A Comprehensive Approach for the Right Security Safeguards

Similar documents
The Right Solutions for Management

The Right Solutions for IT Certification. Click to Scroll Forward

IBM Security Privileged Identity Manager helps prevent insider threats

Payment Card Industry Data Security Standard

Security Overview. BlackBerry Corporate Infrastructure

Provide access control with innovative solutions from IBM.

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

OVERVIEW. With just 10,000 customers in your database, the cost of a data breach averages more than $2 million.

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Strengthen security with intelligent identity and access management

DMZ Gateways: Secret Weapons for Data Security

CA Enterprise Mobility Management MSO

CyberArk Privileged Threat Analytics. Solution Brief

Implement security solutions that help protect your IT systems and facilitate your On Demand Business initiatives.

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

The PCI Dilemma. COPYRIGHT TecForte

SecurityMetrics Business Associate HIPAA compliance program

Fortify. Securing Your Entire Software Portfolio

Bellevue University Cybersecurity Programs & Courses

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Preemptive security solutions for healthcare

Stay ahead of insiderthreats with predictive,intelligent security

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Healthcare Information Security Today

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

How To Achieve Pca Compliance With Redhat Enterprise Linux

whitepaper Ten Essential Steps for Achieving Continuous Compliance: A Complete Strategy for Compliance

IT Security. Securing Your Business Investments

How To Protect Your Network From Attack From A Network Security Threat

Multi-Factor Authentication of Online Transactions

PII Compliance Guidelines

Simply Sophisticated. Information Security and Compliance

PAI Secure Program Guide

Flexible Spending Account Administration Best Practices

KEY TRENDS AND DRIVERS OF SECURITY

White paper September Realizing business value with mainframe security management

McAfee Certified Product Specialist McAfee epolicy Orchestrator

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Cisco Security Optimization Service

White Paper THE FIVE STEPS TO MANAGING THIRD-PARTY RISK. By James Christiansen, VP, Information Risk Management

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results.

Risk Management of Outsourced Technology Services. November 28, 2000

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Projectplace: A Secure Project Collaboration Solution

Hackers are here. Where are you?

1) DOES YOUR SOFTWARE

PTE ACADEMIC SECURE

Securing Your Business with Managed File Transfer

Information Protection

The Next Generation of Security Leaders

Securing the Cloud Infrastructure

RECORDS MANAGEMENT RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Strategic Healthcare IT Advanced Research. SHARPS Project and ILHIE Prototype June 26, 2013

Injazat s Managed Services Portfolio

Cloud Security Trust Cisco to Protect Your Data

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Hackers are here. Where are you?

How To Protect Your Credit Card Information From Being Stolen

PCI DSS READINESS AND RESPONSE

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Intel Security Certified Product Specialist Data Loss Prevention Endpoint (DLPe)

Department of Management Services. Request for Information

Data Security Concerns for the Electric Grid

Secure communications via IdentaDefense

RECORDS MANAGEMENT SERVICES. Cost-Effective, Legally Defensible Records Management

APPENDIX C - PRICING INDEX DIR-SDD-2514 VERIZON BUSINESS NETWORK SERVICES, INC SERVICES

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Security aspects of e-tailing. Chapter 7

IBM Tivoli Access Manager and VeriSign Managed Strong Authentication Services. Combine resources for one complete online business security solution.

Address C-level Cybersecurity issues to enable and secure Digital transformation

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES

Data Loss Prevention and HIPAA. Kit Robinson Director

Special report Healthcare

fs viewpoint

How To Comply With The Pci Ds.S.A.S

Governance, Risk, and Compliance (GRC) White Paper

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions

Security Information Lifecycle

PROVIDING IT SOLUTIONS FOR THE HEALTHCARE INDUSTRY

case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:

PCI Security Compliance in KANA Solutions How KANA Applications Helps Companies Comply with PCI Security Standards

Middle Class Economics: Cybersecurity Updated August 7, 2015

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Copyright 2014 Nymity Inc. All Rights Reserved.

Six Challenges for the Privacy and Security of Health Information. Carl A. Gunter University of Illinois

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

IBM Connections Cloud Security

HP and netforensics Security Information Management solutions. Business blueprint

Consolidated Audit Program (CAP) A multi-compliance approach

Transcription:

A Comprehensive Approach for the Right Security Safeguards

Protect Your Intellectual Property and Test Environment at Every Point in the Exam Lifecycle Protecting your intellectual property has become increasingly difficult with evolving technologies, such as miniature cameras, smart phones and the internet. Our intellectual property safeguards, however, help you address these challenges and protect the significant investments you have made in the development of your programs. Our broad range of measures, include the following: Test Development and Publishing Resource Level Blocking (RLB) technologies that extend the life of the test over a longer period of time and allow test sponsoring organizations to react quickly to required content changes by recognizing overuse of an item and systematically replacing it with another suitable and less-used item. Computer Mastery Testing (CMT) processes by which tests can be cut short if there is a demonstrated mastery or non-mastery of the test material to minimize item exposure and increase the effective shelf life of the exams. This is achieved by the inclusion of content blocks that precisely match the content areas and difficulty levels specified in the exam design. Linear On The Fly Testing (LOFT) an effective alternative to traditional fixed-form test delivery in which tests are constructed by selecting items from the bank each time a candidate takes an exam. With LOFT, an entire pool of items is released to the field, accompanied by computer code to intelligently design a new form every time a candidate takes the test. This ensures each candidate will receive a virtually unique test, making attempts at item harvesting and content sharing far more difficult. Technology Enablement Encryption Management Tools leveraging advanced encryption algorithms and a wide range of methodologies and tools designed to protect your item inventories and exam versions. Cutting-edge Test Delivery System that simplifies and automates test delivery and maintenance while offering one of the most sophisticated, computer-based test delivery engines in the industry. Through its modular software architecture, we offer greater flexibility to meet your unique requirements while still maintaining the security and integrity of the testing process. Test Center Self-service Tools that include an enterprise-wide contact credentials database for all computer-based test center staff. While offering test center staff quick, easy self-service access, the system further enhances test center security by ensuring all test center staff are: (1) appropriately credentialed; (2) up-to-date in their continuing education; (3) associated only to their valid test center; (4) current in their user names and passwords; and (4) authorized to access required systems based on roles and credentials. the right The right security, testing locations, delivery options, reliability, global offices, end-to-end solutions, industry knowledge, specialized expertise

Test Delivery Test Center Administration to provide a first line of defense against security breaches. Each of our test center administrators receives extensive training that establishes safeguards and best practices for test delivery, including test center communications, check-in and check-out procedures, handling in-test questions and issues and monitoring the testing room. Metal Detection Wands to scan all candidates for any prohibited devices that a candidate may attempt to take into the testing room. Scans are performed in full view of the test center administrator s DVR camera so that all scans are recorded providing important evidence to address any candidate complaints or escalations. Digital Video Recordings (DVRs) to provide the test center administrator with an important bird s eye view of the test area, as well as a number of secondary views. The recorded sessions are reviewed by expert auditors and can be used by clients to investigate any concerns that arise 30-90 days after an exam. ID Management to protect test candidate privacy while conducting identity verification to improve the security and integrity of the testing process. Our full array of ID Management Solutions, from convenient ID scan check ins... to complex electronic ID captures and digital fingerprinting... to FBI-quality fingerprinting and background investigations, helps ensure you have the right level of security for your testing events as well as the right level of convenience for your test takers. Test Center Report Cards to provide a 360-degree view of each test center s performance on a wide variety of performance measures including security. Multi-Layered Audits to foster continuous improvements in our security processes and systems and include a wide range of rigorous, constant and recurring audits, such as Secret Shops, site audits, DVR audits, center problem report (CPR) audits, subcontractor audits and independent, third-party audits. Results and Analyses Data Forensics that involve advanced warehousing and consolidating exam data to identify trends that may suggest security breaches. Proxy Testing Analyses to identify unusual patterns from exam results that may indicate proxy testing, a situation where candidates hire others to test for them. Anomalous Test Pattern Detection that involves indicators generated during a testing event that may warrant concern for an exam s security, including: unusual response patterns, short-test durations, candidates taking a large number of breaks, the skipping of large numbers of items, and more. Information Security Infrastructure Network Security that involves some of the industry s most advanced security protocol. From external network connections, to hosting services, to data management and storage... we offer the highest levels of technical security by using multiple firewalls, multiple levels of password protection and encryption and more. * * With annual on-site audits of security systems and procedures, Prometric is compliant with the following: Payment Card Industry (PCI); Federal Information Security Management Act (FISMA); ISO 9001 2008 Quality Management Standard; ISO 14001 Environmental Management Standard; ISO 27001 Certification Information Security Management System; and OHSAS 18001 Health and Safety Standard.

Selecting the right provider to help you develop and manage your testing program is an important decision. You want someone you can trust. A leader in computer-based testing and assessment for more than 20 years, we understand the critical nature of security. With Prometric, you can count on: Insight and Industry Knowledge gained through more than 20 years as the preeminent name in computerbased testing INCORPORATING AN ARSENAL OF DEFENSIVE AND OFFENSIVE MEASURES Through a coordinated approach of offensive and defensive measures, Prometric has taken an aggressive stand against security challenges. Its full-time, dedicated security specialists have put in place: 1. Improvements to the underlying security mechanisms protecting exam content 2. Advanced data forensics tools to detect potential threats to exam content 3. Independent, third-party mystery shops and operational audits to increase test center security and performance Count on Us. Learn more about our Security Safeguards: visit www.prometric.com, call toll-free 1-855-855-2241. Security advanced systems and processes to ensure test integrity and identify verification Reliability testing that is consistent, valid, reliable and fair Testing Locations largest global network of secure testing locations in more than 160 countries with more than 10,000 test centers Client Experience ongoing support of more than 400 client programs with more than 10 million tests delivered annually 4. Vigorous test center security controls with metal detector wands, cameras, digital recordings of test-taking behavior and biometrics capture 5. Enhanced security training of test center administrators

A single exam can oftentimes change a career path and improve a candidate s quality of life. With stakes as high as these and amidst rapidly changing technologies the struggle to mitigate risks associated with theft and maintain a secure testing environment has never been greater. At Prometric, security is at the center of everything we do. Through a constantly evolving process, we deliver protected test content to test takers with confirmed identities in a controlled environment that assures no one has an unfair advantage. Rely on Strong, Secure Testing Processes to Provide Safe, Reliable Results Whether it involves item protection or test site management, no one brings the same measure of experience and commitment that we do. At Prometric, we understand how critical it is to determine which candidates receive important credentials. That s why we remain so involved in helping to set test security standards for the testing and assessment industry all in an effort to stay a step ahead of the ever-evolving threats to test security. Our holistic approach protects the integrity of testing throughout the entire Exam Life Cycle. From the time that items are developed and published, through the application of technology, to the channels of delivery, and through the results and analysis phases, we focus on identifying, addressing and reducing a wide range of risks. EXAM LIFECYCLE RESULTS & ANALYSES TEST DEVELOPMENT & PUBLISHING SECURITY TECHNOLOGY ENABLEMENT TEST DELIVERY POLICY & COMPLIANCE

Prometric, a wholly-owned subsidiary of ETS, is a trusted provider of technology-enabled testing and assessment. Its market-leading test development and test delivery solutions allow clients to develop and launch global testing programs as well as accurately measure program results and data. Prometric reliably develops, delivers and administers more than 10 million tests a year on behalf of approximately 400 clients in the academic, financial, government, healthcare, professional, corporate and information technology markets. It delivers test flexibly via the Web or Find Out More For more information about our Security Safeguards by visiting www.prometic.com or by calling toll-free 1-855-855-2241. by utilizing a robust network for more than 10,000 test centers in more than 160 countries. Copyright 2012 Prometric, Inc. All Rights Reserved. www.prometric.com