CLIQ Remote - System description and requirements
|
|
- Clarissa Williamson
- 6 years ago
- Views:
Transcription
1 CLIQ Remote - System description and requirements
2 1. Introduction CLIQ Remote - Access at a distance CLIQ Remote is an electromechanical lock system with an additional level of security and flexibility, a natural choice for those looking for a modern security solution. CLIQ Remote combines a modern mechanical basic platform with an advanced electronic function. A major advantage of CLIQ Remote is the distance function. This locking system can change access and permission at a distance. For example, you can sit in Stockholm and, through the CLIQ Web Manager software give access to your keys via the programming terminal. A contractor in the North of Sweden may get access to a facility, maybe an antenna or a mast, by programming his/her key in wall readers at the facility. CLIQ Remote features: 1. A key with CLIQ has built-in clock and memory. 2. Validation of keys increases security in case of loss. 3. Audit trails and logs provides security for all users and managers. 4. Update permissions remotely minimizes work and saves time. 5. The combination of electronic and mechanical locking gives a unique level of security 2
3 2. Main features of CLIQ Remote List of functions in the CLIQ Remote locking system: Easy to install - CLIQ is a cost efficient offline systems that do not require electrical wiring or batteries in the lock cylinders. Event Logs - CLIQ provides easy access to accurate verified log data from each cylinder lock and key in the lock system. Individual keys - Protected by strong digital encryption, each key can be designated for use by a single individual. The key can then be given access to all the areas that the individual should move in. If the key is lost and blocked, a new key can be generated in its place. Time-based access - CLIQ enables the definition of a time-based schedule in which the days and times of access is permitted. Digital Key Management - CLIQ Web Manager keeps track of which keys that belong to different key holders. The keys can be issued completely digitally without the interference of paper. It s smart administration and good for the environment. Electronic keying - keys can be updated without the presence of physical key of the administrator. Validation of keys - Adds safety to the locking system by forcing key holders to validate the key with updates in an adjacent programming station. It also ensures that the event logs are transmitted to the server and is available for system administrators. Grouping Features - Simplifies administration. CLIQ Web Manager makes it possible to provide access to groups of cylinders and groups of people based on e.g. geographical location or role in the organization. Domains - Just like grouping permissions and users the administrator's role can also be controlled to see only their part of the locking system with the domain function. 3
4 3. Documentation about CLIQ Remote List of information that is available on the CLIQ Remote system: Brochure - CLIQ Remote Access at a distance Product sheet - CLIQ Remote Cylinder Product sheet - CLIQ Remote Key Product sheet - Wall PD Product sheet - Vandal-resistant Wall PD Product sheet - Mobile PD Product sheet - CLIQ Web Manager / System requirements CLIQ Remote IT-Compliance CLIQ Certifications and classifications CLIQ Remote FAQ SSL-certificates An introduction Manual CLIQ Web Manager The above information is available through your ASSA Retailer and on: Design of a CLIQ Remote locking system should be made in cooperation between the property / security manager and installer, to gain insight in how the business can benefit from the features and thus build a system that meets the customer's needs. At the planning stage it should be taken into account how the expansion of the system can be done in an efficient manner. It is also important to the company's IT department is involved at an early stage so that the necessary rights to PCs and networks is approved. ASSA manages servers, backup and IT operation when the agreement of the SaaS service contract has been signed. Check the following: Fire Regulations for the door environment Fire Standards Evacuation routes Emergency exits Safety regulations Mechanical requirements for perimeter protection Safety requirements for special areas such as server rooms / technical rooms Local requirements from the insurance company IT security with firewalls, administrator rights, etc. 4
5 4. Important Information The following information is required before you begin the installation of a CLIQ Remote system. This information is also needed to if you contact the ASSA technical support. 4.1 Agreement The agreement for SaaS services and certificate is signed between ASSA and the client company at the time of approval of the license agreement made via the address specified in advance. The customer undertakes to register a new address in the system. This is to ensure that the communication regarding licenses and certificates is not specified to a certain employee. This address is then connected to the system operator for the system. The locking system should be treated as a business function. The name of this account should be: "cliqremote" Selected address: Ex: cliqremote@customer.com System manager A person shall be appointed to the transmission system and be responsible for software and contact the dealer or installer. The system operator has been appointed:. The address registered will receive the Certificate Files from ASSA. 5
6 4.2 Checklist for system setup The following manuals should be at the IT department of the client company before beginning the installation and the infrastructure to be prepared for the new locking system. Make sure that these requirements are met: (mark with an X)) Manual CLIQ Web Manager [ ] CLIQ Remote - FAQ [ ] Address is created [ ] Drivers for Terminal PD are installed [ ] on the client computers The recommended version of Java installed [ ] on the client computers Places of wall-mounted PD s are assigned [ ] and network connectivity is available Communication on port 443 is allowed [ ] Outgoing traffic Communication on port 8443 is allowed [ ] Outgoing traffic This document is signed by both parties [ ] 4.3 Support Support of the software is handled by a retailer selected by the customer. If the customer and the dealer opts support directly between the customer and ASSA this is concluded in a separate agreement. What type of Support Agreement has been selected: The retailer provides support [ ] Support agreement CLIQ Remote [ ] (For direct support between the customer and ASSA) 6
7 5. System Overview The diagram describes the functions of the CLIQ Web Manager environment. 5.1 SSL Client-certificate Encryption protects data during transmission The CLIQ Remote Web server and the browser uses Certificates of Secure Sockets Layer (SSL) protocol to assist users to protect data during transmission. A unique, encrypted channel for private communications are created on the otherwise public Internet. Each SSL Certificate consists of a pair of keys, as well as verified identification data. When a CLIQ Remote (or client) points to a secure website, the server shares the public key with the client in order to create an encryption method and a unique session key. CLIQ Web Manager confirms that it recognizes and trusts the issuer of the SSL certificate. This process is called the "SSL handshake" and it initiates a secure session that protects message privacy and message integrity. 7
8 6. The CLIQ Remote server All CLIQ Remote servers are managed by ASSA AB and made available to the client company through a Service Agreement (SaaS). System functionality: The ability to manage the locking system. Adding up the staff. Hand out keys. Change the permissions on the keys. Being able to tag (label) all the objects to facilitate the search. - An average key update is about 20-30kB. To update daily CLIQ keys by Wall PD units. Being able to block the lost keys. Primarily from being updated in Wall PD, but also to block the key in the cylinders. Being able to read the logs out of the cylinders and keys. 6.1 Schematic overview Figure 1: 8
9 7. Administrator PC Requirements to run the CLIQ Web Manager software 7.1 Client computer hardware Hardware CPU RAM Hard Disk Minimum requirement Capable of running Windows Vista/7/8/10 Capable of running Windows Vista/7/8/10 20 Mb available 7.2 Client tablets Hardware Microsoft Surface Pro* Minimum requirement Windows 7 Pro/Ent/Ult (32 or 64bit) Windows 8 (32 or 64bit) *All tablets capable of running Microsoft based operating systems 7.3 Software Software Operating System ASSA CLIQ Connect Web browser PDF-reader Required product Windows Vista/7/8/10 Linux capable of running Mozilla Firefox OSX capable of running Mozilla Firefox ASSA ABLOY CLIQ Connect (latest version by ASSA) Internet Explorer 8/9/10/11 (32 or 64-bit) Firefox or later (32 or 64-bit) All standard readers *The browser security setting Do not save encrypted pages to disk must be disabled. 9
10 8. Login to the web software ASSA provides the end customer with the information and files required to sign in and manage the CLIQ Remote locking system. Via our Admin Page for CLIQ Web Manager at assa.se the following is offered: Download center - Driver files Knowledge - ASSA Smart Guides for user Operating information - the latest news about new versions and features of the software Ability to create new SSL certificates - When administrators need to renew their credentials 10
11 9. Updating devices (PD) To change permissions for keys the system uses programming units called PD s. The Local PD is used by the administrator to log into the CLIQ Web Manager software. The Remote PDs (Wall PDs and Mobile PD s) access the CLIQ Remote server by mutual authentication to create an https session. Also the CLIQ Web Manager server uses an https session to communicate with the CLIQ Remote server. The mutual authentication requires a client certificate for CLIQ Web Manager and a server certificate for the CLIQ Remote web application. Each Remote PD is also prepared with a client certificate and a CA certificate to establish an https session with the CLIQ Remote application. Web services require their own client certificate. - An average key update is about 20-30kB. For sending notifications to the users an SMTP server is used. This server is covered by a service contract and is provided by ASSA. Figure 2: Local PD Figure 3: Mobile PD with smart phone Figure 4: Wall PD Figure 5: Vandal-resistant wall PD 11
12 10. Wall PD setup information This information must be available before the installation of a CLIQ Remote systems can begin. Also remember to draw the network cables to the places where Wall PD units are to be installed before the installation starts. A Wall PD is used in a CLIQ Remote system to allow the user to update their key authorizations without having to seek out the administrator. 1. How many key updating devices should be installed?: (write number) Wall mounted [ ] Mobile [ ] 2. What type of IP address will the Wall PD units use: (mark with an X) Static IP [ ] Dynamic DHCP [ ] 3. If static IP address is used which addresses can be used: Which Subnet Mask should be used: Which default gateway should be used: Eventual DNS server adress: Name for the Wall PD in the network: What power source will the Wall PD units use: Power over Ethernet PoE [ ] 12v 24v separate supply [ ] 5. To deploy a Wall PD a USB memory less than 2Gb is needed. A certificate is generated in the web software CLIQ Web Manager and then transferred to the Wall PD device with a mini USB cable. For more information see CLIQ Web Manager Manual USB memory is available Yes [ ] No [ ] 12
13 11. Maintenance An overview of the planed maintenance and its impact on the system. Downtime matrix Info Dynamic keys Normal keys Remote PDs Administration SOE Environment Service windows Patch OS Reserved for Every 3 rd weekend in month saturday SOE DB changes upgrades Reserved for Every 3 rd weekend in month saturday Can do offline revalidate Cannot be reprogrammed PD can do an offline revalidation Not functional VM restoration Exchange server changes mail SOE Network /infrastructure/ storage changes Can do offline revalidate Cannot be reprogrammed PD can do an offline revalidation Upgrades of CWM (with DB changes) Can do offline revalidate PD can do an offline revalidation Not functional Cannot be reprogrammed Upgrades of CWM (no DB changes) 2 times a year Office hours 2hours Migration of CWM environment Can do offline revalidate Cannot be reprogrammed PD can do an offline revalidation Not functional Extensions Customer locks the system, update DB, customer unlocks system Not functional Renew Server cert The acronym CWM is used for CLIQ Web Manager. *CWM - CLIQ Web Manager. * Offline PD is a backup feature that allows key validation if the network is not be available, please contact your sales representative for more information on configuration. 13
14 By signing this agreement the customer assures that the IT Compliance requirements set by ASSA are met. This Agreement is signed in two (2) copies, of which each party has received one. Place and date Place and date Signature Signature Name Customer name 14
15 Feedback on this document can be sent to: 15
16 16
CLIQ Remote. Access at a distance
CLIQ Remote Access at a distance CLIQ Remote combines mechanical and electronic security The basic idea of CLIQ technology is the creation of a lock system that retains a high level of security despite
More informationCLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1
CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9
More informationSafeConsole On-Prem Install Guide
SafeConsole On-Prem Install Guide This guide applies to SafeConsole 5.0.5 Introduction This guide describes how to install a new SafeConsole server on Windows using the SafeConsole installer. As an option,
More informationSafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem
version 5.2.2 DataLocker Inc. July, 2017 SafeConsole Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 2 How do the devices become managed by SafeConsole?....................
More informationKEYS ALWAYS IN THE RIGHT HANDS
KEYS ALWAYS IN THE RIGHT HANDS ASSA ABLOY, the global leader in door opening solutions INTELLIGENT KEY CABINET TRAKA TOUCH DO YOU KNOW WHERE YOUR KEYS ARE RIGHT NOW? Traka does and it can tell you, too
More informationRespond quickly to security threats, lost or stolen keys, or personnel changes without the added cost of changing your locks and keys.
Medeco CLIQ The Medeco Solution Medeco CLIQ is an Intelligent Key locking and access control solution, combining electronic and mechanical technologies. Managed via cloud-based software, Medeco CLIQ provides
More informationemarketeer Information Security Policy
emarketeer Information Security Policy Version Date 1.1 2018-05-03 emarketeer Information Security Policy emarketeer AB hereafter called emarketeer is a leading actor within the development of SaaS-service
More informationAXIS Camera Station S20 Appliance Series AXIS Camera Station S2008 Appliance AXIS Camera Station S2016 Appliance AXIS Camera Station S2024 Appliance
AXIS Camera Station S2008 Appliance AXIS Camera Station S2016 Appliance AXIS Camera Station S2024 Appliance User Manual Table of Contents About the AXIS Camera Station S20 Appliance Series.............
More informationCode Alert Customer Information Technology Requirements Series 30 Software
Code Alert Customer Information Technology Requirements Series 30 Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part of this work may
More information7.16 INFORMATION TECHNOLOGY SECURITY
7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for
More informationCisco s AnyConnect VPN Client (version 2.4)
Table of Contents [TOC]: Introduction Getting Started Installation Overview Using the Softphone System Requirements Introduction: Valley City State University is deploying Cisco s AnyConnect Virtual Private
More informationSAS SOLUTIONS ONDEMAND
DECEMBER 4, 2013 Gary T. Ciampa SAS Solutions OnDemand Advanced Analytics Lab Birmingham Users Group, 2013 OVERVIEW SAS Solutions OnDemand Started in 2000 SAS Advanced Analytics Lab (AAL) Created in 2007
More informationSafe Place and Code Alert Customer Information Technology Requirements Series 10.x Software
Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part
More informationCODE ALERT Enterprise Software Customer Information Technology Requirements
CODE ALERT Enterprise Software Customer Information Technology Requirements 2018 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part of this work may
More informationNetwork Projector Operation Guide
Network Projector Operation Guide Table of contents Preparation...4 Connecting the projector with your computer...4 Wired connection... 4 Wireless connection (for selected models)... 5 QPresenter...8 Minimum
More informationPMS 138 C Moto Black spine width spine width 100% 100%
Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of
More informationFirmware Update Details (v p)
Firmware Update Details (v0.32-07p) CONTENT: Instructions: How to Update New Features and Improvements Examples Issues Addressed Notes and Known Issues Requirements for the Update: e3 with software: 0.32-07e,
More informationDeploy the ExtraHop Discover 3100, 6100, 8100, or 9100 Appliances
Deploy the ExtraHop Discover 3100, 6100, 8100, or 9100 s Published: 2017-12-29 This guide explains how to install the rack-mounted EDA 3100, EDA 6100, EDA 8100, and EDA 9100 ExtraHop Discover appliances.
More informationForcepoint Sidewinder Control Center, Virtual Appliance. Installation Guide 5.3.x. Revision A
Forcepoint Sidewinder Control Center, Virtual Appliance Installation Guide 5.3.x Revision A Table of contents 1 Virtual Appliance requirements...3 Two Control Center options...3 Sizing guidelines... 3
More informationThe Medeco Solution for Controlled Access and Accountability
Medeco XT The Medeco Solution for Controlled Access and Accountability Medeco XT is a powerful Intelligent Key System that uses innovative technology to deliver a flexible, cost-effective solution for
More informationIPS265T / IPS275T. TimeIPS Server. Installation Guide
IPS265T / IPS275T Server Installation Guide FCC Declaration of Conformity (DoC) Compliance Information (according to FCC 2.1077) (1) Product: IPS265T / IPS275T. The above device complies with Part 15 of
More informationSMARTair Proximity access control
SMARTair Proximity access control We take the worry out of protecting what s valuable to you. Lockwood: no worries www. What is SMARTair Security, simplicity, convenience SMARTair is a powerful access
More informationNetwork Bullet Camera. Quick Operation Guide
Network Bullet Camera Quick Operation Guide Thank you for purchasing our product. If there are any questions, or requests, please do not hesitate to contact the dealer. About This Document This manual
More informationSplashtop Enterprise for IoT Devices - Quick Start Guide v1.0
Introduction For information about different deployment choices, please see chapter 3 of the full Splashtop Center Administrator s Guide. Splashtop Enterprise for IoT Devices is comprised of three components:
More informationIPCorder KNR-2008/12/16
IPCorder KNR-2008/12/16 Quick Installation Guide Thank you for purchasing this KOUKAAM product. Before you start using it, please read this installation guide which will quickly guide you through the setup
More informationVMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Windows VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationSafeConsole On-Prem Install Guide
version 5.4 DataLocker Inc. December, 2018 Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 3 How do the devices become managed by SafeConsole?....................
More informationVMware AirWatch Content Gateway Guide for Windows
VMware AirWatch Content Gateway Guide for Windows AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationCHECKLIST FOR IT AND SECURITY PERSONNEL
ABSTRACT This document describes basic requirements for PC, Operating Systems and Networks for IDenticard PremiSys Software CHECKLIST FOR IT April 17, 2018 AND SECURITY PERSONNEL IDenticard PremiSys v3.2
More informationCPM Quick Start Guide V2.2.0
CPM Quick Start Guide V2.2.0 1 Content 1 Introduction... 3 1.1 Launching the instance... 3 1.2 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 3 3 Creating a Simple Backup
More informationANNEX. Organizational and technical measures
ANNEX Organizational and technical measures The Data Processor has implemented the measures as described in this exhibit insofar as the respective measure contributes or is capable of contributing directly
More informationenalyzer enalyzer security
enalyzer enalyzer security A documentation that provides an in depth description, that can be read as is, or forwarded to IT departments demanding more technical information. Copenhagen, May 2018 www.enalyzer.com
More informationHosted Testing and Grading
Hosted Testing and Grading Technical White Paper July 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or
More informationVMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationSangfor adesk v5.1 Feature List
Sangfor adesk v5.1 Feature List Category Feature Description Terminal and Operation System Terminal Thin Client PC, ipad, iphone, Android smartphone (above version 2.5) OS Windows 7 (32 bit & 64 bit),
More informationECONOMIC DISCLOSURE STATEMENT AND AFFIDAVIT (EDS) The web link for the Online EDS is https://webapps.cityofchicago.org/edsweb
CITY OF CHICAGO Department of Procurement Services Jamie L. Rhee, Chief Procurement Officer 121 North LaSalle Street, Room 403 Chicago, Illinois 60602-1284 ECONOMIC DISCLOSURE STATEMENT AND AFFIDAVIT (EDS)
More informationChoosing a sophisticated locking system: Where security is an issue, compromise is simply not an option
Choosing a sophisticated locking system: Where security is an issue, compromise is simply not an option In a world increasingly challenged by mounting security threats, the need for comprehensive locking
More informationSage 300 People & Web Self Service Technical Information & System Requirements
Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People Architecture The Sage 300 People application is a 2-tier application with the program and database residing
More informationVMware AirWatch Content Gateway Guide For Linux
VMware AirWatch Content Gateway Guide For Linux AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationRespond quickly to security threats, lost or stolen keys, or personnel changes without the added cost of changing your locks and keys.
Medeco CLIQ The Medeco Solution Medeco CLIQ is an Intelligent Key locking and access control solution, combining electronic and mechanical technologies. Managed via cloud-based software, Medeco CLIQ provides
More informationReal-time access control by your side!
Real-time access control by your side! SMARTair Pro Wireless Online, flexible online control for smart facilities. ASSA ABLOY, the global leader in door opening solutions 1 Be smart in a busy and constantly
More informationCPM. Quick Start Guide V2.4.0
CPM Quick Start Guide V2.4.0 1 Content 1 Introduction... 3 Launching the instance... 3 CloudFormation... 3 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 4 CPM Server Configuration...
More informationCertification Authority
Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying
More informationVMware AirWatch Content Gateway Guide for Windows
VMware AirWatch Content Gateway Guide for Windows AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationDeploy the ExtraHop Discover Appliance 1100
Deploy the ExtraHop Discover Appliance 1100 Published: 2018-07-17 The following procedures explain how to deploy an ExtraHop Discover appliance 1100. System requirements Your environment must meet the
More informationXerox Audio Documents App
Xerox Audio Documents App Additional information, if needed, on one or more lines Month 00, 0000 Information Assurance Disclosure 2018 Xerox Corporation. All rights reserved. Xerox, Xerox,
More informationVMware AirWatch Content Gateway Guide for Windows
VMware AirWatch Content Gateway Guide for Windows AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationVMware AirWatch Content Gateway Guide for Linux For Linux
VMware AirWatch Content Gateway Guide for Linux For Linux Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationDooblo SurveyToGo: Security Overview
Dooblo SurveyToGo: Security Overview November, 2013 Written by: Dooblo Page 1 of 11 1 Table of Contents 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 PURPOSE... 3 2 PHYSICAL DATA CENTER SECURITY... 4 2.1 OVERVIEW...
More informationRevised September 2011 Broadband Access Agreement for BIT Communications
Revised September 2011 Broadband Access Agreement for BIT Communications 1 This Broadband Access Agreement for BIT Communications High Speed Internet serves as a confirmation and acknowledgment of the
More information1 Data Center Requirements
1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider
More informationUser s Guide: Applied Functions
User s Guide: Applied Functions Table of contents 1 Using Web Connection 1.1 Web Connection... 1-2 Web Connection...1-2 Operating environment...1-2 1.2 Operations required to use this function... 1-2 1.2.1
More informationRemote Access System for STAM-2 Monitoring Station STAM-VIEW
Remote Access System for STAM-2 Monitoring Station STAM-VIEW Installation Manual stam-view_i_en 10/11 SATEL sp. z o.o. ul. Schuberta 79 80-172 Gdańsk POLAND tel. + 48 58 320 94 00 info@satel.pl www.satel.eu
More informationVMware AirWatch Content Gateway Guide for Windows
VMware AirWatch Content Gateway Guide for Windows Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationEasy UI Solution 2.1 Installation Guide
Easy UI Solution 2.1 Installation Guide Thank you for selecting our product. This guide is intended for System Administrators, and describes how to install Easy UI Solution 2.1 (hereafter referred to as
More informationSonicOS Release Notes
SonicOS Contents Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 4 Upgrading SonicOS Enhanced Image Procedures... 5 Related Technical Documentation... 10 Platform Compatibility The SonicOS
More informationCERN Certification Authority
CERN Certification Authority Emmanuel Ormancey (IT/IS) What are Certificates? What are Certificates? Digital certificates are electronic credentials that are used to certify the identities of individuals,
More informationPage 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES
002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission
More informationM2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres
M2M / IoT Security Eurotech`s Everyware IoT Security Elements Overview Robert Andres 23. September 2015 The Eurotech IoT Approach : E2E Overview Application Layer Analytics Mining Enterprise Applications
More informationticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding
ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding THOMAS SAMANT thomas@terainsights.com Tera Insights, LLC Feb 15th 2018 ALIN DOBRA alin@terainsights.com
More informationWhy choose Medeco? Medeco Security Locks A History of High Security and Innovation
Medeco Logic Why choose Medeco? Since its inception in 1968, Medeco has been a pioneer in the locking industry and a trusted partner to provide enhanced security and accountability solutions. With more
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationUniversity of Pittsburgh Security Assessment Questionnaire (v1.7)
Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided
More informationAppSense DataNow. Release Notes (Version 4.0) Components in this Release. These release notes include:
AppSense DataNow Release Notes (Version 4.0) These release notes include: Components in this Release Important Upgrade Information New Features Bugs Fixed Known Issues and Limitations Supported Operating
More informationFACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?
FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit
More informationNRG Oncology and VisionTree Optimal Care (VTOC) Frequently Asked Questions
NRG Oncology and VisionTree Optimal Care (VTOC) Frequently Asked Questions Overview VisionTree Optimal Care (VTOC) v4.1 is a secure, encrypted cloud-based platform to collect/report patient reported outcomes
More informationPCI DSS Compliance. White Paper Parallels Remote Application Server
PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3
More informationAvalanche Remote Control User Guide. Version 4.1
Avalanche Remote Control User Guide Version 4.1 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095
More informationGB-Ware. Quick Guide. Powered by: Tel: Fax Web:
Powered by: GB-OS 6.1 GB-Ware Quick Guide GBWAQG201208-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com Web:
More informationData Security at Smart Assessor
Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5
More informationServer Installation ZENworks Mobile Management 2.6.x January 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.6.x January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationControl Center Over the NET Management Software
CC2000 Control Center Over the NET Management Software Physical server sales diminished in 2009 as a result of an increased migration to virtual server systems. Recently, however, due to older equipment
More informationSECURITY DOCUMENT. 550archi
SECURITY DOCUMENT 550archi Documentation for XTM Version 10.3 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of this publication may be reproduced or
More informationJuniper Vendor Security Requirements
Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks
More informationUsing the Terminal Services Gateway Lesson 10
Using the Terminal Services Gateway Lesson 10 Skills Matrix Technology Skill Objective Domain Objective # Deploying a TS Gateway Server Configure Terminal Services Gateway 2.2 Terminal Services (TS) Web
More informationBelarc Product Description
Belarc Product Description BelManage Base Belarc's architecture is based on a single enterprise-wide server and database. There is no requirement to maintain local servers or scanners. Belarc's discovery
More informationThe simplified guide to. HIPAA compliance
The simplified guide to HIPAA compliance Introduction HIPAA, the Health Insurance Portability and Accountability Act, sets the legal requirements for protecting sensitive patient data. It s also an act
More informationGLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications
GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter
More informationAppPulse Point of Presence (POP)
AppPulse Point of Presence Micro Focus AppPulse POP service is a remotely delivered solution that provides a managed environment of Application Performance Management. AppPulse POP service supplies real-time
More informationInventory and Reporting Security Q&A
Inventory and Reporting Security Q&A General Q. What is Inventory Reporting, Collection, and Analysis? A. Inventory Reporting, Collection, and Analysis is a tool that discovers, collects, and analyzes
More informationepad 5.0 Mobile Keypad
Programming Guide epad 5.0 Mobile Keypad Description Providing much-needed flexibility, the epad 5.0 Mobile Keypad allows users to control their DMP security system using an Internet browser. The epad
More informationQuick Installation Guide
Quick Installation Guide DL-200 Cellular Data logger V1.2_201610 TABLE OF CONTENTS CHAPTER 1 INTRODUCTION... 4 1.1 CONTENTS LIST... 5 1.2 HARDWARE INSTALLATION... 6 1.2.1 WARNING... 6 1.2.2 SYSTEM REQUIREMENTS...
More informationEchidna Concepts Guide
Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this
More informationGuide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1
Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware
More informationVeeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide June, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,
More informationQuoVadis Trustlink Schweiz AG Teufenerstrasse 11, 9000 St. Gallen
QuoVadis The Swiss solution for digital certificates with worldwide distribution QuoVadis Trustlink Schweiz AG Teufenerstrasse 11, 9000 St. Gallen Overview!! Check list for Root signing or managed PKI!!
More informationCLIQ Go. Access control at your fingertips
CLIQ Go Access control at your fingertips Anytime, anywhere With the CLIQ Go app, you keep your business secure on the go. Manage your security via the App Because your business is changing constantly
More informationDeploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2
Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationIntroduction and Data Center Topology For Your System
Introduction and Data Center Topology For Your System This chapter provides an introduction, a data center overview, and VMware vcenter requirements for your system. Introducing Cisco WebEx Meetings Server,
More informationARCHITECTURE GUIDE. Campaign Manager 6.0
ARCHITECTURE GUIDE Campaign Manager 6.0 VERSION CONTROL Version Date Author Changes 1.0 28 April 2017 D Cooper Release RELATED DOCUMENTS The related documents are located in the Alterian product help.
More informationPartner Pre-Install Checklist: Common Service Platform Collector (CSP-C) for Smart Portal 0.5
Partner Support Service Partner Pre-Install Checklist: Common Service Platform Collector (CSP-C) for Smart Portal 0.5 Cisco Corporate Headquarters 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com
More informationEMC Secure Remote Support Device Client for Symmetrix Release 2.00
EMC Secure Remote Support Device Client for Symmetrix Release 2.00 Support Document P/N 300-012-112 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
More informationPA-DSS Implementation Guide For
PA-DSS Implementation Guide For, CAGE (Card Authorization Gateway Engine), Version 4.0 PCI PADSS Certification 2.0 December 10, 2013. Table of Contents 1. Purpose... 4 2. Delete sensitive authentication
More informationSingle Secure Credential to Access Facilities and IT Resources
Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access
More informationInstalling VMware vsphere 5.1 Components
Installing VMware vsphere 5.1 Components Module 14 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks
More informationCONFIGURING SQL SERVER 2008 REPORTING SERVICES FOR REDHORSE CRM
CONFIGURING SQL SERVER 2008 REPORTING SERVICES FOR REDHORSE CRM This article will walk you thru the initial configuration of SQL Server Reporting Services. Choosing an Instance Reporting Services is configured
More informationCA Agile Central Administrator Guide. CA Agile Central On-Premises
CA Agile Central Administrator Guide CA Agile Central On-Premises 2018.1 Table of Contents Overview... 3 Server Requirements...3 Browser Requirements...3 Access Help and WSAPI...4 Time Zone...5 Architectural
More informationnew world ERP Server Migration Checklist New World ERP TMS
new world ERP Server Migration Checklist Revised 2/20/17 Table of Contents Overview... 3 Document and Build Environments... 4 Test the New Servers... 7 Cut Over to New Servers... 8 Appendix A: Server Documentation
More informationPoint ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core Version 1.02 POINT TRANSACTION SYSTEMS AB Box 92031,
More informationAppController :21:56 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
AppController 2.6 2014-03-18 13:21:56 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents AppController 2.6... 6 About This Release... 8 Getting Started...
More information