Locum Software Services Limited



Similar documents
Getting Started. A Getting Started Guide for Locum RealTime Monitor. Manual Version 2.1 LOCUM SOFTWARE SERVICES LIMITED

MCP Guru Seminar Series: Security. Mike Kain, Consulting Engineer and Security Architect Wednesday, September 10 th, :00 pm

Enterprise Security CPA for IBM MF

DiskPulse DISK CHANGE MONITOR

Reports, Features and benefits of ManageEngine ADAudit Plus

Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution

What s New in Centrify DirectAudit 2.0

Admin Report Kit for Active Directory

DiskBoss. File & Disk Manager. Version 2.0. Dec Flexense Ltd. info@flexense.com. File Integrity Monitor

Task Management. JobTraQ Core Features

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Enforcive /Cross-Platform Audit

Reports, Features and benefits of ManageEngine ADAudit Plus

PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:

Track-It! 8.5. The World s Most Widely Installed Help Desk and Asset Management Solution

KMnet Admin ENTERPRISE DEVICE MANAGEMENT SOFTWARE ADVANCED DEVICE MANAGEMENT SOFTWARE.

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

ManageEngine Exchange Reporter Plus :: Help Documentation WELCOME TO EXCHANGE REPORTER PLUS... 4 GETTING STARTED... 7 DASHBOARD VIEW...

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

Radiological Assessment Display and Control System

MOBILE AGENT BANKING SYSTEM PRODUCT BENEFITS AND FEATURES

Running the SANS Top 5 Essential Log Reports with Activeworx Security Center

nexus Hybrid Access Gateway

JIJI AUDIT REPORTER FEATURES

Enforcive / Enterprise Security

SQL Server 2008 Administration

Partie Serveur Lab : Implement Group Policy. Create, Edit and Link GPOs. Lab : Explore Group Policy Settings and Features

Configuration Information

IBM Tivoli Compliance Insight Manager

Product Comparison List

TimePictra Release 10.0

VX Search File Search Solution. VX Search FILE SEARCH SOLUTION. User Manual. Version 8.2. Jan Flexense Ltd.

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

Appendix A4. AUTOMATED EMPLOYEE SCHEDULING SYSTEM (AESS) Technical Requirements

NetWrix Exchange Change Reporter

50238: Introduction to SQL Server 2008 Administration

Configuration Information

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Information Server Documentation SIMATIC. Information Server V8.0 Update 1 Information Server Documentation. Introduction 1. Web application basics 2

Product Data Sheet.

MS Exam Objectives Administering Windows Server 2012 R2

Smart Business Architecture for Midsize Networks Network Management Deployment Guide

Improved document archiving speeds; data enters the FileNexus System at a faster rate! See benchmark test spreadsheet.

SAFETICA QUICK GUIDE

Xtraction V2.5: Frequently Asked Questions

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Evaluator s Guide. PC-Duo Enterprise HelpDesk v5.0. Copyright 2006 Vector Networks Ltd and MetaQuest Software Inc. All rights reserved.

WatchGuard Training. Introduction to WatchGuard Dimension

Someone may be manipulating information in your organization. - and you may never know about it!

Stellar Active Directory Manager

Special Edition for FastTrack Software

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

InfoView User s Guide. BusinessObjects Enterprise XI Release 2

Table of Contents WELCOME TO ADAUDIT PLUS Release Notes... 4 Contact ZOHO Corp... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED...

Once the product is installed, you'll have access to our complete User Guide from the client.

Data Sheet: Work Examiner Professional and Standard

LEPIDEAUDITOR SUITE- DATASHEET

Out n About! for Outlook Electronic In/Out Status Board. Administrators Guide. Version 3.x

An Esri White Paper June 2010 Tracking Server 10

Asset Track Getting Started Guide. An Introduction to Asset Track

Grupo Lanka s Pivotal Development tools are integrated by the follow individual products:

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Course 6425B: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

Analyst 1.6 Software. Laboratory Director s Guide

EZManage SQL Pro. Quick guide for installation and implementation

What s New in Centrify Server Suite 2013 Update 2

InfoCenter Suite and the FDA s 21 CFR part 11 Electronic Records; Electronic Signatures

Unified Security Management (USM) 5.2 Vulnerability Assessment Guide

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Active Directory 2008 Audit Management Pack Guide for Operations Manager 2007 and Essentials 2010

Bomgar License Comparison

Global Value 7. Productivity Suite for GammaVision. Optimizing Gamma Spectrometry Processes through Secure Data Management and Measurement Automation.

Managing and Maintaining a Microsoft Windows Server 2003 Environment

Audit TM. The Security Auditing Component of. Out-of-the-Box

How To Choose A Business Intelligence Toolkit

Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

ElegantJ BI. White Paper. The Enterprise Option Reporting Tools vs. Business Intelligence

theguard! ApplicationManager System Windows Data Collector

Introduction. Connection security

TaskCentre v4.5 Run Crystal Report Tool White Paper

Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/ Barfield Road Atlanta, GA Tel: Fax:

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Backup Tab. User Guide

System 800xA Tools. System Version 5.1. Power and productivity for a better world TM

User Manual. Call Center - Agent Assistant Application

DELIVER Utility for MCP Systems

PCI Compliance for Cloud Applications

Security Information & Event Management A Best Practices Approach

SQL Server for Database Administrators Course Syllabus

User Reports. Time on System. Session Count. Detailed Reports. Summary Reports. Individual Gantt Charts

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé

The Advanced Process Data Historian Solution

PaperCut Implementing PaperCut NG

Transcription:

Locum Software Services Limited Security Solutions ALERT ASSURE ASSESS ADMINISTER AUDIT Products & Services

Safe & Secure Security Administration & Reporting ADMINISTRATION Userdatafile and COMS Cfile Administration and Interrogation Use of Templates as Roles ACCESS CONTROLS Password Aging for Usercodes and Accesscodes User and/or Station Lockout Shared Secret User Verification CHAIN MULTI-HOST SECURITY Single-point administration across multiple systems Password Updating and Synchronization across multiple systems Zonal Updates- simultaneous updates across multiple systems Full CHAIN Audit SYSTEM COMMANDS Delegation and Authorization of System Commands Unique subsets of System Commands for specified users DELEGATIONS Delegation of Functions to Sub-Administrators Regime and Regime Administration capability Delegation of Functions within Regimes REPORTING Production of security reports from SUMLOG files and system Directory files Batch Mode for automatic productions of standard and regular reports Interactive Mode for production of ad-hoc reports Realtime Mode for monitoring of specific security Events and Violations Output to printer file, disk, PDF, screen or PC files FILE SECURITY File Security Attributes Group/Individual Guardfile maintenance INSTALLATION Quick and simple automated installation process

AdminDesk Graphical User Interface Easy to use GUI for SAFE & SECURE Interactive Administration of: o System Security Policy o Usercodes o Accesscodes o Profiles o Templates Single Point of administration for multiple servers Customizable interface and ability to copy customizable items to other connections Delegations of Regimes fully supported HTML online Help Multi-language support Configuration Wizard aids installation AdminSock Enterprise Security Agent Provides an interface between Enterprise Security Servers and ClearPath MCP Servers One interface for Userdatafile and COMS Cfile security data Creation, modification and removal of Access Rights for users across multiple platforms Two modes of operation Interactive and Silent Administration of users via a Command File Reconciliation function Validation function Uses English-text commands

UserSock Client User Validation Implements Access Controls for Client-Server Applications that bypass MARC logon procedures Authentication Service Validation Control Password Change Request Control Password Generation Request Control Password Aging Detail Retrieval SafeSurvey System Security Analysis SafeSurvey is a PC and server-based security assessment product for ClearPath MCP hosts, helping Company Auditors and Security Administrators perform their critical functions based on system-generated data. SafeSurvey automates the process of risk identification, and helps significantly in risk evaluation and risk management. Additionally, it allows you to ensure compliance with your defined security policy. If run regularly, it will keep you informed of the current status of the security environment on your systems. Integrated with Unisys SecurityCenter Wide range of security snapshots Automated scheduling Ability to store reports to a local database Exporting and Importing of reports Graphical data analysis Policy-based assessments Output reports to PDF

SecureAudit Client and Host SecureAudit is a powerful auditing tool for checking ClearPath MCP hosts and reporting on a wide range of events. It can be used in conjunction with SafeSurvey and RealTime Monitor to provide a comprehensive event and status reporting package to help Company Auditors and Security Administrators analyze and secure your systems. Host-side Batch, Interactive and Realtime modes of operation Generation of unique and bespoke reports without the need for SUMLOG knowledge Flexible control over output reports and exporting reports Reports filtering: Statistics and Detailed Data reports can be filtered to provide as specific a focus as required. Graphical data analysis: Time-line graphs can be generated to highlight security trends. Bar charts and pie charts can be generated from single reports. Automated Scheduling Output reports to PDF Integrated with Unisys SecurityCenter RealTime Monitor Real-time Event Monitor Locum RealTime Monitor provides highly flexible alert designation, together with the routing of system and security events to meet your system monitoring needs. It consists of RealTime Config, RealTime DashBoard and RealTime Service which work together to offer the power and flexibility to create the monitoring environment by specifying alert filters and activity codes. With options to keep security administrators in touch with critical events even away from a PC and a choice of options to help display or further process the data, Locum RealTime Monitor gives total monitoring control over ClearPath MCP hosts. Integrating with Unisys SecurityCenter Allows the designation of security and system events as alerts Activity codes specify severity and routing information Collectors can display or forward alerts Monitor multiple MCP hosts simultaneously from a single MCP host Provides configurable display characteristics Advanced filtering offers finer granularity by means of Filter Rules

DIR Diskfile Information Specific, filtered directory information retrieval from single and multiple pack families Fast and concise Independent of hierarchical directory structures Search allows multiple wildcards Files retrieved by CREATIONDATE, LASTACCESSDATE, File Size and FILEKIND Searches within Container files Output routed to terminals, printers and disk files File Copy, Wrap, Unwrap and Removal File Contents displayed on screen Target String Searching within files PCDIR Graphical User Interface Graphical User Interface for DIR Runs DIR functions on an MS Windows-based PC Easy to use: no prior knowledge of DIR required Create and store connections to multiple systems and activate them as needed Easy selection of Packs and Search criteria Multiple outputs for Search results Easy viewing of files and file contents: choice of EBCDIC and HEX with search capabilities Easy control of Marking and Grouping Files, and File Deletion

Locum InSight Enterprise Fraud Detection In association with Intellinx, Locum Software presents InSight, a breakthrough in insider threat detection and prevention. InSight provides a first-of-its-kind cross-platform surveillance system for unparalleled visibility of end-user activity in Unisys and other platforms. The InSight Solution provides a critical infrastructure for combating internal fraud and information leakage, making authorized users accountable for their actions. InSight is the only product on the market today that provides all of the following: Non-Invasive Detection Cross-Platform Application Level and Application Agnostic Captures and Secures Data (Encrypts, Compresses and Digitally Signs) Provides Real-time Tracking and Alerting Offers Visual Audit Trail and Ability to Replay user activity Built-in Google-like search engine Incorporates an Investigation Workbench and Case Management System Fast, no-risk, with no overhead installation- achieved in hours, not weeks!

Security Services Locum Software Services Limited has a wealth of expertise in software security. We offer the following services, from auditing your systems to determine your individual security needs, to installing and setting up the software which will allow you to secure, control and monitor your systems; from training to enable you to get the very best out of your software, to evaluating your systems to ensure compliance with auditing regulations. Security Product Sales, Installation and Implementation Support We provide sales and installation support for all of our products. We also offer an Implementation Strategy to help you tailor the software to your company s individual needs. Security Evaluation and Audit We offer a comprehensive Security Evaluation and Audit service to identify areas in which your systems may be at risk and help you produce a plan to better protect them. Security Training Courses Locum Software Services Limited provides training courses for all of our products, available on request and tailored to meet your organization s requirements. 84 Brown Street Tel: +44 (0) 114 252-1199 Sheffield enquiries@locumsoftware.com S1 2BS UK Locum Software Services Limited, a Unisys Technology Partner, has a wealth of expertise in software security solutions, offering Security Products, Evaluation & Audit, Insider Threat Detection & Prevention, Training and Implementation Services worldwide. www.unisys.com/locum Copyright 2016