ShareFile Enterprise Security White Paper

Size: px
Start display at page:

Download "ShareFile Enterprise Security White Paper"

Transcription

1 ShareFile Enterprise Security White Paper Providing security is essential when implementing an Enterprise class file sync and sharing solution Learn how ShareFile Enterprise provides industry-leading security measures to protect both ShareFile.com and our customer s data citrix.com/sharefle

2 White Paper Table of Contents Introduction SaaS application tier ShareFile servers: web, API, and database overview SaaS application tier security Encryption Hash-based message authentication code Metadata Citrix-managed StorageZones Overview Securing file upload/download requests Security Encryption in transit Encryption at rest Data backup Anti-virus Amazon Web Services security Microsoft Azure Security Customer-managed StorageZones with on-prem storage Overview Securing file upload/download requests Security Trust and encryption: on-premise StorageZone ShareFile StorageZones Controller server Encryption in transit Encryption at rest Customer-managed Restricted StorageZones Overview Encrypting file upload/download data and metadata Adding a document Enumerating files from the Restricted StorageZone External Access to encrypted file and metadata notifications Sharing/sending files Receiving a shared file Customer-managed StorageZones with Windows Azure storage Overview Securing file upload/download requests Security StorageZone Connectors Overview Securing File Upload/Download Requests Security Data Loss Prevention (DLP) integration Overview 2

3 White Paper Table of Contents Which DLP systems are supported? How ShareFile works to prevent data loss Information Rights Management Customer Managed Encryption Keys NetScaler integration Overview Requests for ShareFile data from on-premise data storage Securing ShareFile data upload/download requests with NetScaler Requests for data from StorageZones Connectors Securing ShareFile Connector upload/download requests with NetScaler SAML integration Overview Workflow Security and benefits Additional resources OAuth Overview Workflows Web authentication ShareFile credentials Parameter definitions Web authentication SAML Desktop apps Security and benefits Conclusion Appendix A. Mobile device security Appendix B. ShareFile web application security features 3

4 White Paper Introduction ShareFile is an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise. Securing data is critical to every enterprise and is a responsibility taken seriously by ShareFile. Savvy IT executives understand that with the plethora of free or low-cost data sharing applications available to end users, it has become critical to provide users with a more secure alternative that still empowers them to sync files across their devices and securely share files with co-workers. This paper explores the details of how ShareFile is secure by design, and highlights the set of security controls available to ShareFile Enterprise customers. Figure 1. ShareFile components overview with applicable ports 4

5 ShareFile consists of 3 primary components: the SaaS Application Tier, StorageZones, and the client. 1. SaaS Application Tier sometimes referred to the as the Control Plane, this is a Citrixmanaged component that consists of web, database, and API servers 2. StorageZones this is where customer data is stored. Customers have four options when deciding where to store their data. This paper will discuss the workflow and security processes of each option Citrix-managed cloud storage on Amazon Web Services Citrix-managed cloud storage on Microsoft Azure Customer-managed cloud storage on Microsoft Azure Customer-managed storage in corporate datacenters 3. Clients ShareFile supports a broad device list, which includes but is not limited to Windows and Mac OSX, Android and ios, Windows phone and Windows Metro 5

6 White Paper SaaS Application Tier ShareFile servers: web, API, and database overview The ShareFile SaaS Application Tier is hosted in Citrix s datacenter. The components include (see figure 2.): NetScaler used to load balance client requests to the ShareFile.com/eu webs and API webservers ShareFile.com/eu webservers designed to deliver the Web UI API webservers used for client devices and tools using the HTTPS and REST API, including the Outlook plug-in, mobile and sync applications Database SQL database instances which contain things such as account data, file and folder metadata, including access rights, user account data, logs etc. The database in the SaaS Application tier does not process or store any customer data files The NetScalers and web servers are installed in the DMZ with the SQL databases installed in the private network behind an additional firewall. The SQL database instances are securely replicated to a second datacenter for backup and disaster recovery purposes. Figure 2. SaaS Application Tier components overview SaaS application tier security Encryption To protect customer data in transit ShareFile supports TLS 1.2 with up to 256 bit AES encryption and no less than 128 bit encryption with the negotiation to TLS/AES-256 dependent on whether the end user s device or proxy supports TLS/AES-256. Hash-based message authentication code Hashing is defined as producing hash values for accessing data or for security purposes. A hash value (or simply hash) is a number generated from a string of text. The hash is substantially smaller than the text itself, and is generated by a formula in such a way that it is extremely unlikely that some other text will produce the same hash value. 6

7 White Paper In security systems, hashes are used to ensure that transmitted messages have not been tampered with. The sender generates a hash of the message, encrypts it, and sends it with the message itself. The recipient then decrypts both the message and the hash, produces another hash from the received message, and compares the two hashes. If the hashes are the same, it indicates that the message was transmitted intact. Metadata Customer files are never processed, stored or transferred to the ShareFile SaaS application tier. Instead we store metadata which when defined means data about data or data that describes other data. The metadata attributes that ShareFile stores in the SaaS application tier s database servers are as follows: User Info: First Name Last Name User Login ( Address) Company Name (Optional) Password Hash Security Question Security Answer Access Control Lists (ACL) File Info: File Name File Description File Location File Size File Hash File Creation Date Notification Access Control Lists (ACL) IP Address from which file was uploaded Other: Account Subdomains on ShareFile.com/eu Audit & Reporting 7

8 White Paper Citrix-managed StorageZones Overview ShareFile operates a hybrid cloud infrastructure, with separate application and storage tiers managed by separate entities. Citrix manages the SaaS application tier (no file content) while an enterprise class cloud services provider (either Amazon Web Services or Microsoft Azure, depending on customer contract) hosts the StorageZone servers, along with application servers running the FTP/FTPS, Antivirus, Indexing, and Thumbnail services. The Citrix-managed StorageZones architecture consists of the SaaS Application tier, StorageZone Controller server(s) and cloud storage (see Figure 3). Figure 3. Citrix-managed StorageZones architectural overview 8

9 Securing File Upload/Download Requests When a user uploads or downloads a file, ShareFile s architecture prevents forged requests by using hash-based message authentication codes or HMAC s. Figure 4. Preventing forged requests workflow diagram 1. Client requests a file. 2. A prepare message is sent by the ShareFile web application or API servers in the SaaS application tier to the StorageZone hosting the file. The location of the file is stored in the SaaS application tier database, accessed by the ShareFile web application and API servers. 3. A hash-based message authentication code (HMAC) based on the Shared Key used to establish a trust relationship between the SaaS application tier and StorageZone, is sent as part of the prepare message and is validated by the StorageZone Controller. 4. Once validated, the StorageZone confirms the validity and generates a unique one-time-use download token. 5. The ShareFile web application or API server provides the download link containing the fully qualified domain name (FQDN) of the StorageZones controller to the client with the unique download token. 6. To start the actual download, the client connects directly to the StorageZone. 7. The download token (part of the download request from the client), is validated. 8. If validation is successful, the file will be retrieved from storage, and the StorageZone will provide the file to the client. 9

10 Security Encryption in transit Client files are protected in transit between the web application and storage tier using TLS with no less than 128 bit encryption depending on end-user browser configuration. Encryption at rest All client files are encrypted using AES 256-bit symmetric key encryption, a FIPS approved encryption algorithm. Data backup Customer files are stored redundantly within the cloud storage provider s region and ShareFile backs up all files daily. We store and back up customer files according to the data retention and version settings your dedicated ShareFile admin configures via the ShareFile administrative web interface. Anti-virus We employ dedicated antivirus servers that, based on customer preference, can scan all client files for malware. Any infected file is marked with a Red exclamation mark to warn end users of the risk associated with downloading an infected file. Amazon Web Services security The ShareFile infrastructure is segmented logically from other vendors using a concept Amazon Web Services refers to as Security Groups. Think of security groups as a firewall-like implementation that segregates ShareFile s infrastructure from other vendors. Amazon EC2 provides a firewall solution to enable security groups; this mandatory inbound firewall is configured in a default deny mode and we must explicitly open any ports to allow inbound traffic. The traffic may be restricted by protocol, by service port, as well as by source IP address (individual IP or CIDR block). Amazon Web Services runs in geographically dispersed datacenters that comply with key industry standards for security, reliability and confidentiality, such as ISO/IEC 27001:2005, SOC 1 and SOC 2. Microsoft Azure security Like Amazon Web Services, Windows Azure runs in geographically dispersed datacenters that comply ISO/IEC 27001:2005, SOC 1 and SOC 2. Datacenters are managed, monitored, and administered by Microsoft operations staff that have years of experience in delivering the world s largest online services with 24 x 7 continuity. In addition to datacenter, network, and personnel security practices, Windows Azure incorporates security practices at the application and platform layers to enhance security for application developers and service administrators. 10

11 White Paper Customer-managed StorageZones with on-prem storage Overview Customer-managed StorageZones allow IT administrators to choose where corporate data will be processed and stored. IT can store data in the organization s datacenter to help meet unique data sovereignty and compliance requirements, or an organization can choose to host ShareFile data natively in a Microsoft Azure account, helping IT build the most cost-effective and customized solution for their organization. The on-premise customer-managed data can be easily integrated with an organization s existing infrastructure as it is designed to support any Common Internet File System (CIFS)- based network share. In both options the SaaS application tier is a required component. The customer-managed on-premise architecture consists of the SaaS Application tier, StorageZone Controller server(s) and customer datacenter hosted backend storage (see Figure 5). Figure 5. Customer-managed on-premise StorageZones components diagram 11

12 Securing file upload/download requests The workflow is the same as Citrix-managed StorageZones. The ShareFile architecture in customer-managed StorageZones prevents forged upload and download requests by using hash-based message authentication codes (HMAC) as well. Figure 6. Preventing forged requests workflow diagram 1. Client requests a file. 2. A prepare message is sent by the ShareFile web application or API servers in the SaaS application tier to the StorageZone hosting the file. The location of the file is stored in the SaaS application tier database, accessed by the ShareFile web application and API servers. 3. A hash-based message authentication code (HMAC) based on the Shared Key used to establish a trust relation between the SaaS application tier and StorageZone, is sent as part of the prepare message and is validated by the StorageZone Controller. 4. Once validated, the StorageZone confirms the validity and generates a unique one-time-use download token. 5. The ShareFile web application or API server provides the download link to the Client with the unique download token. 6. To start the actual download, the Client connects to the StorageZone. 7. The download token (part of the download request from the Client), is validated. 8. If validation is successful, the file will be retrieved from storage. 9. The StorageZones controller server will send the file to the Client. 12

13 Security Trust and encryption: on-premise StorageZone Shared Zone Secret Key created when StorageZone is created. Storage Encryption Key created when StorageZone Controller Encryption Key is encrypted by Passphrase when StorageZone Controller is configured. Figure 7. Security related SZ Controller configurations ShareFile StorageZones Controller server Once the pre-requisites for installation are met, installing the StorageZones Controller server software is simple and consists of launching an.msi file and clicking through until finished. Pre-requisites: Use a publicly-resolvable Internet hostname (not an IP address) Install a commercially trusted TLS certificate in IIS Allow inbound TCP requests on port 443 through the Windows firewall The installation file installs the following server components: A virtual directory and files into the IIS Default Web site. The physical location of the folder and files is c:\intetpub\wwwroot\citrix\storagecenter. An IIS application pool named StorageCenterAppPool. The installer also points the IIS Default Web Site s application pool to the newly created StorageCenterAppPool application pool. 4 windows services: ShareFile Cloud Storage Uploader Service ShareFile File Cleanup Service ShareFile File Copy Service ShareFile Management Service After installing the StorageZones Controller server software, configuration is required. Instructions on configuring the StorageZones Controller software can be found here. The configuration utility accomplishes the following tasks (see Figure 7): Creates a shared zone secret key in the customer s ShareFile account and on the StorageZones Controller server stored encrypted in the registry. Creates a storage encryption key (SCKeys.txt) and encrypts that key using 128 bit encryption when a passphrase is entered in the last step of the configuration. This encryption key is only used if the Enable Encryption box is checked during configuration which instructs the StorageZone Controller server to encrypt the files stored in your shared ShareFile data repository. 13

14 Creates a proprietary folder structure and the SCKeys.txt file in the ShareFile Storage Location network share location defined during the configuration. Enables StorageZone Connectors if Enable StorageZone Connector for Network File Shares and Enable StorageZone Connector for SharePoint are checked. Enabling the Connectors creates the IIS apps cifs (Connector for Network File Shares) and sp (Connector for SharePoint). Encryption in transit If a NetScaler is not used in the architecture, customer files are protected in transit between the web application and the customer-managed on-premise storage location using TLS with a minimum 128 bit encryption depending on end-user browser or proxy configuration. If customers are using Windows Azure, files are protected in transit between the web application and the customer-managed on-premise storage location and to the Windows Azure storage container using the same TLS protocols as above. If a NetScaler is used in the architecture, the TLS connection will be terminated at the NetScaler in the DMZ and files will be sent to the storage location either over http or https, depending on your configuration. If HTTP is used, files will traverse the internal network to the storage location un-encrypted. If HTTPS is used, files will traverse the internal network to the storage location using TLS. The storage server will then decrypt the files and store them. Encryption at rest The StorageZones Controller software has the ability to encrypt the files located in the Storage Location defined during configuration. If data encryption is enabled, all zone files are encrypted with 128 bit encryption using the same key stored in SCKeys.txt. It is therefore critical that the SCKeys.txt file and passphrase be backed up to a secondary secure location. If the SCKeys.txt file is lost, all zone files become inaccessible. Because this directory resides in a customer- managed datacenter it is a Citrix best practice to not have the StorageZones Controller software encrypt the data and leverage encryption options from your storage subsystem instead. If encrypted by the StorageZone Controller software, processes like anti-virus scanning and file indexing will not work. If customers are using Windows Azure, the StorageZones Controller software has the ability to encrypt the files located in the temporary storage location defined during configuration. If the files are encrypted they will be transferred to the Windows Azure storage container encrypted. Decryption happens when a file is requested for download. The file gets copied from the Azure storage container to the temporary storage location in the customer datacenter where it is decrypted and sent from the StorageZones controller server to the client. All communications from the StorageZones servers and Windows Azure storage containers happen over TLS. 14

15 White Paper Customer-managed Restricted StorageZones Overview In some highly regulated industries and organizations, having ShareFile data stored in customer-managed on-premises StorageZones still presents some privacy concerns. The first is that metadata, specifically file and folder names are still visible to Citrix, and secondly, as the authentication provider, Citrix must be trusted to authorize access to files. Customer-managed Restricted StorageZones is the solution to this problem. The onpremises StorageZones Controller encrypts the metadata with a customer-owned encryption key before writing that data to the Citrix SaaS application tier (sharefile.com/ sharefile.eu). Access to decrypted files and metadata only happens via the StorageZones Controller server, which acts as an authenticating encryption/decryption proxy. Figure 8. Customer-managed Restricted StorageZone Encrypting file upload/download data and metadata During the configuration of a Restricted StorageZone, customer-owned private encryption keys are created and used for the encryption and decryption of file data and metadata. An HTTPS binding occurs to a new proxy service used to authenticate all requests to the Restricted StorageZone and serves as the only communication path to that Restricted StorageZone. Adding a document 1. Unencrypted file and metadata is uploaded from a client to the StorageZones Controller via the proxy service 2. Both the file and metadata are encrypted with the customer-owned encryption key 3. Encrypted file metadata is uploaded to ShareFile with a sample file name of!zk!@ OwYB92ryh-m9MvrQ6ejLQ$$!ZK! 4. Encrypted file is written to the Restricted StorageZones repository Enumerating files from the Restricted StorageZone 1. User logs in to ShareFile using either ShareFile credentials or via SAML and Active Directory. 2. The user is redirected to the StorageZone Controller s proxy service with a request for metadata. 15

16 White Paper 3. The StorageZone Controller initiates an authentication to Active Directory prompting the user for domain credentials with appropriate permissions to view encrypted metadata. As part of the authentication process, the StorageZones Controller server also verifies that the address in Active Directory matches the address used to authenticate to ShareFile. 4. The StorageZone Controller server fetches the encrypted metadata from ShareFile and decrypts it for the user. 5. The unencrypted metadata is returned to the client. External access to encrypted file and metadata Encrypted file and metadata are being delivered from the customer-managed StorageZones Controller server. For this reason, to enable access for users not on the internal network or VPN, a NetScaler Gateway is used to server as the Restricted StorageZone s external domain address. The architecture is similar to how we architect authentication to SharePoint and Network Share connectors (section 8). The traffic headed to those connectors is stopped at the NetScaler in the DMZ, authenticated and then those credentials are passed to the appropriate location using SSO. With Restricted StorageZones all traffic destined for the StorageZone Controller server can be stopped at the NetScaler, authenticated and credentials passed back to the StorageZone Controller using SSO. notifications The ShareFile SaaS application tier cannot see the folder and file names, therefore sharing and upload/download notification s cannot be sent by Shar efile. Using Restricted Zones, customers will need to point to an SMTP server that is reachable by the onpremises StorageZones Controller server. Notification content with encrypted info is downloaded by the StorageZones Controller via the use of an Azure service bus, decrypted, and then sent via SMTP. Sharing/sending files 1. Client initiates the request to share an encrypted document 2. The share object is requested and digitally signed by the StorageZones Controller 3. In ShareFile a share message object is created with encrypted file names 4. The StorageZones Controller downloads the encrypted message using the Azure service bus 5. The message is decrypted by the StorageZones Controller server and sent to the SMTP server where it is sent to all recipients Receiving a shared file 1. User clicks the Share URL from ShareFile.com 2. ShareFile.com redirects the user to the StorageZones Controller server where they are required to authenticate with Active Directory credentials 3. After successful authentication the StorageZones Controller fetches the signed shared object, validates the signature and enforces security policies 4. The file is obtained from the StorageZone data storage repository and delivered to the client from the StorageZones Controller server 16

17 White Paper Customer-managed StorageZones with Windows Azure storage Overview The Microsoft Azure customer-managed solution (Figure 8) integrates ShareFile with Microsoft Azure s Binary Large Object (Blob) storage, a cloud service for storing large amounts of unstructured data that can be accessed from anywhere in the world via HTTP or HTTPS. The Azure Storage architecture is similar to the customer-managed on-premise StorageZones architecture with one minor difference. Azure storage is customer-managed storage hosted in the Azure cloud. File uploads are initially deposited into a temporary storage area shared by all StorageZone controllers. Then, a background service copies those files to the Windows Azure storage container and deletes the local cached copy of the file(s). Figure 9. Customer-managed StorageZones with Windows Azure components diagram 17

18 Securing file upload/download requests Overview Because the architecture is very similar to the customer-managed on premise StorageZones architecture, the workflow is the same with one small difference highlighted in bold below. Figure 10. Preventing forged requests workflow diagram 1. Client requests a file. 2. A prepare message is sent by the ShareFile web application or API servers in the SaaS application tier to the StorageZone hosting the file. The location of the file is stored in the SaaS application tier database, accessed by the ShareFile web application and API servers. 3. A hash-based message authentication code (HMAC) based on the Shared Key used to establish a trust relation between the SaaS application tier and StorageZone, is sent as part of the prepare message and is validated by the StorageZone Controller. 4. Once validated, the StorageZone confirms the validity and generates a unique onetime-use download token. 5. The ShareFile web application or API server provides the download link to the Client with the unique download token. 6. To start the actual download, the Client connects to the StorageZone. 7. The download token (which is part of the download request from the Client), is validated. 8. If validation is successful, the file will be retrieved from Windows Azure storage and placed in the shared storage location in the customer datacenter. 9. The StorageZones controller server will send the file to the Client. 18

19 Security The installation of the StorageZones controller software is identical to the customermanaged on premise installation instructions, but the configuration of the software requires some additional steps. Instructions on configuring the StorageZones Controller software with Windows Azure support can be found here and there is a video of the configuration located here. The configuration utility accomplishes the following tasks (see Figure 7 above) with the difference in configuration in bold below: Creates a shared zone secret key in the customer s ShareFile account and on the StorageZones Controller server stored encrypted in the registry. Creates a storage encryption key (SCKeys.txt) and encrypts that key when a passphrase is entered in the last step of the configuration. This encryption key is only used if the Enable Encryption box is checked during configuration which instructs the StorageZone. Controller server to encrypt the files stored in your shared ShareFile data repository Creates a proprietary folder structure and the SCKeys.txt file in the ShareFile Storage Location network share location defined during the configuration. Enables StorageZone Connectors if Enable StorageZone Connector for Network File Shares and Enable StorageZone Connector for SharePoint are checked. Enabling the Connectors creates the IIS apps cifs (Connector for Network File Shares) and sp (Connector for SharePoint). Connects the StorageZones controller server to the Windows Azure account using the account name and 512-bit authentication key generated in Azure when the Azure storage container is created. Once the StorageZones controller authenticates to Azure the administrator is presented with a list of available storage containers to choose from for the ShareFile data storage location. 19

20 White Paper StorageZone Connectors Overview ShareFile StorageZone Connectors, enabled by a customer-managed implementation of a StorageZones controller server, help organizations leverage and mobilize existing enterprise data platforms. This feature, available in the ShareFile mobile app for iphone, ipad and Android devices, allows mobile users to create a secure connection to existing CIFS network shares and SharePoint document libraries. The StorageZone Connectors architecture consists of the SaaS application tier, a customermanaged implementation of a StorageZones Controller server, network shares and SharePoint document libraries. Figure 11. StorageZone Connectors component architecture 20

21 Securing file upload/download requests Figure 12. StorageZone Connectors workflow diagram without NetScaler 1. User login request sent to subdomain.sharefile.com 2. Top-level StorageZone connectors are displayed 3. User login request sent to organizations Active Directory 4. User authenticated to Active Directory 5. Network shares enumeration 6. SharePoint document libraries enumeration 7. Files are uploaded/downloaded Security When using StorageZone Connectors, an additional authentication step (Step 3 in Figure 10) is introduced when users access a Connector, and the file upload/download authorization step from sharefile.com is removed. Additional StorageZone Connectors security information: Clients always use HTTPS when initiating connections to the StorageZones Controller HTTPS Basic authentication is required to support all mobile applications Passwords are never sent in clear text by ShareFile clients ShareFile administrators can control through user permissions which users have the ability to create connectors Administrators can also whitelist/blacklist connectors to specific file shares and SharePoint libraries 21

22 White Paper Data Loss Prevention (DLP) integration Overview ShareFile integrates with several market-leading Data Loss Prevention (DLP) products enabling content-aware sharing restrictions. Documents stored in your on-premises StorageZone can be examined by any third-party DLP security suite that supports ICAP, a standard network protocol for inline content scanning. Sharing and access privileges can then be adjusted based on the results of the DLP scan and your preferences for how strictly you want to control access. Which DLP systems are supported? Because we rely on the ICAP standard for interaction with your DLP server the ShareFile DLP integration will work with any ICAP-compliant solution and requires no changes to policies or servers in your existing security suite. ICAP-compliant solutions include: Symantec Data Loss Prevention McAfee DLP Prevent Websense Forcepoint Tying ShareFile security policies to your existing DLP security suite means you can maintain a single point of policy management for data inspection and security alerts. If you already use one of the solutions mentioned above for scanning outgoing attachments or web traffic, you can point the ShareFile StorageZones Controller to the same server. How ShareFile works to prevent data loss Figure 13. Graphical overview of DLP integration solution. 22

23 We ve developed a flexible policy-based system that offers granular access and sharing controls based on a new classification attribute that will be associated with each file. The system uses the DLP scan results to classify every version of every file in your StorageZone. There are three data classifications: 1. Scanned: OK Files that were scanned by a DLP system and passed OK 2. Scanned: Blocked Files that were scanned by a DLP system and were found to contain sensitive data 3. Unscanned Files that have not yet been scanned (in cases where files exist before DLP is configured, or when the external DLP system is unavailable or slow to respond) Next, the ShareFile platform enforces different access and sharing restrictions for each data classification. For each of the three categories, the ShareFile administrator chooses which actions to allow: Whether employees can download or share the file Whether 3rd-party users can download share the file Whether anonymous users can download the file These settings constrain the normal permissions and sharing controls available to users as they interact with their ShareFile data and collaborate with others. For instance, when sending someone a file, users could choose to block anonymous access even if DLP settings would allow them to share it anonymously. But if they attempt to share a file in a way that the DLP settings prohibit, the platform prevents them from doing so. This flexibility allows you to control the trade-offs between security and usability as best fits your organization. If a document is flagged as sensitive, you could still allow sharing between employees but block sending to anyone outside your organization. Or you could take a stricter approach and block all users (even the owner of the file) from downloading or sharing the file with anyone. If you block downloads, an employee would not be able to access ShareFile from an unmanaged device, get the file and share it by other means. For any files that are not yet scanned, you can configure the same sets of constraints. This means ShareFile could take an innocent until proven guilty or guilty until proven innocent approach according to your approach for impeding the flow of information. When the StorageZones Controller sends files to the DLP system for scanning, it includes metadata indicating the owner of the file and the folder path where the file resides in ShareFile. This allows the DLP server to log incidents and create notifications with enough detail to be actionable. 23

24 White Paper Information Rights Management Overview When you are working with an application or service like ShareFile, control over access to content can be easily maintained as long as the end-users interact and share content with other users of the same service. This works great as long as the interaction is contained within the application. However, in the world where mobility is becoming the norm and users have the ability to download applications, the control can disappear once the document leaves the application. With the ever growing mobilization of the workforce, data has a tendency to develop legs. Once the recipient has downloaded a file, the authentication and authorization controls no longer apply. They are free to re-distribute that file to anyone using any means (USB drive, attachment, Personal cloud account, etc.). A file you intended to only be seen by one recipient, suddenly has found its way to an unauthorized user that you never intended. How can I ensure that content I sent to a recipient is only viewed by that person? This is where Information Rights Management or IRM can help. It s a follow-me security model that allows for security protections to continue being enforced no matter where the data goes. Securing documents likely means different things to different people. If you are familiar with the on-premises world, its defined as securing at the share level and then maybe the file and folder level. But in the mobile-first, cloud enabled world this means something different and you need a security model that allows defined security settings to follow documents. 24

25 White Paper Information Rights Management applies file-level encryption, authentication and authorization controls to downloaded documents. You set some very simple and straightforward sharing permissions to a file you intend to send to a collaborator. Controls like: Whether the document can only be viewed Whether it can view and printed Or whether it can be view, printed or edited Those permission controls will be packaged with the file. This results in securing the file no matter where it lives or ends up. The great thing is, at any point in time if you no longer desire the recipients to have access, you can revoke the share and thus removing their access. What can I control using Rights Management for ShareFile? The following are the actions that you can control when using Rights Management for ShareFile: Limit access to browser view only Require Authentication to open downloaded file Revoke access to downloaded file Apply watermark Block printing and the clipboard Expire access after a set number of days Amount of time offline file access is allowed Allow Editing Screen sharing or screenshots How it works To explain how this works we will use an example where Bob is working on a project with Alice an outside consultant. Bob needs to collaborate with Alice and needs to share a document with her regarding the project. Bob wants to control how the file is used after he shares it with Alice, 25

26 White Paper 1. Bob selects a file he has stored in ShareFile that he wants to share with Alice. This file is stored in a StorageZone that is associated with an on-premises storagezone controller. 2. Bob defines Rights Management Security settings to be applied to the file he intends to share. The ShareFile StorageZone Controller will obtain an encryption key from the Rights Management policy server located within the ShareFile control plane and wraps the file using this encryption key. 3. Bob sends the file to Alice, who subsequently downloads the file. Alice then attempts to open the downloaded file. At this time she will need to authenticate to ShareFile and the Rights Management policy server will be consulted for the allowed permissions. This check is done in real time and the permissions are also enforced in real time. Up to this point all of the interaction between Bob, Alice and the file have been with ShareFile. During her interaction with the file Alice decides that she needs to consult Charlie for guidance. However, Charlie is not authorized to view content associated with the project. Alice isn t aware of this and shares the file with Charlie anyway. 4. Alice constructs an to Charlie and attaches her downloaded copy of file to the Charlies receives the and attempts to open the attached file. At this point the file open will initiate a process where ShareFile and the Rights Management Policy server will be consulted. This is similar to the earlier process where Alice s permissions are checked in real time. 6. The open request will be disallowed as Charlie will not be able to authenticate to ShareFile. This will result in the Rights Management policy server being unable to validate the actions attempted on the file. Even though Charlie has a physical copy of the file, it is still wrapped with the initial security settings defined by Bob back in step #2. Just because a copy of the file was downloaded by Alice the Rights Management setting were not removed. To provide this level of security, Citrix ShareFile has partnered with Seclore to provide this follow-me security model. Securing files within ShareFile is easy and is extended to sharing via the web UI, Outlook Plug-in, ios and Android devices and the ShareFile Desktop. In order to utilize Rights Management with a share, the sender will select from a list of straightforward sharing options: 26

27 White Paper View and Print This allows a recipient to only be capable of printing or viewing the file. They will be unable to edit the file View, Print and Edit This will allow essentially full control on a shared file. View (online and offline) Recipient will be allowed view only. No printing or editing abilities will be provided to the recipient. Should a user download the file and later go offline, they will still be allowed access to the file for a period of time while offline. As the above example shows, there is a direct interaction between the recipient and the ShareFile environment. In order to allow a user to download a file and work offline, that interaction has to be suspended in order to allow continued access. This is important when somebody is in an environment where they do not have internet access available to them (travelling, in a customer site with no available access, etc). When a file is downloaded and offline use is allowed, the user will be granted access offline for a defined period of time. A timer will begin. As long as the user is offline and the period of offline access is not exceeded, they will be allowed to work with the file. Once the offline access period expires, the user will be required to restore online access in order to continue working with the file. This is done to ensure there is a periodic check available to validate the recipient s access rights and usage ability has not been revoked or changed. What is required for this to work In order for a recipient to work with protected files there is additional software they will need to install. This software is available for Mac OS, ios / Android and Windows operating systems. When a recipient receives a rights management protected share and they do not have the software installed, the recipient is presented with a page that provides further guidance on how to interact with the file. Should a recipient not download the necessary software and attempt to open the file, they will be presented with an additional message advising them hey have received a protected document. The document will display a user friendly unencrypted message that references similar details as above. 27

28 White Paper This level of protection is available across a wide range of file types. Information Rights Management settings can be applied to traditional office types, PDF, TXT/RTF files, Open Office, image files (bmp, jpg, png, tif), AutoCAD / AutoDesk and Visio. As of the last published date of this document the solution is supported for the on-premises deployment of ShareFile storagezone data. In addition to the above the environment will need a ShareFile Storagezone controller deployed and configured to store customer data on-premises. You will need to ensure that your storagezone controller is running the latest revision of the ShareFile storagezone controller software. There is no additional software to deploy beyond those requirements. The Information Rights Management server software and infrastructure itself is deployed and managed by Citrix within the ShareFile application tier or control plane. 28

29 White Paper Customer Managed Encryption Keys Overview ShareFile provides customers with flexibility in storing content through our StorageZones architecture. Customers can choose between hosting content entirely in the cloud in a ShareFile Managed zone, on-premises via our StorageZone Controller software, in your own cloud storage container and finally a hybrid approach that uses a combination of the previous options. Some primary factors considered when deciding which option to use are: performance (proximity to primary user base), compliance / regulatory or geographic specific needs. Beyond the above, security becomes the next concern for customers how is my data secured if I select to store my data entirely in the ShareFile cloud? Data stored within the ShareFile cloud is always encrypted utilizing encryption keys generated by the ShareFile service. Even with this level of assurance by Citrix, this still can present some hesitancy by customers to adopt the service due to a lack of provider trust. Customers desire the ability to control the encryption of content in the cloud using their own encryption keys and subsequently be capable of revoking access should they have the need to for security reasons. This is where customer managed encryption keys offered by ShareFile can assist. What are Customer Managed Encryption Keys ShareFile Customer Managed Encryption Keys is a feature leveraging Amazon s Key Management Solution to assist customers in providing the data security control they desire. Customer files will still reside within the ShareFile application, but the generation (and control) of the encryption keys will occur within Amazon KMS. What is Amazon KMS? It s a service offered by Amazon utilizing two kinds of keys to secure content: Master and Data Keys. An Amazon KMS customer will have a single master key that can be used to encrypt or decrypt up to 4KB of data but more importantly it s used to generate / protect data keys. As a feature available to ShareFile the KMS master key is only used to generate and protect data keys. The actual encryption of data will occur within ShareFile. A master key is stored securely within a customer s Amazon KMS account and never exported outside of that environment. In contrast, a data key can be generated and exported outside of the KMS environment. So how does Amazon KMS work when generating data keys and securing data: 1. A request is initiated to encrypt data using a Customer s Amazon KMS account by a service or application 2. The Request is sent to Amazon KMS 3. Within an Amazon KMS Customer account their Master Key will generate (2) data keys: one plain text and one encrypted copy of the plain text key 4. Both of these keys are returned to the requesting service. 5. The requesting service will utilize the plain text key to encrypt the data to be stored in the service 6. Once the data has been encrypted by the service, the plain text copy of the key is discarded. 7. The service will write the encrypted file to disk and alongside it the encrypted copy of the data key used to secure the file. The encrypted copy of the data key will be used later for decrypting the stored data. 29

30 White Paper The benefit of this solution is that it simplifies the management of encrypted data and at the same time it allows for a level of trust to be established between the cloud service provider and the customer. After the data has been stored within the service in encrypted format, should someone gain access to the data they would be unable to open the file without having the ability to decrypt the secured file. This moves the control over encryption closer to the customer. If a file encrypted with KMS need to be accessed the following steps are followed to decrypt the file: 1. A client or application makes a request to access a KMS encrypted file to the service storing the file. 2. The service initiates a conversation with Amazon KMS, sending the encrypted data key associated with the saved file over to be decrypted 3. Amazon KMS will utilize the associated customer master key to decrypt the encrypted data key 4. Amazon KMS will return the plaintext copy to the requesting service that initiated the conversation 5. The service will use the plaintext key to decrypt the file requested by the client / application 6. The service will discard the plaintext copy of the key and return the now unencrypted file to the requesting client or application So how does all of this fit into the context of ShareFile. Below are brief walk-throughs of uploading and downloading files from ShareFile when using Customer Managed Encryption Keys. Upload a file to ShareFile 1. Customer initiates a request to upload a file to their ShareFile cloud StorageZone 2. ShareFile initiates a conversation with Amazon KMS associated with the Customers KMS Account. Requesting a data key that can be used to encrypt the file 3. Amazon KMS generates the plain text data key and the encrypted copy, returning both to ShareFile 4. ShareFile encrypts the customers file using the plain text key and discards the plaintext key. The encrypted copy of the key and the encrypted customer file are then stored in ShareFile 30

31 White Paper Download a file from ShareFile 1. Client initiates a download of a file secured via a KMS encryption key. ShareFile retrieves the encrypted file and the associated secure data key (ie: encrypted data key). 2. ShareFile initiates a conversation with Amazon KMS and sends the encrypted data key to KMS 3. Amazon KMS locates the master key associated with the KMS customer, decrypts the data key and returns the plain text data key back to ShareFile 4. ShareFile now decrypts the file using the plain text copy of the key. The plain text copy of the key is discarded and the requested file is returned to the client initiating the download request. As you can see the reliance on securing data is heavily dependent on the customers Amazon KMS Master key. At any point the customer can revoke ShareFile s access to their Master Key. Once access has been revoked it would it would make all the data secured using data keys tied to that master key inaccessible. Currently this security feature is supported for cloud storage zones only. If an environment is using theon-premises storage model having deployed a Citrix ShareFile StorageZone controller, the control over encryption keys is already within the customer s domain. When using onpremises storagezone a customer has option of using encryption through StorageZone controller itself or take advantage of the encryption services available on the destination CIFS repository where the on-premises data is stored. Once the feature is enabled and configured for a ShareFile account only new data will use the customer managed keys. Data stored prior to enabling the feature will use ShareFile encryption keys for storage. The feature is designed to work in parallel to existing ShareFile encrypted files. 31

32 White Paper NetScaler integration Overview A demilitarized zone (DMZ) provides an extra layer of security for the internal network. A DMZ proxy, such as Citrix NetScaler VPX, is an optional component used to: Ensure all requests to a StorageZones originate from sharefile.com or sharefile.eu, so that only approved traffic reaches the StorageZone Controllers Validates URI signatures before forwarding messages to StorageZone controllers reducing load on the StorageZone controllers Load balance requests to StorageZone Controllers using real-time status indicators Offload TLS from StorageZone Controllers Ensure requests for files on SharePoint or network drives are authenticated before passing through the DMZ In this scenario, two firewalls stand between the Internet and the secure network. StorageZone Controllers reside in the internal network. User connections to ShareFile must traverse the first firewall and use the TLS protocol on port 443 to establish this connection. To support this connectivity, you must open port 443 on the firewall and install a public TLS certificate on the NetScaler appliances (if they terminate the user connection). 32

33 Figure 15. NetScaler configuration architectural diagram NetScaler content switching virtual server sends user requests for data from ShareFile and from StorageZones Connectors to the appropriate NetScaler load balancing virtual server NetScaler load balancing virtual server Load balances the traffic for your StorageZones Controllers and also handles requests for data from your on-premise data storage and from StorageZone Connectors Requests for ShareFile data from on-premise data storage A load balancing virtual server performs hash validation, to ensure valid URI signatures are present on incoming requests. Figure 16. NetScaler configuration architectural diagram for ShareFile data Securing ShareFile data upload/download requests with NetScaler The following diagram and table describe the network connections that occur when a user logs onto ShareFile and then downloads a document from an on-premise storage zone deployed behind NetScaler. File activity is accessed via NetScaler in the DMZ, which terminates TLS, authenticates user requests and then accesses the StorageZone Controller in the trusted network on behalf of authenticated users. The NetScaler external address for ShareFile is accessed using the Internet FQDN szc.company.com (See Figure 17). 33

34 Figure 17. Securing requests for on-premise ShareFile data with NetScaler 1. The client makes a user logon request to company.sharefile.com over HTTPS 2. The client makes a file/folder enumeration and download request to company.sharefile. com over HTTPS 3. A file download authorization comes from sharefile.com to the szc.company.com (external address) over HTTP(S) 4. A file download authorization is sent from the NetScaler NSIP to the StorageZones Controller over HTTPS 5. A file download request comes from the Client to the szc.company.com (external address) over HTTPS 6. A file download request is sent from the NetScaler NSIP to the StorageZones Controller server over HTTP(S) 7. The file is downloaded In between steps 4 and 5 the NetScaler strips the HMAC from the URI and sends the URI & HMAC to the StorageZones Controller server. The HMAC is validated by the StorageZones Controller server which then sends confirmation to NetScaler. The process completes and file is uploaded or downloaded. Requests for data from StorageZones Connectors A load balancing virtual server performs user authentication. It stops a user request at the NetScaler, authenticates the user, and then performs single sign-on of the user to the StorageZones Controller. Although authentication to NetScaler is optional, it is a recommended best practice. 34

35 Figure 18. NetScaler configuration architectural diagram for StorageZone Connectors Securing ShareFile Connector upload/download requests with NetScaler The following diagram and table extend the previous scenario (see Figure 17) to show the network connections for StorageZone Connectors. This scenario includes the use of NetScaler in the DMZ to terminate TLS and perform user authentication for Connectors access. Figure 19. Securing requests for ShareFile Connector data with NetScaler 1. The client makes a user logon request to company.sharefile.com over HTTPS 2. The client requests top-level connector enumeration from company.sharefile.com over HTTPS 3. The client then sends a user logon to the StorageZones Controller server via the szc. company.com (external address) over HTTPS 4. The user is authenticated from the NetScaler SNIP to the AD domain controller over LDAP(S) 5. The NetScaler SNIP sends file/folder enumeration and upload/download requests to the StorageZones Controller over HTTP(S) 6. The StorageZones Controller server sends network share enumeration and upload/ download requests to the customer file server over CIFS or DFS 7. The StorageZones Controller server sends SharePoint enumeration and upload/ download requests to the internal customer SharePoint server over HTTP(S) 35

36 White Paper SAML integration Overview Security Assertion Markup Language (SAML) is a standard for exchanging authentication and authorization data between security domains. SAML is an XML-based protocol that uses security tokens to pass information about a principal (usually an end user) between a SAML authority, (an identity provider), and a SAML consumer, (a service provider). SAML enables web-based authentication and authorization scenarios including cross-domain single sign-on (SSO), which helps reduce the administrative overhead of distributing multiple authentication tokens to an end user. ShareFile supports single sign-on via SAML 2.0 and integrates with a number of federated identity management solutions. ShareFile requires SAML assertions to include a NameID in the format address. Workflow Figure 20. ShareFile SAML 2.0 Workflow 1. Client requests from sharefile.com 2. Client discovers identity provider 3. Client is redirected via an HTTPS 302 redirect to identity com/ idroot with SAML request 4. Client requests identity 5. Identity provider authenticates the user and redirects client to Assertion Consumer with SAML response 6. Client posts SAML response to the Assertion Consumer sharefile.com/saml/acs 7. Assertion Consumer Service validates SAML response and authenticates the user if successful ShareFile sets a session cookie and redirects Client to sharefile.com 8. Client requests 9. Access to granted. End user defaults to personal folder 36

37 Security and benefits User passwords never cross the firewall, since user authentication occurs inside of the firewall and multiple web application passwords are no longer required. Web applications with no passwords are virtually impossible to hack, as the user must authenticate against an enterprise-class Identity Provider first, which can include strong authentication mechanisms. Service Provider (SP)-initiated SAML SSO provides access to web apps for users outside of the firewall. If an outside user requests access to a web application, the SP can automatically redirect the user to an authentication portal located at the Identity Provider. After authenticating, the user is granted access to the application, while their login and password remains locked safely inside the firewall. Centralized federation provides a single point of web application access, control and auditing, which has security, risk and compliance benefits. The ability to offer secure, scalable, standards-based Internet SSO to customers, either as a value-added service, a competitive differentiator, or to satisfy customer demands. Ability to federate with other service providers, sharing user identity in order to deliver seamless, transparent, value-added services without requiring an additional login. Additional resources These additional resources can be used to get more information on ShareFile SAML configuration. 1. Configure Single Sign-on for SAML-Based Federation using ADFS 2. Configure Single Sign-on for SAML-Based Federation using Ping Federate 3. Configure Single Sign-on for SAML-Based Federation using CA SiteMinder 4. Configure Single Sign-on for SAML-Based Federation using OKTA 37

38 White Paper OAuth Overview OAuth is an open protocol to allow secure authorization in a simple and standard method from web, mobile and desktop applications. ShareFile supports the OAuth 2.0 framework which enables applications like the ShareFile mobile, sync, and Outlook Plug-In to obtain limited access to an HTTP service like ShareFile. com. The great thing about OAuth is that it uses access tokens to provide authentication protecting the end-user s account credentials. The following ShareFile clients support OAuth: iphone and ipad With the exception of the MDX-wrapped versions of this client. Those will ask Worx Home for a SAML token during every login attempt Android With the exception of the MDX-wrapped versions of this client. Those will ask Worx Home for a SAML token during every login attempt Windows Phone 8 Windows 8 Modern App ShareFile Sync for Windows and ShareFile Sync for MAC Outlook Plug-In Workflows Web authentication ShareFile credentials Below is a graphical representation of how the ios mobile client exchanges a user s credentials with an OAuth token. Please refer to section for the definitions of specific terms used in the following workflow. In most scenarios our latest mobile apps will use the Web authentication flow for authenticating the exception for mobile is the MDX builds of ios and Android get a SAML token directly from Worx Home and authenticates without OAuth. 38

39 Figure 21. IOS mobile client web authentication flow using ShareFile credentials 1. The first step in the request of an OAuth token will be either a GET or POST request with the following parameters: response_type Needed to determine whether the endpoint returns an authorization code. For web applications (like ShareFile.com) the value of code is used. client_id This is hard coded in the code of the mobile client. redirect_uri An HTTPS URI or custom URL scheme where the response will be redirected. This is also hardcoded into the mobile client and gets set when the mobile client is initially installed on the mobile device. 2. Next in the sequence will be calls for account discovery. This is when a user enters their ShareFile credentials and subdomain. 3. Once the client has finished account discovery an HTTP 302 is sent to the client with the redirecturi and the following parameters: code authorization code returned from ShareFile expires_in the amount of time the authorization code is valid for subdomain the user s subdomain from account discovery appcp the web application control plane (ShareFile.com etc) apicp the API control plane for the user 4. Next in the sequence will be the POST request sent to subdomain.appcp/oauth/token with the following parameters found in our API documentation: Header: Content-Type: application/x-www-form-urlencoded Content: grant_type authorization_code (this has to be authorization_code.) code the authorization code received in the previous step client_id comes from the mobile client code client_secret this is a client specific secret hardcoded into the software An example request in curl looks like: curl \ -d grant_ type=authorization_ code&code={your_code}&client_id={your_client_ id}&client_secret={your_client_ secret} \ -X POST 39

40 5. If successful the client will receive an HTTP 200 response with a JSON encoded object with the following data: access_token The access token. refresh_token The refresh token. token_type The token type. apicp The user s ShareFile API control plane, i.e. sharefile.com for the above example. appcp The user s ShareFile account control plane, i.e. for the above example. subdomain The user s ShareFile subdomain, i.e. if they access their ShareFile account through this value would return mycompany. Some username / password combinations may be active on multiple accounts. The user would need to choose an account in this case. expires_in The expiration time in seconds. A sample OAuth token would look like this: Figure 22. A sample OAuth token. 40

41 You ll notice that the response includes an access_token and a refresh_token. Access_ tokens are designed to expire in 8 hours and can be revoked at any time by the ShareFile administrator. Refresh_tokens are designed to have a lifetime assigned to them after which they expire and force re-authentication. The default lifetime for the refresh_token is set to never expire but can be changed by the ShareFile administrator to 1, 7 or 30 days, this OAuth Lifetime setting is located in your ShareFile account on the Admin Advanced Preferences Password, Login and Security Policy page and ShareFile support can set a custom timeframe if one is needed. These tokens can also be revoked at any time by the ShareFile administrator and if an employee leaves the company, disabling or deleting their account in ShareFile will automatically revoke all of their tokens and break their access to ShareFile. The way that the tokens work is as follows. When you configure your ShareFile account on a mobile client the client checks the Device Security configuration and if Automatic Login is enabled the client will store the access and refresh tokens on the device. This makes opening and using the ShareFile client much easier. If Automatic Login is disabled the user will be prompted with their address and password every time they use the ShareFile client. What needs to be stressed here is that we are not storing user credentials in the client we are storing access and refresh tokens that are linked to the user s credentials. Anytime a user opens the ShareFile application the application checks to see whether the access_token has expired. If it hasn t expired the access_token is used to authenticate the user to ShareFile and the user is presented with his or her files and folders. If the access_ token has expired, an example of this would be the user hasn t opened the application in less than 8 hours, the refresh_token is used to refresh the access_token and restarts the 8 hour expiration clock. The user doesn t know this is happening and authentication happens instantaneously bringing the user to his or her files and folders. Parameter definitions Field access_token refresh_token token_type apicp appcp subdomain expires_in Description Short lived token presented to ShareFile to obtain an authid. Long lived token used to acquire new access token. Token type typically will be bearer. API Control Plane for the user. Control Plane for the web app (sharefile.com, securevdr.com, etc.). Subdomain for the user s account. Lifetime of the access_token in seconds. 41

42 Web authentication SAML The workflow for the IOS and Android mobile client using SAML is very similar to the above workflow with the exception of the redirection and authentication with the SAML IdP. Figure 24. Mobile client web authentication flow using SAML. Desktop apps Our desktop apps that support OAuth (Desktop Sync and Outlook Plug-in) will only do the account discovery part of the web authentication natively. If the user can login using their ShareFile address/password the desktop app will use the Password Authentication flow in Figure 23 below. If the customer uses an IdP that can do some sort of integrated authentication the desktop app will natively capture the SAML token and use the SAML Authentication Native flow in Figure 24 for exchanging the SAML token for OAuth token. And finally, if the customer uses forms authentication the application will switch to the Web authentication SAML flow in Figure 25 and provide the username and subdomain, auto- advancing the flow to the IdP and bypassing all calls for account discovery. Password authentication ShareFile credentials Figure 25. Password Authentication flow for desktop apps using ShareFile credentials 42

StorageZones Controller 3.4

StorageZones Controller 3.4 StorageZones Controller 3.4 Mar 09, 2016 For a link to documentation for the most current release, see StorageZones Controller. To download the latest version, see https://www.citrix.com/downloads/sharefile/.

More information

StorageZones Controller 3.3

StorageZones Controller 3.3 StorageZones Controller 3.3 Mar 09, 2016 For a link to documentation for the most current release, see StorageZones Controller. To download the latest version, see https://www.citrix.com/downloads/sharefile/.

More information

ShareFile Technical Presentation

ShareFile Technical Presentation ShareFile Technical Presentation Joerg Vosse Senior Systems Engineer - Citrix ShareFile CEE joerg.vosse@citrix.com ShareFile Enterprise Architecture Overview ShareFile Document Cloud ShareFile.com ShareFile.eu

More information

Citrix ShareFile Share, store, sync, and secure data on any device, anywhere

Citrix ShareFile Share, store, sync, and secure data on any device, anywhere Citrix ShareFile Share, store, sync, and secure data on any device, anywhere Data Sheet ShareFile is a secure, enterprise data sync and sharing service with flexible storage options that allows IT to mobilize

More information

StorageZones Controller 3.1

StorageZones Controller 3.1 StorageZones Controller 3.1 Jun 05, 2015 For a link to documentation for the most current release, see StorageZones Controller. To download the latest version, see https://www.citrix.com/downloads/sharefile/.

More information

StorageZones Controller 3

StorageZones Controller 3 StorageZones Controller 3 Jun 05, 2015 For a link to documentation for the most current release, see StorageZones Controller. To download the latest version, see https://www.citrix.com/downloads/sharefile/.

More information

Introduction. The Safe-T Solution

Introduction. The Safe-T Solution Secure Application Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Capabilities 4 Benefits 5 Feature List 6 6 Introduction As the world becomes much more digital and global,

More information

StorageZones Controller 4.0

StorageZones Controller 4.0 StorageZones Controller 4.0 Apr 05, 2017 For a link to documentation for the most current release, see StorageZones Controller. To download the latest version, see https://www.citrix.com/downloads/sharefile/.

More information

How to Access Protected Health Information from Anywhere and Stay Compliant

How to Access Protected Health Information from Anywhere and Stay Compliant How to Access Protected Health Information from Anywhere and Stay Compliant Secure, HIPAA-compliant file sharing & data storage with mobile data access Safeguard protected health information (PHI), support

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

Citrix ShareFile Enterprise: a technical overview citrix.com

Citrix ShareFile Enterprise: a technical overview citrix.com Citrix ShareFile Enterprise: a technical overview White Paper Citrix ShareFile Enterprise: a technical overview 2 The role of IT organizations is changing rapidly as the forces of consumerization pose

More information

StorageZones Controller 2.1

StorageZones Controller 2.1 StorageZones Controller 2.1 2014-12-07 04:29:29 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents StorageZones Controller 2.1... 3 StorageZones Controller

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.

Avanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved. Avanan for G Suite Technical Overview Contents Intro 1 How Avanan Works 2 Email Security for Gmail 3 Data Security for Google Drive 4 Policy Automation 5 Workflows and Notifications 6 Authentication 7

More information

Welcome! Securely Sync, Store & Share with Citrix ShareFile

Welcome! Securely Sync, Store & Share with Citrix ShareFile Welcome! Securely Sync, Store & Share with Citrix ShareFile Chris Riley System Source criley@syssrc.com Dennis Kloster System Source dkloster@syssrc.com Charlie Brinson Citrix charlie.brinson@citrix.com

More information

The Nasuni Security Model

The Nasuni Security Model White Paper Nasuni enterprise file services ensures unstructured data security and privacy, enabling IT organizations to safely leverage cloud storage while meeting stringent governance and compliance

More information

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often

More information

Single Sign-On. Introduction

Single Sign-On. Introduction Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

Datasheet. Only Workspaces delivers the features users want and the control that IT needs. Datasheet Secure SECURE Enterprise ENTERPRISE File FILE Sync, SYNC, Sharing SHARING and AND Content CONTENT Collaboration COLLABORATION BlackBerry Workspaces makes enterprises more mobile and collaborative,

More information

Augmenting security and management of. Office 365 with Citrix XenMobile

Augmenting security and management of. Office 365 with Citrix XenMobile Office 365 with Citrix XenMobile Augmenting security and management of Office 365 with Citrix XenMobile There are quite a few reasons why Microsoft Office 365 is so popular with enterprise customers. Citrix.com

More information

Enterprise file sync and share using Citrix ShareFile and IBM Storwize V7000 Unified system

Enterprise file sync and share using Citrix ShareFile and IBM Storwize V7000 Unified system Enterprise file sync and share using Citrix ShareFile and IBM Storwize V7000 Unified system A technical report Sandeep Zende IBM Systems ISV Enablement January 2016 Table of contents Abstract... 1 Scope...

More information

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations

More information

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON

SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON White Paper SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON Abstract This white paper explains the benefits to the extended enterprise of the on-premise, online file sharing storage

More information

Cirius Secure Messaging Single Sign-On

Cirius Secure Messaging Single Sign-On Cirius Secure Messaging seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Cloud Security Whitepaper

Cloud Security Whitepaper Cloud Security Whitepaper Sep, 2018 1. Product Overview 3 2. Personally identifiable information (PII) 3 Using Lookback without saving any PII 3 3. Security and privacy policy 4 4. Personnel security 4

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

Evaluating Encryption Products

Evaluating  Encryption Products Evaluating Email Encryption Products A Comparison of Virtru and Zix Importance of Email Encryption Most modern email providers, such as Google and Microsoft, offer excellent default security options, but

More information

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1 VMware Workspace ONE Quick Configuration Guide VMware AirWatch 9.1 A P R I L 2 0 1 7 V 2 Revision Table The following table lists revisions to this guide since the April 2017 release Date April 2017 June

More information

Cloud FastPath: Highly Secure Data Transfer

Cloud FastPath: Highly Secure Data Transfer Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance

More information

Secure communications simplified

Secure communications simplified Secure communications simplified Cirius is a powerful, secure, cloud-based communications and information management solution that enables regulated and non-regulated organizations to effectively protect,

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Windows VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

1Y0-371 Q&As. Designing, Deploying and Managing Citrix XenMobile 10 Enterprise Solutions. Pass home 1Y0-371 Exam with 100% Guarantee

1Y0-371 Q&As. Designing, Deploying and Managing Citrix XenMobile 10 Enterprise Solutions. Pass home 1Y0-371 Exam with 100% Guarantee 1Y0371 Q&As Designing, Deploying and Managing Citrix XenMobile 10 Enterprise Solutions Pass home 1Y0371 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing

More information

Highly scalable enterprise file sync and share using Citrix ShareFile and IBM Spectrum Scale

Highly scalable enterprise file sync and share using Citrix ShareFile and IBM Spectrum Scale Highly scalable enterprise file sync and share using Citrix ShareFile and IBM Spectrum Scale A technical report Sandeep Zende IBM Systems ISV Enablement February 2016 Table of contents Abstract... 1 Scope...

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Single Sign-On. Introduction. Feature Sheet

Single Sign-On. Introduction. Feature Sheet Feature Sheet Single Sign-On Introduction CipherPost Pro seamlessly integrates into your enterprise single sign-on (SSO) to give your users total email security and an extra set of robust communications

More information

Virtru Microsoft Protection

Virtru Microsoft  Protection Virtru Microsoft Email Protection Seamless Experience, Automatic Protection, Persistent Control Encrypt Outlook and OWA on the client-side with the flip of a switch Track and control access to emails and

More information

Security in Bomgar Remote Support

Security in Bomgar Remote Support Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

BlackBerry Workspaces: Security Architecture. White Paper

BlackBerry Workspaces: Security Architecture. White Paper BlackBerry Workspaces: Security Architecture White Paper Table of Contents Introduction 3 Our Philosophy 3 Key Features 4 Document Control and Tracking 4 File Control 4 File Tracking 5 High Level System

More information

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3 Deploying VMware Identity Manager in the DMZ SEPT 2018 VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

Security Information & Policies

Security Information & Policies Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER

More information

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Google Cloud Platform: Customer Responsibility Matrix. December 2018 Google Cloud Platform: Customer Responsibility Matrix December 2018 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect

More information

Dooblo SurveyToGo: Security Overview

Dooblo SurveyToGo: Security Overview Dooblo SurveyToGo: Security Overview November, 2013 Written by: Dooblo Page 1 of 11 1 Table of Contents 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 PURPOSE... 3 2 PHYSICAL DATA CENTER SECURITY... 4 2.1 OVERVIEW...

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Security Guide Zoom Video Communications Inc.

Security Guide Zoom Video Communications Inc. Zoom unifies cloud video conferencing, simple online meetings, group messaging, and a softwaredefined conference room solution into one easy-to-use platform. Zoom offers the best video, audio, and wireless

More information

VMware AirWatch Content Gateway Guide for Linux For Linux

VMware AirWatch Content Gateway Guide for Linux For Linux VMware AirWatch Content Gateway Guide for Linux For Linux Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

WHITEPAPER. Security overview. podio.com

WHITEPAPER. Security overview. podio.com WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features

More information

Cirius Secure Messaging Enterprise Dedicated Cloud

Cirius Secure Messaging Enterprise Dedicated Cloud Secure messaging and message control that is flexible to data jurisdiction, integrates rapidly into Office 365 and Outlook, and supports regulatory compliance. Enterprise organizations are recognizing

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions. Version: Demo

Vendor: Citrix. Exam Code: 1Y Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions. Version: Demo Vendor: Citrix Exam Code: 1Y0-370 Exam Name: Designing, Deploying and Managing Citrix XenMobile Solutions Version: Demo QUESTION NO: 1 Which connection type is used when WorxWeb for ios is configured to

More information

ncrypted Cloud works on desktops and laptop computers, mobile devices, and the web.

ncrypted Cloud works on desktops and laptop computers, mobile devices, and the web. OS X User Manual Welcome to ncrypted Cloud! ncrypted Cloud is a Security Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the

More information

Security in the Privileged Remote Access Appliance

Security in the Privileged Remote Access Appliance Security in the Privileged Remote Access Appliance 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

Colligo Briefcase. for Good Technology. Administrator Guide

Colligo Briefcase. for Good Technology. Administrator Guide for Good Technology Administrator Guide Contents Introduction... 2 Target Audience... 2 Overview... 2 Key Features... 2 Platforms Supported... 2 SharePoint Security & Privileges... 3 for Good Technology...

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

Administering Jive Mobile Apps for ios and Android

Administering Jive Mobile Apps for ios and Android Administering Jive Mobile Apps for ios and Android TOC 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios...3 Custom App Wrapping for ios...3 Authentication with Mobile

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service.

Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service. Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service. Citrix.com Data Governance For up-to-date information visit: This section

More information

VMware AirWatch Content Gateway Guide For Linux

VMware AirWatch Content Gateway Guide For Linux VMware AirWatch Content Gateway Guide For Linux AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

SECURE DATA EXCHANGE

SECURE DATA EXCHANGE POLICY-DRIVEN SOLUTIONS FOR SECURE DATA EXCHANGE Sending and receiving data is a fundamental part of daily business for nearly every organization. Companies need to share financial transaction details,

More information

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever Hybrid Cloud is the new normal. % plan to migrate >50% of

More information

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 Table of Contents Introduction to Horizon Cloud with Manager.... 3 Benefits of Integration.... 3 Single Sign-On....3

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

Maximize your move to Microsoft in the cloud

Maximize your move to Microsoft in the cloud Citrix and Microsoft 365: Maximize your move to Microsoft in the cloud 3 reasons to manage Office 365 with Citrix Workspace Pg. 2 Pg. 4 Citrix.com e-book Maximize your Citrix Workspace 1 Content Introduction...3

More information

CipherPost Pro. Secure communications simplified. Feature Sheet

CipherPost Pro. Secure communications simplified. Feature Sheet Feature Sheet CipherPost Pro Secure communications simplified CipherPost Pro is a powerful, secure, cloud-based communications and information management solution that enables regulated and non-regulated

More information

APPLICATION & INFRASTRUCTURE SECURITY CONTROLS

APPLICATION & INFRASTRUCTURE SECURITY CONTROLS APPLICATION & INFRASTRUCTURE SECURITY CONTROLS ON THE KINVEY PLATFORM APPLICATION KINVEY PLATFORM SERVICES END-TO-END APPLICATION & INFRASTRUCTURE SERCURITY CONTROLS ENTERPRISE DATA & IDENTITY 2015 Kinvey,

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

CipherPost Pro Enterprise Dedicated Cloud

CipherPost Pro Enterprise Dedicated Cloud Feature Sheet CipherPost Pro Enterprise Dedicated Cloud Secure messaging and message control that is flexible to data jurisdiction, integrates rapidly into Office 365 and Outlook and supports regulatory

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

MigrationWiz Security Overview

MigrationWiz Security Overview MigrationWiz Security Overview Table of Contents Introduction... 2 Overview... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Data Security and Handling... 4 Database

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Watson Developer Cloud Security Overview

Watson Developer Cloud Security Overview Watson Developer Cloud Security Overview Introduction This document provides a high-level overview of the measures and safeguards that IBM implements to protect and separate data between customers for

More information

Xerox Audio Documents App

Xerox Audio Documents App Xerox Audio Documents App Additional information, if needed, on one or more lines Month 00, 0000 Information Assurance Disclosure 2018 Xerox Corporation. All rights reserved. Xerox, Xerox,

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

CipherCloud CASB+ Connector for ServiceNow

CipherCloud CASB+ Connector for ServiceNow ServiceNow CASB+ Connector CipherCloud CASB+ Connector for ServiceNow The CipherCloud CASB+ Connector for ServiceNow enables the full suite of CipherCloud CASB+ capabilities, in addition to field-level

More information

Providing an Enterprise File Share and Sync Solution for

Providing an Enterprise File Share and Sync Solution for Storage Made Easy Providing an Enterprise File Share and Sync Solution for Microsoft Azure Storage Storage Made Easy Enterprise File Share and Sync Solution for Microsoft Azure The Storage Made Easy (SME)

More information

Administrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration.

Administrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. Administrator Guide Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. The information and content in this document is provided for informational purposes

More information

Google Cloud Platform: Customer Responsibility Matrix. April 2017

Google Cloud Platform: Customer Responsibility Matrix. April 2017 Google Cloud Platform: Customer Responsibility Matrix April 2017 Introduction 3 Definitions 4 PCI DSS Responsibility Matrix 5 Requirement 1 : Install and Maintain a Firewall Configuration to Protect Cardholder

More information

XenApp, XenDesktop and XenMobile Integration

XenApp, XenDesktop and XenMobile Integration XA, XD and XM Integration XenApp, XenDesktop and XenMobile Integration for a Comprehensive Mobility and Digital Workspace Solution Citrix.com 1 Desktop and application virtualization have enhanced mobility

More information

VMware Horizon Workspace Security Features WHITE PAPER

VMware Horizon Workspace Security Features WHITE PAPER VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon

More information

CloudLink SecureVM. Administration Guide. Version 4.0 P/N REV 01

CloudLink SecureVM. Administration Guide. Version 4.0 P/N REV 01 CloudLink SecureVM Version 4.0 Administration Guide P/N 302-002-056 REV 01 Copyright 2015 EMC Corporation. All rights reserved. Published June 2015 EMC believes the information in this publication is accurate

More information

Data Encryption with ServiceNow

Data Encryption with ServiceNow Data Encryption with ServiceNow Encryption Technologies for Data Protection on the ServiceNow Platform Table of Contents Executive summary... 3 Edge Encryption...4 Common use cases... 5 Perspectives on

More information

Administration Guide. BlackBerry Workspaces. Version 5.6

Administration Guide. BlackBerry Workspaces. Version 5.6 Administration Guide BlackBerry Workspaces Version 5.6 Published: 2017-06-21 SWD-20170621110833084 Contents Introducing the BlackBerry Workspaces administration console... 8 Configuring and managing BlackBerry

More information

G/On. G/On is available for Windows, MacOS and Linux (selected distributions).

G/On. G/On is available for Windows, MacOS and Linux (selected distributions). G/On Soliton G/On is a remote access solution which establishes connections between a remote device and application servers inside an organisations network. A secure gateway is used to separate the remote

More information

Migrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server

Migrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server Parallels Remote Application Server Migrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server Contents 1. Introduction a. Why Should You Migrate from Citrix to Parallels RAS b. Overview

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation

More information

vshield Administration Guide

vshield Administration Guide vshield Manager 5.1 vshield App 5.1 vshield Edge 5.1 vshield Endpoint 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

About This Document 3. Overview 3. System Requirements 3. Installation & Setup 4

About This Document 3. Overview 3. System Requirements 3. Installation & Setup 4 About This Document 3 Overview 3 System Requirements 3 Installation & Setup 4 Step By Step Instructions 5 1. Login to Admin Console 6 2. Show Node Structure 7 3. Create SSO Node 8 4. Create SAML IdP 10

More information

Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios

Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios Overview Citrix XenApp, XenDesktop and NetScaler are commonly used in the creation of Payment Card Industry (PCI), Data Security

More information

Security and Compliance at Mavenlink

Security and Compliance at Mavenlink Security and Compliance at Mavenlink Table of Contents Introduction....3 Application Security....4....4....5 Infrastructure Security....8....8....8....9 Data Security.... 10....10....10 Infrastructure

More information

Support for the HIPAA Security Rule

Support for the HIPAA Security Rule white paper Support for the HIPAA Security Rule PowerScribe 360 Reporting v1.1 healthcare 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

DATACENTER MANAGEMENT Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz

DATACENTER MANAGEMENT Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz Goodbye ADFS, Hello Modern Authentication! Osman Akagunduz Osman Akagunduz Consultant @ InSpark Microsoft Country Partner Of The Year Twitter: @Osman_Akagunduz What s in this session The role of Azure

More information