Inter-Business Vault



Similar documents
Inter-Business Vault. Technical Overview

Breaking down the Barriers: Implementing Vaulting Technologies

Cyber-Ark Software and the PCI Data Security Standard

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

Citrix MetaFrame XP Security Standards and Deployment Scenarios

Novell Access Manager SSL Virtual Private Network

Secure web transactions system

Barracuda Backup for Managed Services Providers Barracuda makes it easy and profitable. White Paper

ReadyNAS Remote White Paper. NETGEAR May 2010

How To Set Up Checkpoint Vpn For A Home Office Worker

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Secure remote access to your applications and data. Secure Application Access

Stateful Inspection Technology

Remote Access VPN Solutions

Security Considerations for DirectAccess Deployments. Whitepaper

Using etoken for SSL Web Authentication. SSL V3.0 Overview

TSC (Total Solution Communications Ltd)

Presented by Philippe Bogaerts Senior Field Systems Engineer Securing application delivery in the cloud

Unicenter Remote Control r11

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May New Features and Enhancements. Tip of the Day

IBM enetwork VPN Solutions

BlackBerry Enterprise Solution and RSA SecurID

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

RSA Digital Certificate Solution

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

ipad in Business Security

Security Services. Benefits. The CA Advantage. Overview

Avaya IP Office. Converged Communications. Contact Centres Unified Communication Services

PrivyLink Internet Application Security Environment *

Top 10 Questions to Ask when Choosing a Secure File Transfer Solution

Aventail White Paper. Comparing Secure Remote Access Options: IPSec VPNs vs. SSL VPNs

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Complying with PCI Data Security

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Media Shuttle. Secure, Subscription-based File Sharing Software for Any Size Enterprise or Workgroup. Powerfully Simple File Movement

RSA Security. RSA, RC2, RC4, RC5, MD5 AES RC6 PKCS RSA Keon PKI. RSA BSAFE 5 Web. RSA SecurID 4000

CheckPoint FireWall-1 Version 3.0 Highlights Contents

Ensuring the security of your mobile business intelligence

Cisco IWAN and Akamai Intelligent Platform : Maximize Your WAN Investment

How To Manage Sensitive Information Management With Cyberark Software

Ensuring the security of your mobile business intelligence

IBM Tivoli Federated Identity Manager

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

How To Achieve Pca Compliance With Redhat Enterprise Linux

Voltage's Encrypted

IPSec vs. SSL: Why Choose?

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

Ranch Networks for Hosted Data Centers

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

Symantec Mobile Management Suite

Distributed architecture for VoIP telephony solutions White paper

Network Services Internet VPN

RSA ACCESS MANAGER. Web Access Management Solution ESSENTIALS SECURE ACCESS TO WEB APPLICATIONS WEB SINGLE SIGN-ON CONTEXTUAL AUTHORIZATION

Best Practices for Secure Remote Access. Aventail Technical White Paper

Secure Access Gateway 3000er Serie

Security Policy Revision Date: 23 April 2009

Wyse Device Manager TM

TFS ApplicationControl White Paper

PRIVACY, SECURITY AND THE VOLLY SERVICE

Information and Communications Technology Courses at a Glance

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

Network Security and Firewall 1

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

The Costs of Managed PKI:

IT Security. Securing Your Business Investments

Enterprise Data Protection

TIBCO Managed File Transfer Suite

Understanding the Cisco VPN Client

Introducing etoken. What is etoken?

SiteCelerate white paper

RSA SecurID Two-factor Authentication

Proven LANDesk Solutions

Deploying iphone and ipad Security Overview

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Product Overview. Contents

Wildcard and SAN: Understanding Multi-Use SSL Certificates

Firewalls. Outlines: By: Arash Habibi Lashkari July Network Security 06

Windows in a Browser Secure Remote Access with HOB RD VPN

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding

Global Outsourcing / Infrastructure Management. Instinct 2.0. Bridging the Gap between the Disparate Needs of Organizations and End-Users

Sage Abra HRMS. Abra HRMS Security Considerations

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

Unlock the Value of Your Microsoft and SAP Software Investments

Transcription:

Inter-Business Vault Finally, you can enjoy the security, performance and accessibility of a local area network, when sharing information over the Internet with business partners, customers, and remote offices.

The Challenge: Connecting your Enterprise to Remote Offices and Business Partners Significant inter-business processes today are primarily based on file distribution, collection and sharing mechanisms. Whether you are a financial institute distributing credit card transaction-files to corporate customers, or a bank collecting daily check deposit reports; whether you are a telecommunications company publishing billing statements or an airline company sharing flight schedules with code-share partners; or whether you are a distributed enterprise sharing file servers between remote branches - in all cases, you need to share files with business partners, customers and remote offices in order to increase your business productivity. Introducing Inter-Business Vault LAN experience over the Web Based on its patented Vaulting Technology, Cyber-Ark provides the Inter-Business Vault, a Safe Haven, highly secured regardless of overall network security, where information can be stored and shared over the Internet. The Vault enables business partners and remote offices to distribute, collect, transfer and share files as if they were on the same LAN, thus providing a ready-to-use platform for every inter-business file based application. The innovative Vaulting Technology enables organizations to enjoy a LAN Experience over the Web for the first time, by providing a LAN level of security, performance and accessibility. This places the Vault way ahead of alternative information sharing implementations, which are made of a secured extranet combined with a file sharing/transfer solution and performance enhancers. Superior Security 10 layers of security turn the Internet into a secure platform for inter-business connectivity The Inter-Business Vault is comprised of 10 layers of security, including: Firewall, VPN, Access Control, multiple Authentication methods, Content Inspection, an Encryption engine, Auditing tools and more. The Vault was named Best Security Product of 2001 in the Networking Industry Awards, and is considered by industry experts to be the most secure solution available today for information sharing over the Web. File Encryption Visual, Manual & Geographical Security Authentication File Access Control Firewall VPN Inter-Business Vault 1

Improved Performance Getting the most out of your networking infrastructure A benchmark made for the Inter-Business Vault indicates significant performance advantages. For example, accessing a typical document on a slow Internet connection via the Vault is 28 times faster than accessing the same file via a simple extranet. Boundless Connectivity For the first time, business partners can access files over the Internet, using the same tools they use inside their LAN, regardless of network boundaries. When a manufacturing company, for example, uses the Vault to share design specs with sub-contractors, the data can be accessed directly from the CAD/CAM system rather then via cumbersome tools such as FTP. Moreover, using its variety of built-in interfaces (see below), each business partner can select its own preferred interface(s), providing full inter-business independence. Easier Administration Divide and Conquer Using the Vault, business partners no longer need to notify each other about personnel changes for setting access rights to the shared system. The Vault s administration offers a distributed approach that enables administrators to securely delegate administration tasks to business partners in order to let them independently control their sub-territory. Moreover, with distributed authentication, your LAN sign-on can be your inter-business sign-on, eliminating the need for an additional sign-on to each and every business partner network. Cost Effective and Rapid ROI Using the Vault, you can stop spending money every time you transfer data to your business partners no need for dedicated networks, couriers or ASPs. In addition, the Inter-Business Vault can reduce up to 80 percent of the enterprise costs for alternative solutions by eliminating the need for extra collaboration, security and performance products, by effectively utilizing your existing networking bandwidth and by increasing your business productivity. Inter-Business Vault 2

File Sharing and beyond Optional add-on modules enable you to have a LAN experience when exchanging Mails and sharing Web applications with business partners. The breakthrough is in the Vaulting Technology The Inter-Business Vault architecture is based on Cyber-Ark s Vaulting Technology (US Patent No 6,356,941 B1). Cyber-Ark discovered that by splitting the server interfaces from the storage engine it can remove many of today s technology barriers associated with inter-business connectivity. The Vaulting Technology creates a Single Data Access Channel, which significantly improves the security and makes it possible to build 10 layers of security in a unified solution. This technology serves as the basis for the breakthrough in performance, accessibility and administration, by enabling the distributed VPN, remote caching, object-level end-to-end data compression, distributed administration, distributed authentication and boundless connectivity, all that is needed to achieve a LAN experience. Boundless Connectivity. The Inter-Business Vault provides worldwide accessibility to the information it stores, by all major protocols, regardless of network boundaries. These protocols include: standard file server interface (SMB/CIFS), FTP interface, Web interface (HTTP or ActiveX), and CLI / API. This breakthrough accessibility enables business partners to access files over the Internet, using the same tools they use inside their LAN. The Inter-Business Vault provides: Security Level - Enjoy a LAN level of security while using the Internet for information sharing. Performance Level Leverage your existing Internet infrastructure to achieve a LANlike performance level. Boundless Connectivity Increase your business productivity by using the same tools that you use inside your LAN to access external information. Simplified Administration Avoid the headache of administrating your partners endusers. Boundless Authentication Avoid the need to authenticate to your business partners networks; your LAN authentication is acceptable worldwide.and you can achieve all of these with lower costs and a rapid deployment Inter-Business Vault 3

Implementations Learn from our customers experiences: Financial institutions use the Inter-Business Vault to distribute and collect transaction files such as banking transactions, check deposits, and salary files to and from their corporate customers. Manufacturing companies use the Inter-Business Vault to securely share design specs with sub-contractors over the Internet. Telecommunication companies use the Inter-Business Vault to distribute billing information to their customers. Large enterprises use the Inter-Business Vault as a shared file server between remote branches. ASP vendors offer secured file sharing services over the Vault. Technical Specifications The Inter-Business Vault supports major industry standards and protocols: Encryption and Hash algorithms: 3DES, IDEA, Blowfish, RC2, RC4, RC5, RSA, SHA1, MD5 Authentication Methods and Devices: Password based - Two way Challenge-Response PKI Windows NT based Authentication Cyber-Key RSA SecurID Smart cards Supported Platforms: Server: The Vault server should be run on a dedicated computer. Windows 2000 - Professional, Server, Advanced Server Centralized Gateway: Red Hat Linux Version 7 Personal Client: Win9x with Internet Explorer 4 or higher. WinNT SP5 or higher with Internet Explorer 4 or higher Win2000 SP1 or higher WinXP Inter-Business Vault 4

About Cyber-Ark Software Cyber-Ark Software Inc., is the leading provider of vaulting security software that leverages its unique patented Vaulting Technology to create safe havens for securing and sharing vital company information. The company s award-winning Network Vault and Inter-Business Vault solutions enable a truly secure extended enterprise by providing an infrastructure that allows for completely transparent, yet totally secure, intra- and interbusiness communications. Founded by a group of leading military security experts and computer engineers, Cyber- Ark Software is privately held and backed by some of the world s most successful venture capitalists, including: Jerusalem Venture Partners, Seed Capital Partners (a SOFTBANK Affiliate), JP Morgan/Chase Partners, Vertex Management and Nomura International Plc. Awards: Cyber-Ark s solution was awarded Best Security Product of the Year 2001 by the renowned Networking Industry. Cyber-Ark offers the most elegant and efficient solution we have seen to the problem of securing confidential data in a networked environment where sharing is important but must be properly authorized and user authenticated. SC Magazine, Nov 2001 Cyber-Ark Software, Inc. 270 Bridge Street Dedham, MA 02026 Tel: 1-888-808-9005 Tel: (781) 251-0670 Fax: (781) 251-0678 sales@cyber-ark.com www.cyber-ark.com 2002 Cyber-Ark Software, Ltd. All rights reserved. US Patent No 6,356,941. Cyber-Ark, the Cyber-Ark logo, the Cyber-Ark slogan, PrivateArk, Network Vault, Inter-Business Vault, Geographical Security and Visual Security are trademarks of Cyber-Ark Software Ltd. All other product names mentioned herein are trademarks of their respective owners. Information in this document is subject to change without notice. Inter-Business Vault 5