Secure and Streamline your File Transfers with the new GoAnywhere 5.4 Release
|
|
- Amberlynn Fox
- 6 years ago
- Views:
Transcription
1 Secure and Streamline your File Transfers with the new GoAnywhere 5.4 Release Presented by Linoma Software
2 Introductions Bob Luebbe, CISSP Chief Architect Steve Luebbe Director of Engineering
3 Agenda File Transfer Challenges What is Managed File Transfer (MFT) and its benefits: Protects file transfers (e.g. SFTP, FTPS, AS2, HTTPS, PGP, etc.) Automates batch transfers without scripting Allows sharing files between users with end-to-end encryption Guarantees delivery with auto-resume and integrity checks Sends alerts on failures or success Generates detailed audit trails on all file transfer activity Meets compliance requirements for HIPAA, PCI DSS, SOX and GLBA Introduction to GoAnywhere MFT 5.4 Live demo Existing customers can learn in-depth details on the new features in 5.4 at: Q&A
4 Linoma Software Background Founded in based in Nebraska Growing and financially stable Active R&D with focus on Data Automation and Security Responsive technical support Phone, Web, Almost 99% of customers renew their product maintenance each year Division of with 10,000 customers and over 500 employees around the world Member of PCI Security Standards Council
5 Workload Automation Business Process Automation Network Monitoring Message & Event Monitoring Performance Monitoring Data Backup Management Enterprise Data Access Executive Dashboards & Reporting Mobile Data Access Data Warehousing Risk Assessment Anti-virus Security Event Monitoring Identity & Access Management Compliance Reporting Professional Security Services Process & Workflow Management Document & Image Management Forms Management Electronic Forms Document Distribution Signature Capture Remote Monitoring & Management Managed File Transfers Database Encryption
6 File Transfer Challenges HOST= PORT= USER= user1 PASSWD= s3cr3t FILE= user_log.log LDIR= /home/test Unsecure Manual Processes echo Running FTP transfer from $HOST ftp n $HOST $PORT <<END_SCRIPT quote USER $USER quote PASS $PASSWD passive lcd $LDIR get $FILE quit END_SCRIPT Legacy Scripts???? Unsecure PC Tools No Audit Trails USB Decentralized Unsecured No Alerts Limited Controls
7 PC Tools Problems (1 of 2) PC transfers are often manual, consuming valuable employee time Manual processes are prone to errors: o Employee may accidently download/upload the wrong file o Forgot to encrypt the file o Sent the file to wrong place! Internet
8 PC Tools Problems (2 of 2) What happens if the user is gone for the day? Sensitive files are more vulnerable on PCs and laptops PC tools save money or do they? Limited (or no) audit trails Compliance issues Internet
9 FTP Scripts Programmers have traditionally written scripts to perform file transfers Passwords are often stored in the scripts (in the clear) Scripts need to be maintained by Programmers: - When host names and IP addresses change - When user ids and passwords change - When file names change Can become very complex and unmanageable, especially as you add more trading partners No auto-retry or auto-resume capabilities Difficult to know when it fails HOST= PORT= USER= user1 PASSWD= s3cr3t FILE= user_log.log LDIR= /home/test echo Running FTP transfer from $HOST ftp n $HOST $PORT <<END_SCRIPT quote USER $USER quote PASS $PASSWD passive lcd $LDIR get $FILE quit END_SCRIPT
10 What is Managed File Transfer
11 Managed File Transfer Top 3 Things to look for when evaluating a MFT solution Easy To Use Centralized Security and Control Auditing and Alerts
12 GoAnywhere MFT
13 GoAnywhere MFT
14 GoAnywhere MFT Advantages (1 of 2) Multiplatform - Installs to most operating systems including IBM i, Windows, Linux, AIX, UNIX, Amazon and Azure. Batch and Ad Hoc - Allows organizations to perform both scheduled batch transfers and user-to-user file sharing. Auditing - Generates detailed audit logs of all file activity including batch, ad hoc, inbound and outbound transfers. Interface - Provides a browser-based interface for all administration and monitoring. No desktop client is needed. Inbound Services - Allows inbound connections from trading partners over SFTP, FTP/S, HTTPS and AS2 (Drummond Certified). Key Management - Provides integrated tools for creating and managing Open PGP keys, SSH keys and SSL certificates. Encryption - Protects files at rest and in-motion with FIPS validated AES-256 encryption. Admin Controls Implements role-based administration, security domains and granular permission controls.
15 GoAnywhere MFT Advantages (2 of 2) Private Cloud Eliminates the need for public file sharing services like Dropbox, Box, Google Drive and OneDrive. Customer Portal Allows organizations to provide a custom branded web interface for secure file transfers over HTTPS. Secure Mail Allows employees to send large or confidential files through secure links. Includes an Outlook plugin. Two-Factor - Authenticates with user credentials and RSA SecurID, RADIUS, SSH keys or X.509 certificates. DMZ Gateway - Keeps services and files in the private network (out of the DMZ) without requiring inbound ports. Job Control - Provides extensive job management features including job queues, run priorities and clustering. File Transfer Acceleration - Enables high speed transmission of large files between systems using UDP channels. Clustering - Provides high availability and load balancing by connecting two or more instances together in a cluster
16 GoAnywhere MFT 5.4 New Features Web Services integration with both SOAP and REST support Secure Forms enhancements Six new screen components Enhanced Project Designer to create workflows. More drag-n-drop features. Includes 10 new functions. JSON format Read & Write tasks Several new Reports including a Custom Report task More Administrator features including AD and LDAP synchronization Web Client enhancements including custom branding per port
17 Security Features Helps meet compliance for PCI-DSS, HIPAA, FIPS 140-2, Sarbanes Oxley, GLBA and State Privacy Laws Secure Protocols SFTP FTP over SSH FTPS FTP over SSL/TLS SCP Secure Copy HTTPS HTTP over SSL Open PGP / GPG ZIP with password protection Encrypted (SMIME) AS2 AES encryption (key lengths of 128, 192, 256) NIST standard Two-factor Authentication SAML RADIUS (RSA SecurID) SSH Keys X.509 Certificates Key Management tools for Open PGP Keys, SSL X.509 certificates and SSH Keys SSL protected console
18 Automated Workflow Examples - Outgoing
19 Automated Workflow Examples - Incoming
20 GoAnywhere Administrator Browser-based Dashboard Intelligent Gadgets Drag-n-Drop Latest HTML5 Technology
21 Integrated Scheduler Flexible scheduling: One Time Minutely Hourly Set job priorities, job queue, etc. Custom holiday calendars Skip holidays or run the business day before or after Auto-retry on failures Daily Weekly Monthly notifications for success and failures Pass in variables to Projects Optionally, use your own scheduler
22 Commands and APIs Run workflows in GoAnywhere using the provided commands and APIs Available for Windows, Linux, IBM i (iseries) and UNIX SOAP and REST enabled Requests sent over HTTP/s Override variables Run interactive or batch Trap for errors Commands and APIs are provided at no additional charge
23 Examples to Run a Project from CL Monitor for message IDs Any errors are placed in Job Log Retrieve any errors with RCVMSG command RPG procedures are also available to run a Project
24 Command Line Examples to Run a Project Windows Example: gacmd.exe server -user projectmanager -password ******** -command runproject -Project /Payroll/SendDirectDeposit -variables filename deposit.csv folderpath /inbound/deposit Linux Example: sh gacmd -server -user projectmanager -password ******** -command runproject -Project /Orders/SendPurchaseOrders -variables VendorNumber Status Open APIs are also provided for Java and.net
25 Project Logging (Audit Trails) Job Log per execution of Project Log Level can be defined on a project, module or a task Log Level controls what should be logged: SILENT INFO VERBOSE DEBUG Search Completed Jobs Date/time range User Project Name Job Number Status
26 Example Job Log 1/21/15 9:38:07AM INFO Start Date and Time: 1/21/15 9:38:07 AM 1/21/15 9:38:07AM INFO Job Number: /21/15 9:38:07AM INFO Project Name: /Demo/DB to Excel to Zip and FTP 1/21/15 9:38:07AM INFO Submitted By: administrator 1/21/15 9:38:07AM INFO Executing task 'Retrieve Records 1/21/15 9:38:07AM INFO Executing statement select * from LIBRARY.EMP 1/21/15 9:38:08AM INFO Query execution produced a rowset 1/21/15 9:38:08AM INFO Finished task 'Retrieve Records 1/21/15 9:38:08AM INFO Executing task 'Create Excel File 1/21/15 9:38:09AM INFO 8 record(s) were written 1/21/15 9:38:09AM INFO Finished task 'Create Excel File' 1/21/15 9:38:09AM INFO Executing task 'Create ZIP File 1/21/15 9:38:09AM INFO Compressing file '/files/employees.xls 1/21/15 9:38:09AM INFO Number of files compressed: 1 1/21/15 9:38:09AM INFO Finished task 'Create ZIP File 1/21/15 9:38:09AM INFO Executing task 'FTP the ZIP File 1/21/15 9:38:09AM INFO Connecting to ' ' at port '21' 1/21/15 9:38:10AM INFO Executing sub-task 'put 1/21/15 9:38:10AM INFO Setting the data type to AUTO 1/21/15 9:38:10AM INFO Uploading /files/employees.zip 1/21/15 9:38:12AM INFO 1 file(s) were uploaded successfully 1/21/15 9:38:12AM INFO Finished sub-task 'put 1/21/15 9:38:12AM INFO Closed the FTP connection 1/21/15 9:38:12AM INFO Finished task 'FTP the ZIP File' 1/21/15 9:38:12AM INFO Finished module 'main 1/21/15 9:38:12AM INFO Finished project 'DB to Excel to Zip and FTP 1/21/15 9:38:12AM INFO End Date and Time: 1/21/15 9:38:12 AM
27 Inbound Services Allows your trading partners and employees to securely connect to your organization and easily retrieve or upload files. Supports transfer protocols of FTP, SFTP, SCP, FTPS, HTTPS and AS2 Provides a browser-based web client for simple file transfers Includes event triggers based on user-defined conditions Generates detailed audit logs and alert messages
28 Trading Partner Management Create Trading Partner accounts using Wizards, APIs, batch load or selfregistration Authenticate users against AD, LDAP, IBM i or database. SAML for Single Signon Grant individual permissions or adopt permissions from groups Restrict to FTP, SFTP, FTPS, HTTP/s, AS2 Restrict access to certain folders and permissions (e.g. upload, download, delete, rename, etc.) Restrict to certain IPs Set Time Limits
29 Web Client for Ad-Hoc File Transfers Provides your trading partners with browser-based access to your system for uploading and downloading files Rebrand with your company logo and privacy policy Full audit trails and event triggers
30 Audit Logs Audit logs are stored for every transaction (login, upload, download, rename, etc.) for all services Search using a wide variety of filter criteria View on-line or export to CSV
31 Development and Promotion Promote Project Workflows from Development to Production Also Promote Resources (connection properties), Trigger Definitions, Scheduler entries, Job Monitors and Web Users Projects/Resources can also be exported and imported
32 Reports Available Blacklisted IP Addresses Completed Jobs Completed Job Statistics Database Statistics Expiring Open PGP Keys Expiring SSL Certificates GoDrive Disk Usage Job Count Summary Secure Mail Activity Secure Mail Package Sizes Security Settings Audit Service Activity Summary Trigger Activity Web User Logins Web User Transfer Count Activity Web User Transfer Size Activity
33 Report Example
34 Security Audit Report Analyze your GoAnywhere product s security settings and determine if they comply with the Payment Card Industry Data Security Standards (PCI-DSS). For each security setting, the report will indicate if the setting meets the PCI-DSS standard using one of the following statuses: Pass - The setting meets the PCI-DSS requirement Fail - The setting does not meet the PCI-DSS requirement. Warning - Further research is required to ensure your system meets the specified requirement.
35 Security Audit Report Example
36 Secure Mail Files and messages are transferred over a secure HTTPS connection Your system keeps possession of the files (in encrypted form) until the recipient retrieves them (not hosted) No file size limits Recipients don t have to deal with keys or certificates (just click on the URL) Customizable templates (use your own logo, color schemes, fonts) Licensed as an add-on module for GoAnywhere MFT
37 Send Secure Mail from Outlook
38 Secure Mail Download Recipient downloads the file attachments securely Full Audit Trails every step is recorded
39 GoDrive Diagram
40 GoDrive Overview (1 of 2) Person-to-Person file sharing and collaboration On-premise storage of files Files are encrypted with AES-256 Set user disk quotas Assign roles/permissions at the folder and file level Full audit trails of all activity (uploads, downloads, sharing, etc.) No subscription fees
41 GoDrive Overview (2 of 2) File revisions and Trash bin Image thumbnails and media viewer Add and View Comments Synchronize with Windows and Mac desktops and laptops ios app for ipads and iphones Device management - Administrator can approve or reject devices, remote wipe
42 GoDrive Screen Example
43 GoDrive Mobile Apps ipad and iphone Android Selective Sync Intelligent caching File preview Offline access Encrypted at rest
44 Gateway Overview (1 of 2) No incoming ports are opened into the private (internal) network No sensitive files are stored in the DMZ User credentials are maintained/stored in the private network
45 Gateway Overview (2 of 2) Supports FTP/s, SFTP, SCP and HTTP/s file transfer protocols No special hardware components; software-only solution Installs to Windows, Linux, AIX, UNIX and Solaris operating systems
46 Clustering Two or more installations of GoAnywhere MFT can be in a cluster GoAnywhere Gateway can load balance inbound connections Project workloads are distributed horizontally across multiple systems Active-Active = Better high availability for mission critical environments All systems can be managed from a central interface No 3 rd party tools or software are needed
47 GoAnywhere Managed File Transfer
48 Installation Requirements Linux (32-bit and 64-bit): - Distributions Red Hat, SUSE, Ubuntu, CentOS (not inclusive) - Disk space 375 MB per product (not including user data) - Memory 512 MB minimum per product Windows (32-bit and 64-bit): - Operating System Windows 2000, 2003, 2008 R2, 2012 R2, XP, Vista, 7, 10 - Disk space 375 MB per product (not including user data) - Memory 512 MB minimum per product Virtualized Environments: IBM i (iseries): - Operating System V7R1 or higher - Disk space requirements 275 MB per product (not including user data) - Memory requirements 512 MB minimum per product - JRE 1.7 or later UNIX / AIX / Solaris / HP-UX: - Disk space requirements 250 MB per product (not including user data) - Memory requirements 512 MB minimum per product - JRE 1.7 or later
49 Contact Information Web site: Toll-free: Direct: (402) Fax: (402) Address: 103 South 14 th Street Ashland, NE USA Copyright
Presented by. GoAnywhere.com
Presented by Bob Luebbe Chief Architect Steve Luebbe Software Development Mgr. About Linoma Software File Transfer Challenges What is Managed File Transfer (MFT)? 10 Ways to Make File Transfers easier
More informationPresented by. GoAnywhere.com
Presented by Bob Luebbe, CISSP Chief Architect Steve Luebbe Software Development Manager About Linoma Software File Transfer Challenges What is Managed File Transfer (MFT) and its benefits Introduction
More informationGoAnywhere MFT System Architecture Guide. For High Availability, Scaling, and Performance
For High Availability, Scaling, and Performance Copyright 2016 Linoma Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document
More informationWhat s New in GoAnywhere MFT 5.6?
What s New in GoAnywhere MFT 5.6? Introductions Bob Luebbe, CISSP Chief Architect Steve Luebbe Director of Engineering Agenda Introduction to GoAnywhere MFT 5.6 Overview of new features Live demo How to
More information2018 GLOBALSCAPE TRAINING OVERVIEW
2018 GLOBALSCAPE TRAINING OVERVIEW TABLE OF CONTENTS COURSE... 3 EFT ESSENTIALS COURSE...4 EFT ADMINISTRATOR COURSE... 5 EFT ADMINISTRATOR COURSE (CONT.)... 6 EFT AUTOMATION COURSE... 7 EFT SECURITY COURSE...8
More informationFive Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer
Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer INTRODUCTION Meeting HIPAA and HITECH security and compliance requirements is a formidable challenge.
More informationWhat s New in GoAnywhere MFT 5.7
What s New in GoAnywhere MFT 5.7 Today s Agenda 1. 2. 3. 4. New features and enhancements in GoAnywhere MFT 5.7 Live demo! How to get started Q&A HelpSystems Corporate Overview. All rights reserved. Today
More informationSERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING
DATASHEET SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING If you re looking for a highly professional, no-nonsense FTP server, then you can t do much better
More informationFilesAnywhere Features List
FilesAnywhere Feature List FilesAnywhere Page 1 of 9 Contents Basic Features... 3 Advanced Features... 7 Enterprise Features... 9 FilesAnywhere Page 2 of 9 Basic Features No File Size Limit: There is no
More informationFeature Express Enterprise Arcus. SSL/TLS - secure FTP communications Included Included Included
Protocols SSL/TLS - secure FTP communications SSL key manager - manage, import, export, and create SSL certificates SSL Config - specify ciphers and versions allowed (SSL v2, v3, and TLS v1) Checkpoint
More informationGet the Most Out of GoAnywhere: Achieving Cloud File Transfers and Integrations
Get the Most Out of GoAnywhere: Achieving Cloud File Transfers and Integrations Today s Presenter Dan Freeman, CISSP Senior Solutions Consultant HelpSystems Steve Luebbe Director of Development HelpSystems
More informationVersion: 4.0. Quatrix Data Sheet. January 2018 Author: Maytech
Version: 4.0 Quatrix Data Sheet January 2018 Author: Maytech Problem Consumer file sharing services such as Hightail, WeTransfer and Dropbox are causing a massive headache for enterprise IT as BYOFT (bring
More informationAre You Avoiding These Top 10 File Transfer Risks?
Are You Avoiding These Top 10 File Transfer Risks? 1. 2. 3. 4. Today s Agenda Introduction 10 Common File Transfer Risks Brief GoAnywhere MFT Overview Question & Answer HelpSystems Corporate Overview.
More informationCLEO VLTrader Made Simple Guide
CLEO VLTrader Made Simple Guide Table of Contents Quick Reference... 3 Miscellaneous Technical Notes... 3 CLEO VLTrader at a Glance... 3 Introduction... 5 Application Page Layout... 5 Preconfigured Hosts...
More informationDSS User Guide. End User Guide. - i -
DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...
More informationMB Microsoft Dynamics CRM 2016 Online Deployment.
MB2-710 Microsoft Dynamics CRM 2016 Online Deployment Getting Started Overview CRM Online is a cloud-based offering of Microsoft Dynamics CRM The licensing is a subscription-based model with a monthly
More information#1 Enterprise File Share, Sync, Backup and Mobile Access for Business
#1 Enterprise File Share, Sync, Backup and Mobile Access for Business Top 10 Benefits 1 2 Best ROI in the Industry 4 5 Secure Access Smart Drive files and comply with regulations. Share Securely Security
More informationSFTPPlus Client SFTPPlus Server 1.5.1
SFTPPlus Client 1.5.1 SFTPPlus Server 1.5.1 Product Features & Benefits (Comparison Overview) The Old Exchange South Cadbury Yeovil Somerset BA22 7ET UK Copyright: Pro:Atria Limited 2009. Neither the whole
More information#1 Enterprise File Share, Sync, Backup and Mobile Access for Business
#1 Enterprise File Share, Sync, Backup and Mobile Access for Business Top 10 Benefits 1 Best ROI in the Industry Lower cost, higher value, free unlimited partner accounts 2 4 Site Sandbox 7 The Best Return
More informationEnd User Manual. December 2014 V1.0
End User Manual December 2014 V1.0 Contents Getting Started... 4 How to Log into the Web Portal... 5 How to Manage Account Settings... 6 The Web Portal... 8 How to Upload Files in the Web Portal... 9 How
More informationHySecure Quick Start Guide. HySecure 5.0
HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current
More informationWAM!NET Direct! SM. Service Description
WAM!NET Direct! SM Service Description INTRODUCTION The Direct! Service is a subscription based content delivery service that provides customers with the ability to send, receive, and track digital files
More informationGLBA Compliance. with O365 Manager Plus.
GLBA Compliance with O365 Manager Plus www.o365managerplus.com About GLBA The Gramm-Leach-Bliley Act (GLB Act or GLBA) is also known as the Financial Modernization Act of 1999. It is a United States federal
More informationDon t just manage your documents. Mobilize them!
Don t just manage your documents Mobilize them! Don t just manage your documents Mobilize them! A simple, secure way to transform how you control your documents across the Internet and in your office.
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationGRS Enterprise Synchronization Tool
GRS Enterprise Synchronization Tool Last Revised: Thursday, April 05, 2018 Page i TABLE OF CONTENTS Anchor End User Guide... Error! Bookmark not defined. Last Revised: Monday, March 12, 2018... 1 Table
More informationIBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights
IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing
More informationTechnical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.
Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple
More informationSync User Guide. Powered by Axient Anchor
Sync Powered by Axient Anchor TABLE OF CONTENTS End... Error! Bookmark not defined. Last Revised: Wednesday, October 10, 2018... Error! Bookmark not defined. Table of Contents... 2 Getting Started... 7
More informationSecret Server Demo Outline
Secret Server is a feature rich product that can be introduced to your prospects in many different ways. Below is a generic outline of several of the most important features that should be covered during
More informationNETWRIX GROUP POLICY CHANGE REPORTER
NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationSophos Mobile as a Service
startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6
More informationAnchor User Guide. Presented by: Last Revised: August 07, 2017
Anchor User Guide Presented by: Last Revised: August 07, 2017 TABLE OF CONTENTS GETTING STARTED... 1 How to Log In to the Web Portal... 1 How to Manage Account Settings... 2 How to Configure Two-Step Authentication...
More informationVendor: RSA. Exam Code: CASECURID01. Exam Name: RSA SecurID Certified Administrator 8.0 Exam. Version: Demo
Vendor: RSA Exam Code: 050-80-CASECURID01 Exam Name: RSA SecurID Certified Administrator 8.0 Exam Version: Demo QUESTION NO: 1 RSA 050-80-CASECURID01 Exam Which of the following can cause the error message
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationAxway SecureTransport
Axway SecureTransport Enhanced Managed File Transfer Gateway For many organizations, years of adding one-off file-transfer connections to meet specific needs has created a complex environment that lacks
More informationGoAnywhere MFT Install Guide. Version 5.7.4
GoAnywhere MFT Install Guide Version 5.7.4 Copyright Terms and Conditions The content in this document is protected by the Copyright Laws of the United States of America and other countries worldwide.
More informationIntelligent Enterprise Digital Asset Management
Intelligent Enterprise Digital Asset Management New Updated for Cumulus 11 Protect brand assets and increase productivity with Canto s award-winning DAM platform. Integrate and configure Cumulus to support
More informationSingle Sign-On. Introduction
Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationSysAid Technical Presentation. Phone (Toll-Free US): Phone: +972 (3)
SysAid Technical Presentation www.sysaid.com sales@sysaid.com Phone (Toll-Free US): 1-800-686-7047 Phone: +972 (3) 533-3675 SysAid Overview A Global ITSM Solution Provider Technology Built for You Customer-Driven
More informationSophos Mobile in Central
startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure IT
More informationUser Manual. Admin Report Kit for Exchange Server
User Manual Admin Report Kit for Exchange Server Table of Contents 1 About ARKES-Admin Report Kit for Exchange Server 1 1.1 System requirements 2 1.2 How to activate the software? 3 1.3 ARKES Reports Primer
More informationTIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide
TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide Software Release 8.1 March 2018 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES
More informationSophos Mobile in Central
startup guide Product Version: 8.1 Contents About this guide... 1 What are the key steps?... 2 Activate Mobile Advanced licenses... 3 Configure settings... 4 Configure personal settings...4 Configure technical
More informationGetting Started with Commercial Services
Getting Started with Commercial Services USER GUIDE For informational purposes only, not considered an advertisement. WELCOME TO M&T BANK S COMMERCIAL SERVICES M&T Bank s Commercial Services system provides
More informationFeatures Comparison Sheet
ManageEngine Password Manager Pro Vs Thycotic Secret Server Features Comparison Sheet (As per information available on Thycotic Secret Server s website on March 23, 2018.) Feature ManageEngine Password
More informationAxway Activator Release Notes
Axway Activator 6.0.0 Release Notes Document version: April 2018 Product version requirements New features and enhancements Known issues and limitations Documentation Support services Product version requirements
More informationCirius Secure Messaging Single Sign-On
Cirius Secure Messaging seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single
More informationRelease Notes Release (December 4, 2017)... 4 Release (November 27, 2017)... 5 Release
Release Notes Release 2.1.4. 201712031143 (December 4, 2017)... 4 Release 2.1.4. 201711260843 (November 27, 2017)... 5 Release 2.1.4. 201711190811 (November 20, 2017)... 6 Release 2.1.4. 201711121228 (November
More informationBBVA Compass Spend Net Payables
User Guide BBVA Compass Spend Net Payables User Guide Vault Services Table of Contents Introduction 2 Technical Requirements 2 Getting started 3 Sign In 3 General Navigation 4 Upload/Create Payment 5
More information4 phases to understand owncloud
4 phases to understand owncloud Introduction Basic Features App Ecosystem Crossplatform Support Outline Introduction Basic Features App Ecosystem Crossplatform Support Introduction: Team Collaboration
More informationAXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure
AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical
More informationStreamSets Control Hub Installation Guide
StreamSets Control Hub Installation Guide Version 3.2.1 2018, StreamSets, Inc. All rights reserved. Table of Contents 2 Table of Contents Chapter 1: What's New...1 What's New in 3.2.1... 2 What's New in
More informationAlliance Key Manager A Solution Brief for Partners & Integrators
Alliance Key Manager A Solution Brief for Partners & Integrators Key Management Enterprise Encryption Key Management This paper is designed to help technical managers, product managers, and developers
More informationSecurity in Bomgar Remote Support
Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their
More informationSophos Mobile as a Service
startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses... 5 Check your licenses...6
More informationSophos Mobile SaaS startup guide. Product version: 7.1
Sophos Mobile SaaS startup guide Product version: 7.1 Contents 1 About this guide...4 2 What are the key steps?...5 3 Change your password...6 4 Change your login name...7 5 Activate SMC Advanced licenses...8
More informationHIPAA Compliance. with O365 Manager Plus.
HIPAA Compliance with O365 Manager Plus www.o365managerplus.com About HIPAA HIPAA, the Health Insurance Portability and Accountability Act, sets the standard for protecting sensitive patient data. Any
More informationUiB 1. april 04. Sun Microsystems
UiB 1. april 04 hans.bue@sun.com Sun Microsystems Agenda Java Desktop System (JDS) StarOffice / OpenOffice Videre utvikling Java Enterprise System (JES) Konsept for fremtidens desktop 2 JDS Java Desktop
More informationSophos Mobile. super administrator guide. product version: 8.6
Sophos Mobile super administrator guide product version: 8.6 Contents About this guide... 1 Document conventions... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer...
More informationVMware, SQL Server and Encrypting Private Data Townsend Security
VMware, SQL Server and Encrypting Private Data Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 Today s Agenda! What s new from Microsoft?! Compliance, standards, and
More informationDespite a number of newer and more complex file transfer requirements, we sometimes lose track of the basic needs for managing file transfers.
GoAnywhere Director is a managed file transfer solution that manages basic file transfers and automates data movement, translation, encryption and compression processes. Despite a number of newer and more
More informationSingle Sign-On. Introduction. Feature Sheet
Feature Sheet Single Sign-On Introduction CipherPost Pro seamlessly integrates into your enterprise single sign-on (SSO) to give your users total email security and an extra set of robust communications
More informationVendor: Microsoft. Exam Code: MB Exam Name: Microsoft Dynamics CRM Online Deployment. Version: Demo
Vendor: Microsoft Exam Code: MB2-715 Exam Name: Microsoft Dynamics CRM Online Deployment Version: Demo Exam A QUESTION 1 You are a systems support specialist for your company. A sales manager is currently
More informationControl-M and Payment Card Industry Data Security Standard (PCI DSS)
Control-M and Payment Card Industry Data Security Standard (PCI DSS) White paper PAGE 1 OF 16 Copyright BMC Software, Inc. 2016 Contents Introduction...3 The Need...3 PCI DSS Related to Control-M...4 Control-M
More informationTop. Reasons Legal Teams Select kiteworks by Accellion
Top 10 Reasons Legal Teams Select kiteworks by Accellion Accellion Legal Customers Include: Top 10 Reasons Legal Teams Select kiteworks kiteworks by Accellion enables legal teams to manage their increasing
More informationStorage Made Easy. SoftLayer
Storage Made Easy Providing an Enterprise File Fabric for SoftLayer STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR SOFTLAYER The File Fabric is a comprehensive multi-cloud data security solution built on
More informationVMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices.
VMware AirWatch Product Provisioning and Staging for Windows Rugged Guide Using Product Provisioning for managing Windows Rugged devices. AirWatch v9.2 Have documentation feedback? Submit a Documentation
More informationCitrix ShareFile Share, store, sync, and secure data on any device, anywhere
Citrix ShareFile Share, store, sync, and secure data on any device, anywhere Data Sheet ShareFile is a secure, enterprise data sync and sharing service with flexible storage options that allows IT to mobilize
More informationIntroduction. The Safe-T Solution
Secure File and Email Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Components Functions 4 Secure File and Email Access Use Cases 4 Capabilities 6 Benefits 6 List 7
More informationFive critical features
Five critical features you need for effective Office 365 administration www.manageengine.com/active-directory-360 Table of contents 1. 2. 3. Introduction Office 365 management: Five things you can't do
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationWebAdmin IceWarp WebAdmin Manual
WebAdmin IceWarp WebAdmin Manual WWW.ICEWARP.COM 1 WebClient WebAdmin User Manual Guide Contents About IceWarp WebAdmin Manual 3 1/ Login Page 4 2/ 4 Control bar 5 User Account Menu 5 Main Windows 6 Dashboard
More informationWorkspace ios Content Locker. UBC Workspace 2.0: VMware Content Locker v4.12 for ios. User Guide
UBC Workspace 2.0: VMware Content Locker v4.12 for ios User Guide Navigating Content Locker Content Locker centralizes all your enterprise data in a single container and integrates existing content repositories
More informationHow Managed File Transfer Addresses HIPAA Requirements for ephi
How Managed File Transfer Addresses HIPAA Requirements for ephi INTRODUCTION These new requirements have effectively made traditional File Transfer Protocol (FTP) file sharing ill-advised, if not obsolete.
More informationMozy. Administrator Guide
Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license
More informationInstalling and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.
Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on
More informationFeatures Comparison Sheet
ManageEngine Password Manager Pro Vs Thycotic Secret Server Features Comparison Sheet (As per the information available in Thycotic Secret Server s website on April 24, 2017) Feature ManageEngine Password
More informationCopyright and Legal Disclaimers
1 Copyright and Legal Disclaimers User Manual for DiConnect Enterprise R11. Document Release Date: June 25, 2014. Copyright 2014 by DiCentral Corporation. All rights reserved. This document and all content
More informationCompliance and Privileged Password Management
Introduces Compliance and Privileged Password Management [ W H I T E P A P E R ] Written by Kris Zupan, CEO/CTO e-dmz Security, LLC April 13, 2007 Compliance and Privileged Password Management Overview
More informationGoAnywhere MFT Upgrade Guide. Version 5.5.2
GoAnywhere MFT Upgrade Guide Version 5.5.2 Copyright Terms and Conditions The content in this document is protected by the Copyright Laws of the United States of America and other countries worldwide.
More informationIntroduction With the move to the digital enterprise, all organizations regulated or not, are required to provide customers and anonymous users alike
Anonymous Application Access Product Brief Contents Introduction 1 The Safe-T Solution 1 How It Works 2-3 Capabilities 4 Benefits 4 List 5-11 Introduction With the move to the digital enterprise, all organizations
More informationSophos Mobile. startup guide. Product Version: 8.5
Sophos Mobile startup guide Product Version: 8.5 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are
More informationVMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationSophos Mobile. startup guide. Product Version: 8.1
Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are
More informationSophos Mobile. super administrator guide. product version: 9
super administrator guide product version: 9 Contents About this guide... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer... 3 Log in as super administrator... 3 Switch
More informationHow to Access Protected Health Information from Anywhere and Stay Compliant
How to Access Protected Health Information from Anywhere and Stay Compliant Secure, HIPAA-compliant file sharing & data storage with mobile data access Safeguard protected health information (PHI), support
More informationTREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide
TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide February 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator
More informationVMware Identity Manager Connector Installation and Configuration (Legacy Mode)
VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until
More informationManageEngine ADSelfService Plus
Comparison Document ManageEngine ADSelfService Plus Vs Azure AD Self-Service Password Reset (SSPR) ManageEngine ADSelfService Plus vs. Azure AD Self-Service Password Reset (SSPR) Password reset tickets
More informationProviding an Enterprise File Share and Sync Solution for
Storage Made Easy Providing an Enterprise File Share and Sync Solution for Microsoft Azure Storage Storage Made Easy Enterprise File Share and Sync Solution for Microsoft Azure The Storage Made Easy (SME)
More informationSecurity Specifications
Security Specifications Overview Password Manager Pro deals with administrative passwords that offer secure access to enterprise credentials and devices. Any compromise on the security of these passwords
More informationSSH Product Overview
SSH Product Overview SSH Product Overview Understanding SSH SSH Discovery and Remediation Agentless SSH Agent Based SSH 2018 Venafi. All Rights Reserved. 2 Where is SSH used? File Transfer & Remote Script
More informationREVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE
REVISED 6 NOVEMBER 2018 COMPONENT DESIGN: VMWARE IDENTITY MANAGER ARCHITECTURE Table of Contents Component Design: VMware Identity Manager Architecture Design Overview VMware Identity Manager Connector
More informationSophos Mobile Control SaaS startup guide. Product version: 7
Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login
More informationElasterStack 3.2 User Administration Guide - Advanced Zone
ElasterStack 3.2 User Administration Guide - Advanced Zone With Advance Zone Configuration TCloud Computing Inc. 6/22/2012 Copyright 2012 by TCloud Computing, Inc. All rights reserved. This document is
More informationLiferay Security Features Overview. How Liferay Approaches Security
Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................
More informationNETWRIX WINDOWS SERVER CHANGE REPORTER
NETWRIX WINDOWS SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 4.0 June 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationNETWRIX ACTIVE DIRECTORY CHANGE REPORTER
NETWRIX ACTIVE DIRECTORY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More information