TFS ApplicationControl White Paper

Size: px
Start display at page:

Download "TFS ApplicationControl White Paper"

Transcription

1 White Paper Transparent, Encrypted Access to Networked Applications TFS Technology

2 Table of Contents Overview 3 User Friendliness Saves Time 3 Enhanced Security Saves Worry 3 Software Componenets 3 Features of TFS ApplicationControl 4 TFS Agents for Remote Administration 4 System Architecture 5 TFS BoKS Manager 5 TFS ApplicationControl 6 Log in Process With TFS ApplicationControl 7 Off-the-Shelf TFS Agents 8 Software Development Kits 8 TFS Agents Combinations for Differing Requirements 9 Basic Combinations of TFS Agents 9 Additional Questions to Ask 9 Using Proxy Machines for Old or Special Operating Systems 10 About TFS Technology 11 TFS ApplicationControl / 2

3 The TFS Technology Vision: Lead the world in providing enhancements to existing infrastructure, simplifying usage and administration with profound security using products and services that add value to the customer. Overview TFS ApplicationControl is designed to provide you both a more user-friendly application environment and enhanced security. User-Friendliness Saves Time Once you have fully deployed TFS ApplicationControl, users need log in only once daily. TFS ApplicationControl then provides them transparent single sign-on (SSO) to all applications that are TFS ApplicationControl enabled. This eliminates user frustration due to lost account information, for example, upon returning from vacation or not having used a particular application for some time. It is not only users who benefit from the SSO friendliness - application administrators are spared all the calls from users who would otherwise need to reset their passwords. The results: reduced help-desk costs and more time for productive tasks such as user account administration and application management. This means less time spent on daily tasks that do not add value, and more time available for tasks that do. Enhanced Security Saves Worry When important or essential information is transferred in clear text over a network, there is every reason to take a careful look at application security within the network. Sensitive information concerning things such as customers, bids, salaries, personnel, blueprints, prototypes, plans and strategy are among an organization's most important strategic assets. Unauthorized access to such information must be prevented, as it is possible for an attacker to obtain information sent in clear text over networks with simple tools such as "sniffers". TFS ApplicationControl secures sensitive information by encrypting all communication between application server and user. It is not only application content (data) that is protected, but user names and passwords as well. Software Components TFS ApplicationControl employs the following components: TFS BoKS Manager server - the central security server that provides user administration, user authentication, user authorization, audit logging as well as other services. TFS Desktop - client software that is installed on all PCs to allow users to log in to the security system and gain access to TFS ApplicationControl-enabled applications. Access is only possible from a TFS Desktop PC, virtually eliminating risk from outside, unauthorized intruders. TFS Desktop provides users with the capability of using digital user credentials such as certificates and electronic keys, which may be stored in either Smart Cards or Virtual Cards, or a combination of both. (A Virtual Card is essentially the protected software equivalent of a Smart Card). TFS Agents -the server software that is usually installed on the application server itself to protect the application from unauthorized access. Depending on the application, TFS Agents are installed either as a proxy in front of the application or as a shared library (DLL file) if such an interface exists in the application. For some applications, there is also a TFS Agent client component installed on the PC along with the TFS Desktop. TFS ApplicationControl/ 3

4 Features of TFS ApplicationControl TFS Agents are designed and built specifically for standard applications, but can also be customized for particular needs. Features, which vary somewhat depending on application, include: Non-intrusiveness - TFS Agents can be implemented without modifying the application being protected. SSO - Single sign-on to all applications, which lets users log in once to authenticate themselves, then gives them access to all applications for which they are authorized without the need for further passwords. Role Mapping - Allows a user to log in to an application with different roles, such as administrator, operator or tester. Access Control or Authorization - You define who can access what and when. Access Control is managed in TFS BoKS Manager. Strong two-factor authentication - Ensures that the user is who he or she claims to be, so that only authenticated users gain access. Line Encryption - Encrypts communication between the user's PC and the application server. Central Administration - Allows administration of access rights to all applications from one central point in the network. Administrators do not need to log in to all application servers to disable an account. Instead, the user is removed (or blocked temporarily) in the central security database. No one can log in to TFS Agent-protected applications without access rights in the database. Central Audit Logs -TFS Agents log successful and unsuccessful login attempts to the central security log in TFS BoKS Manager. In application security, it is an advantage to have only one general security system to protect many applications, rather than one security system for each application. A single system greatly simplifies the work of administrators, provides a system overview and allows centralized audit logging for much easier audit review. Almost all TFS Agents can be installed without the need to alter or modify the application. They are quick and easy to install, and the startup time before moving into production mode is short. TFS Agents for Remote Administration In today's world, it is becoming increasingly important to be able to perform remote administration for components such as application servers, file servers, firewalls and routers in a secure manner. The following TFS Agents for network access methods make it is possible to protect remote host administration via the most common means: TFS Agent for Telnet - Telnet TFS Agent for FTP - FTP TFS Agent for Web Servers - HTTP (via a web interface) TFS Agent for Line Encryption - Allows remote access through a secure tunnel for existing user-developed administrative tools The use of the above TFS Agents in a configuration in which the application server cannot be reached in any way except via the TFS Agents provides greatly strengthened security for remote administration. TFS ApplicationControl / 4

5 System Architecture TFS BoKS Manager is the central security server for the TFS ApplicationControl, TFS DocumentControl, TFS UnixControl and TFS WorkstationControl solutions. This section describes the basic functionality that TFS BoKS Manager provides, as well as how it interacts with different solution values. TFS BoKS Manager TFS BoKS Manager is the central server in an ApplicationControl solution, holding the security database and the audit logs. From an ApplicationControl perspective, the TFS BoKS Manager has three primary tasks: 1. Generating RSA keys and certificates for users (unless Smart Cards are used) and hosts in the form of Virtual Cards. 2. Providing the TFS Desktop with a number of services, such as download of Virtual Cards (roaming credentials), user authentication and download of trusted CA certificates. 3. Providing TFS Agents with services to authenticate, authorize and fetch application account information for users and act as audit log server. A TFS BoKS Manager installation is called a domain and consists of one TFS BoKS Manager Master server and a number of Replica servers. The Desktops and Agents can access any of the servers to obtain the particular services, providing load balancing and improved performance. In addition to the services directly related to ApplicationControl, TFS BoKS Manager is also the central server in the UnixControl and DocumentControl solutions, providing access control services to BoKS Clients and providing Group Encryption Keys and personal file encryption keys to TFS Desktops users. Communication between the TFS Desktops and TFS BoKS Manager is accomplished using the CSSP (Cryptographic Security Services Protocol) protocol over 128-bit SSL. Communication both between TFS Agents and TFS BoKS Manager, as well as between the BoKS Master, Replicas and Clients, is accomplished using 128-bit RC5 with a shared secret (Nodekey). TFS BoKS Manager is managed via a web interface on the Master server. The web interface uses 128-bit https, and authentication to the web interface is done either using SecurID or client-authenticated SSL. TFS BoKS Manager supports all major UNIX brands (see the TFS BoKS Manager data sheet for details). This means that the Master server and Replica servers can be installed in a heterogeneous UNIX environment with all functionality intact, regardless of the platform on which TFS BoKS Manager is installed. TFS ApplicationControl / 5

6 TFS ApplicationControl TFS BoKS Manager is the point of central control and the provider of information to the other components in a TFS ApplicationControl solution. Both TFS Desktop and TFS Agent need to be in contact with TFS BoKS Manager for authentication, authorization and accounting purposes. TFS BoKS Manager also gathers log information for each connection (or attempted connection) and other events. The following schematic overview shows how the different components interact: TFS ApplicationControl / 6

7 Log In Process with TFS ApplicationControl TFS Desktop Login: The user logs in to the TFS Desktop, which connects to TFS BoKS Manager to check if the user is authorized to log in. When logging in to the TFS Desktop, the user may use either a Smart Card or a Virtual Card, or a combination of both, as user credentials. It is possible to configure (on a user basis) the use of either password or an RSA SecurID token to unlock the Smart Card or Virtual Card. User Starts Application: When the application client is started on the PC (makes a TCP connection to the application server), the TFS Desktop connection filter intercepts the connection and starts an SSL negotiation session with the TFS Agent to set up an authenticated, encrypted connection. After a secure connection is negotiated, it is encrypted using 128-bit SSL. All communication between TFS products is also encrypted. Authorization by TFS BoKS Manager: After the authentication process, the application data is tunneled through an SSL channel and the TFS Agent begins processing the first application data packages sent between the application client and server. The TFS Agent checks the user's application setup in the TFS BoKS security database to ensure that the user is authorized to use this application (Access Route check), and maps the user to a predefined application user account. This means that the application user name, password and ID need not be known by the user. TFS Agent Opens Channel to Application: With authorization from TFS BoKS Manager, the user's application account information is now inserted into the original data package and the connection between the application client and the application server is opened. After the application has accepted the user name and password, the user has an encrypted line across the network to the application, or more correctly to the TFS Agent on the Agent host (which is generally the application server). TFS ApplicationControl / 7

8 The user only needs to authenticate once on their TFS Desktop through TFS BoKS Manager when starting work each day, and then experiences the ease of single sign-on without multiple passwords to all applications protected by TFS Agents. Your administrators can also rest secure in the knowledge that users are not setting simplified passwords that they can remember but that are easy to crack, or writing passwords down where they may be seen. In the context of this solution, TFS BoKS Manager manages all user credentials. TFS BoKS Manager allows synchronization with external CRLs, and provides for manual revocation and reinstatement of user certificates. Off-the-Shelf TFS Agents The following TFS Agent solutions are available either for direct download or as standard solutions that must be compiled on the target platform and quickly tested before usage: TFS Agent for SNC/SSF - covers SAP R/3's Secure Network Communication (SNC) interface, Secure Store and Forward (SSF) interface and MySAP.com (web) interface. TFS Agent for Line Encryption (LEA)- provides access control and tunnels any application that uses the TCP/IP protocol (that is, does not support applications running on UDP). TFS Agent for Oracle Applications TFS Agent for Oracle DB/MTS TFS Agent for Peoplesoft TFS Agent for Informix TFS Agent for Sybase TFS Agent for Web Servers - protects the HTTP protocol v1.0 and v1.1 and is not web server specific. No modifications to the TFS Agent for Web Servers is needed as long as the web server uses standard HTTP. TFS Agent for Lotus Notes - provides single sign-on (SSO) to the Lotus Notes application. May be combined with the TFS Agent for Line Encryption to add access control and encrypted communication. TFS Agent for Telnet TFS Agent for FTP TFS Agent for POP3 - secures incoming mail traffic from the server to the client, that is, when fetching mail from the mail server. TFS Agent for IMAP - secures incoming mail traffic from the server to the client, that is, when fetching mail from the mail server. TFS Agent for SMTP - secures outgoing mail. The TFS Agent for SMTP can also ensure the authenticity of the sender's name and address. TFS Agent for TN3270 Software Development Kits TFS Agent Software Development Kits (SDKs) can be used to build customized Agent solutions. Currently, three different TFS Agent Software Development Kits (SDKs) are available: one full kit and two lightweight Single Sign-On kits. The full TFS Agent SDK (referred to as the Agent SDK) has an easy-to-use C-API with a high level interface, allowing for easy creation of standard proxy agents. In addition, the Agent SDK has some 180 functions for advanced use if desired. This kit can be used to tailor solutions for almost any need. If the requirement for a customized Agent is limited to single sign-on functionality, TFS offers two lightweight single sign-on SDKs that include 15 to 40 functions, respectively, to give you lightweight solutions that are easy, quick and cheap to implement. These kits only include functions relevant to SSO and come in two forms, depending on your architecture and needs: one server-based, referred to as the SSO SDK and the other client-based, referred to as the Desktop SSO SDK. The client-based kit works in conjunction with the TFS Desktop. TFS ApplicationControl / 8

9 In summary, the available TFS Agent SDKs are: TFS Agent SDK - full kit, currently ported to approximately 15 different platforms TFS SSO SDK - server-based SSO tool. Currently ported to 3 platforms TFS Desktop SSO SDK - client-based SSO tool that interacts with the TFS Desktop TFS Agent Combinations for Differing Requirements TFS Agent software is so well integrated, modular and versatile, that many solutions are available for a given need. A commonly asked question is how to obtain SSO and security in the most cost-effective way. Basic Combinations of TFS Agents TFS Agents and the software kits can be combined to provide the most cost-effective solution for your needs. Some tradeoffs to consider in designing your solution using the various TFS Agents and SDKs are: Using the Agent SDK by itself is more complex than using the (Desktop) SSO SDK together with the optional TFS Line Encryption Agent (LEA). The benefit of using the Agent SDK is that the resulting solution is extremely secure if implemented correctly, whereas the (Desktop) SSO SDK together with the LEA offer medium security, that is, no sensitive information is sent in clear text over the networks but account information may reside in the client PC machine's memory for a time. The (Desktop) SSO SDK used alone offers improved, though lower, security than do the other combinations. Using the (Desktop) SSO SDKs alone should be used only for users to have SSO to applications, as account information is sent in clear text over the network. Implementing a solution using the (Desktop) SSO SDK is easier than doing so with the SDK, thus there are further questions one needs to answer before planning and choosing the tools for building a solution. Additional Questions Some additional questions to answer when designing a custom solution are the following: What security level is required? high medium low If your answer is "high", use the Agent SDK. Is the application's protocol specification available as open information? This is needed in implementing a full TFS Agent with the SDK. If not immediately available, it may take some effort to gather such specification information. If a full TFS Agent is desired and the application's source code is available, one option is to build the TFS Agent into the application (compiled together, or "native support"). This option creates a very tight, secure solution. Is it possible to start the application client with a script or log in to the application client via a published and supported API? Then the (Desktop) SSO SDK + the optional LEA is a good choice. TFS ApplicationControl / 9

10 If it is not possible to start the client via a script and there is no login API, do you have the source code to the client? Would it be possible to add functionality allowing a scripted start to the code? In C programs, using the main (argv, argc) makes adding such functionality fairly easy. In such a case, TFS Technology suggests using the (Desktop) SSO SDK + optional LEA. This solution combination will likely result in a project that is shorter, more cost-effective and easier to maintain, due to the fact that there are no maintenance dependencies on changes in the application protocol, etc. This is a way to create solutions for many applications, whereas a customized Agent built with the SDK would have been too expensive and costly to maintain. It is also possible to put (Desktop) SSO SDK client calls into the application client source code. This is a nice way to add SSO to the application. In a typical operating network, there is often no need to secure all applications, as long as they do not contain sensitive information. However, when TFS Agents are to be developed and deployed for all sensitive applications, it may be just as profitable - from a cost, saved time and user perspective - to include all major applications in the TFS ApplicationControl solution. Using Proxy Machines for Old or Special Operating Systems Occasionally, applications run on hardware or with operating systems that TFS Agents do not support. In such cases, it is always possible to front the application server with another machine using the (Desktop) SSO SDK and LEA, or the full Agent SDK, to create a TFS Agent solution. In such circumstances, the connection between the application server and the fronting machine must be physically secured and protected, as it is not encrypted. As a TFS Agent may be installed directly on the application server or on a front-end machine, TFS uses the term Agent Host to refer to either one, that is, to the machine on which the Agent is installed. TFS ApplicationControl / 10

11 One System, Many Solutions TFS Technology achieves synergy between its different solutions, as they are all part of the same standards-based system that protects critical applications while complying with enterprise-wide security policies. It's central component, the TFS BoKS Manager, provides not only central administration, but also a central point of security information for other applications. A number of solutions are available in the system including UNIX administration, file encryption, secure messaging, directory synchronization, and many more. TFS currently offers subsets of these services as individual licenses. About TFS Technology TFS Technology is an international award-winning provider of solutions that simplify usage and administration of existing infrastructure while providing profound security for today's successful businesses. With solutions adopted in more than 10,000 organizations spanning 30 countries, TFS Technology leads the world in providing value-added products and services to the customer. The history of the company's technology dates back to 1986 at the DynaSoft organization with the initial development of what is known today as TFS BoKS. In 1992, the development work of the security and connectivity products were initiated within the TenFour organization. In 2001, TFS Technology was established as a separate entity from TenFour. focusing strictly on product development of security and connectivity solutions. In 2002, TFS Technology acquired the key management and file encryption products from RSA Security Inc., joining both product families together and strategically positioning TFS Technology as a comprehensive provider of e-security and infrastructure-enhancing solutions. Today, TFS Technology's management team consists of the original inventors and developers of both successful product families, and is dedicated to continuing their strong product reputation of developing easy-to-use solutions. TFS Technology US Inc. info@tfstech.com TFS Technology Sweden AB info@tfstech.com TFS Technology UK Ltd. info@tfstech.com Copyright 2003 TFS Technology. All rights reserved.

TFS UnixControl White Paper

TFS UnixControl White Paper White Paper Consolidate and simplify UNIX system management with TFS UnixControl TFS Technology www.tfstech.com Table of Contents Overview 3 Introduction 3 TFS UnixControl Functionality 3 System Architecture

More information

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0 Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction

More information

Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On

Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On SAP Brief SAP NetWeaver SAP NetWeaver Single Sign-On Objectives Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On Single sign-on in the SAP software architecture Single sign-on

More information

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

Authentication. Authentication in FortiOS. Single Sign-On (SSO) Authentication FortiOS authentication identifies users through a variety of methods and, based on identity, allows or denies network access while applying any required additional security measures. Authentication

More information

GoToMyPC Corporate Advanced Firewall Support Features

GoToMyPC Corporate Advanced Firewall Support Features F A C T S H E E T GoToMyPC Corporate Advanced Firewall Support Features Citrix GoToMyPC Corporate features Citrix Online s advanced connectivity technology. We support all of the common firewall and proxy

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

Single Sign-on (SSO) technologies for the Domino Web Server

Single Sign-on (SSO) technologies for the Domino Web Server Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145

More information

How Reflection Software Facilitates PCI DSS Compliance

How Reflection Software Facilitates PCI DSS Compliance Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit

More information

7.1. Remote Access Connection

7.1. Remote Access Connection 7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to

More information

Integrating Hitachi ID Suite with WebSSO Systems

Integrating Hitachi ID Suite with WebSSO Systems Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication

More information

Security for Application Service Providers

Security for Application Service Providers Security for Application Service Providers Overview Outsourcing is nothing new. Time sharing services for data processing have been around for some time. EDI applications have been at least partially outsourced

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Endpoint Security VPN for Mac

Endpoint Security VPN for Mac Security VPN for Mac E75 Release Notes 8 April 2012 Classification: [Protected] 2012 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

ecopy ShareScan v4.3 Pre-Installation Checklist

ecopy ShareScan v4.3 Pre-Installation Checklist ecopy ShareScan v4.3 Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication section describes

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Vidder PrecisionAccess

Vidder PrecisionAccess Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Network Defense Tools

Network Defense Tools Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds ravikantvanjara@gmail.com What is Firewall? A firewall

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

2003, Rainbow Technologies, Inc.

2003, Rainbow Technologies, Inc. Expertise Corporate 25 Years of Security SMB to Fortune 30 Access Control 28 Million Hardware Keys 50% Token market share 6 Years of ikey Web Security 10 Years of SSL Secure > 50% of the Data NetSwift

More information

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network 70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

Licenses are not interchangeable between the ISRs and NGX Series ISRs. Q&A Cisco IOS SSL VPN Q. What is Cisco IOS SSL VPN or SSL VPN? A. Secure Sockets Layer (SSL)-based VPN is an emerging technology that provides remote-access connectivity from almost any Internet-enabled

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

Device Log Export ENGLISH

Device Log Export ENGLISH Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,

More information

Versatile Cross-platform Access

Versatile Cross-platform Access Versatile Cross-platform Access Danware Data A/S Bregnerodvej 127 3460 Birkerod Denmark Tel.: +45 45 90 25 25 Fax.: +45 45 90 25 26 www.danware.com Copenhagen April 2007 Page 1 of 6 Abstract Accessing

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity

More information

etoken Single Sign-On 3.0

etoken Single Sign-On 3.0 etoken Single Sign-On 3.0 Frequently Asked Questions Table of Contents 1. Why aren t passwords good enough?...2 2. What are the benefits of single sign-on (SSO) solutions?...2 3. Why is it important to

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with

More information

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2 RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks

More information

Versatile remote access. Product white paper

Versatile remote access. Product white paper Product white paper Abstract Accessing all your own computers and all of your customers computers often is a cumbersome task because of the variety of platforms and different user needs requiring different

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

ERserver. iseries. Securing applications with SSL

ERserver. iseries. Securing applications with SSL ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Mobile Admin Architecture

Mobile Admin Architecture Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Security Policy Revision Date: 23 April 2009

Security Policy Revision Date: 23 April 2009 Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure

More information

Proxies. Chapter 4. Network & Security Gildas Avoine

Proxies. Chapter 4. Network & Security Gildas Avoine Proxies Chapter 4 Network & Security Gildas Avoine SUMMARY OF CHAPTER 4 Generalities Forward Proxies Reverse Proxies Open Proxies Conclusion GENERALITIES Generalities Forward Proxies Reverse Proxies Open

More information

iphone in Business How-To Setup Guide for Users

iphone in Business How-To Setup Guide for Users iphone in Business How-To Setup Guide for Users iphone 3G is ready for business. It supports Microsoft Exchange ActiveSync, delivering push email, calendars, and contacts. And it gives mobile users secure

More information

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability Overview... 3 Installing Bridgit Software... 4 Installing Bridgit Software Services... 4 Creating a Server Cluster... 4 Using

More information

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT

IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT IMPLEMENTATION OF INTELLIGENT FIREWALL TO CHECK INTERNET HACKERS THREAT Roopa K. Panduranga Rao MV Dept of CS and Engg., Dept of IS and Engg., J.N.N College of Engineering, J.N.N College of Engineering,

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

RemotelyAnywhere Getting Started Guide

RemotelyAnywhere Getting Started Guide April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...

More information

iphone in Business How-To Setup Guide for Users

iphone in Business How-To Setup Guide for Users iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over

More information

Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology

Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology The #1 Remote Control and File Transfer Software Contents 1 Introduction 1 Application Level Security 2 Network Level Security 2 Usage Examples 4 Summary 4 Appendix A Setting Up a Firewall for Timbuktu

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Secure remote access to your applications and data. Secure Application Access

Secure remote access to your applications and data. Secure Application Access Secure Application Access Secure remote access to your applications and data Accops HySecure is an application access gateway that enables secure access to corporate applications, desktops and network

More information

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK

Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc

More information

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification Remote Connectivity for mysap.com Solutions over the Technical Specification June 2009 Remote Connectivity for mysap.com Solutions over the page 2 1 Introduction SAP has embarked on a project to enable

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

SSL VPN vs. IPSec VPN

SSL VPN vs. IPSec VPN SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White

More information

OVERVIEW. DIGIPASS Authentication for Office 365

OVERVIEW. DIGIPASS Authentication for Office 365 OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile

More information

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration

More information

IBM Unica emessage Version 8 Release 6 February 13, 2015. Startup and Administrator's Guide

IBM Unica emessage Version 8 Release 6 February 13, 2015. Startup and Administrator's Guide IBM Unica emessage Version 8 Release 6 February 13, 2015 Startup and Administrator's Guide Note Before using this information and the product it supports, read the information in Notices on page 83. This

More information

Configuring Security Features of Session Recording

Configuring Security Features of Session Recording Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording

More information

Basics of Internet Security

Basics of Internet Security Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

NETASQ MIGRATING FROM V8 TO V9

NETASQ MIGRATING FROM V8 TO V9 UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

Case Study for Layer 3 Authentication and Encryption

Case Study for Layer 3 Authentication and Encryption CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client

More information

Implementing PCoIP Proxy as a Security Server/Access Point Alternative

Implementing PCoIP Proxy as a Security Server/Access Point Alternative Implementing PCoIP Proxy as a Security Server/Access Point Alternative Overview VMware s Horizon Security Server and Access Point provides secure access to sessions over an unsecured WAN and/or Internet

More information

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES

PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES M-FILES CORPORATION PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES VERSION 8 24 SEPTEMBER 2014 Page 1 of 8 CONTENTS 1. Overview... 3 2. Encryption of Data in Transit in M-Files... 4 HTTPS... 4 RPC

More information

Copyright Giritech A/S. Secure Mobile Access

Copyright Giritech A/S. Secure Mobile Access Secure Mobile Access From everywhere... From any device... From user......to applications Page 3...without compromising on security and usability... and to my PC in the office: Secure Virtual Access Contrary

More information

Version Highlights. CertainT 100 SSL Accelerator. Version 2.11. International. New hardware and software version. North America

Version Highlights. CertainT 100 SSL Accelerator. Version 2.11. International. New hardware and software version. North America Version Highlights SSL Accelerator Version 2.11 New hardware and software version North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22

More information

Remote Access Clients for Windows

Remote Access Clients for Windows Remote Access Clients for Windows E80.60 Release Notes 3 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation

More information

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

ReadyNAS Remote White Paper. NETGEAR May 2010

ReadyNAS Remote White Paper. NETGEAR May 2010 ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that

More information

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE Virtual Server and DDNS For BIPAC 741/743GE August, 2003 1 Port Number In TCP/IP and UDP networks, a port is a 16-bit number, used by the host-to-host protocol to identify to which application program

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Mithi Connect Server deployment options

Mithi Connect Server deployment options Page 1 of 8 Mithi Connect Server deployment options aintroduction 2 Mail servers 2 Single/Standalone server setups 2 Multiple server setups 4 Co-existence with proprietary mailing solutions such as Exchange

More information

Mobile Admin Security

Mobile Admin Security Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local

More information

Barracuda SSL VPN Administrator s Guide

Barracuda SSL VPN Administrator s Guide Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,

More information

Proof of Concept Guide

Proof of Concept Guide Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Convenience and security

Convenience and security Convenience and security ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work and home environments.

More information

Fig. 4.2.1: Packet Filtering

Fig. 4.2.1: Packet Filtering 4.2 Types of Firewalls /DKo98/ FIREWALL CHARACTERISTICS 1. All traffic from inside to outside, and vice versa, must pass through the firewall. This is achieved by physically blocking all access to the

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Thales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved.

Thales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved. ncipher modules Integration Guide for IBM Tivoli Access Manager for e-business 6.1 Windows Server 2003 32-bit and 64-bit Windows Server 2008 32-bit and 64-bit Version: 1.2 Date: 22 December 2009 Copyright

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

Controlling Web Access with BMC Web Access Manager WHITE PAPER

Controlling Web Access with BMC Web Access Manager WHITE PAPER Controlling Web Access with BMC Web Access Manager WHITE PAPER Table of Contents Executive Summary...2 The BMC Identity and Access Management Approach...3 BMC Enforcement Agent Deployment Flexibility...3

More information

Locking down a Hitachi ID Suite server

Locking down a Hitachi ID Suite server Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist

BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist This document lists the preinstallation requirements that must be met before you install the BlackBerry Enterprise Server

More information

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

Exam Questions SY0-401

Exam Questions SY0-401 Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened

More information

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309

More information