Pexip Infinity platform management and security features



Similar documents
Polycom RealPresence Group Series Deployment Guide for Maximum Security Environments

Fundamentals of a Windows Server Infrastructure MOC 10967

Active Directory LDAP

Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1

Ensuring the security of your mobile business intelligence

CONTENTS. PCI DSS Compliance Guide

Hitachi Virtual Storage Platform Family: Security Overview. By Hitachi Data Systems

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Secure Access Link. Table of Contents. Introduction. Background. avaya.com. Introduction Background Secure Access Link...

Ensuring the security of your mobile business intelligence

Local Session Controller: Cisco s Solution for the U.S. Department of Defense Network of the Future

Information Blue Valley Schools FEBRUARY 2015

Course 2823B: Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Network Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name

2: Do not use vendor-supplied defaults for system passwords and other security parameters

Cisco TelePresence Video Communication Server Basic Configuration (Control with Expressway)

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

Features Description Benefit AP-7131N support Adaptive AP Support for the AP7131N-GR and AP7131N- GRN

LifeSize Video Communications Systems Administrator Guide

Directory Integration in LANDesk Management Suite

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Complying with PCI Data Security

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

High Definition PoE IP Phone

Symphony Plus Cyber security for the power and water industries

Administering Windows Server 2012

This module explains how to configure and troubleshoot DNS, including DNS replication and caching.

Potential Targets - Field Devices

Basics of Internet Security

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Best Practices for PCI DSS V3.0 Network Security Compliance

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60

Document ID. Cyber security for substation automation products and systems

Recommended IP Telephony Architecture

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Administering Windows Server 2012

Configuring Security Features of Session Recording

Qlik Sense Enabling the New Enterprise

QUICK START GUIDE MONDOPAD/WIN

Overview. Edvantage Security

A brief on Two-Factor Authentication

Public Key Infrastructure for a Higher Education Environment

DATA SECURITY AGREEMENT. Addendum # to Contract #

Pre Sales Communications

Oracle Identity Manager, Oracle Internet Directory

Implementing a Microsoft Windows 2000 Network Infrastructure

VMware Zimbra Security. Protecting Your VMware Zimbra and Collaboration Environment

ABC SBC: Securing and Flexible Trunking. FRAFOS GmbH

Cisco Unified Communications Manager 7.0

Pointsec Enterprise Encryption and Access Control for Laptops and Workstations

4cast Server Specification and Installation

Certification Report

SCADA SYSTEMS AND SECURITY WHITEPAPER

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2

Polycom RealPresence Access Director System

Security Architecture Whitepaper

Avaya Aura System Manager

Group Management Server User Guide

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Cisco TelePresence ISDN GW MSE 8321

Session Manager Overview. Seattle IAUG Chapter Meeting

HIPAA Compliance and Wireless Networks Cranite Systems, Inc. All Rights Reserved.

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

VoIP Logic HIPAA/SSAE SOC II Compliance Overview for Service Providers

NetIQ Identity Manager

A Systems Engineering Approach to Developing Cyber Security Professionals

DHHS Information Technology (IT) Access Control Standard

United States Trustee Program s Wireless LAN Security Checklist

How To Protect A Web Application From Attack From A Trusted Environment

Embedded Web Server Security

Core Solutions of Microsoft Lync Server 2013

How To Deploy Cisco Jabber For Windows On A Server Or A Network (For A Non-Profit) For A Corporate Network (A.Net) For Free (For Non Profit) For An Enterprise) Or

Device Log Export ENGLISH

Network Security Guidelines. e-governance

White Paper. BD Assurity Linc Software Security. Overview

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Threats to be considered (1) ERSTE GROUP

HIPAA Compliance and Wireless Networks

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

Cisco WebEx Meetings Server

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

Implementing Cisco IOS Network Security v2.0 (IINS)

McAfee Certified Product Specialist McAfee epolicy Orchestrator

Evolution from FTP to Secure File Transfer

Develop HIPAA-Compliant Mobile Apps with Verivo Akula

Transcription:

Pexip Infinity platform management and security features A white paper by Jordan Owens, VP of Architecture, Pexip. 10 June, 2014 Contact Pexip: w: www.pexip.com e: info@pexip.com t: @PexipInc 1

Platform management tool gets a makeover designed to comply with strictest possible US Federal security requirements Pexip Infinity reinforces its security posture. Network and system administrators can feel comfortable that all remote services necessary for management, monitoring, and control of their collaboration and meeting platform are secure. Pexip Infinity is now designed to comply with the strictest available US Federal security requirements. Building on Pexip Infinity s support for IPv6, a FIPS compliant encryption algorithm, and DSCP, the V6 release includes support for SNMP v3, SNTP, AS-SIP and authentication via AD for Management Node login. 2

Active Directory/LDAP Authentication Integration with Active Directory will allow Pexip administrators to use their existing Active Directory (AD) or LDAP server to authenticate all incoming connections to the Pexip Management Node. Integration will further allow automatic enforcement of password complexity, expiration, and certificate integration in accordance with existing organizational policies and procedures. Authentication into systems is best served by offering a single source of truth in terms of user name and password validation. Alignment of the Pexip portfolio with standard industry practices brings the system in line with customer expectations and helps provide a much improved security posture. This enhancement also allows multiple end users to be logged into the Management Node with their own account and each take independent actions. For example, one administrator, Betty Doe, can be logged in and deploy an additional Conferencing Node while Marie Morris is administering an active conference. In this case, the actions of each administrator will be logged to their unique user names. Betty s Conferencing Node deployment will be tracked to her AD user name (bdoe, as an example) while Marie s participant control will be tracked to hers (i.e. mmorris). Role Based Authentication Management Node authentication has been further enhanced through the creation and assignment of role-based permissions to individual or group of administrators. In this case, permissions for each sub page of the Management Node, from Status to Platform Configuration to Utilities, can be controlled independently. Each subset of administrators is assigned one of three permissions for each of these sub-sections: Modify, View, or No Access. 3

Organizations often want multiple individuals and systems to log into the Management Node and perform actions unique to their responsibility without threat they will impact the operation of the system as a whole. This functionality allows for separation of powers, systematically preventing unauthorized manipulation of the system. Encrypted, Authenticated Services The NTP and SNMP protocols, used in the Pexip platform from the beginning, can now be more secured to help protect informational channels used for system operation and monitoring. Network Time Protocol (NTP) services are vital to establishing the IPSec backplane between various nodes deployed within an environment. Securing time discovery will help enhance this required connection. Simple Network Management Protocol (SNMP) v3 allows those administrators interested in using this protocol for management to both encrypt and authenticate incoming SNMP discovery and monitoring between the Pexip Management Node and the SNMP manager. Means of encrypting and authenticating ancillary channels is always a good idea. All about protecting transmission of information to and from the Pexip environment, these means of encryption will help ensure protection of these production level resources. 4

Assured Services SIP (AS-SIP) Essential to DoD collaboration interoperability, AS-SIP is a superset of SIP signaling requirements deemed necessary by the United States Department of Defense (DoD), including DSCP tagging, secure TLS signaling, SRTP media security, and more. With support for AS-SIP included with all releases from V6 and on, Pexip has demonstrated its commitment to support the mission at hand, whatever that may be. Guaranteed interoperability is extremely important to the DoD to ensure that all installed applications support the mission. Implementation and support for AS-SIP, included in the V6 release, supports Pexip s firm commitment to the armed forces and the DoD. 5