Service With A Microsoft Server 2007 Monitoring Software

How To Improve Your Data Center Service With A Microsoft Server 2007 Monitoring Software Microsoft Server Product Portfolio Customer Solution Case Study Data Center Services Provider Boosts Service Levels with Monitoring Software Overview Country or Region: United States Industry: Professional

More information

Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide

Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide September 2015 Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide 2015 Brocade Communications Systems, Inc. All Rights Reserved. ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX,

More information

Perfect Vision Saves Up to AUD$30,000 a Year by Eliminating Downtime

Perfect Vision Saves Up to AUD$30,000 a Year by Eliminating Downtime Microsoft Windows Small Business Server 2003 Customer Solution Case Study Perfect Vision Saves Up to AUD$30,000 a Year by Eliminating Downtime Overview Country or Region: Australia Industry: Health Customer

More information

Implementing Business Portal in an Extranet Environment

Implementing Business Portal in an Extranet Environment Implementing Business Portal in an Extranet Environment Published: December 2005 Table of contents Introduction...1 What is extranet access?...1 Why deploy Business Portal in an extranet?...1 Order Management...1

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

AMD Helps Business Users Manage Web Assets with Enhanced Content Management

AMD Helps Business Users Manage Web Assets with Enhanced Content Management Solution Sheet: Microsoft Office System Customer Solution Sheet AMD Helps Business Users Manage Web Assets with Enhanced Content Management Overview Country or Region: United States Industry: Semiconductors

More information

Transport Fleet Services Firm Shifts From Paper Processes with Microsoft Dynamics NAV

Transport Fleet Services Firm Shifts From Paper Processes with Microsoft Dynamics NAV Microsoft Dynamics Customer Solution Case Study Transport Fleet Services Firm Shifts From Paper Processes with Microsoft Dynamics NAV Overview Country: Canada Industry: Service/Manufacturing Customer Profile

More information

PRODUCT CATEGORY BROCHURE

PRODUCT CATEGORY BROCHURE PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size

More information

Media Company Reduces Time-to-Market by 80 Percent with Cloud-Hosting Solution

Media Company Reduces Time-to-Market by 80 Percent with Cloud-Hosting Solution Microsoft Customer Solution Customer Solution Case Study Media Company Reduces Time-to-Market by 80 Percent with Cloud-Hosting Solution Overview Country or Region: United States Industry: Media and cable

More information

IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop

IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop Planning a data security and auditing deployment for Hadoop 2 1 2 3 4 5 6 Introduction Architecture Plan Implement Operationalize Conclusion Key requirements for detecting data breaches and addressing

More information

Secure Email Inside the Corporate Network: INDEX 1 INTRODUCTION 2. Encryption at the Internal Desktop 2 CURRENT TECHNIQUES FOR DESKTOP ENCRYPTION 3

Secure Email Inside the Corporate Network: INDEX 1 INTRODUCTION 2. Encryption at the Internal Desktop 2 CURRENT TECHNIQUES FOR DESKTOP ENCRYPTION 3 A Tumbleweed Whitepaper Secure Email Inside the Corporate Network: Providing Encryption at the Internal Desktop INDEX INDEX 1 INTRODUCTION 2 Encryption at the Internal Desktop 2 CURRENT TECHNIQUES FOR

More information

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.

More information

Shoe Manufacturer Improves Access, Enhances Security with Identity and Access Management

Shoe Manufacturer Improves Access, Enhances Security with Identity and Access Management Microsoft Forefront: Security Products for Business Customer Solution Case Study Shoe Manufacturer Improves Access, Enhances Security with Identity and Access Management Overview Country or Region: Denmark

More information

The Benefits of SSL Content Inspection ABSTRACT

The Benefits of SSL Content Inspection ABSTRACT The Benefits of SSL Content Inspection ABSTRACT SSL encryption is the de-facto encryption technology for delivering secure Web browsing and the benefits it provides is driving the levels of SSL traffic

More information

Secospace elog. Secospace elog

Secospace elog. Secospace elog Secospace elog Product Overview With the development of networks, security events continually occur on hosts, databases, and Web servers. These range from Trojans, worms, and SQL injections, to Web page

More information

Using EonOne to Centralize the Management of all EonNAS devices

Using EonOne to Centralize the Management of all EonNAS devices Using EonOne to Centralize the Management of all EonNAS devices Application Note Abstract This application note describes how to manage multiple EonNAS devices across your network with the help of EonOne.

More information

Contract Researcher Cuts Costs by 35 Percent with FDA-Compliant System

Contract Researcher Cuts Costs by 35 Percent with FDA-Compliant System Microsoft Customer Solution Healthcare Industry Case Study Contract Researcher Cuts Costs by 35 Percent with FDA-Compliant System Overview Country or Region: United States Industry: Healthcare services

More information

Trust. The essential ingredient for innovation. Thomas Langkabel National Technology Officer Microsoft Germany

Trust. The essential ingredient for innovation. Thomas Langkabel National Technology Officer Microsoft Germany Trust The essential ingredient for innovation Thomas Langkabel National Technology Officer Microsoft Germany How do we understand innovation? Innovation is the conversion of knowledge and ideas into new

More information

How To Achieve Pca Compliance With Redhat Enterprise Linux

How To Achieve Pca Compliance With Redhat Enterprise Linux Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving

More information

Strong Authentication for Microsoft SharePoint

Strong Authentication for Microsoft SharePoint Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

HP ProLiant DL320 Firewall/VPN/Cache Server User Guide

HP ProLiant DL320 Firewall/VPN/Cache Server User Guide HP ProLiant DL320 Firewall/VPN/Cache Server User Guide Running Microsoft Internet Security and Acceleration Server 2004 June 2005 (Third Edition) Part Number 341672-003 Copyright 2004, 2005 Hewlett-Packard

More information

Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management

Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management Optimize Your Microsoft Infrastructure Leveraging Exinda s Unified Performance Management Executive Summary Organizations

More information

Installation and configuration guide

Installation and configuration guide Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

ISA Server Plugins Setup Guide

ISA Server Plugins Setup Guide ISA Server Plugins Setup Guide Secure Web (Webwasher) Version 1.3 Copyright 2008 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Secure Remote and Outbound Internet Access Using ISA Server 2006 Web Proxy

Secure Remote and Outbound Internet Access Using ISA Server 2006 Web Proxy Secure Remote and Outbound Internet Access Using ISA Server 2006 Web Proxy White Paper Published: June 2006 For the latest information, please see http://www.microsoft.com/isaserver/ 1 Table of Contents

More information

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Web application security Executive brief Managing a growing threat: an executive s guide to Web application security. Danny Allan, strategic research analyst, IBM Software Group Contents 2 Introduction

More information

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1

Fidelis XPS Power Tools. Gaining Visibility Into Your Cloud: Cloud Services Security. February 2012 PAGE 1 PAGE 1 Fidelis XPS Power Tools Gaining Visibility Into Your Cloud: Cloud Services Security February 2012 PAGE 1 PAGE 1 Introduction Enterprises worldwide are increasing their reliance on Cloud Service providers

More information

White paper. Keys to SAP application acceleration: advances in delivery systems.

White paper. Keys to SAP application acceleration: advances in delivery systems. White paper Keys to SAP application acceleration: advances in delivery systems. Table of contents The challenges of fast SAP application delivery...3 Solving the acceleration challenge: why traditional

More information

Network Configuration/Bandwidth Planning Scope

Network Configuration/Bandwidth Planning Scope Network Configuration/Bandwidth Planning Scope Workshop Focus and Objective Workshop Focus Drive key planning considerations for Office 365 domain and domain name service (DNS) records configuration Network

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

Online Firm Improves Performance, Customer Service with Mission-Critical Storage Solution

Online Firm Improves Performance, Customer Service with Mission-Critical Storage Solution Microsoft SQL Server Customer Solution Case Study Online Firm Improves Performance, Customer Service with Mission-Critical Storage Solution Overview Country or Region: United States Industry: IT services

More information

Integrated Citrix Servers

Integrated Citrix Servers Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights

More information

Managed Antivirus Quick Start Guide

Managed Antivirus Quick Start Guide Quick Start Guide Managed Antivirus In 2010, GFI Software enhanced its security product offering with the acquisition of Sunbelt Software and specifically its VIPRE product suite. Like GFI Software, Sunbelt

More information

.CRF. Electronic Data Capture and Workflow System for Clinical Trials

.CRF. Electronic Data Capture and Workflow System for Clinical Trials .CRF Electronic Data Capture and Workflow System for Clinical Trials Business challenge Most research takes place in different centers simultaneously. These are often located in different cities or even

More information

GOOD PRACTICE GUIDE 13 (GPG13)

GOOD PRACTICE GUIDE 13 (GPG13) GOOD PRACTICE GUIDE 13 (GPG13) GPG13 - AT A GLANCE Protective Monitoring (PM) is based on Good Practice Guide 13 Comprises of 12 sections called Proactive Monitoring Controls 1-12 Based on four Recording

More information

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES FIREWALL Features SECURITY OF INFORMATION TECHNOLOGIES To ensure that they stay competitive and in order to expand their activity, businesses today know it is in their best interests to open up more channels

More information

Overview - Using ADAMS With a Firewall

Overview - Using ADAMS With a Firewall Page 1 of 6 Overview - Using ADAMS With a Firewall Internet security is becoming increasingly important as public and private entities connect their internal networks to the Internet. One of the most popular

More information

Data Security and Governance with Enterprise Enabler

Data Security and Governance with Enterprise Enabler Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date

More information

Device Lifecycle Management

Device Lifecycle Management Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)

More information

Global Software and Services Firm Reduces Costs, Builds Community with Unified Communications

Global Software and Services Firm Reduces Costs, Builds Community with Unified Communications Microsoft Lync Server 2010 Customer Solution Case Study Global Software and Services Firm Reduces Costs, Builds Community with Unified Communications Overview Country or Region: United States Industry:

More information