Device Lock. Why Consider An Endpoint DLP Solution?

Size: px
Start display at page:

Download "Device Lock. Why Consider An Endpoint DLP Solution?"

Transcription

1 Device Lock An Endpoint Data LEak leak Prevention Site to Protect Yor yor Sensitive Information Why Consider An Endpoint DLP Soltion? The data yo are striving to protect behind firewalls and passwords is likely still slipping throgh yor fingers. Data leaks can be initiated by either nwitting employees or sers with malicios intent copying proprietary or sensitive information from their PCs to flash memory sticks, smartphones, cameras, PDA s, DVD/CDROMs, or other convenient forms of portable storage. Or, leaks may spring from ser s, instant messages, web forms, social network exchanges or telnet sessions. Wireless endpoint interfaces like Wi-Fi, Bletooth, and Infrared as well as device synchronization channels provide additional avenes for data loss. Likewise, endpoint PCs can be infected with vicios malware that harvest ser keystrokes and send the stolen data over SMTP or FTP channels into criminal hands. While these vlnerabilities can evade both network secrity soltions and native Windows controls, the DeviceLock Endpoint Data Leak Prevention (DLP) Site addresses them. It enforces data protection policies with awareness of both the context and content of data flows across endpoint channels.

2 DeviceLock Data leakage prevention starts with contextal control that is, blocking or allowing data flows by recognizing the ser, the data types, the interface, the device or network protocol, the flow direction, the state of encryption, the date and time, etc. Some scenarios call for a deeper level of awareness than context alone can provide; for example, when the data being handled contains personally identifiable information, when the inpt/otpt channel is conventionally open and ncontrolled, and when the sers involved have sitations or backgronds considered high risk. Secrity administrators can gain greater peace of mind by passing data flows that fall into any of these categories throgh an additional content analysis and filtering step before allowing the data transfer to complete. DeviceLock Endpoint DLP Site provides both contextal and content-based control for maximm leakage prevention at minimm pfront and ownership cost. Its mlti-layered inspection and interception engine provides fine-grained control over a fll range of data leakage pathways at the context level. For frther confidence that no sensitive data is escaping, content analysis and filtering can be applied to select endpoint data exchanges with removable media and PnP devices, as well as with the network. With DeviceLock, secrity administrators can precisely match ser rights to job fnction with regard to transferring, receiving and storing data on corporate compters. The reslting secre compting environment allows all legitimate ser actions to proceed nimpeded while blocking any accidental or deliberate attempts to perform operations otside of preset bonds. DeviceLock spports a straightforward approach to DLP management that allows secrity administrators to se Microsoft Windows Active Directory Grop Policy Objects (GPOs) and DeviceLock consoles for dynamically managing distribted endpoint agents that enforce centrally defined DLP policies on their host compters. With DeviceLock in place, yo can centrally control, log, shadow-copy, and analyze end-ser access to and data transfers throgh all types of peripheral devices and ports, as well as network commnications on corporate compters. In addition, its agents detect and block hardware keyloggers to prevent their se in the theft of passwords and other proprietary or personal information. Importantly, DeviceLock does all this while rnning in a tamper-proof mode, remaining transparent to end sers, and consming a minimm of disk space and memory. With its fine-grained endpoint context controls complemented by content filtering for the most dangeros data channels, DeviceLock Endpoint DLP Site significantly redces the risk of sensitive information leaking from employees compters, whether de to simple negligence or malicios intent. At the same time, it acts as a secrity discipline tool that enforces stated data protection policies and promotes compliance with corporate information handling rles, as well as legal mandates like HIPAA, Sarbanes-Oxley, and PCI DSS.

3 DeviceLock Data leaks occr when proprietary information is copied to convenient forms of of portable storage or when typed, pasted, or otherwise sent via applications sing Modlar Strctre and Licensing DeviceLock Endpoint DLP Site is comprised of a modlar set of complementary fnctional components that can be licensed separately or in any combination that sits crrent secrity reqirements. Existing cstomers have a secre pgrade path for their core DeviceLock fnctionality and the option to expand endpoint secrity with their choice of new modles. Likewise, new cstomers can incrementally move p to fll-featred endpoint DLP by adding fnctionality as it is needed and bdgets allow. The DeviceLock component incldes an entire set of context controls together with event logging and data shadowing for all local data channels on protected compters inclding peripheral devices and ports, connected smartphones/pda s, and docment printing. DeviceLock also provides the core platform for all other fnctional modles of the prodct site and incldes its central management and administration components. The NetworkLock component performs all context control fnctions over endpoint network commnications inclding portindependent protocol/application detection and selective control, message and session reconstrction with file, data, and parameter extraction, as well as event logging and data shadowing. Corporate Data NetworkLock DeviceLock ContentLock The ContentLock component implements content monitoring and filtering of files transferred to and from removable media and Plg-n-Play devices, as well as of varios data objects of network commnications reconstrcted and passed to it by NetworkLock like s, instant messages, web forms, files, social media exchanges, and telnet sessions. DeviceLock Search Server (DLSS) is another separately licensed component. It performs fll-text search in the central shadowing and event log database. DLSS is aimed at making the labor-intensive processes of information secrity compliance aditing, incident investigations, and forensic analysis more precise, convenient and time-efficient. The core DeviceLock component is mandatory for every prodct installation. All other components inclding NetworkLock, ContentLock and DeviceLock Search Server are separately licensed optional add-ons. This modlar prodct strctre and flexible licensing scheme enable DeviceLock cstomers to cost-effectively deploy endpoint DLP. They can start with the essential set of port and device control fnctions incorporated in the core component, and incrementally add new fnctional licenses to activate additional prodct capabilities as secrity reqirements grow. Network Channel Removable Media Local Syncs Printing Channel nchecked network protocols. Who What When How Where to What content Core DeviceLock fnctionality enforces device access policy by port (interface), device class, device type, device model, niqe device ID, hor-of-day, day-of-the-week, as well as by discrete parameters sch as write, read-only, and format access. Device types can be configred to only allow access to verified file types and to adhere to enforced encryption rles. NetworkLock extends the ability to control the context of data commnications to network protocols and applications. By adding ContentLock, yo can ensre that only filtered data objects that do not contain restricted content will be passed to their destinations.

4 DeviceLock Stdies point to the docment printing channel as the most often sed for stealing corporate data. Yet, 75% DeviceLock Featres and Benefits DeviceLock Endpoint DLP Site delivers essential content filtering capabilities and reliable control over network commnications on top of DeviceLock s best-in-indstry context-based controls, whereby access to local ports and peripheral devices on corporate endpoint compters is nder a DeviceLock administrator s centralized control. Active Directory Integration. DeviceLock s most poplar console integrates directly with the Microsoft Management Console (MMC) Active Directory (AD) Grop Policy interface. As Grop Policy and MMC-style interfaces are common knowledge for AD administrators, there is no proprietary interface to learn or appliance to by to effectively manage endpoints centrally. The simple presence of the DeviceLock MMC snapin console on a Grop Policy administrator s compter allows for direct integration into the Grop Policy Management Console (GPMC) or the Active Directory Users & Compters (ADUC) console with absoltely zero scripts, ADO templates, or schema changes. Secrity administrators can dynamically manage endpoint data leakage prevention and adit settings right along with other Grop Policy related tasks. In addition to the MMC snap-in console for Grop Policy, DeviceLock also has classic Windows-style administrative consoles that can centrally manage agents on any AD, LDAP, or workgrop network of Windows compters. XML-based policy templates can be shared across all DeviceLock consoles. RSoP Spport. The Windows standard Resltant Set of Policy snap-in can be sed to identify which DeviceLock grop policy is crrently being applied and to predict which policy wold be applied in a given Organizational Unit (OU) membership scenario. of srveyed IT organizations that Active Directory Domain Controller DeviceLock Service iphone Windows Mobile Palm se DLP soltions Network Grop Policies CD-R/DVD-R Printer cannot control Memory Card the content USB IrDA of docments Bletooth FireWire WiFi printed from corporate Enterprises can secre any nmber of remote endpoints with DeviceLock Endpoint DLP Site by leveraging its integration with Active Directory and the Windows Grop Policy Management Console. NOTE: For a fll list of network data channels protected by NetworkLock, see the last page of this brochre. compters. Device Whitelisting. Among the five layers of Windows device control spported by DeviceLock, the USB device model and device ID levels are handled sing a whitelist approach, whereby the DeviceLock administrator can explicitly assign sers/grops to a USB device. Administrators can whitelist a specific corporate-issed model of USB drive, for example, and DeviceLock will allow only designated sers to have access with these, while blocking all other nlisted devices and nlisted sers by defalt. Administrators can even whitelist a single, niqe device, while locking ot all other devices of the same brand and model, as long as the device manfactrer has implemented a standard niqe identifier. There is also a powerfl Temporary Whitelist applet that sers can rn to secrely reqest short-term se of a USB monted device from a DeviceLock administrator, even while off the network. Meanwhile, the rest of the original secrity policy remains intact and enforced dring this exceptional device-se period.

5 Network Commnications Control. Introdced with this version of DeviceLock Endpoint DLP Site, the NetworkLock component adds comprehensive context control capabilities over endpoint network commnications. NetworkLock spports port-independent network protocol and application detection and selective blocking, message and session reconstrction with file, data, and parameter extraction, as well as event logging and data shadowing. NetworkLock controls most poplar network protocols and applications inclding plain and SSL-tnneled SMTP commnications with messages and attachments handled separately, as well as web access and other HTTP-based applications inclding content extraction of encrypted HTTPS sessions. See the Prodct Specifications pages for a list of all webmail and social media applications controlled by NetworkLock. With NetworkLock yo can set ser permissions for the network protocols sed for web mail, SMTP mail, social networking commnications, instant messaging, file transfers and telnet sessions. Content Filtering. Extending DeviceLock and NetworkLock capabilities beyond context-based secrity mechanisms, the ContentLock modle can filter the content of files copied to removable drives and other Plg-n-Play storage devices, as well as varios data objects of network commnications. These inclde , web access and other HTTP-based applications like webmail and social networking, most poplar instant messaging applications, FTP file transfers, and telnet sessions. In addition the content of textal data copied between applications and docments throgh clipboard operations can be analyzed and filtered according to DLP policies.the text analysis engine can extract textal data from more than 80 file formats and other data types and then apply effective and reliable content filtering methods based on Reglar Expression (RegExp) patterns with nmerical conditions and Boolean combinations of matching criteria. To ease the task of specifying content filtering rles, pre-bilt indstry-specific keyword dictionaries can be sed, as well as RegExp templates for common sensitive information types inclding nmbers for social secrity registrations, credit cards, bank acconts, addresses, driver s licenses, etc. The configration screens here show high-level samples of content-aware rles per specific device (above) and per specific network protocol (below). ContentLock's MMCstyle interface eases definition of content-aware filtering policies.

6 DeviceLock We fond DeviceLock Featres and Benefits cont. DeviceLock to be the most cost-effective soltion for endpoint device management after months of prodct evalation. It has proven itself to be one of the biggest bangs for the bck in or arsenal of information secrity controls. David Gardner, Data Secrity Specialist, University of Alabama at Birmingham Health System Tre File Type Control. Administrators can selectively grant or deny access to over 4,000 specific file types for removable media. When a file type policy is configred, DeviceLock will look into a file s binary content to determine its tre type (regardless of file name and extension) and enforce control and shadowing actions per the applied policy. For flexibility, Content-Aware Rles for file types can be defined on a per-ser or per-grop basis at the device type layer. Tre file type rles can also apply to pre-filtering of shadow copies to redce the volme of captred data. Clipboard Control. DeviceLock enables secrity administrators to effectively block data leaks at their very embryonic stage when sers deliberately or accidentally transfer nathorized data between different applications and docments on their compter throgh clipboard mechanisms available in Windows operating systems. Copy and Paste operations can be selectively filtered for data exchanges between different applications (e.g. from Word to Excel or OpenOffice). At the context level, DeviceLock spports the ability to selectively control ser access to data objects of varios types copied into the clipboard inclding files, textal data, images, adio fragments (like recordings captred by Windows Sond Recorder), and data of nidentified types. Screenshot operations can be blocked for specific sers at specific compters inclding Windows PrintScreen fnction, as well as screenshot operations of third-party applications. Mobile Device Sync Control. Administrators can set granlar access control, aditing, and shadowing rles for mobile devices that se the Microsoft Windows Mobile, Apple iphone /ipad /ipod toch or Palm operating systems' local data synchronization. Permissions are presented with fine granlarity, defining which types of data (files, pictres, s, contacts, calendars, etc.) specified sers and/or grops are allowed to synchronize between corporate PCs and their personal mobile devices regardless of the connection interface. BlackBerry smartphones are also spported with device presence detection, access control and event logging. Printing Secrity. DeviceLock pts local and network printing nder the strict control of corporate secrity administration. By intercepting, filtering and tracing Print Spooler operations, DeviceLock enables administrators to centrally specify and locally enforce who is allowed to print, from where, when, and where to. User access to any local, network, and even virtal printers regardless of how they connect to the PC. In addition, for USB connections, printers can be whitelisted on per-vendor, per-model or niqe printer basis. Printing events can be logged, and printot copies of any printed docments can be shadow-copied and stored in a central database for adit and postanalysis. Removable Media Encryption Integration. DeviceLock takes an open integration approach to encryption of data ploaded to removable media. Cstomers have the option of sing the encryption soltion that best fits their secrity scenarios among best-of-breed technologies that inclde: Windows 7 BitLocker To Go, PGP Whole Disk Encryption for standard FIPS-certified encryption; TreCrypt for free Open Sorce encryption; SafeDisk, SecrStar DriveCrypt Pls Pack Enterprise (DCPPE) software; and Lexar Media s S1100/S3000 series USB flash drives for pre-encrypted removable media. In addition, any pre-encrypted USB media can be selectively whitelisted with sage strictly enforced. DeviceLock allows for discrete access rles for both encrypted and nencrypted partitions of sch media. With its partnering approach, DeviceLock is positioned to qickly add spport for more encryption vendors as the market demands. Network-Awareness. Yo can define different online vs. offline secrity policies for the same ser accont and compter. A sefl setting on a mobile ser's laptop, for example, is to disable Wi-Fi when docked to the corporate network to avoid bridging data leaks and to enable Wi-Fi when ndocked.

7 Anti-Keylogger. DeviceLock detects USB keyloggers to generate alerts or even block keyboards connected to them. This featre allows administrators to secrely allow all USB mice and keyboards by class. DeviceLock also obfscates PS/2 keyboard inpt and forces PS/2 keyloggers to record nintelligible text instead of real keystrokes. Tamper Protection. Configrable 'DeviceLock Administrators' featre prevents anyone from tampering with settings locally, even sers that have local PC system administration privileges. With this featre activated, only designated secrity administrators working from a DeviceLock console or Grop Policy Object (GPO) Editor can install/ ninstall the program or edit DeviceLock policies. DeviceLock MMC snap-in to Grop Policy Management: DeviceLock administrators have fll central control over access, adit, shadow, and content rles covering potential local data leakage channels across the entire Active Directory domain forest.

8 DeviceLock DeviceLock Observation Mode DeviceLock is often sed at first to collect a record of the data objects that end sers are moving to removable We have DeviceLock media, DVD/CD-ROMs, PDAs, throgh Wi-Fi, and via web , web forms etc. DeviceLock adit/shadow records are sefl in determining the crrent level of non-compliance exposre and can be sed to provide a non-reptable adit trail for compliance officials. When a leak is discovered or even sspected, DeviceLock provides tools to captre and forensically view objects and associated logs for se as evidence. for central management of local ports and drives on employee PCs, so that they only se or corporateisse hardware encrypted flash drives. Dog Miller, Director of IT, Armanino McKenna Adit Logging. DeviceLock s aditing capability tracks ser and file activity for specified device types and ports on a local compter. It can prefilter aditable events by ser/grop, by day/hor, by tre file type, by port/device type, by reads/ writes, and by sccess/failre events. DeviceLock employs the standard event logging sbsystem and writes adit records to a Windows Event Viewer log with GMT timestamps. Logs can be exported to many standard file formats for import into other reporting and log management soltions. Data Shadowing. DeviceLock s data shadowing fnction can be set p to mirror all data copied to external storage devices, printed or transferred throgh serial, parallel, and network ports (with NetworkLock add-on). DeviceLock can also split ISO images prodced by CD/DVD brners into the original separated files pon ato-collection by the DeviceLock Enterprise Server (DLES). A fll copy of the files can be saved into the SQL database or to a secre share managed by the DLES. Shadow data can be prefiltered, jst like reglar adit logging, to narrow down what is collected. DeviceLock s adit and shadowing featres are designed for efficient se of transmission and storage resorces with stream compression, traffic shaping for qality of service (QoS), performance/qota settings, and atomatic optimal DLES server selection. Agent Monitoring. DeviceLock Enterprise Server can monitor remote compters in real-time, checking DeviceLock agent stats (rnning or not), version, policy consistency and integrity. The detailed information is written to the Monitoring log. If this process ncovers DeviceLock agents that are inconsistent with crrent secrity policy, DeviceLock can remotely pdate those agents to settings that will keep the local endpoint policy in compliance. Report Plg-n-Play Devices. The PnP Report allows administrators and aditors to generate a report displaying the USB, FireWire, and PCMCIA devices crrently and historically connected to selected compters in the network. This report also allows for efficient poplation of the USB whitelist as a first step to adding select device models or niqe devices to DeviceLock access policies. Graphical Reporting. DeviceLock can generate graphical canned reports in HTML, PDF or RTF format based on analysis of DLES-collected adit log and shadow file data. These reports can be ato- ed to a data secrity management list or compliance officers if desired. Data Search. The optional, separately licensed DeviceLock Search Server (DLSS) enhances the forensic abilities of DeviceLock by indexing and allowing comprehensive fll-text searches of centrally collected DeviceLock adit log and shadow file data. The DLSS aids in the laborintensive processes of information secrity compliance aditing, incident investigations, and forensic analysis by making fact-finding faster, more precise, and more convenient. It spports indexing and searching in more than 80 file formats. Langage independent word, phrase, and nmber qeries take only seconds to execte once the data has been indexed. Stemming and noise-word filtering are trned on by defalt for words and phrases in English, French, German, Italian, Japanese, Rssian, and Spanish. DLSS ses all words logic (AND logic), with some special character wildcards available to refine or expand searches. Reslts are sorted by hit cont by defalt, thogh term weighting or field weighting for particlar words is possible. The DLSS also spports fll-text indexing and searching of printots in PCL and PostScript langages to adit virtally all docment printing.

9 Prodct Specifications DeviceLock Strctral (Installable) Components DeviceLock Service (agent) DeviceLock Enterprise Server (DLES) Consoles: DeviceLock Grop Policy Manager, DeviceLock Management Console, DeviceLock Enterprise Manager USB FireWire Infrared Serial and parallel Ports Secred Data Types Controlled More than 4,000 file types Data synchronization protocol objects: Microsoft ActiveSync, Palm HotSync, itnes Pictres containing text as image (embedded in docments or as separate graphic files) Clipboard Control Inter-application clipboard copy/paste operations Data types controlled separately: file types, textal data, images, adio, nidentified Screenshot operations (for PrintScreen and 3rd party applications) Fnctional (Licensable) Components DeviceLock NetworkLock ContentLock Devicelock Search Server (DLSS) Floppies Device Types Controlled CD-ROMs/DVDs Any removable storage (flash drives, memory cards, etc.) Hard drives Tape devices WiFi adapters Bletooth adapters Windows Mobile, Palm OS, Apple iphone/ipod toch/ipad and BlackBerry Printers (local, network and virtal) Network Commnications Controlled Web Mail: Gmail, Yahoo!Mail, Windows Live Mail Social Networking: Facebook,Twitter, LiveJornal, LinkedIn, MySpace, Odnoklassniki, Vkontakte Instant Messengers: ICQ/AOL, MSN Messenger, Jabber, IRC, Yahoo! Messenger, Mail.r Agent. Internet Protocols: FTP, FTP over SSL, HTTP/HTTPS, SMTP and SMTP over SSL Telnet sessions "DeviceLock was selected as or soltion becase it got the highest score in all key fnctional and management areas among the prodcts we evalated". Marcel Dijkstra, ICT Manager, Syntrs Achmea

10 Prodct Specifications Content Filtering Featres DeviceLock DeviceLock Controlled Data Channels Removable media Other PnP storage devices Network commnications (See previos list) File Formats Parsed 80+ file formats inclding Microsoft Office, OpenOffice, Lots 1-2-3, repositories and archives, CSV, DBF, XML, Unicode, GZIP, RAR, ZIP, etc. Filtering Technologies Keyword matching Advanced reglar expression patterns with nmerical conditions and Boolean combination of matching criteria Pre-bilt RegExp templates (SSN, credit card, bank accont, address, passport, driver s license, etc.) Indstry-specific keyword dictionaries Content-Aware Data Shadowing All endpoint data channels All parsed file formats and data types (See previos list) PCL and Postscript printots Adit gives I.T. staff a complete record of device and Application Control By name of exectable for file operations Fll Text Searching 80+ file formats inclding Microsoft Office, OpenOffice, Lots 1-2-3, repositories and archives, CSV, DBF, XML, Unicode, GZIP, RAR, ZIP, etc. PCL and Postscript printots Indexing and search based on: log record parameters, word, phrase, nmber Search logic: all words (AND), defalt hit cont weighting, configrable term and field weighting Stemming and noise-word filtering for English, French, German, Italian, Rssian, and Spanish Encryption Integration Windows 7 BitLocker To Go PGP Whole Disk Encryption TreCrypt Lexar Media SAFE S1100 & S3000 Series SafeDisk SecrStar DriveCrypt (DCPPE) [ ] Approved Encrypted Devices IronKey : D20XXX, S-200 & D200 Series Systematic Development Grop LOK-IT Lexar Media SAFE S1100 & S3000 Series SanDisk Crzer Enterprise Series BlockMaster SafeStick Component Dependencies ContentLock, NetworkLock and DLSS reqire installation of the core DeviceLock modle ContentLock reqires NetworkLock for content filtering of network commnications System Reqirements DeviceLock agent: Windows NT 4.0/2000/XP/Vista/7 or Server 2003/2008 (32-bit and 64-bit versions); CPU Pentim 4, 1GB RAM, HDD 50GB DeviceLock consoles: Windows NT 4.0/2000/XP/Vista/7 or Server 2003/2008 (32-bit and 64-bit versions); CPU Pentim 4, 2GB RAM, HDD 100GB DeviceLock Enterprise Server: Windows Server 2000/2003/2008; CPU Intel Xeon 2.33GHz, RAM 4GB, HDD 500GB; MSDE or MS SQL Server (optionally) 2440 Camino Ramon, Ste. 130 San Ramon, CA 94583, USA port activity. Device Lock Proactive Endpoint Secrity s.sales@devicelock.com Toll Free: Phone: Fax: The 401 Centre, 302 Regent Street London, W1B 3HH, UK Toll Free: +44 (0) Fax: +44 (0) Via Falcone Milan, Italy Phone: Fax: Halskestr Ratingen, Germany Phone: Fax: Copyright DeviceLock, Inc. All Rights Reserved. DeviceLock is a registered trademark.

Device Lock. Why Consider An Endpoint DLP Solution? GROUP POLICY-INTEGRATED DATA LEAK PREVENTION (DLP) SUITE FOR PROTECTING SENSITIVE INFORMATION

Device Lock. Why Consider An Endpoint DLP Solution? GROUP POLICY-INTEGRATED DATA LEAK PREVENTION (DLP) SUITE FOR PROTECTING SENSITIVE INFORMATION Device Lock GROUP POLICY-INTEGRATED DATA LEAK PREVENTION (DLP) SUITE FOR PROTECTING Why Consider An Endpoint DLP Soltion? The data yo are striving to protect behind firewalls and passwords is likely still

More information

What s New in AppSense Management Suite Version 7.0?

What s New in AppSense Management Suite Version 7.0? What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,

More information

Why Consider an. Solution? Group Policy-integrated Data. Leak Prevention for protecting. sensitive information

Why Consider an. Solution? Group Policy-integrated Data. Leak Prevention for protecting. sensitive information Why Consider an Endpoint DLP Solution? Group Policy-integrated Data Leak Prevention for protecting sensitive information The data you are striving to protect behind firewalls and passwords is likely still

More information

Local Run Manager. Software Reference Guide for MiSeqDx

Local Run Manager. Software Reference Guide for MiSeqDx Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880

More information

VRM Video Recording Manager

VRM Video Recording Manager Video VRM Video Recording Manager VRM Video Recording Manager www.boschsecrity.com 24/7 Distribted storage and configrable load balancing iscsi disk array failover for extra reliability Used with all Bosch

More information

Access Professional Edition 2.1

Access Professional Edition 2.1 Engineered Soltions Access Professional Edition 2.1 Access Professional Edition 2.1 www.boschsecrity.com Compact access control based on Bosch s innovative AMC controller family Integrated Video Verification

More information

DeviceLock Endpoint DLP. Introduction

DeviceLock Endpoint DLP. Introduction DeviceLock Endpoint DLP Introduction 10.04.2014 Agenda Company Brief DeviceLock Solution At a Glance Data-in-Use DLP: Local Controls Data-in-Motion DLP: Network Controls Content-Aware Data Inspection &

More information

Content Safety Precaution... 4 Getting started... 7 Input method... 9 Using the Menus Use of USB Maintenance & Safety...

Content Safety Precaution... 4 Getting started... 7 Input method... 9 Using the Menus Use of USB Maintenance & Safety... STAR -1- Content 1. Safety Precation... 4 2. Getting started... 7 Installing the cards and the Battery... 7 Charging the Battery... 8 3. Inpt method... 9 To Shift Entry Methods... 9 Nmeric and English

More information

DVR 630/650 Series. Video DVR 630/650 Series. 8/16-Channel real-time recording with CIF resolution. Flexible viewing with two monitor outputs

DVR 630/650 Series. Video DVR 630/650 Series. 8/16-Channel real-time recording with CIF resolution. Flexible viewing with two monitor outputs Video DVR 630/650 Series DVR 630/650 Series 8/16-Channel real-time recording with resoltion Flexible viewing with two monitor otpts Remote viewing, playback, control, and configration Easy Pan/Tilt/Zoom

More information

LDAP Configuration Guide

LDAP Configuration Guide LDAP Configration Gide Content Content LDAP directories on Gigaset phones............................................... 3 Configration.....................................................................

More information

Content Content Introduction

Content Content Introduction Content Content Introdction...................................................................... 3 Roles in the provisioning process............................................................... 4 Server

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

Local Run Manager Generate FASTQ Analysis Module

Local Run Manager Generate FASTQ Analysis Module Local Rn Manager Generate FASTQ Analysis Modle Workflow Gide For Research Use Only. Not for se in diagnostic procedres. Overview 3 Set Parameters 3 Analysis Methods 5 View Analysis Reslts 5 Analysis Report

More information

USER S GUIDE: SPRINT RELAY CUSTOMER PROFILE

USER S GUIDE: SPRINT RELAY CUSTOMER PROFILE USER S GUIDE: SPRINT RELAY CUSTOMER PROFILE www.mysprintrelay.com/login n Log-in Go to www.mysprintrelay.com/login. If yo don t have a sername or password, click the gray men btton Cstomer New Profile/Call

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

BIS - Basic Package V4.6

BIS - Basic Package V4.6 Engineered Soltions BIS - Basic Package V4.6 BIS - Basic Package V4.6 www.boschsecrity.com The Bilding Integration System (BIS) BIS is a flexible, scalable secrity and safety management system that can

More information

VRM Video Recording Manager v3.0

VRM Video Recording Manager v3.0 Video VRM Video Recording Manager v3.0 VRM Video Recording Manager v3.0 www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability Used with

More information

EMC AppSync. User Guide. Version REV 01

EMC AppSync. User Guide. Version REV 01 EMC AppSync Version 1.5.0 User Gide 300-999-948 REV 01 Copyright 2012-2013 EMC Corporation. All rights reserved. Pblished in USA. EMC believes the information in this pblication is accrate as of its pblication

More information

BIS - Basic package V4.3

BIS - Basic package V4.3 Engineered Soltions BIS - Basic package V4.3 BIS - Basic package V4.3 www.boschsecrity.com Integration of Bosch and third party systems throgh deployment of OPC All relevant information in one ser interface

More information

BIS - Basic Package V4.4

BIS - Basic Package V4.4 Engineered Soltions BIS - Basic Package V4.4 BIS - Basic Package V4.4 www.boschsecrity.com Integration of Bosch and third party systems via open interfaces and SDK All relevant information in one ser interface

More information

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

BIS - Basic package V4.2

BIS - Basic package V4.2 Engineered Soltions BIS - Basic package V4.2 BIS - Basic package V4.2 www.boschsecrity.com Integration of Bosch and third party systems throgh deployment of OPC All relevant information in one ser interface

More information

Unit Testing with VectorCAST and AUTOSAR

Unit Testing with VectorCAST and AUTOSAR Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs

More information

Data Leak Prevention

Data Leak Prevention Data Leak Prevention Safetica ESET Technology Alliance Data Leak Prevention by Safetica Safetica security software offers a full DLP (Data Leak Prevention) solution which covers a wide range of security

More information

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03 EMC VNX Series Version VNX1, VNX2 Problem Resoltion Roadmap for VNX with ESRS for VNX and Connect Home P/N 300-014-335 REV. 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA.

More information

Doctor Web. All rights reserved

Doctor Web. All rights reserved Enterprise Site 2004-2009 Doctor Web. All rights reserved This docment is the property of Doctor Web. No part of this docment may be reprodced, pblished or transmitted in any form or by any means for any

More information

MVM-BVRM Video Recording Manager v2.21

MVM-BVRM Video Recording Manager v2.21 Video MVM-BVRM Video Recording Manager v2.21 MVM-BVRM Video Recording Manager v2.21 www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability

More information

About This Manual Copyright Copyright 2017 ZTE CORPORATION All rights reserved. Notice Disclaimer

About This Manual Copyright Copyright 2017 ZTE CORPORATION All rights reserved. Notice Disclaimer User Manal 1 Abot This Manal Thank yo for choosing this ZTE mobile device. In order to keep yor device in its best condition, please read this manal and keep it for ftre reference. Copyright Copyright

More information

MVM BVRM Video Recording Manager v2.20

MVM BVRM Video Recording Manager v2.20 Video MVM BVRM Video Recording Manager v2.20 MVM BVRM Video Recording Manager v2.20 www.boschsecrity.com Distribted storage and configrable load balancing iscsi disk array failover for extra reliability

More information

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of

More information

Membership Library in DPDK Sameh Gobriel & Charlie Tai - Intel DPDK US Summit - San Jose

Membership Library in DPDK Sameh Gobriel & Charlie Tai - Intel DPDK US Summit - San Jose Membership Library in DPDK 17.11 Sameh Gobriel & Charlie Tai - Intel DPDK US Smmit - San Jose - 2017 Contribtors Yipeng Wang yipeng1.wang@intel.com Ren Wang ren.wang@intel.com John Mcnamara john.mcnamara@intel.com

More information

TAKING THE PULSE OF ICT IN HEALTHCARE

TAKING THE PULSE OF ICT IN HEALTHCARE ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless

More information

The best decision leaves you options

The best decision leaves you options From Eye to Insight Digital HD Microscope Cameras The best decision leaves yo options The Leica MC170 HD and Leica MC190 HD 2 Easy. Fast. Brilliant. Fast and precise HD live preview images right on yor

More information

Computer User s Guide 4.0

Computer User s Guide 4.0 Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements

More information

BIS Software Maintenance Agreements (SMA)

BIS Software Maintenance Agreements (SMA) Engineered Soltions BIS Software Maintenance Agreements (SMA) BIS Software Maintenance Agreements (SMA) www.boschsecrity.com Uniqe, hassle-free pdates Technology is moving at sch a fast pace today that

More information

dss-ip Manual digitalstrom Server-IP Operation & Settings

dss-ip Manual digitalstrom Server-IP Operation & Settings dss-ip digitalstrom Server-IP Manal Operation & Settings Table of Contents digitalstrom Table of Contents 1 Fnction and Intended Use... 3 1.1 Setting p, Calling p and Operating... 3 1.2 Reqirements...

More information

Introduction to Windows Server Copyright 2018 NY SYSTEMS INC.

Introduction to Windows Server Copyright 2018 NY SYSTEMS INC. Introdction to Windows Server 2008 1 Learning Objectives Identify the key featres of each Windows Server 2008 edition Understand client systems that can be sed with Windows Server 2008 Identify important

More information

Standard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH

Standard. 8029HEPTA DataCenter. Because every fraction of a second counts. network synchronization requiring minimum space. hopf Elektronik GmbH 8029HEPTA DataCenter Standard Becase every fraction of a second conts network synchronization reqiring minimm space hopf Elektronik GmbH Nottebohmstraße 41 58511 Lüdenscheid Germany Phone: +49 (0)2351

More information

L EGAL NOTICES. ScanSoft, Inc. 9 Centennial Drive Peabody, MA 01960, United States of America

L EGAL NOTICES. ScanSoft, Inc. 9 Centennial Drive Peabody, MA 01960, United States of America L EGAL NOTICES Copyright 2002 by ScanSoft, Inc. All rights reserved. No part of this pblication may be transmitted, transcribed, reprodced, stored in any retrieval system or translated into any langage

More information

DIVAR IP Video DIVAR IP Remote viewing via Video Security App and Video Security Client from Bosch

DIVAR IP Video DIVAR IP Remote viewing via Video Security App and Video Security Client from Bosch Video DIVAR IP 5000 DIVAR IP 5000 www.boschsecrity.com Remote viewing via Video Secrity App and Video Secrity Client from Bosch Flly featred video recording soltion for p to 32 channels Ot-of-the-box IP

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

EMC M&R (Watch4net ) Installation and Configuration Guide. Version 6.4 P/N REV 02

EMC M&R (Watch4net ) Installation and Configuration Guide. Version 6.4 P/N REV 02 EMC M&R (Watch4net ) Version 6.4 Installation and Configration Gide P/N 302-001-045 REV 02 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished September, 2014 EMC believes

More information

Vector Logger Cloud. VECTOR GB Ltd Conference, 28th Sept, 2017 V

Vector Logger Cloud. VECTOR GB Ltd Conference, 28th Sept, 2017 V Vector Logger Clod VECTOR GB Ltd Conference, 28th Sept, 2017 V1.0 2017-09-27 Agenda Challenges Vector Logger Clod Secrity Aspects Data Acqisition Policy Conclsion 2 Vector Logger Clod Challenges Growing

More information

AAA CENTER FOR DRIVING SAFETY & TECHNOLOGY

AAA CENTER FOR DRIVING SAFETY & TECHNOLOGY AAA CENTER FOR DRIVING SAFETY & TECHNOLOGY 2017 FORD MUSTANG PREMIUM CONVERTIBLE INFOTAINMENT SYSTEM* DEMAND RATING Very High Demand The Ford Mstang Convertible s SYNC 3 (version 2.20) infotainment system

More information

Data Leak Prevention

Data Leak Prevention Data Leak Prevention Key advantages Full suite DLP solution Short time-to-benefit High level of tamperresistance All speciality functions covered against leakage Agnostic approach Clearly defined data

More information

DIVAR IP U. Video DIVAR IP U.

DIVAR IP U. Video DIVAR IP U. Video DIVAR IP 6000 2U DIVAR IP 6000 2U RAID-5 protected (standard configration), all-in-one recording soltion for p to 128 channels Pre-installed, pre-configred IP storage soltion with p to 32 TB storage

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

DIVAR IP U. Video DIVAR IP U.

DIVAR IP U. Video DIVAR IP U. Video DIVAR IP 7000 3U DIVAR IP 7000 3U www.boschsecrity.com RAID-5 protected (standard configration), all-in-one video management soltion for p to 128 channels Ot-of-the-box IP video management soltion

More information

Gigaset M34 USB Ya-LBA / englisch / A31008-M403-R / cover_front.fm / User Manual

Gigaset M34 USB Ya-LBA / englisch / A31008-M403-R / cover_front.fm / User Manual User Manal Contents Contents For yor safety.............................. 4 Notes on the operating instrctions....................................... 4 Safety precations.....................................................

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

DSCS6020: SQLite and RSQLite

DSCS6020: SQLite and RSQLite DSCS6020: SQLite and RSQLite SQLite History SQlite is an open sorce embedded database, meaning that it doesn t have a separate server process. Reads and writes to ordinary disk files. The original implementation

More information

DIVAR IP U. Video DIVAR IP U.

DIVAR IP U. Video DIVAR IP U. Video DIVAR IP 6000 3U DIVAR IP 6000 3U www.boschsecrity.com RAID-5 protected (standard configration), all-in-one recording soltion for p to 128 channels Pre-installed, pre-configred IP storage soltion

More information

Carbon Black PCI Compliance Mapping Checklist

Carbon Black PCI Compliance Mapping Checklist Carbon Black PCI Compliance Mapping Checklist The following table identifies selected PCI 3.0 requirements, the test definition per the PCI validation plan and how Carbon Black Enterprise Protection and

More information

DIVAR IP U. Video DIVAR IP U.

DIVAR IP U. Video DIVAR IP U. Video DIVAR IP 7000 2U DIVAR IP 7000 2U www.boschsecrity.com RAID-5 protected (standard configration), all-in-one video management soltion for p to 128 channels Ot-of-the-box IP video management soltion

More information

DSA E-Series 4TB (E2700)

DSA E-Series 4TB (E2700) Video DSA E-Series 4TB (E2700) DSA E-Series 4TB (E2700) Scale-p network storage soltion: controller nit with 12 internal HDDs expandable via state-of-theart SAS interface-connected expansion nits Configrable

More information

DLA AIOL Series IP Video Storage Array

DLA AIOL Series IP Video Storage Array Video DLA AIOL0 1400 Series IP Video Storage Array DLA AIOL0 1400 Series IP Video Storage Array www.boschsecrity.com RAID-5 protected, all-in-one recording soltion for p to 64 channels Pre-installed, pre-configred

More information

LTC 8600 Series Allegiant Matrix/Control Systems - Modular

LTC 8600 Series Allegiant Matrix/Control Systems - Modular Video 86 Series Allegiant Matrix/Control Systems - Modlar 86 Series Allegiant Matrix/Control Systems - Modlar www.boschsecrity.com 128 Camera by 16 monitor switching Modlar constrction Powerfl alarm handling

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

DIVAR IP U. Video DIVAR IP U.

DIVAR IP U. Video DIVAR IP U. Video DIVAR IP 7000 3U DIVAR IP 7000 3U www.boschsecrity.com RAID-5 protected (standard configration), all-in-one video management soltion for p to 128 channels Ot-of-the-box IP video management soltion

More information

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat Lectre 4: Roting CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Amin Vahdat Lectre 4 Overview Pop qiz Paxon 95 discssion Brief intro to overlay and active networking 2 End-to-End Roting

More information

BIS - Access Engine (ACE)

BIS - Access Engine (ACE) Engineered Soltions BIS - Access Engine (ACE) BIS - Access Engine (ACE) www.boschsecrity.com Sophisticated access control with direct alarm management Seamless integration and interaction with video, fire,

More information

Nortel DECT Handset 4025 User Guide

Nortel DECT Handset 4025 User Guide DECT 4025 Nortel DECT Handset 4025 User Gide Revision history Revision history October 2005 Standard 2.00. This docment is p-issed to spport Nortel Commnication Server 1000 Release 4.5. Febrary 2005 Standard

More information

An Introduction to GPU Computing. Aaron Coutino MFCF

An Introduction to GPU Computing. Aaron Coutino MFCF An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They

More information

Secure Biometric-Based Authentication for Cloud Computing

Secure Biometric-Based Authentication for Cloud Computing Secre Biometric-Based Athentication for Clod Compting Kok-Seng Wong * and Myng Ho Kim School of Compter Science and Engineering, Soongsil University, Sangdo-Dong Dongjak-G, 156-743 Seol Korea {kswong,kmh}@ss.ac.kr

More information

Distributed Systems Security. Authentication Practice - 2. Prof. Steve Wilbur

Distributed Systems Security. Authentication Practice - 2. Prof. Steve Wilbur Distribted Systems Secrity Athentication Practice - 2 Prof. Steve Wilbr s.wilbr@cs.cl.ac.k MSc in Data Commnications Networks and Distribted Systems, UCL Lectre Objectives Examine X.509 as a practical

More information

Plugs, Receptacles & Connectors

Plugs, Receptacles & Connectors Plgs, Receptacles & Connectors for the Power Generation Indstry Featring: Switch-Rated Plgs & Receptacles with DECONTACTOR Technology meltric.com A company of MARECHAL ELECTRIC GROUP MELTRIC Switch-Rated

More information

Clustering and Clustering

Clustering and Clustering Clstering and Clstering Tools Testing Migrate configration settings Qick configration and trobleshooting Storage configration Performance and reliability Secrity 20 Enhanced Web Services Microsoft Internet

More information

CS 153 Design of Operating Systems

CS 153 Design of Operating Systems CS 153 Design of Operating Systems Spring 18 Lectre 3: OS model and Architectral Spport Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time/today

More information

LTC 8500 Series Allegiant Matrix/Control Systems - Modular

LTC 8500 Series Allegiant Matrix/Control Systems - Modular Video LTC 85 Series Allegiant Matrix/Control Systems - Modlar LTC 85 Series Allegiant Matrix/Control Systems - Modlar www.boschsecrity.com 64 Camera by 8 monitor switching 8 Independent keyboards Modlar

More information

Z4 G4 Management Workstation

Z4 G4 Management Workstation Video Z4 G4 Management Workstation Z4 G4 Management Workstation www.boschsecrity.com High-performance workstation with Intel s nextgeneration microarchitectre Mlti-monitor spport (NVIDIA Qadro P4000, 8

More information

LTC 8500 Series Allegiant Matrix/Control Systems - Modular

LTC 8500 Series Allegiant Matrix/Control Systems - Modular Video LTC 85 Series Allegiant Matrix/Control Systems - Modlar LTC 85 Series Allegiant Matrix/Control Systems - Modlar www.boschsecrity.com 64 Camera by 8 monitor switching 8 Independent keyboards Modlar

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

BVMS Professional 9.0

BVMS Professional 9.0 Video BVMS Professional 9.0 BVMS Professional 9.0 www.boschsecrity.com 24/7 Embedded resilience - keep operations p and rnning even when mltiple system components fail. Redced total costs of ownership

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 15: Virtal Address Space Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian OS Abstractions Applications

More information

Putting the dynamic into software security testing

Putting the dynamic into software security testing Ptting the dynamic into software secrity testing Detecting and Addressing Cybersecrity Isses V1.1 2018-03-05 Code ahead! 2 Atomated vlnerability detection and triage + = 3 How did we get here? Vector was

More information

RKP6200 S32 Server License

RKP6200 S32 Server License Engineered Soltions RKP6200 S32 Server License RKP6200 S32 Server License wwwboschsecritycom Enhanced Imaging Image export Spport for 64 bit credential nmbers iclass integration with Smart Card encoding

More information

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 12: Deadlock Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Deadlock the deadly embrace! Synchronization

More information

Conettix D6600 Communications Receiver/Gateway

Conettix D6600 Communications Receiver/Gateway Intrsion Alarm Systems Conettix D6600 Commnications Receiver/Gateway Conettix D6600 Commnications Receiver/Gateway www.boschsecrity.com 32 lines for pblic switched telephone network (PSTN) commnications

More information

DIVAR hybrid 5000 recorder

DIVAR hybrid 5000 recorder Video DIVAR hybrid 5000 recorder DIVAR hybrid 5000 recorder www.boschsecrity.com APP H.265 Hybrid recording of p to 16 IP and 16 analog channels Extended rack-mont nit with advanced connections 12 MP IP

More information

COPYRIGHTED MATERIAL. Recording Macros and Getting Started with VBA. Part 1

COPYRIGHTED MATERIAL. Recording Macros and Getting Started with VBA. Part 1 Part 1 Recording Macros and Getting Started with VBA Chapter 1: Recording and Rnning Macros in the Office Applications Chapter 2: Getting Started with the Visal Basic Editor Chapter 3: Editing Recorded

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Abstract 1 Introduction

Abstract 1 Introduction Combining Relevance Information in a Synchronos Collaborative Information Retrieval Environment Colm Foley, Alan F. Smeaton and Gareth J. F. Jones Centre for Digital Video Processing and Adaptive Information

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Midterm Review Midterm in class on Friday (May 4) Covers material from arch spport to deadlock Based pon lectre material and modles of the book indicated on

More information

TINYON IP 2000 PIR. Video TINYON IP 2000 PIR. Compact and stylish 720p indoor IP camera. PIR-based motion and audio detection

TINYON IP 2000 PIR. Video TINYON IP 2000 PIR.   Compact and stylish 720p indoor IP camera. PIR-based motion and audio detection Video www.boschsecrity.com Compact and stylish 720p indoor IP camera PIR-based motion and adio detection Integrated white light for night time viewing FTP, Dropbox and e-mail alarms SD card slot for local

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 2: Historical Perspective Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time What is an OS?

More information

AN A. GPON Optical Network Terminal. Product Manual. Version: A/1. FiberHome Telecommunication Technologies Co., Ltd.

AN A. GPON Optical Network Terminal. Product Manual. Version: A/1. FiberHome Telecommunication Technologies Co., Ltd. AN5506-01-A GPON Optical Network Terminal Prodct Manal Version: A/1 FiberHome Telecommnication Technologies Co., Ltd. April 2017 Thank yo for choosing or prodcts. We appreciate yor bsiness. Yor satisfaction

More information

Overview of Security Support in Vector Tools

Overview of Security Support in Vector Tools Overview of Secrity Spport in Vector Tools Secrity Manager V0.2 2017-09-22 Agenda Motivation Challenges Secrity Manager Otlook 2 Motivation Secrity protects Featres and Bsiness Models Secrity Goals: Integrity

More information

Don t just manage your documents. Mobilize them!

Don t just manage your documents. Mobilize them! Don t just manage your documents Mobilize them! Don t just manage your documents Mobilize them! A simple, secure way to transform how you control your documents across the Internet and in your office.

More information

Advanced Security Measures for Clients and Servers

Advanced Security Measures for Clients and Servers Advanced Security Measures for Clients and Servers Wayne Harris MCSE Senior Consultant Certified Security Solutions Importance of Active Directory Security Active Directory creates a more secure network

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

AutoDome 200 Series PTZ Camera System

AutoDome 200 Series PTZ Camera System Video AtoDome 200 Series PTZ Camera System AtoDome 200 Series PTZ Camera System www.boschsecrity.com Economical, high-speed PTZ dome Flly interchangeable CPUs, cameras, hosings, commnications, and monts

More information

AUTODOME IP 5000 IR. Video AUTODOME IP 5000 IR.

AUTODOME IP 5000 IR. Video AUTODOME IP 5000 IR. Video AUTODOME IP 5000 IR AUTODOME IP 5000 IR www.boschsecrity.com High-performance HD otdoor PTZ dome camera with integrated IR illmination for scenes with low or no ambient lighting Long distance illmination

More information

Workshop. Improving the Bus Network

Workshop. Improving the Bus Network Workshop Improving the Bs Network Workshop Objectives To consider a range of objectives and proposals that cold improve the bs system in Brisbane to contribte to pblic (inclding RACQ members ) mobility

More information

AUTODOME IP 4000 HD. Video AUTODOME IP 4000 HD.

AUTODOME IP 4000 HD. Video AUTODOME IP 4000 HD. Video AUTODOME IP 4000 HD AUTODOME IP 4000 HD www.boschsecrity.com Perfect combination of style and technology for indoor installations that reqire high-qality imaging in a compact and aesthetic dome hosing

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information