CLIQ Remote - System description and requirements

Size: px
Start display at page:

Download "CLIQ Remote - System description and requirements"

Transcription

1 CLIQ Remote - System description and requirements

2 1. Introduction CLIQ Remote - Access at a distance CLIQ Remote is an electromechanical lock system with an additional level of security and flexibility, a natural choice for those looking for a modern security solution. CLIQ Remote combines a modern mechanical basic platform with an advanced electronic function. A major advantage of CLIQ Remote is the distance function. This locking system can change access and permission at a distance. For example, you can sit in Stockholm and, through the CLIQ Web Manager software give access to your keys via the programming terminal. A contractor in the North of Sweden may get access to a facility, maybe an antenna or a mast, by programming his/her key in wall readers at the facility. CLIQ Remote features: 1. A key with CLIQ has built-in clock and memory. 2. Validation of keys increases security in case of loss. 3. Audit trails and logs provides security for all users and managers. 4. Update permissions remotely minimizes work and saves time. 5. The combination of electronic and mechanical locking gives a unique level of security 2

3 2. Main features of CLIQ Remote List of functions in the CLIQ Remote locking system: Easy to install - CLIQ is a cost efficient offline systems that do not require electrical wiring or batteries in the lock cylinders. Event Logs - CLIQ provides easy access to accurate verified log data from each cylinder lock and key in the lock system. Individual keys - Protected by strong digital encryption, each key can be designated for use by a single individual. The key can then be given access to all the areas that the individual should move in. If the key is lost and blocked, a new key can be generated in its place. Time-based access - CLIQ enables the definition of a time-based schedule in which the days and times of access is permitted. Digital Key Management - CLIQ Web Manager keeps track of which keys that belong to different key holders. The keys can be issued completely digitally without the interference of paper. It s smart administration and good for the environment. Electronic keying - keys can be updated without the presence of physical key of the administrator. Validation of keys - Adds safety to the locking system by forcing key holders to validate the key with updates in an adjacent programming station. It also ensures that the event logs are transmitted to the server and is available for system administrators. Grouping Features - Simplifies administration. CLIQ Web Manager makes it possible to provide access to groups of cylinders and groups of people based on e.g. geographical location or role in the organization. Domains - Just like grouping permissions and users the administrator's role can also be controlled to see only their part of the locking system with the domain function. 3

4 3. Documentation about CLIQ Remote List of information that is available on the CLIQ Remote system: Brochure - CLIQ Remote Access at a distance Product sheet - CLIQ Remote Cylinder Product sheet - CLIQ Remote Key Product sheet - Wall PD Product sheet - Vandal-resistant Wall PD Product sheet - Mobile PD Product sheet - CLIQ Web Manager / System requirements CLIQ Remote IT-Compliance CLIQ Certifications and classifications CLIQ Remote FAQ SSL-certificates An introduction Manual CLIQ Web Manager The above information is available through your ASSA Retailer and on: Design of a CLIQ Remote locking system should be made in cooperation between the property / security manager and installer, to gain insight in how the business can benefit from the features and thus build a system that meets the customer's needs. At the planning stage it should be taken into account how the expansion of the system can be done in an efficient manner. It is also important to the company's IT department is involved at an early stage so that the necessary rights to PCs and networks is approved. ASSA manages servers, backup and IT operation when the agreement of the SaaS service contract has been signed. Check the following: Fire Regulations for the door environment Fire Standards Evacuation routes Emergency exits Safety regulations Mechanical requirements for perimeter protection Safety requirements for special areas such as server rooms / technical rooms Local requirements from the insurance company IT security with firewalls, administrator rights, etc. 4

5 4. Important Information The following information is required before you begin the installation of a CLIQ Remote system. This information is also needed to if you contact the ASSA technical support. 4.1 Agreement The agreement for SaaS services and certificate is signed between ASSA and the client company at the time of approval of the license agreement made via the address specified in advance. The customer undertakes to register a new address in the system. This is to ensure that the communication regarding licenses and certificates is not specified to a certain employee. This address is then connected to the system operator for the system. The locking system should be treated as a business function. The name of this account should be: "cliqremote" Selected address: Ex: cliqremote@customer.com System manager A person shall be appointed to the transmission system and be responsible for software and contact the dealer or installer. The system operator has been appointed:. The address registered will receive the Certificate Files from ASSA. 5

6 4.2 Checklist for system setup The following manuals should be at the IT department of the client company before beginning the installation and the infrastructure to be prepared for the new locking system. Make sure that these requirements are met: (mark with an X)) Manual CLIQ Web Manager [ ] CLIQ Remote - FAQ [ ] Address is created [ ] Drivers for Terminal PD are installed [ ] on the client computers The recommended version of Java installed [ ] on the client computers Places of wall-mounted PD s are assigned [ ] and network connectivity is available Communication on port 443 is allowed [ ] Outgoing traffic Communication on port 8443 is allowed [ ] Outgoing traffic This document is signed by both parties [ ] 4.3 Support Support of the software is handled by a retailer selected by the customer. If the customer and the dealer opts support directly between the customer and ASSA this is concluded in a separate agreement. What type of Support Agreement has been selected: The retailer provides support [ ] Support agreement CLIQ Remote [ ] (For direct support between the customer and ASSA) 6

7 5. System Overview The diagram describes the functions of the CLIQ Web Manager environment. 5.1 SSL Client-certificate Encryption protects data during transmission The CLIQ Remote Web server and the browser uses Certificates of Secure Sockets Layer (SSL) protocol to assist users to protect data during transmission. A unique, encrypted channel for private communications are created on the otherwise public Internet. Each SSL Certificate consists of a pair of keys, as well as verified identification data. When a CLIQ Remote (or client) points to a secure website, the server shares the public key with the client in order to create an encryption method and a unique session key. CLIQ Web Manager confirms that it recognizes and trusts the issuer of the SSL certificate. This process is called the "SSL handshake" and it initiates a secure session that protects message privacy and message integrity. 7

8 6. The CLIQ Remote server All CLIQ Remote servers are managed by ASSA AB and made available to the client company through a Service Agreement (SaaS). System functionality: The ability to manage the locking system. Adding up the staff. Hand out keys. Change the permissions on the keys. Being able to tag (label) all the objects to facilitate the search. - An average key update is about 20-30kB. To update daily CLIQ keys by Wall PD units. Being able to block the lost keys. Primarily from being updated in Wall PD, but also to block the key in the cylinders. Being able to read the logs out of the cylinders and keys. 6.1 Schematic overview Figure 1: 8

9 7. Administrator PC Requirements to run the CLIQ Web Manager software 7.1 Client computer hardware Hardware CPU RAM Hard Disk Minimum requirement Capable of running Windows Vista/7/8/10 Capable of running Windows Vista/7/8/10 20 Mb available 7.2 Client tablets Hardware Microsoft Surface Pro* Minimum requirement Windows 7 Pro/Ent/Ult (32 or 64bit) Windows 8 (32 or 64bit) *All tablets capable of running Microsoft based operating systems 7.3 Software Software Operating System ASSA CLIQ Connect Web browser PDF-reader Required product Windows Vista/7/8/10 Linux capable of running Mozilla Firefox OSX capable of running Mozilla Firefox ASSA ABLOY CLIQ Connect (latest version by ASSA) Internet Explorer 8/9/10/11 (32 or 64-bit) Firefox or later (32 or 64-bit) All standard readers *The browser security setting Do not save encrypted pages to disk must be disabled. 9

10 8. Login to the web software ASSA provides the end customer with the information and files required to sign in and manage the CLIQ Remote locking system. Via our Admin Page for CLIQ Web Manager at assa.se the following is offered: Download center - Driver files Knowledge - ASSA Smart Guides for user Operating information - the latest news about new versions and features of the software Ability to create new SSL certificates - When administrators need to renew their credentials 10

11 9. Updating devices (PD) To change permissions for keys the system uses programming units called PD s. The Local PD is used by the administrator to log into the CLIQ Web Manager software. The Remote PDs (Wall PDs and Mobile PD s) access the CLIQ Remote server by mutual authentication to create an https session. Also the CLIQ Web Manager server uses an https session to communicate with the CLIQ Remote server. The mutual authentication requires a client certificate for CLIQ Web Manager and a server certificate for the CLIQ Remote web application. Each Remote PD is also prepared with a client certificate and a CA certificate to establish an https session with the CLIQ Remote application. Web services require their own client certificate. - An average key update is about 20-30kB. For sending notifications to the users an SMTP server is used. This server is covered by a service contract and is provided by ASSA. Figure 2: Local PD Figure 3: Mobile PD with smart phone Figure 4: Wall PD Figure 5: Vandal-resistant wall PD 11

12 10. Wall PD setup information This information must be available before the installation of a CLIQ Remote systems can begin. Also remember to draw the network cables to the places where Wall PD units are to be installed before the installation starts. A Wall PD is used in a CLIQ Remote system to allow the user to update their key authorizations without having to seek out the administrator. 1. How many key updating devices should be installed?: (write number) Wall mounted [ ] Mobile [ ] 2. What type of IP address will the Wall PD units use: (mark with an X) Static IP [ ] Dynamic DHCP [ ] 3. If static IP address is used which addresses can be used: Which Subnet Mask should be used: Which default gateway should be used: Eventual DNS server adress: Name for the Wall PD in the network: What power source will the Wall PD units use: Power over Ethernet PoE [ ] 12v 24v separate supply [ ] 5. To deploy a Wall PD a USB memory less than 2Gb is needed. A certificate is generated in the web software CLIQ Web Manager and then transferred to the Wall PD device with a mini USB cable. For more information see CLIQ Web Manager Manual USB memory is available Yes [ ] No [ ] 12

13 11. Maintenance An overview of the planed maintenance and its impact on the system. Downtime matrix Info Dynamic keys Normal keys Remote PDs Administration SOE Environment Service windows Patch OS Reserved for Every 3 rd weekend in month saturday SOE DB changes upgrades Reserved for Every 3 rd weekend in month saturday Can do offline revalidate Cannot be reprogrammed PD can do an offline revalidation Not functional VM restoration Exchange server changes mail SOE Network /infrastructure/ storage changes Can do offline revalidate Cannot be reprogrammed PD can do an offline revalidation Upgrades of CWM (with DB changes) Can do offline revalidate PD can do an offline revalidation Not functional Cannot be reprogrammed Upgrades of CWM (no DB changes) 2 times a year Office hours 2hours Migration of CWM environment Can do offline revalidate Cannot be reprogrammed PD can do an offline revalidation Not functional Extensions Customer locks the system, update DB, customer unlocks system Not functional Renew Server cert The acronym CWM is used for CLIQ Web Manager. *CWM - CLIQ Web Manager. * Offline PD is a backup feature that allows key validation if the network is not be available, please contact your sales representative for more information on configuration. 13

14 By signing this agreement the customer assures that the IT Compliance requirements set by ASSA are met. This Agreement is signed in two (2) copies, of which each party has received one. Place and date Place and date Signature Signature Name Customer name 14

15 Feedback on this document can be sent to: 15

16 16

CLIQ Remote. Access at a distance

CLIQ Remote. Access at a distance CLIQ Remote Access at a distance CLIQ Remote combines mechanical and electronic security The basic idea of CLIQ technology is the creation of a lock system that retains a high level of security despite

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

SafeConsole On-Prem Install Guide

SafeConsole On-Prem Install Guide SafeConsole On-Prem Install Guide This guide applies to SafeConsole 5.0.5 Introduction This guide describes how to install a new SafeConsole server on Windows using the SafeConsole installer. As an option,

More information

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem

SafeConsole On-Prem Install Guide. version DataLocker Inc. July, SafeConsole. Reference for SafeConsole OnPrem version 5.2.2 DataLocker Inc. July, 2017 SafeConsole Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 2 How do the devices become managed by SafeConsole?....................

More information

KEYS ALWAYS IN THE RIGHT HANDS

KEYS ALWAYS IN THE RIGHT HANDS KEYS ALWAYS IN THE RIGHT HANDS ASSA ABLOY, the global leader in door opening solutions INTELLIGENT KEY CABINET TRAKA TOUCH DO YOU KNOW WHERE YOUR KEYS ARE RIGHT NOW? Traka does and it can tell you, too

More information

Respond quickly to security threats, lost or stolen keys, or personnel changes without the added cost of changing your locks and keys.

Respond quickly to security threats, lost or stolen keys, or personnel changes without the added cost of changing your locks and keys. Medeco CLIQ The Medeco Solution Medeco CLIQ is an Intelligent Key locking and access control solution, combining electronic and mechanical technologies. Managed via cloud-based software, Medeco CLIQ provides

More information

emarketeer Information Security Policy

emarketeer Information Security Policy emarketeer Information Security Policy Version Date 1.1 2018-05-03 emarketeer Information Security Policy emarketeer AB hereafter called emarketeer is a leading actor within the development of SaaS-service

More information

AXIS Camera Station S20 Appliance Series AXIS Camera Station S2008 Appliance AXIS Camera Station S2016 Appliance AXIS Camera Station S2024 Appliance

AXIS Camera Station S20 Appliance Series AXIS Camera Station S2008 Appliance AXIS Camera Station S2016 Appliance AXIS Camera Station S2024 Appliance AXIS Camera Station S2008 Appliance AXIS Camera Station S2016 Appliance AXIS Camera Station S2024 Appliance User Manual Table of Contents About the AXIS Camera Station S20 Appliance Series.............

More information

Code Alert Customer Information Technology Requirements Series 30 Software

Code Alert Customer Information Technology Requirements Series 30 Software Code Alert Customer Information Technology Requirements Series 30 Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part of this work may

More information

7.16 INFORMATION TECHNOLOGY SECURITY

7.16 INFORMATION TECHNOLOGY SECURITY 7.16 INFORMATION TECHNOLOGY SECURITY The superintendent shall be responsible for ensuring the district has the necessary components in place to meet the district s needs and the state s requirements for

More information

Cisco s AnyConnect VPN Client (version 2.4)

Cisco s AnyConnect VPN Client (version 2.4) Table of Contents [TOC]: Introduction Getting Started Installation Overview Using the Softphone System Requirements Introduction: Valley City State University is deploying Cisco s AnyConnect Virtual Private

More information

SAS SOLUTIONS ONDEMAND

SAS SOLUTIONS ONDEMAND DECEMBER 4, 2013 Gary T. Ciampa SAS Solutions OnDemand Advanced Analytics Lab Birmingham Users Group, 2013 OVERVIEW SAS Solutions OnDemand Started in 2000 SAS Advanced Analytics Lab (AAL) Created in 2007

More information

Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software

Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software Safe Place and Code Alert Customer Information Technology Requirements Series 10.x Software 2017 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part

More information

CODE ALERT Enterprise Software Customer Information Technology Requirements

CODE ALERT Enterprise Software Customer Information Technology Requirements CODE ALERT Enterprise Software Customer Information Technology Requirements 2018 RF Technologies, Inc. All specifications subject to change without notice. All Rights Reserved. No Part of this work may

More information

Network Projector Operation Guide

Network Projector Operation Guide Network Projector Operation Guide Table of contents Preparation...4 Connecting the projector with your computer...4 Wired connection... 4 Wireless connection (for selected models)... 5 QPresenter...8 Minimum

More information

PMS 138 C Moto Black spine width spine width 100% 100%

PMS 138 C Moto Black spine width spine width 100% 100% Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of

More information

Firmware Update Details (v p)

Firmware Update Details (v p) Firmware Update Details (v0.32-07p) CONTENT: Instructions: How to Update New Features and Improvements Examples Issues Addressed Notes and Known Issues Requirements for the Update: e3 with software: 0.32-07e,

More information

Deploy the ExtraHop Discover 3100, 6100, 8100, or 9100 Appliances

Deploy the ExtraHop Discover 3100, 6100, 8100, or 9100 Appliances Deploy the ExtraHop Discover 3100, 6100, 8100, or 9100 s Published: 2017-12-29 This guide explains how to install the rack-mounted EDA 3100, EDA 6100, EDA 8100, and EDA 9100 ExtraHop Discover appliances.

More information

Forcepoint Sidewinder Control Center, Virtual Appliance. Installation Guide 5.3.x. Revision A

Forcepoint Sidewinder Control Center, Virtual Appliance. Installation Guide 5.3.x. Revision A Forcepoint Sidewinder Control Center, Virtual Appliance Installation Guide 5.3.x Revision A Table of contents 1 Virtual Appliance requirements...3 Two Control Center options...3 Sizing guidelines... 3

More information

The Medeco Solution for Controlled Access and Accountability

The Medeco Solution for Controlled Access and Accountability Medeco XT The Medeco Solution for Controlled Access and Accountability Medeco XT is a powerful Intelligent Key System that uses innovative technology to deliver a flexible, cost-effective solution for

More information

IPS265T / IPS275T. TimeIPS Server. Installation Guide

IPS265T / IPS275T. TimeIPS Server. Installation Guide IPS265T / IPS275T Server Installation Guide FCC Declaration of Conformity (DoC) Compliance Information (according to FCC 2.1077) (1) Product: IPS265T / IPS275T. The above device complies with Part 15 of

More information

SMARTair Proximity access control

SMARTair Proximity access control SMARTair Proximity access control We take the worry out of protecting what s valuable to you. Lockwood: no worries www. What is SMARTair Security, simplicity, convenience SMARTair is a powerful access

More information

Network Bullet Camera. Quick Operation Guide

Network Bullet Camera. Quick Operation Guide Network Bullet Camera Quick Operation Guide Thank you for purchasing our product. If there are any questions, or requests, please do not hesitate to contact the dealer. About This Document This manual

More information

Splashtop Enterprise for IoT Devices - Quick Start Guide v1.0

Splashtop Enterprise for IoT Devices - Quick Start Guide v1.0 Introduction For information about different deployment choices, please see chapter 3 of the full Splashtop Center Administrator s Guide. Splashtop Enterprise for IoT Devices is comprised of three components:

More information

IPCorder KNR-2008/12/16

IPCorder KNR-2008/12/16 IPCorder KNR-2008/12/16 Quick Installation Guide Thank you for purchasing this KOUKAAM product. Before you start using it, please read this installation guide which will quickly guide you through the setup

More information

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Windows VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

SafeConsole On-Prem Install Guide

SafeConsole On-Prem Install Guide version 5.4 DataLocker Inc. December, 2018 Reference for SafeConsole OnPrem 1 Contents Introduction................................................ 3 How do the devices become managed by SafeConsole?....................

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

CHECKLIST FOR IT AND SECURITY PERSONNEL

CHECKLIST FOR IT AND SECURITY PERSONNEL ABSTRACT This document describes basic requirements for PC, Operating Systems and Networks for IDenticard PremiSys Software CHECKLIST FOR IT April 17, 2018 AND SECURITY PERSONNEL IDenticard PremiSys v3.2

More information

CPM Quick Start Guide V2.2.0

CPM Quick Start Guide V2.2.0 CPM Quick Start Guide V2.2.0 1 Content 1 Introduction... 3 1.1 Launching the instance... 3 1.2 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 3 3 Creating a Simple Backup

More information

ANNEX. Organizational and technical measures

ANNEX. Organizational and technical measures ANNEX Organizational and technical measures The Data Processor has implemented the measures as described in this exhibit insofar as the respective measure contributes or is capable of contributing directly

More information

enalyzer enalyzer security

enalyzer enalyzer security enalyzer enalyzer security A documentation that provides an in depth description, that can be read as is, or forwarded to IT departments demanding more technical information. Copenhagen, May 2018 www.enalyzer.com

More information

Hosted Testing and Grading

Hosted Testing and Grading Hosted Testing and Grading Technical White Paper July 2010 www.lexmark.com Lexmark and Lexmark with diamond design are trademarks of Lexmark International, Inc., registered in the United States and/or

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Sangfor adesk v5.1 Feature List

Sangfor adesk v5.1 Feature List Sangfor adesk v5.1 Feature List Category Feature Description Terminal and Operation System Terminal Thin Client PC, ipad, iphone, Android smartphone (above version 2.5) OS Windows 7 (32 bit & 64 bit),

More information

ECONOMIC DISCLOSURE STATEMENT AND AFFIDAVIT (EDS) The web link for the Online EDS is https://webapps.cityofchicago.org/edsweb

ECONOMIC DISCLOSURE STATEMENT AND AFFIDAVIT (EDS) The web link for the Online EDS is https://webapps.cityofchicago.org/edsweb CITY OF CHICAGO Department of Procurement Services Jamie L. Rhee, Chief Procurement Officer 121 North LaSalle Street, Room 403 Chicago, Illinois 60602-1284 ECONOMIC DISCLOSURE STATEMENT AND AFFIDAVIT (EDS)

More information

Choosing a sophisticated locking system: Where security is an issue, compromise is simply not an option

Choosing a sophisticated locking system: Where security is an issue, compromise is simply not an option Choosing a sophisticated locking system: Where security is an issue, compromise is simply not an option In a world increasingly challenged by mounting security threats, the need for comprehensive locking

More information

Sage 300 People & Web Self Service Technical Information & System Requirements

Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People Architecture The Sage 300 People application is a 2-tier application with the program and database residing

More information

VMware AirWatch Content Gateway Guide For Linux

VMware AirWatch Content Gateway Guide For Linux VMware AirWatch Content Gateway Guide For Linux AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

Respond quickly to security threats, lost or stolen keys, or personnel changes without the added cost of changing your locks and keys.

Respond quickly to security threats, lost or stolen keys, or personnel changes without the added cost of changing your locks and keys. Medeco CLIQ The Medeco Solution Medeco CLIQ is an Intelligent Key locking and access control solution, combining electronic and mechanical technologies. Managed via cloud-based software, Medeco CLIQ provides

More information

Real-time access control by your side!

Real-time access control by your side! Real-time access control by your side! SMARTair Pro Wireless Online, flexible online control for smart facilities. ASSA ABLOY, the global leader in door opening solutions 1 Be smart in a busy and constantly

More information

CPM. Quick Start Guide V2.4.0

CPM. Quick Start Guide V2.4.0 CPM Quick Start Guide V2.4.0 1 Content 1 Introduction... 3 Launching the instance... 3 CloudFormation... 3 CPM Server Instance Connectivity... 3 2 CPM Server Instance Configuration... 4 CPM Server Configuration...

More information

Certification Authority

Certification Authority Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

Deploy the ExtraHop Discover Appliance 1100

Deploy the ExtraHop Discover Appliance 1100 Deploy the ExtraHop Discover Appliance 1100 Published: 2018-07-17 The following procedures explain how to deploy an ExtraHop Discover appliance 1100. System requirements Your environment must meet the

More information

Xerox Audio Documents App

Xerox Audio Documents App Xerox Audio Documents App Additional information, if needed, on one or more lines Month 00, 0000 Information Assurance Disclosure 2018 Xerox Corporation. All rights reserved. Xerox, Xerox,

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

VMware AirWatch Content Gateway Guide for Linux For Linux

VMware AirWatch Content Gateway Guide for Linux For Linux VMware AirWatch Content Gateway Guide for Linux For Linux Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Dooblo SurveyToGo: Security Overview

Dooblo SurveyToGo: Security Overview Dooblo SurveyToGo: Security Overview November, 2013 Written by: Dooblo Page 1 of 11 1 Table of Contents 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 PURPOSE... 3 2 PHYSICAL DATA CENTER SECURITY... 4 2.1 OVERVIEW...

More information

Revised September 2011 Broadband Access Agreement for BIT Communications

Revised September 2011 Broadband Access Agreement for BIT Communications Revised September 2011 Broadband Access Agreement for BIT Communications 1 This Broadband Access Agreement for BIT Communications High Speed Internet serves as a confirmation and acknowledgment of the

More information

1 Data Center Requirements

1 Data Center Requirements 1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider

More information

User s Guide: Applied Functions

User s Guide: Applied Functions User s Guide: Applied Functions Table of contents 1 Using Web Connection 1.1 Web Connection... 1-2 Web Connection...1-2 Operating environment...1-2 1.2 Operations required to use this function... 1-2 1.2.1

More information

Remote Access System for STAM-2 Monitoring Station STAM-VIEW

Remote Access System for STAM-2 Monitoring Station STAM-VIEW Remote Access System for STAM-2 Monitoring Station STAM-VIEW Installation Manual stam-view_i_en 10/11 SATEL sp. z o.o. ul. Schuberta 79 80-172 Gdańsk POLAND tel. + 48 58 320 94 00 info@satel.pl www.satel.eu

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Easy UI Solution 2.1 Installation Guide

Easy UI Solution 2.1 Installation Guide Easy UI Solution 2.1 Installation Guide Thank you for selecting our product. This guide is intended for System Administrators, and describes how to install Easy UI Solution 2.1 (hereafter referred to as

More information

SonicOS Release Notes

SonicOS Release Notes SonicOS Contents Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 4 Upgrading SonicOS Enhanced Image Procedures... 5 Related Technical Documentation... 10 Platform Compatibility The SonicOS

More information

CERN Certification Authority

CERN Certification Authority CERN Certification Authority Emmanuel Ormancey (IT/IS) What are Certificates? What are Certificates? Digital certificates are electronic credentials that are used to certify the identities of individuals,

More information

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES

Page 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES 002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission

More information

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres M2M / IoT Security Eurotech`s Everyware IoT Security Elements Overview Robert Andres 23. September 2015 The Eurotech IoT Approach : E2E Overview Application Layer Analytics Mining Enterprise Applications

More information

ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding

ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding ticrypt DEPLOYMENT OVERVIEW AND TIMELINE Information about hardware, deployment, and on-boarding THOMAS SAMANT thomas@terainsights.com Tera Insights, LLC Feb 15th 2018 ALIN DOBRA alin@terainsights.com

More information

Why choose Medeco? Medeco Security Locks A History of High Security and Innovation

Why choose Medeco? Medeco Security Locks A History of High Security and Innovation Medeco Logic Why choose Medeco? Since its inception in 1968, Medeco has been a pioneer in the locking industry and a trusted partner to provide enhanced security and accountability solutions. With more

More information

HP Instant Support Enterprise Edition (ISEE) Security overview

HP Instant Support Enterprise Edition (ISEE) Security overview HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

AppSense DataNow. Release Notes (Version 4.0) Components in this Release. These release notes include:

AppSense DataNow. Release Notes (Version 4.0) Components in this Release. These release notes include: AppSense DataNow Release Notes (Version 4.0) These release notes include: Components in this Release Important Upgrade Information New Features Bugs Fixed Known Issues and Limitations Supported Operating

More information

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS? FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? Financial companies choose how they share your personal information. Federal law gives consumers the right to limit

More information

NRG Oncology and VisionTree Optimal Care (VTOC) Frequently Asked Questions

NRG Oncology and VisionTree Optimal Care (VTOC) Frequently Asked Questions NRG Oncology and VisionTree Optimal Care (VTOC) Frequently Asked Questions Overview VisionTree Optimal Care (VTOC) v4.1 is a secure, encrypted cloud-based platform to collect/report patient reported outcomes

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

Avalanche Remote Control User Guide. Version 4.1

Avalanche Remote Control User Guide. Version 4.1 Avalanche Remote Control User Guide Version 4.1 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095

More information

GB-Ware. Quick Guide. Powered by: Tel: Fax Web:

GB-Ware. Quick Guide. Powered by: Tel: Fax Web: Powered by: GB-OS 6.1 GB-Ware Quick Guide GBWAQG201208-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com Web:

More information

Data Security at Smart Assessor

Data Security at Smart Assessor Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5

More information

Server Installation ZENworks Mobile Management 2.6.x January 2013

Server Installation ZENworks Mobile Management 2.6.x January 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.6.x January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Control Center Over the NET Management Software

Control Center Over the NET Management Software CC2000 Control Center Over the NET Management Software Physical server sales diminished in 2009 as a result of an increased migration to virtual server systems. Recently, however, due to older equipment

More information

SECURITY DOCUMENT. 550archi

SECURITY DOCUMENT. 550archi SECURITY DOCUMENT 550archi Documentation for XTM Version 10.3 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of this publication may be reproduced or

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

Using the Terminal Services Gateway Lesson 10

Using the Terminal Services Gateway Lesson 10 Using the Terminal Services Gateway Lesson 10 Skills Matrix Technology Skill Objective Domain Objective # Deploying a TS Gateway Server Configure Terminal Services Gateway 2.2 Terminal Services (TS) Web

More information

Belarc Product Description

Belarc Product Description Belarc Product Description BelManage Base Belarc's architecture is based on a single enterprise-wide server and database. There is no requirement to maintain local servers or scanners. Belarc's discovery

More information

The simplified guide to. HIPAA compliance

The simplified guide to. HIPAA compliance The simplified guide to HIPAA compliance Introduction HIPAA, the Health Insurance Portability and Accountability Act, sets the legal requirements for protecting sensitive patient data. It s also an act

More information

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter

More information

AppPulse Point of Presence (POP)

AppPulse Point of Presence (POP) AppPulse Point of Presence Micro Focus AppPulse POP service is a remotely delivered solution that provides a managed environment of Application Performance Management. AppPulse POP service supplies real-time

More information

Inventory and Reporting Security Q&A

Inventory and Reporting Security Q&A Inventory and Reporting Security Q&A General Q. What is Inventory Reporting, Collection, and Analysis? A. Inventory Reporting, Collection, and Analysis is a tool that discovers, collects, and analyzes

More information

epad 5.0 Mobile Keypad

epad 5.0 Mobile Keypad Programming Guide epad 5.0 Mobile Keypad Description Providing much-needed flexibility, the epad 5.0 Mobile Keypad allows users to control their DMP security system using an Internet browser. The epad

More information

Quick Installation Guide

Quick Installation Guide Quick Installation Guide DL-200 Cellular Data logger V1.2_201610 TABLE OF CONTENTS CHAPTER 1 INTRODUCTION... 4 1.1 CONTENTS LIST... 5 1.2 HARDWARE INSTALLATION... 6 1.2.1 WARNING... 6 1.2.2 SYSTEM REQUIREMENTS...

More information

Echidna Concepts Guide

Echidna Concepts Guide Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide June, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

QuoVadis Trustlink Schweiz AG Teufenerstrasse 11, 9000 St. Gallen

QuoVadis Trustlink Schweiz AG Teufenerstrasse 11, 9000 St. Gallen QuoVadis The Swiss solution for digital certificates with worldwide distribution QuoVadis Trustlink Schweiz AG Teufenerstrasse 11, 9000 St. Gallen Overview!! Check list for Root signing or managed PKI!!

More information

CLIQ Go. Access control at your fingertips

CLIQ Go. Access control at your fingertips CLIQ Go Access control at your fingertips Anytime, anywhere With the CLIQ Go app, you keep your business secure on the go. Manage your security via the App Because your business is changing constantly

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Introduction and Data Center Topology For Your System

Introduction and Data Center Topology For Your System Introduction and Data Center Topology For Your System This chapter provides an introduction, a data center overview, and VMware vcenter requirements for your system. Introducing Cisco WebEx Meetings Server,

More information

ARCHITECTURE GUIDE. Campaign Manager 6.0

ARCHITECTURE GUIDE. Campaign Manager 6.0 ARCHITECTURE GUIDE Campaign Manager 6.0 VERSION CONTROL Version Date Author Changes 1.0 28 April 2017 D Cooper Release RELATED DOCUMENTS The related documents are located in the Alterian product help.

More information

Partner Pre-Install Checklist: Common Service Platform Collector (CSP-C) for Smart Portal 0.5

Partner Pre-Install Checklist: Common Service Platform Collector (CSP-C) for Smart Portal 0.5 Partner Support Service Partner Pre-Install Checklist: Common Service Platform Collector (CSP-C) for Smart Portal 0.5 Cisco Corporate Headquarters 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

EMC Secure Remote Support Device Client for Symmetrix Release 2.00

EMC Secure Remote Support Device Client for Symmetrix Release 2.00 EMC Secure Remote Support Device Client for Symmetrix Release 2.00 Support Document P/N 300-012-112 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

PA-DSS Implementation Guide For

PA-DSS Implementation Guide For PA-DSS Implementation Guide For, CAGE (Card Authorization Gateway Engine), Version 4.0 PCI PADSS Certification 2.0 December 10, 2013. Table of Contents 1. Purpose... 4 2. Delete sensitive authentication

More information

Single Secure Credential to Access Facilities and IT Resources

Single Secure Credential to Access Facilities and IT Resources Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access

More information

Installing VMware vsphere 5.1 Components

Installing VMware vsphere 5.1 Components Installing VMware vsphere 5.1 Components Module 14 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks

More information

CONFIGURING SQL SERVER 2008 REPORTING SERVICES FOR REDHORSE CRM

CONFIGURING SQL SERVER 2008 REPORTING SERVICES FOR REDHORSE CRM CONFIGURING SQL SERVER 2008 REPORTING SERVICES FOR REDHORSE CRM This article will walk you thru the initial configuration of SQL Server Reporting Services. Choosing an Instance Reporting Services is configured

More information

CA Agile Central Administrator Guide. CA Agile Central On-Premises

CA Agile Central Administrator Guide. CA Agile Central On-Premises CA Agile Central Administrator Guide CA Agile Central On-Premises 2018.1 Table of Contents Overview... 3 Server Requirements...3 Browser Requirements...3 Access Help and WSAPI...4 Time Zone...5 Architectural

More information

new world ERP Server Migration Checklist New World ERP TMS

new world ERP Server Migration Checklist New World ERP TMS new world ERP Server Migration Checklist Revised 2/20/17 Table of Contents Overview... 3 Document and Build Environments... 4 Test the New Servers... 7 Cut Over to New Servers... 8 Appendix A: Server Documentation

More information

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core Version 1.02 POINT TRANSACTION SYSTEMS AB Box 92031,

More information

AppController :21:56 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

AppController :21:56 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement AppController 2.6 2014-03-18 13:21:56 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents AppController 2.6... 6 About This Release... 8 Getting Started...

More information