Secure and Streamline your File Transfers with the new GoAnywhere 5.4 Release

Size: px
Start display at page:

Download "Secure and Streamline your File Transfers with the new GoAnywhere 5.4 Release"

Transcription

1 Secure and Streamline your File Transfers with the new GoAnywhere 5.4 Release Presented by Linoma Software

2 Introductions Bob Luebbe, CISSP Chief Architect Steve Luebbe Director of Engineering

3 Agenda File Transfer Challenges What is Managed File Transfer (MFT) and its benefits: Protects file transfers (e.g. SFTP, FTPS, AS2, HTTPS, PGP, etc.) Automates batch transfers without scripting Allows sharing files between users with end-to-end encryption Guarantees delivery with auto-resume and integrity checks Sends alerts on failures or success Generates detailed audit trails on all file transfer activity Meets compliance requirements for HIPAA, PCI DSS, SOX and GLBA Introduction to GoAnywhere MFT 5.4 Live demo Existing customers can learn in-depth details on the new features in 5.4 at: Q&A

4 Linoma Software Background Founded in based in Nebraska Growing and financially stable Active R&D with focus on Data Automation and Security Responsive technical support Phone, Web, Almost 99% of customers renew their product maintenance each year Division of with 10,000 customers and over 500 employees around the world Member of PCI Security Standards Council

5 Workload Automation Business Process Automation Network Monitoring Message & Event Monitoring Performance Monitoring Data Backup Management Enterprise Data Access Executive Dashboards & Reporting Mobile Data Access Data Warehousing Risk Assessment Anti-virus Security Event Monitoring Identity & Access Management Compliance Reporting Professional Security Services Process & Workflow Management Document & Image Management Forms Management Electronic Forms Document Distribution Signature Capture Remote Monitoring & Management Managed File Transfers Database Encryption

6 File Transfer Challenges HOST= PORT= USER= user1 PASSWD= s3cr3t FILE= user_log.log LDIR= /home/test Unsecure Manual Processes echo Running FTP transfer from $HOST ftp n $HOST $PORT <<END_SCRIPT quote USER $USER quote PASS $PASSWD passive lcd $LDIR get $FILE quit END_SCRIPT Legacy Scripts???? Unsecure PC Tools No Audit Trails USB Decentralized Unsecured No Alerts Limited Controls

7 PC Tools Problems (1 of 2) PC transfers are often manual, consuming valuable employee time Manual processes are prone to errors: o Employee may accidently download/upload the wrong file o Forgot to encrypt the file o Sent the file to wrong place! Internet

8 PC Tools Problems (2 of 2) What happens if the user is gone for the day? Sensitive files are more vulnerable on PCs and laptops PC tools save money or do they? Limited (or no) audit trails Compliance issues Internet

9 FTP Scripts Programmers have traditionally written scripts to perform file transfers Passwords are often stored in the scripts (in the clear) Scripts need to be maintained by Programmers: - When host names and IP addresses change - When user ids and passwords change - When file names change Can become very complex and unmanageable, especially as you add more trading partners No auto-retry or auto-resume capabilities Difficult to know when it fails HOST= PORT= USER= user1 PASSWD= s3cr3t FILE= user_log.log LDIR= /home/test echo Running FTP transfer from $HOST ftp n $HOST $PORT <<END_SCRIPT quote USER $USER quote PASS $PASSWD passive lcd $LDIR get $FILE quit END_SCRIPT

10 What is Managed File Transfer

11 Managed File Transfer Top 3 Things to look for when evaluating a MFT solution Easy To Use Centralized Security and Control Auditing and Alerts

12 GoAnywhere MFT

13 GoAnywhere MFT

14 GoAnywhere MFT Advantages (1 of 2) Multiplatform - Installs to most operating systems including IBM i, Windows, Linux, AIX, UNIX, Amazon and Azure. Batch and Ad Hoc - Allows organizations to perform both scheduled batch transfers and user-to-user file sharing. Auditing - Generates detailed audit logs of all file activity including batch, ad hoc, inbound and outbound transfers. Interface - Provides a browser-based interface for all administration and monitoring. No desktop client is needed. Inbound Services - Allows inbound connections from trading partners over SFTP, FTP/S, HTTPS and AS2 (Drummond Certified). Key Management - Provides integrated tools for creating and managing Open PGP keys, SSH keys and SSL certificates. Encryption - Protects files at rest and in-motion with FIPS validated AES-256 encryption. Admin Controls Implements role-based administration, security domains and granular permission controls.

15 GoAnywhere MFT Advantages (2 of 2) Private Cloud Eliminates the need for public file sharing services like Dropbox, Box, Google Drive and OneDrive. Customer Portal Allows organizations to provide a custom branded web interface for secure file transfers over HTTPS. Secure Mail Allows employees to send large or confidential files through secure links. Includes an Outlook plugin. Two-Factor - Authenticates with user credentials and RSA SecurID, RADIUS, SSH keys or X.509 certificates. DMZ Gateway - Keeps services and files in the private network (out of the DMZ) without requiring inbound ports. Job Control - Provides extensive job management features including job queues, run priorities and clustering. File Transfer Acceleration - Enables high speed transmission of large files between systems using UDP channels. Clustering - Provides high availability and load balancing by connecting two or more instances together in a cluster

16 GoAnywhere MFT 5.4 New Features Web Services integration with both SOAP and REST support Secure Forms enhancements Six new screen components Enhanced Project Designer to create workflows. More drag-n-drop features. Includes 10 new functions. JSON format Read & Write tasks Several new Reports including a Custom Report task More Administrator features including AD and LDAP synchronization Web Client enhancements including custom branding per port

17 Security Features Helps meet compliance for PCI-DSS, HIPAA, FIPS 140-2, Sarbanes Oxley, GLBA and State Privacy Laws Secure Protocols SFTP FTP over SSH FTPS FTP over SSL/TLS SCP Secure Copy HTTPS HTTP over SSL Open PGP / GPG ZIP with password protection Encrypted (SMIME) AS2 AES encryption (key lengths of 128, 192, 256) NIST standard Two-factor Authentication SAML RADIUS (RSA SecurID) SSH Keys X.509 Certificates Key Management tools for Open PGP Keys, SSL X.509 certificates and SSH Keys SSL protected console

18 Automated Workflow Examples - Outgoing

19 Automated Workflow Examples - Incoming

20 GoAnywhere Administrator Browser-based Dashboard Intelligent Gadgets Drag-n-Drop Latest HTML5 Technology

21 Integrated Scheduler Flexible scheduling: One Time Minutely Hourly Set job priorities, job queue, etc. Custom holiday calendars Skip holidays or run the business day before or after Auto-retry on failures Daily Weekly Monthly notifications for success and failures Pass in variables to Projects Optionally, use your own scheduler

22 Commands and APIs Run workflows in GoAnywhere using the provided commands and APIs Available for Windows, Linux, IBM i (iseries) and UNIX SOAP and REST enabled Requests sent over HTTP/s Override variables Run interactive or batch Trap for errors Commands and APIs are provided at no additional charge

23 Examples to Run a Project from CL Monitor for message IDs Any errors are placed in Job Log Retrieve any errors with RCVMSG command RPG procedures are also available to run a Project

24 Command Line Examples to Run a Project Windows Example: gacmd.exe server -user projectmanager -password ******** -command runproject -Project /Payroll/SendDirectDeposit -variables filename deposit.csv folderpath /inbound/deposit Linux Example: sh gacmd -server -user projectmanager -password ******** -command runproject -Project /Orders/SendPurchaseOrders -variables VendorNumber Status Open APIs are also provided for Java and.net

25 Project Logging (Audit Trails) Job Log per execution of Project Log Level can be defined on a project, module or a task Log Level controls what should be logged: SILENT INFO VERBOSE DEBUG Search Completed Jobs Date/time range User Project Name Job Number Status

26 Example Job Log 1/21/15 9:38:07AM INFO Start Date and Time: 1/21/15 9:38:07 AM 1/21/15 9:38:07AM INFO Job Number: /21/15 9:38:07AM INFO Project Name: /Demo/DB to Excel to Zip and FTP 1/21/15 9:38:07AM INFO Submitted By: administrator 1/21/15 9:38:07AM INFO Executing task 'Retrieve Records 1/21/15 9:38:07AM INFO Executing statement select * from LIBRARY.EMP 1/21/15 9:38:08AM INFO Query execution produced a rowset 1/21/15 9:38:08AM INFO Finished task 'Retrieve Records 1/21/15 9:38:08AM INFO Executing task 'Create Excel File 1/21/15 9:38:09AM INFO 8 record(s) were written 1/21/15 9:38:09AM INFO Finished task 'Create Excel File' 1/21/15 9:38:09AM INFO Executing task 'Create ZIP File 1/21/15 9:38:09AM INFO Compressing file '/files/employees.xls 1/21/15 9:38:09AM INFO Number of files compressed: 1 1/21/15 9:38:09AM INFO Finished task 'Create ZIP File 1/21/15 9:38:09AM INFO Executing task 'FTP the ZIP File 1/21/15 9:38:09AM INFO Connecting to ' ' at port '21' 1/21/15 9:38:10AM INFO Executing sub-task 'put 1/21/15 9:38:10AM INFO Setting the data type to AUTO 1/21/15 9:38:10AM INFO Uploading /files/employees.zip 1/21/15 9:38:12AM INFO 1 file(s) were uploaded successfully 1/21/15 9:38:12AM INFO Finished sub-task 'put 1/21/15 9:38:12AM INFO Closed the FTP connection 1/21/15 9:38:12AM INFO Finished task 'FTP the ZIP File' 1/21/15 9:38:12AM INFO Finished module 'main 1/21/15 9:38:12AM INFO Finished project 'DB to Excel to Zip and FTP 1/21/15 9:38:12AM INFO End Date and Time: 1/21/15 9:38:12 AM

27 Inbound Services Allows your trading partners and employees to securely connect to your organization and easily retrieve or upload files. Supports transfer protocols of FTP, SFTP, SCP, FTPS, HTTPS and AS2 Provides a browser-based web client for simple file transfers Includes event triggers based on user-defined conditions Generates detailed audit logs and alert messages

28 Trading Partner Management Create Trading Partner accounts using Wizards, APIs, batch load or selfregistration Authenticate users against AD, LDAP, IBM i or database. SAML for Single Signon Grant individual permissions or adopt permissions from groups Restrict to FTP, SFTP, FTPS, HTTP/s, AS2 Restrict access to certain folders and permissions (e.g. upload, download, delete, rename, etc.) Restrict to certain IPs Set Time Limits

29 Web Client for Ad-Hoc File Transfers Provides your trading partners with browser-based access to your system for uploading and downloading files Rebrand with your company logo and privacy policy Full audit trails and event triggers

30 Audit Logs Audit logs are stored for every transaction (login, upload, download, rename, etc.) for all services Search using a wide variety of filter criteria View on-line or export to CSV

31 Development and Promotion Promote Project Workflows from Development to Production Also Promote Resources (connection properties), Trigger Definitions, Scheduler entries, Job Monitors and Web Users Projects/Resources can also be exported and imported

32 Reports Available Blacklisted IP Addresses Completed Jobs Completed Job Statistics Database Statistics Expiring Open PGP Keys Expiring SSL Certificates GoDrive Disk Usage Job Count Summary Secure Mail Activity Secure Mail Package Sizes Security Settings Audit Service Activity Summary Trigger Activity Web User Logins Web User Transfer Count Activity Web User Transfer Size Activity

33 Report Example

34 Security Audit Report Analyze your GoAnywhere product s security settings and determine if they comply with the Payment Card Industry Data Security Standards (PCI-DSS). For each security setting, the report will indicate if the setting meets the PCI-DSS standard using one of the following statuses: Pass - The setting meets the PCI-DSS requirement Fail - The setting does not meet the PCI-DSS requirement. Warning - Further research is required to ensure your system meets the specified requirement.

35 Security Audit Report Example

36 Secure Mail Files and messages are transferred over a secure HTTPS connection Your system keeps possession of the files (in encrypted form) until the recipient retrieves them (not hosted) No file size limits Recipients don t have to deal with keys or certificates (just click on the URL) Customizable templates (use your own logo, color schemes, fonts) Licensed as an add-on module for GoAnywhere MFT

37 Send Secure Mail from Outlook

38 Secure Mail Download Recipient downloads the file attachments securely Full Audit Trails every step is recorded

39 GoDrive Diagram

40 GoDrive Overview (1 of 2) Person-to-Person file sharing and collaboration On-premise storage of files Files are encrypted with AES-256 Set user disk quotas Assign roles/permissions at the folder and file level Full audit trails of all activity (uploads, downloads, sharing, etc.) No subscription fees

41 GoDrive Overview (2 of 2) File revisions and Trash bin Image thumbnails and media viewer Add and View Comments Synchronize with Windows and Mac desktops and laptops ios app for ipads and iphones Device management - Administrator can approve or reject devices, remote wipe

42 GoDrive Screen Example

43 GoDrive Mobile Apps ipad and iphone Android Selective Sync Intelligent caching File preview Offline access Encrypted at rest

44 Gateway Overview (1 of 2) No incoming ports are opened into the private (internal) network No sensitive files are stored in the DMZ User credentials are maintained/stored in the private network

45 Gateway Overview (2 of 2) Supports FTP/s, SFTP, SCP and HTTP/s file transfer protocols No special hardware components; software-only solution Installs to Windows, Linux, AIX, UNIX and Solaris operating systems

46 Clustering Two or more installations of GoAnywhere MFT can be in a cluster GoAnywhere Gateway can load balance inbound connections Project workloads are distributed horizontally across multiple systems Active-Active = Better high availability for mission critical environments All systems can be managed from a central interface No 3 rd party tools or software are needed

47 GoAnywhere Managed File Transfer

48 Installation Requirements Linux (32-bit and 64-bit): - Distributions Red Hat, SUSE, Ubuntu, CentOS (not inclusive) - Disk space 375 MB per product (not including user data) - Memory 512 MB minimum per product Windows (32-bit and 64-bit): - Operating System Windows 2000, 2003, 2008 R2, 2012 R2, XP, Vista, 7, 10 - Disk space 375 MB per product (not including user data) - Memory 512 MB minimum per product Virtualized Environments: IBM i (iseries): - Operating System V7R1 or higher - Disk space requirements 275 MB per product (not including user data) - Memory requirements 512 MB minimum per product - JRE 1.7 or later UNIX / AIX / Solaris / HP-UX: - Disk space requirements 250 MB per product (not including user data) - Memory requirements 512 MB minimum per product - JRE 1.7 or later

49 Contact Information Web site: Toll-free: Direct: (402) Fax: (402) Address: 103 South 14 th Street Ashland, NE USA Copyright

Presented by. GoAnywhere.com

Presented by. GoAnywhere.com Presented by Bob Luebbe Chief Architect Steve Luebbe Software Development Mgr. About Linoma Software File Transfer Challenges What is Managed File Transfer (MFT)? 10 Ways to Make File Transfers easier

More information

Presented by. GoAnywhere.com

Presented by. GoAnywhere.com Presented by Bob Luebbe, CISSP Chief Architect Steve Luebbe Software Development Manager About Linoma Software File Transfer Challenges What is Managed File Transfer (MFT) and its benefits Introduction

More information

GoAnywhere MFT System Architecture Guide. For High Availability, Scaling, and Performance

GoAnywhere MFT System Architecture Guide. For High Availability, Scaling, and Performance For High Availability, Scaling, and Performance Copyright 2016 Linoma Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

What s New in GoAnywhere MFT 5.6?

What s New in GoAnywhere MFT 5.6? What s New in GoAnywhere MFT 5.6? Introductions Bob Luebbe, CISSP Chief Architect Steve Luebbe Director of Engineering Agenda Introduction to GoAnywhere MFT 5.6 Overview of new features Live demo How to

More information

2018 GLOBALSCAPE TRAINING OVERVIEW

2018 GLOBALSCAPE TRAINING OVERVIEW 2018 GLOBALSCAPE TRAINING OVERVIEW TABLE OF CONTENTS COURSE... 3 EFT ESSENTIALS COURSE...4 EFT ADMINISTRATOR COURSE... 5 EFT ADMINISTRATOR COURSE (CONT.)... 6 EFT AUTOMATION COURSE... 7 EFT SECURITY COURSE...8

More information

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer INTRODUCTION Meeting HIPAA and HITECH security and compliance requirements is a formidable challenge.

More information

What s New in GoAnywhere MFT 5.7

What s New in GoAnywhere MFT 5.7 What s New in GoAnywhere MFT 5.7 Today s Agenda 1. 2. 3. 4. New features and enhancements in GoAnywhere MFT 5.7 Live demo! How to get started Q&A HelpSystems Corporate Overview. All rights reserved. Today

More information

SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING

SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING DATASHEET SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING If you re looking for a highly professional, no-nonsense FTP server, then you can t do much better

More information

FilesAnywhere Features List

FilesAnywhere Features List FilesAnywhere Feature List FilesAnywhere Page 1 of 9 Contents Basic Features... 3 Advanced Features... 7 Enterprise Features... 9 FilesAnywhere Page 2 of 9 Basic Features No File Size Limit: There is no

More information

Feature Express Enterprise Arcus. SSL/TLS - secure FTP communications Included Included Included

Feature Express Enterprise Arcus. SSL/TLS - secure FTP communications Included Included Included Protocols SSL/TLS - secure FTP communications SSL key manager - manage, import, export, and create SSL certificates SSL Config - specify ciphers and versions allowed (SSL v2, v3, and TLS v1) Checkpoint

More information

Get the Most Out of GoAnywhere: Achieving Cloud File Transfers and Integrations

Get the Most Out of GoAnywhere: Achieving Cloud File Transfers and Integrations Get the Most Out of GoAnywhere: Achieving Cloud File Transfers and Integrations Today s Presenter Dan Freeman, CISSP Senior Solutions Consultant HelpSystems Steve Luebbe Director of Development HelpSystems

More information

Version: 4.0. Quatrix Data Sheet. January 2018 Author: Maytech

Version: 4.0. Quatrix Data Sheet. January 2018 Author: Maytech Version: 4.0 Quatrix Data Sheet January 2018 Author: Maytech Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring

More information

Are You Avoiding These Top 10 File Transfer Risks?

Are You Avoiding These Top 10 File Transfer Risks? Are You Avoiding These Top 10 File Transfer Risks? 1. 2. 3. 4. Today s Agenda Introduction 10 Common File Transfer Risks Brief GoAnywhere MFT Overview Question & Answer HelpSystems Corporate Overview.

More information

CLEO VLTrader Made Simple Guide

CLEO VLTrader Made Simple Guide CLEO VLTrader Made Simple Guide Table of Contents Quick Reference... 3 Miscellaneous Technical Notes... 3 CLEO VLTrader at a Glance... 3 Introduction... 5 Application Page Layout... 5 Preconfigured Hosts...

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

MB Microsoft Dynamics CRM 2016 Online Deployment.

MB Microsoft Dynamics CRM 2016 Online Deployment. MB2-710 Microsoft Dynamics CRM 2016 Online Deployment Getting Started Overview CRM Online is a cloud-based offering of Microsoft Dynamics CRM The licensing is a subscription-based model with a monthly

More information

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business #1 Enterprise File Share, Sync, Backup and Mobile Access for Business Top 10 Benefits 1 2 Best ROI in the Industry 4 5 Secure Access Smart Drive files and comply with regulations. Share Securely Security

More information

SFTPPlus Client SFTPPlus Server 1.5.1

SFTPPlus Client SFTPPlus Server 1.5.1 SFTPPlus Client 1.5.1 SFTPPlus Server 1.5.1 Product Features & Benefits (Comparison Overview) The Old Exchange South Cadbury Yeovil Somerset BA22 7ET UK Copyright: Pro:Atria Limited 2009. Neither the whole

More information

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business

#1 Enterprise File Share, Sync, Backup and Mobile Access for Business #1 Enterprise File Share, Sync, Backup and Mobile Access for Business Top 10 Benefits 1 Best ROI in the Industry Lower cost, higher value, free unlimited partner accounts 2 4 Site Sandbox 7 The Best Return

More information

End User Manual. December 2014 V1.0

End User Manual. December 2014 V1.0 End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

WAM!NET Direct! SM. Service Description

WAM!NET Direct! SM. Service Description WAM!NET Direct! SM Service Description INTRODUCTION The Direct! Service is a subscription based content delivery service that provides customers with the ability to send, receive, and track digital files

More information

GLBA Compliance. with O365 Manager Plus.

GLBA Compliance. with O365 Manager Plus. GLBA Compliance with O365 Manager Plus www.o365managerplus.com About GLBA The Gramm-Leach-Bliley Act (GLB Act or GLBA) is also known as the Financial Modernization Act of 1999. It is a United States federal

More information

Don t just manage your documents. Mobilize them!

Don t just manage your documents. Mobilize them! Don t just manage your documents Mobilize them! Don t just manage your documents Mobilize them! A simple, secure way to transform how you control your documents across the Internet and in your office.

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

GRS Enterprise Synchronization Tool

GRS Enterprise Synchronization Tool GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table

More information

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing

More information

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed. Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple

More information

Sync User Guide. Powered by Axient Anchor

Sync User Guide. Powered by Axient Anchor Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7

More information

Secret Server Demo Outline

Secret Server Demo Outline Secret Server is a feature rich product that can be introduced to your prospects in many different ways. Below is a generic outline of several of the most important features that should be covered during

More information

NETWRIX GROUP POLICY CHANGE REPORTER

NETWRIX GROUP POLICY CHANGE REPORTER NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6

More information

Anchor User Guide. Presented by: Last Revised: August 07, 2017

Anchor User Guide. Presented by: Last Revised: August 07, 2017 Anchor User Guide Presented by: Last Revised: August 07, 2017 TABLE OF CONTENTS GETTING STARTED... 1 How to Log In to the Web Portal... 1 How to Manage Account Settings... 2 How to Configure Two-Step Authentication...

More information

Vendor: RSA. Exam Code: CASECURID01. Exam Name: RSA SecurID Certified Administrator 8.0 Exam. Version: Demo

Vendor: RSA. Exam Code: CASECURID01. Exam Name: RSA SecurID Certified Administrator 8.0 Exam. Version: Demo Vendor: RSA Exam Code: 050-80-CASECURID01 Exam Name: RSA SecurID Certified Administrator 8.0 Exam Version: Demo QUESTION NO: 1 RSA 050-80-CASECURID01 Exam Which of the following can cause the error message

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Axway SecureTransport

Axway SecureTransport Axway SecureTransport Enhanced Managed File Transfer Gateway For many organizations, years of adding one-off file-transfer connections to meet specific needs has created a complex environment that lacks

More information

GoAnywhere MFT Install Guide. Version 5.7.4

GoAnywhere MFT Install Guide. Version 5.7.4 GoAnywhere MFT Install Guide Version 5.7.4 Copyright Terms and Conditions The content in this document is protected by the Copyright Laws of the United States of America and other countries worldwide.

More information

Intelligent Enterprise Digital Asset Management

Intelligent Enterprise Digital Asset Management Intelligent Enterprise Digital Asset Management New Updated for Cumulus 11 Protect brand assets and increase productivity with Canto s award-winning DAM platform. Integrate and configure Cumulus to support

More information

Single Sign-On. Introduction

Single Sign-On. Introduction Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

SysAid Technical Presentation. Phone (Toll-Free US): Phone: +972 (3)

SysAid Technical Presentation.  Phone (Toll-Free US): Phone: +972 (3) SysAid Technical Presentation www.sysaid.com sales@sysaid.com Phone (Toll-Free US): 1-800-686-7047 Phone: +972 (3) 533-3675 SysAid Overview A Global ITSM Solution Provider Technology Built for You Customer-Driven

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure IT

More information

User Manual. Admin Report Kit for Exchange Server

User Manual. Admin Report Kit for Exchange Server User Manual Admin Report Kit for Exchange Server Table of Contents 1 About ARKES-Admin Report Kit for Exchange Server 1 1.1 System requirements 2 1.2 How to activate the software? 3 1.3 ARKES Reports Primer

More information

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide

TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide Software Release 8.1 March 2018 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

Sophos Mobile in Central

Sophos Mobile in Central startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical

More information

Getting Started with Commercial Services

Getting Started with Commercial Services Getting Started with Commercial Services USER GUIDE For informational purposes only, not considered an advertisement. WELCOME TO M&T BANK S COMMERCIAL SERVICES M&T Bank s Commercial Services system provides

More information

Features Comparison Sheet

Features Comparison Sheet ManageEngine Password Manager Pro Vs Thycotic Secret Server Features Comparison Sheet (As per information available on Thycotic Secret Server s website on March 23, 2018.) Feature ManageEngine Password

More information

Axway Activator Release Notes

Axway Activator Release Notes Axway Activator 6.0.0 Release Notes Document version: April 2018 Product version requirements New features and enhancements Known issues and limitations Documentation Support services Product version requirements

More information

Cirius Secure Messaging Single Sign-On

Cirius Secure Messaging Single Sign-On Cirius Secure Messaging seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

Release Notes Release (December 4, 2017)... 4 Release (November 27, 2017)... 5 Release

Release Notes Release (December 4, 2017)... 4 Release (November 27, 2017)... 5 Release Release Notes Release 2.1.4. 201712031143 (December 4, 2017)... 4 Release 2.1.4. 201711260843 (November 27, 2017)... 5 Release 2.1.4. 201711190811 (November 20, 2017)... 6 Release 2.1.4. 201711121228 (November

More information

BBVA Compass Spend Net Payables

BBVA Compass Spend Net Payables User Guide BBVA Compass Spend Net Payables User Guide Vault Services Table of Contents Introduction 2 Technical Requirements 2 Getting started 3 Sign In 3 General Navigation 4 Upload/Create Payment 5

More information

4 phases to understand owncloud

4 phases to understand owncloud 4 phases to understand owncloud Introduction Basic Features App Ecosystem Crossplatform Support Outline Introduction Basic Features App Ecosystem Crossplatform Support Introduction: Team Collaboration

More information

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical

More information

StreamSets Control Hub Installation Guide

StreamSets Control Hub Installation Guide StreamSets Control Hub Installation Guide Version 3.2.1 2018, StreamSets, Inc. All rights reserved. Table of Contents 2 Table of Contents Chapter 1: What's New...1 What's New in 3.2.1... 2 What's New in

More information

Alliance Key Manager A Solution Brief for Partners & Integrators

Alliance Key Manager A Solution Brief for Partners & Integrators Alliance Key Manager A Solution Brief for Partners & Integrators Key Management Enterprise Encryption Key Management This paper is designed to help technical managers, product managers, and developers

More information

Security in Bomgar Remote Support

Security in Bomgar Remote Support Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses... 5 Check your licenses...6

More information

Sophos Mobile SaaS startup guide. Product version: 7.1

Sophos Mobile SaaS startup guide. Product version: 7.1 Sophos Mobile SaaS startup guide Product version: 7.1 Contents 1 About this guide...4 2 What are the key steps?...5 3 Change your password...6 4 Change your login name...7 5 Activate SMC Advanced licenses...8

More information

HIPAA Compliance. with O365 Manager Plus.

HIPAA Compliance. with O365 Manager Plus. HIPAA Compliance with O365 Manager Plus www.o365managerplus.com About HIPAA HIPAA, the Health Insurance Portability and Accountability Act, sets the standard for protecting sensitive patient data. Any

More information

UiB 1. april 04. Sun Microsystems

UiB 1. april 04. Sun Microsystems UiB 1. april 04 hans.bue@sun.com Sun Microsystems Agenda Java Desktop System (JDS) StarOffice / OpenOffice Videre utvikling Java Enterprise System (JES) Konsept for fremtidens desktop 2 JDS Java Desktop

More information

Sophos Mobile. super administrator guide. product version: 8.6

Sophos Mobile. super administrator guide. product version: 8.6 Sophos Mobile super administrator guide product version: 8.6 Contents About this guide... 1 Document conventions... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer...

More information

VMware, SQL Server and Encrypting Private Data Townsend Security

VMware, SQL Server and Encrypting Private Data Townsend Security VMware, SQL Server and Encrypting Private Data Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 Today s Agenda! What s new from Microsoft?! Compliance, standards, and

More information

Despite a number of newer and more complex file transfer requirements, we sometimes lose track of the basic needs for managing file transfers.

Despite a number of newer and more complex file transfer requirements, we sometimes lose track of the basic needs for managing file transfers. GoAnywhere Director is a managed file transfer solution that manages basic file transfers and automates data movement, translation, encryption and compression processes. Despite a number of newer and more

More information

Single Sign-On. Introduction. Feature Sheet

Single Sign-On. Introduction. Feature Sheet Feature Sheet Single Sign-On Introduction CipherPost Pro seamlessly integrates into your enterprise single sign-on (SSO) to give your users total email security and an extra set of robust communications

More information

Vendor: Microsoft. Exam Code: MB Exam Name: Microsoft Dynamics CRM Online Deployment. Version: Demo

Vendor: Microsoft. Exam Code: MB Exam Name: Microsoft Dynamics CRM Online Deployment. Version: Demo Vendor: Microsoft Exam Code: MB2-715 Exam Name: Microsoft Dynamics CRM Online Deployment Version: Demo Exam A QUESTION 1 You are a systems support specialist for your company. A sales manager is currently

More information

Control-M and Payment Card Industry Data Security Standard (PCI DSS)

Control-M and Payment Card Industry Data Security Standard (PCI DSS) Control-M and Payment Card Industry Data Security Standard (PCI DSS) White paper PAGE 1 OF 16 Copyright BMC Software, Inc. 2016 Contents Introduction...3 The Need...3 PCI DSS Related to Control-M...4 Control-M

More information

Top. Reasons Legal Teams Select kiteworks by Accellion

Top. Reasons Legal Teams Select kiteworks by Accellion Top 10 Reasons Legal Teams Select kiteworks by Accellion Accellion Legal Customers Include: Top 10 Reasons Legal Teams Select kiteworks kiteworks by Accellion enables legal teams to manage their increasing

More information

Storage Made Easy. SoftLayer

Storage Made Easy. SoftLayer Storage Made Easy Providing an Enterprise File Fabric for SoftLayer STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR SOFTLAYER The File Fabric is a comprehensive multi-cloud data security solution built on

More information

VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices.

VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices. VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices. AirWatch v9.2 Have documentation feedback? Submit a Documentation

More information

Citrix ShareFile Share, store, sync, and secure data on any device, anywhere

Citrix ShareFile Share, store, sync, and secure data on any device, anywhere Citrix ShareFile Share, store, sync, and secure data on any device, anywhere Data Sheet ShareFile is a secure, enterprise data sync and sharing service with flexible storage options that allows IT to mobilize

More information

Introduction. The Safe-T Solution

Introduction. The Safe-T Solution Secure File and Email Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Components Functions 4 Secure File and Email Access Use Cases 4 Capabilities 6 Benefits 6 List 7

More information

Five critical features

Five critical features Five critical features you need for effective Office 365 administration www.manageengine.com/active-directory-360 Table of contents 1. 2. 3. Introduction Office 365 management: Five things you can't do

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

WebAdmin IceWarp WebAdmin Manual

WebAdmin IceWarp WebAdmin Manual WebAdmin IceWarp WebAdmin Manual WWW.ICEWARP.COM 1 WebClient WebAdmin User Manual Guide Contents About IceWarp WebAdmin Manual 3 1/ Login Page 4 2/ 4 Control bar 5 User Account Menu 5 Main Windows 6 Dashboard

More information

Workspace ios Content Locker. UBC Workspace 2.0: VMware Content Locker v4.12 for ios. User Guide

Workspace ios Content Locker. UBC Workspace 2.0: VMware Content Locker v4.12 for ios. User Guide UBC Workspace 2.0: VMware Content Locker v4.12 for ios User Guide Navigating Content Locker Content Locker centralizes all your enterprise data in a single container and integrates existing content repositories

More information

How Managed File Transfer Addresses HIPAA Requirements for ephi

How Managed File Transfer Addresses HIPAA Requirements for ephi How Managed File Transfer Addresses HIPAA Requirements for ephi INTRODUCTION These new requirements have effectively made traditional File Transfer Protocol (FTP) file sharing ill-advised, if not obsolete.

More information

Mozy. Administrator Guide

Mozy. Administrator Guide Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Features Comparison Sheet

Features Comparison Sheet ManageEngine Password Manager Pro Vs Thycotic Secret Server Features Comparison Sheet (As per the information available in Thycotic Secret Server s website on April 24, 2017) Feature ManageEngine Password

More information

Copyright and Legal Disclaimers

Copyright and Legal Disclaimers 1 Copyright and Legal Disclaimers User Manual for DiConnect Enterprise R11. Document Release Date: June 25, 2014. Copyright 2014 by DiCentral Corporation. All rights reserved. This document and all content

More information

Compliance and Privileged Password Management

Compliance and Privileged Password Management Introduces Compliance and Privileged Password Management [ W H I T E P A P E R ] Written by Kris Zupan, CEO/CTO e-dmz Security, LLC April 13, 2007 Compliance and Privileged Password Management Overview

More information

GoAnywhere MFT Upgrade Guide. Version 5.5.2

GoAnywhere MFT Upgrade Guide. Version 5.5.2 GoAnywhere MFT Upgrade Guide Version 5.5.2 Copyright Terms and Conditions The content in this document is protected by the Copyright Laws of the United States of America and other countries worldwide.

More information

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike

Introduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations

More information

Sophos Mobile. startup guide. Product Version: 8.5

Sophos Mobile. startup guide. Product Version: 8.5 Sophos Mobile startup guide Product Version: 8.5 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Sophos Mobile. startup guide. Product Version: 8.1

Sophos Mobile. startup guide. Product Version: 8.1 Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are

More information

Sophos Mobile. super administrator guide. product version: 9

Sophos Mobile. super administrator guide. product version: 9 super administrator guide product version: 9 Contents About this guide... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer... 3 Log in as super administrator... 3 Switch

More information

How to Access Protected Health Information from Anywhere and Stay Compliant

How to Access Protected Health Information from Anywhere and Stay Compliant How to Access Protected Health Information from Anywhere and Stay Compliant Secure, HIPAA-compliant file sharing & data storage with mobile data access Safeguard protected health information (PHI), support

More information

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide February 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

ManageEngine ADSelfService Plus

ManageEngine ADSelfService Plus Comparison Document ManageEngine ADSelfService Plus Vs Azure AD Self-Service Password Reset (SSPR) ManageEngine ADSelfService Plus vs. Azure AD Self-Service Password Reset (SSPR) Password reset tickets

More information

Providing an Enterprise File Share and Sync Solution for

Providing an Enterprise File Share and Sync Solution for Storage Made Easy Providing an Enterprise File Share and Sync Solution for Microsoft Azure Storage Storage Made Easy Enterprise File Share and Sync Solution for Microsoft Azure The Storage Made Easy (SME)

More information

Security Specifications

Security Specifications Security Specifications Overview Password Manager Pro deals with administrative passwords that offer secure access to enterprise credentials and devices. Any compromise on the security of these passwords

More information

SSH Product Overview

SSH Product Overview SSH Product Overview SSH Product Overview Understanding SSH SSH Discovery and Remediation Agentless SSH Agent Based SSH 2018 Venafi. All Rights Reserved. 2 Where is SSH used? File Transfer & Remote Script

More information

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE

REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE Table of Contents Component Design: VMware Identity Manager Architecture Design Overview VMware Identity Manager Connector

More information

Sophos Mobile Control SaaS startup guide. Product version: 7

Sophos Mobile Control SaaS startup guide. Product version: 7 Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login

More information

ElasterStack 3.2 User Administration Guide - Advanced Zone

ElasterStack 3.2 User Administration Guide - Advanced Zone ElasterStack 3.2 User Administration Guide - Advanced Zone With Advance Zone Configuration TCloud Computing Inc. 6/22/2012 Copyright 2012 by TCloud Computing, Inc. All rights reserved. This document is

More information

Liferay Security Features Overview. How Liferay Approaches Security

Liferay Security Features Overview. How Liferay Approaches Security Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 4.0 June 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

NETWRIX ACTIVE DIRECTORY CHANGE REPORTER

NETWRIX ACTIVE DIRECTORY CHANGE REPORTER NETWRIX ACTIVE DIRECTORY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information