VIEVU Solution Whitepaper

Size: px
Start display at page:

Download "VIEVU Solution Whitepaper"

Transcription

1 VIEVU Solution Whitepaper Introduction VIEVU Solution is the next generation, fully-hosted, cloud evidence management system. This whitepaper describes details about the system, settings, and functionality. Additional support material is available at Contact Us If you need assistance or have any questions, please visit contact us by phone at or Version

2 Table of Contents CONTENTS PLANNING... 1 OVERVIEW... 1 VIEVU Solution Overview... 1 Features... 1 Licensing... 1 Camera Compatibility... 1 Cost Calculations... 1 VIEVU Solution Requirements... 2 VIEVU Solution Architecture... 3 Azure Isolated Resources... 4 Account Name... 4 UPDATE TO LATEST FIRMWARE... 4 Regular Updates for Equipment Firmware... 4 DEPLOYMENT & SETUP... 6 DEPLOYMENT... 6 Deployment Setup Guide... 6 VIEVU SOLUTION CONNECTOR... 6 Overview... 6 DownLoad... 6 Updates... 6 VIEVU SOLUTION APP... 7 Overview... 7 DownLoad... 7 App Updates... 7 VIEVU SOLUTION SYSTEM UPDATES... 7 System Updates... 7 FEATURES & SPECS... 8 VIDEO... 8 Version

3 Table of Contents Video Upload... 8 Video Conversion for Website Playback... 8 Supported Video Formats... 8 Automated deletion... 8 Digital Signature... 8 External Video Sharing... 9 CASES... 9 Case Management Overview... 9 Case File Numbering... 9 Linking Videos To Cases... 9 FIle Attachment Upload... 9 File Attachment Security... 9 Supported File Attachment Formats... 9 Deleting A Case File PERSONALIZATION Logo User Photos DATA EXPORT Export to CSV SYSTEM DATE & TIME Date & Time SECURE STORAGE Geo-Redundancy SECURITY SECURITY & COMPLIANCE Overview PASSWORDS Password Complexity & Expiration Reset Links Security Questions Version

4 Table of Contents IP WHITELISTING IP Restriction Account Lockout Unlock Account AUTOMATIC LOCKOUT Website Lockout After Inactivity ACCESS TOKEN Access Token USER SECURITY Overview Location-based Video Security Security Matrix SUBSCRIPTION TERMINATION SUBSCRIPTION OR AGREEMENT TERMINATION Termination Disclosure Data Access Window Data Export Version

5 Planning PLANNING OVERVIEW VIEVU SOLUTION OVERVIEW VIEVU Solution is a fully hosted evidence management system. Since it is fully hosted and accessed through an internet browser or smartphone app, a minimal amount of setup, support, and maintenance is required. FEATURES The VIEVU Solution includes many key features to enhance your video and evidence management processes: Easy to use and simple to deploy Unlimited scalability Streaming video playback Secure external video sharing Add metadata and upload video from the field Case file management for all digital evidence Store all file types (video, pictures, documents, reports, etc) Smartphone app to enable non-camera users to upload pictures or videos from their smartphone and review video, cases, and files without a computer Enhanced security controls, including IP whitelisting and granular user security options LICENSING The VIEVU Solution is licensed per camera. Each VIEVU camera must have a license. You must purchase a minimum of 15 licenses to use the VIEVU Solution. The number of users you can add is unlimited. CAMERA COMPATIBILITY The VIEVU Solution is only compatible with the LE3, LE4, LE4mini, LE5, and LE5 LITE cameras. COST CALCULATIONS The cost to use the VIEVU Solution is based on two categories: 1. The number of VIEVU cameras. Each camera requires a subscription. 2. The total size of all files stored in the system. The size is calculated each month. There are no other transactions or uses that would incur a fee. Note: The cost calculations criteria are provided as a general reference. Consult your unique subscription plan agreement for how your exact cost of using the system is calculated. Version Page 1

6 Planning REQUIREMENTS VIEVU SOLUTION REQUIREMENTS 1. You have purchased a VIEVU Solution subscription plan for each VIEVU camera. 2. A computer with Windows 7, 8, or 10 is available for camera assignment and download using the VIEVU Solution Connector software. 3. You have an internet connection that meets the minimum specifications for each location at which camera downloads will occur. Refer to the Minimum Bandwidth section below for details. Note: VIEVU Solution Connector is used for communication between the cloud and cameras. MINIMUM BANDWIDTH To ensure all video files can be uploaded successfully, an internet connection with a minimum upload speed must be in place at each site where camera downloads will occur. Use the following table to estimate the minimum bandwidth needed for each site. NUMBER OF CAMERAS MINIMUM UPLOAD BANDWIDTH (MBPS) For example, if office location 1 will have 25 cameras downloading per day, the minimum upload bandwidth for the site must be 15 Mbps. Contact VIEVU for assistance if you have a site with more than 106 cameras, or if you are interested in private Azure direct connection options. Note: Failure to supply sufficient upload bandwidth will cause a backlog of video to occur. This backlog may never clear. SOFTWARE COMPATIBILITY VIEVU Solution Website: Internet Explorer 11 and Edge. The current version of Mozilla Firefox. The current version of Google Chrome. VIEVU Solution Connector: Microsoft Windows 7, 8, and 10 in both 32 and 64 bit. VIEVU Solution App: Android Windows Phone ios Version Page 2

7 Planning ARCHITECTURE VIEVU SOLUTION ARCHITECTURE HTTPS: TCP 443 Patrol Car Smartphone: Review & Upload Video/Pictures Software Installed: VIEVU Solution App Add Metadata & Review in Patrol Car Software Installed: VIEVU Solution Connector On-Site Camera Assignment & Download Software Installed: VIEVU Solution Connector Video & Case Review Software Installed: None Multi-Dock Automated Download ITEM URI IP ADDRESS PORT VIEVU Solution Webserver Provided in welcome Provided in 443 (TCP, https) welcome VIEVU Solution File Storage Provided in welcome Provided in 443 (TCP, https) welcome VIEVU Solution Redaction Webserver Provided in welcome Provided in welcome 443 (TCP, Https), 9293 (TCP) (TCP) Firmware Update Location solutionstorage.blob.core.windows.net (TCP, https) Multi-Dock Internet Time Source pool.ntp.org (UDP) NTP (optional) Multi-Dock Configuration (TCP, http) Webpage Multi-Dock SSH (VIEVU support technician use only) (TCP, SSH) Version Page 3

8 Planning AZURE ISOLATED RESOURCES In Azure, each customer has their own unique and isolated system resources. Customer data separation is controlled at the application level and separated at the database level thereby reducing the risk of data breach due to software bugs. This also prevents system performance issues propagating across customer accounts. Your assets are your assets alone. ACCOUNT NAME Each customer has their own personal website address to access the VIEVU solution. The website address is in the format where XXXXX is your department name and state. This is your Account Name which is used when logging into the VIEVU Solution Connector and VIEVU Solution App. If requested, the Account Name can be customized to a name and format of your choosing. Update to Latest Firmware To be certain that your system is operating at its optimal efficiency and ensure that you re getting the maximum benefits from your VIEVU camera s features and from the rest of your VIEVU equipment, it is critical that you regularly update Camera and Multi-Dock Firmware. REGULAR UPDATES FOR EQUIPMENT FIRMWARE VIEVU camera firmware can be updated either automatically, generally through a Multi-Dock setup, or manually using the following procedure. To manually update VIEVU Camera Firmware: 1. Visit the VIEVU Camera Support page at 2. Select your camera model by clicking on the corresponding red arrow. Version Page 4

9 Planning 3. Download and run the Firmware Updater tool. The file is downloaded to your Downloads folder. 4. Follow the instructions on the screen to update the camera. Version Page 5

10 Deployment & Setup DEPLOYMENT & SETUP DEPLOYMENT DEPLOYMENT SETUP GUIDE The VIEVU Solution Deployment Setup guide is available for download at This guide walks you through the setup and configuration steps necessary for deployment. VIEVU SOLUTION CONNECTOR OVERVIEW For security reasons, websites cannot talk directly to devices such as VIEVU cameras. To support the camera assignment and download processes, a software application called VIEVU Solution Connector must be installed on these computers. The VIEVU Solution Connector performs 3 functions: 1. Assign cameras. 2. Review video and add metadata to videos stored on the camera. The metadata will be automatically imported when the videos are downloaded later. 3. Download videos directly from a camera to the cloud. Install the VIEVU Solution Connector on any computer where these processes will occur. All other access is through an internet browser or smartphone app. DOWNLOAD You can download the current version of the VIEVU Solution Connector from 2 locations: UPDATES Your VIEVU Solution Website: Log in to your VIEVU Solution Website with a user that has Settings security. Click Settings. Click Software & Documentation. Click the VIEVU Solution Connector download link. The VIEVU website: Currently, the VIEVU Solution Connector requires manual updating. However, updates are infrequent and typically only needed if a new camera model or camera feature is released. We hope to enable automated updating in the near future. Version Page 6

11 Deployment & Setup VIEVU SOLUTION APP OVERVIEW The VIEVU Solution app is an optional program you can use to enable access to the VIEVU Solution platform from a smartphone. The VIEVU Solution app enables 2 functions: 1. Review video and cases. 2. Upload video and files from a smartphone. This enables users who do not have body cameras to capture video/pictures with their smartphone and store them in the VIEVU Solution. You can control access to the VIEVU Solution app with a security setting. This allows you to control which users are allowed to use the app. DOWNLOAD The VIEVU Solution App is currently available for download from the Apple App Store, Google Play Store, and the Windows Store. You can also find it on our website. APP UPDATES VIEVU Solution updates are automatically installed by the smartphone s app store when updates are released. VIEVU SOLUTION SYSTEM UPDATES SYSTEM UPDATES The VIEVU Solution system is updated frequently. We deploy upgrades to your environment following these guidelines: You receive advanced notice via unless the update is in response to a security vulnerability. The s are sent to the registered account contacts listed on the VIEVU Solution agreement. If you need to change or update the contact information, please contact VIEVU. All new features that impact security are disabled by default. Version Page 7

12 Features & Specs FEATURES & SPECS VIDEO VIDEO UPLOAD The VIEVU Solution provides 4 ways of uploading video: 1. VIEVU Camera download using the VIEVU Solution Connector application. 2. Upload a video located on a computer to the VIEVU Solution directly through the website. 3. VIEVU Camera download using the Network Multi-Dock. 4. Upload a video on a smartphone using the VIEVU Solution app. VIDEO CONVERSION FOR WEBSITE PLAYBACK For efficient video playback through an internet browser, the video is run through a conversion process. The conversion process creates an additional lower quality copy of the video. This secondary video file is used only for website playback. When a copy request or sharing link is generated, the original video file is provided. At times, you may see a message indicating the video is in queue for conversion. The video conversion process is very quick, but if several videos are uploaded at once, you may need to wait a few minutes. However, if you need immediate access to the video, users with Download File security can view the video by clicking the Download File button and selecting Open. Note: The original video will always be preserved for evidentiary purposes. SUPPORTED VIDEO FORMATS The VIEVU Solution provides support for almost all video file formats and codecs. However, proprietary video formats used by some security cameras cannot be supported. Even though the unsupported file cannot be viewed directly in the website, it can still be stored and viewed by clicking the Download File button and selecting Open. AUTOMATED DELETION You can automatically delete video files based on the Category and Retention values set. You can create an unlimited amount of file categories. Each category can receive a specific retention value. After the retention period has expired, the video file is deleted. You can override this automated deletion by setting the Never Delete field in the video metadata to Yes. DIGITAL SIGNATURE All video files recorded by VIEVU cameras are authenticated using a FIPS level 1 compliant Digital Signature process. Authentic videos are marked Valid in the video metadata. Version Page 8

13 Features & Specs EXTERNAL VIDEO SHARING You can share a video file with anyone electronically without a website login. The sharing process uses a secure, automatic expiring link. This link can be configured to expire based on a time limit that is set during creation. The link is easily shared through an . CASES CASE MANAGEMENT OVERVIEW The VIEVU Solution provides the ability to create an unlimited number of case files. Each case is a virtual folder where video and other documents can be combined to centralize the storage and review of digital evidence. Cases can be assigned to users giving them special privileges to see and review the information. CASE FILE NUMBERING Each case file is given an automatic number based on the format YYYY-XXXXXX, where YYYY is the current year and XXXXXX is a sequential number starting at 1. You can also configure the system to use a case number that you supply, such as a report number from a CAD/RMS system. See the VIEVU Solution User Guide or contact VIEVU for more information. LINKING VIDEOS TO CASES To make reviewing multiple videos of the same incident easier, you can link video files with a specific case. When all the videos have been linked, you can quickly switch between the related videos. By selecting the case number in the video metadata, the video file is linked to the case. FILE ATTACHMENT UPLOAD The VIEVU Solution provides 2 ways of uploading files: 1. Upload a file located on a computer to the VIEVU Solution website. 2. Upload a file on a smartphone using the VIEVU Solution app. Note: Uploading a video from the case file screen automatically links it with the case. FILE ATTACHMENT SECURITY When a user is assigned to a case, the system provides the user with access to every file and video linked to the case. A user without security permissions to view the video on the Videos page can watch the video, however, they cannot view the metadata for the video. SUPPORTED FILE ATTACHMENT FORMATS You can upload any file type as an attachment to a case. If the file format is compatible with viewing in an internet browser, such as a picture or PDF, the file is opened in a browser window. If the file is not compatible, an Open/Save window appears. Additionally, certain files will have thumbnails to make identification easier. Version Page 9

14 Features & Specs Note: Hover over the file with the mouse to view the filename. DELETING A CASE FILE Currently, each case file will need to be manually deleted by clicking the Trash Can button. In the future, an automated deletion process will be released that will handle case file deletions in a similar manner to the way videos are handled. PERSONALIZATION LOGO You can upload a personalized logo to be displayed on the Login screen and at the top of all pages. Note: Use an image with a transparent background for the best appearance. USER PHOTOS You can upload a picture for each user. This picture appears on various screens to make identification of the user easier, such as during searches. DATA EXPORT EXPORT TO CSV You can export any section of the site as a CSV file, which you can then open in Microsoft Excel. SYSTEM DATE & TIME DATE & TIME You can configure the VIEVU Solution to use your local time zone. This time zone setting is automatically applied to all VIEVU cameras, ensuring all dates and times are consistent. Currently, only one time zone can be set for the system. In the future, we will support multiple time zones for customers who span several geographic areas with different time zones. SECURE STORAGE GEO-REDUNDANCY VIEVU Solutions offers advanced Geo-Redundancy functionality for allowing evidence to be redundantly stored in case of a disaster. Talk to your VIEVU representative for more information about this premium feature. Version Page 10

15 Security SECURITY SECURITY & COMPLIANCE OVERVIEW VIEVU s commitment to security and compliance is unparalleled in the Industry. VIEVU partnered with Microsoft to develop the VIEVU Solution. Utilizing combined resources and expertise, we have created the finest hosted evidence management platform available today. When selecting a hosted cloud provider, you are typically receiving services from 2 separate groups: the cloud infrastructure provider and the software product provider. Security and compliance is a requirement of BOTH providers. CLOUD INFRASTRUCTURE PROVIDER VIEVU selected Microsoft as our cloud infrastructure provider for the VIEVU Solution. For United States government customers, the VIEVU Solution is located on Microsoft Azure Government which is the first and only hyper-scale commercial infrastructure cloud platform contractually committed to helping federal, state and local governments meet CJIS Policy requirements. Microsoft was the first and only cloud infrastructure provider to develop completely isolated, U.S. government only datacenters and associated network infrastructure to enable compliance with ALL CJIS requirements. Additionally, they took the unprecedented step of seeking approval from each state s CJIS CSA official. This required a fingerprint and background check of all employees who have access to or are stationed in the Azure Government isolated datacenters. This helps to eliminate the confusing, hard to understand, and difficult to enforce burden of validating CJIS compliance from the department. Furthermore, Microsoft maintains a state of the art 24x7x365 security monitoring center to protect Azure from intruders and hackers. Additional security and compliance information is available online at SOFTWARE PRODUCT PROVIDER VIEVU believes that we must comply with the same security standards and processes that you are required to meet. All VIEVU employees who interact with the VIEVU Solution platform have passed the CJIS vendor background and fingerprint process, received security awareness training, and have signed the CJIS security addendum. SECURITY PROCESSES Encryption in transit and rest using AES-256. IP Whitelisting to prevent access from unauthorized locations. FIPS level 1 compliant digital signature process to prove authenticity. Detailed audit logging of activity which cannot be modified or removed by administrators. VidLock security on each camera to prevent unauthorized access if it is lost or stolen. Version Page 11

16 Security COMPLIANCE CJIS ISO HIPAA FedRAMP SOC 1 and SOC 2 DATA BACKUP AND RECOVERY Frequent encrypted backups of all data. Backups are stored in multiple datacenter locations. All data is replicated to two separate datacenters that are more than 500 miles geographically separated providing uninterrupted access during disaster events. 7-day, accidental deletion recovery. Additional information about security & compliance and frequently asked questions is available online at PASSWORDS PASSWORD COMPLEXITY & EXPIRATION All passwords must meet the following complexity requirements: Minimum of 8 characters in length Must contain both letters and numbers Cannot be the same as the last several passwords Note: All passwords expire after 90 days and must be reset. RESET LINKS The system will send messages to users in the event they need to reset their password. The user can request a password reset by clicking the forgot password link on the login page. An administrator cannot input the password directly into the system. All links ed from the system are valid for 7 days. SECURITY QUESTIONS Each user is required to select 3 security questions. These security questions are used for the following reasons: 1. If a user locks their account, they are presented with 1 of their security questions. If the question is answered correctly, the account is unlocked. 2. If a user requires a password reset, they are presented with 1 of their security questions. If the question is answered correctly, an is sent with a link to reset their password. Version Page 12

17 Security IP WHITELISTING IP RESTRICTION You can configure The VIEVU Solution to whitelist IP addresses. When you add an IP address to the IP Restriction Table on the Settings page, the only computers that are allowed access are those with the public IP addresses listed. If no IP addresses are listed on the IP restriction table, all computers will be allowed access to the VIEVU Solution. Note: Care must be taken when enabling IP restrictions. It is possible to accidently lock yourself out of the system. Contact VIEVU for assistance if this occurs. ACCOUNT LOCKOUT As a security measure, all accounts are locked down after five unsuccessful login attempts. If this happens, the user receives an stating that this is the case. UNLOCK ACCOUNT If, for any reason, five unsuccessful attempts have been made to log into a user s account, the following message is ed to the user: Your VIEVU Solution account has been locked due to multiple password attempts. You can unlock your account by answering your security question. If these attempts were not you, contact your system administrator as your account may be at risk. Note: If a user receives this and they have not made recent unsuccessful attempts to open their account, they should inform the system administrator immediately that this has occurred. To regain access to the user s account, they must answer one of their security questions (chosen at random) correctly. AUTOMATIC LOCKOUT WEBSITE LOCKOUT AFTER INACTIVITY The VIEVU Solution website will automatically lock after 20 minutes of inactivity. When this occurs, the user is required to enter their login information again to continue use. ACCESS TOKEN ACCESS TOKEN An access token is used to provide secure access to the VIEVU Solution system from software that does not require a user to authenticate such as the Multi-Dock. There is only 1 access token in use at a time. You can reset the access token by clicking the Reset button on the Access Token page of the Settings menu. If the token is reset, all software that uses the token to authenticate is immediately disconnected. Version Page 13

18 Security USER SECURITY OVERVIEW To provide the most accurate security levels for each user, user security is role-based. Roles are given security levels and users are assigned to these roles. This also provides for easy user management as security does not need to be configured for each user individually. The VIEVU Solution comes preset with 2 default security roles: Admins and Users. These represent the most common user security levels used. The Admin role cannot be modified or deleted. Notes: There is no limit to the number of roles that can be created. There is no limit to the number of users that can be created. LOCATION-BASED VIDEO SECURITY When configuring user security roles, the ability to view videos can be restricted to the location to which the user is assigned. For example, to provide supervisors with access to view their employee s videos, you would traditionally need to create multiple supervisor roles. Instead, with location based security, you can create 1 supervisor role and control video access by the location to which the supervisor is assigned. Notes: You can also use locations for a group of users, squad, or functional unit. There is no limit to the number of locations that can be created. SECURITY MATRIX Use the following table to determine the security options appropriate for each role that you create. SECURITY ITEM SETTING DESCRIPTION View Videos All, Same Role, Same Location, Own Controls access to view video files, metadata and use the print screen functionality. Make Copies Yes, No Controls ability to download a copy of the original video file and the audit log View Lockdown Yes, No Controls ability to view a video after it has been set for Lockdown Edit Video Details Yes, No Controls ability to change the metadata for a video Download Videos Yes, No Controls ability to download videos from cameras, add a video from a computer or smartphone Version Page 14

19 Security Delete Videos & Cases Yes, No Controls ability to delete video files, cases and case files Assign Cameras Yes, No Controls ability to assign and reassign cameras to users Edit Users & Roles Yes, No Controls ability to create users, edit user information, change a user s role, delete users, add roles, edit role security, and delete roles Edit Settings Yes, No Controls ability to make system changes such as change camera settings, change date/time, add/remove categories, change video retention, add/remove logo, add/remove locations, add/remove IP restrictions, and retrieve/reset the access token Use Mobile App Yes, No Controls ability to use the VIEVU Solution app View Master Log Yes, No Controls ability to view the Master Log View Cases Yes, No Controls ability to view cases, edit case information, view linked videos (but not the metadata), view attached files Share Videos & Cases Yes, No Controls ability to generate sharing links to videos Version Page 15

20 Subscription Termination SUBSCRIPTION TERMINATION SUBSCRIPTION OR AGREEMENT TERMINATION VIEVU Solution User Guide At the end of the subscription period or if the VIEVU Solution agreement is terminated, the following processes will occur: TERMINATION DISCLOSURE Upon expiration of the subscription or termination of the agreement, account contacts will receive an notice and a phone call disclosing the termination. DATA ACCESS WINDOW Upon expiration of the subscription or termination of the agreement, you will retain limited access to the system for a period of time to allow you to retrieve your data. All existing data can be accessed in the VIEVU Solution system for a period of 30 days. No new data will be allowed to be uploaded to the system and camera downloads will no longer occur. All data will be deleted after the 30-day access window expires. Data recovery will not be possible after deletion. It is your responsibility to ensure all information is removed from the system prior to deletion. Account contacts will receive an notification 24 hours before the access window expires and the data is deleted. DATA EXPORT VIEVU is committed to giving you the means to effectively retrieve your data. Upon expiration of the subscription or termination of the agreement, account contacts will be given access to a software tool that will allow for the exportation of all data and metadata stored in the system in a searchable format. Version Page 16

VIEVU Solution Deployment Setup Guide

VIEVU Solution Deployment Setup Guide VIEVU Solution Deployment Setup Guide Contact Us If you need assistance or have any questions, please visit www.vievu.com/vievu-solutionsupport, contact us by phone at 888-285-4548 or email support@vievu.com.

More information

VIEVU Solution User Guide

VIEVU Solution User Guide VIEVU Solution User Guide VIEVU Solution is the next generation, fully-hosted, cloud evidence management system. This guide describes how to operate the VIEVU Solution. Additional support material is available

More information

VIEVU Solution App User Guide

VIEVU Solution App User Guide VIEVU Solution App User Guide Contact Us If you need assistance or have any questions, please visit www.vievu.com/vievu-solutionsupport, contact us by phone at 888-285-4548, or email support@vievu.com.

More information

VIEVU Solution App User Guide

VIEVU Solution App User Guide VIEVU Solution App User Guide INTRODUCTION VIEVU Solution is the next generation, fully-hosted, cloud evidence management system. This guide describes how to operate the VIEVU Solution. Additional support

More information

Box Competitive Sheet January 2014

Box Competitive Sheet January 2014 This document is a comparison of file sharing and collaboration capabilities offered by Soonr Workplace and Box. Narrative is provided when there is no direct comparison between the capabilities or when

More information

VERIPATROL Administrator User Guide

VERIPATROL Administrator User Guide VERIPATROL Administrator User Guide INTRODUCTION VERIPATROL is a secure evidence management software system for the storage, retrieval, and management of video files from VIEVU cameras. This guide describes

More information

Anchor Competitive Sheet May 2015

Anchor Competitive Sheet May 2015 This document is a comparison of file sharing and collaboration capabilities offered by Soonr Workplace and Anchor. Narrative is provided when there is no direct comparison between the capabilities or

More information

System Overview. Security

System Overview. Security ImageSilo is an ultra-secure, on-demand Enterprise Content Management (ECM) system. As the largest on-demand installation of PaperVision Enterprise, it offers all the same features and functionality. ImageSilo

More information

Law Enforcement Solutions

Law Enforcement Solutions Law Enforcement Solutions DISCOVER ALEN Delivering revolutionary, next-generation cloud solutions for law enforcement. We are a leading provider of cloud solutions for federal, state, and local law enforcement

More information

VIEVU DOCKING STATION USER GUIDE

VIEVU DOCKING STATION USER GUIDE VIEVU DOCKING STATION USER GUIDE Contact Us If you need assistance or have any questions, please visit www.vievu.com/docking-station-support, contact us by phone at 888-285-4548 or email support@vievu.com.

More information

VERIPATROL Client User Guide

VERIPATROL Client User Guide VERIPATROL Client User Guide Overview VERIPATROL is a secure software system for the storage, retrieval and management of video files from VIEVU cameras. This guide describes how to operate the VERIPATROL

More information

Evidence.com December 2016 Release Notes

Evidence.com December 2016 Release Notes Evidence.com December 2016 Document Revision: C Evidence.com Version 2016.12 Apple, ios, and Safari are trademarks of Apple, Inc. registered in the US and other countries. Firefox is a trademark of The

More information

Cloud FastPath: Highly Secure Data Transfer

Cloud FastPath: Highly Secure Data Transfer Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance

More information

Google Cloud & the General Data Protection Regulation (GDPR)

Google Cloud & the General Data Protection Regulation (GDPR) Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to

More information

Riverbed Xirrus Cloud Processes and Data Privacy June 19, 2018

Riverbed Xirrus Cloud Processes and Data Privacy June 19, 2018 Riverbed Xirrus Cloud Processes and Data Privacy June 19, 2018 PURPOSE OF THIS DOCUMENT... 2 DATA CENTER PROCESSES... 2 Physical and Environmental Security... 2 Resiliency and Redundancy... 2 Network Security...

More information

SECURITY & PRIVACY DOCUMENTATION

SECURITY & PRIVACY DOCUMENTATION Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive

More information

SAAS: THE RDP ADVANTAGE FOR ISVS AND USERS

SAAS: THE RDP ADVANTAGE FOR ISVS AND USERS SAAS: THE RDP ADVANTAGE FOR ISVS AND USERS How RDP SaaS deployment reduces costs, time to market and barriers to entry while improving security, performance and the UX Independent Software Vendors (ISVs)

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Adobe Sign and 21 CFR Part 11

Adobe Sign and 21 CFR Part 11 Adobe Sign and 21 CFR Part 11 Today, organizations of all sizes are transforming manual paper-based processes into end-to-end digital experiences speeding signature processes by 500% with legal, trusted

More information

Sparta Systems TrackWise Digital Solution

Sparta Systems TrackWise Digital Solution Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities

More information

March Networks Cloud 1.1 ADMINISTRATOR GUIDE

March Networks Cloud 1.1 ADMINISTRATOR GUIDE March Networks Cloud 1.1 ADMINISTRATOR GUIDE Copyright 2008-2013 March Networks Corporation (An Infinova Company). All Rights Reserved. Information in this document is subject to change without notice.

More information

Overview of Archiving. Cloud & IT Services for your Company. EagleMercury Archiving

Overview of  Archiving. Cloud & IT Services for your Company. EagleMercury  Archiving EagleMercury Email Archiving Part of EagleMercury Security Collaboration Suite Assure compliance, speed ediscovery, and help protect your intellectual property Overview of Email Archiving EagleMercury

More information

Sparta Systems TrackWise Solution

Sparta Systems TrackWise Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

TRACKVIA SECURITY OVERVIEW

TRACKVIA SECURITY OVERVIEW TRACKVIA SECURITY OVERVIEW TrackVia s customers rely on our service for many mission-critical applications, as well as for applications that have various compliance and regulatory obligations. At all times

More information

Security Information & Policies

Security Information & Policies Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER

More information

Juniper Vendor Security Requirements

Juniper Vendor Security Requirements Juniper Vendor Security Requirements INTRODUCTION This document describes measures and processes that the Vendor shall, at a minimum, implement and maintain in order to protect Juniper Data against risks

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

CloudLink SecureVM. Administration Guide. Version 4.0 P/N REV 01

CloudLink SecureVM. Administration Guide. Version 4.0 P/N REV 01 CloudLink SecureVM Version 4.0 Administration Guide P/N 302-002-056 REV 01 Copyright 2015 EMC Corporation. All rights reserved. Published June 2015 EMC believes the information in this publication is accurate

More information

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains

More information

Evidence.com User and Administrator Reference Guide

Evidence.com User and Administrator Reference Guide Evidence.com User and Administrator Reference Guide Evidence.com April 2018 Release Evidence.com Version 2018.4 Document Revision: A Apple, ios, and Safari are trademarks of Apple, Inc. registered in the

More information

Mozy. Administrator Guide

Mozy. Administrator Guide Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license

More information

Evidence.com 1.31 Release Notes

Evidence.com 1.31 Release Notes 1.31 Release Notes January 26, 2016 Document Version 1.0 Apple, ios, and Safari are trademarks of Apple, Inc. registered in the US and other countries. Firefox is a trademark of The Mozilla Foundation

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

In-Depth Guide to PaperVision Enterprise

In-Depth Guide to PaperVision Enterprise 800.422.1330 In-Depth Guide to is a simple and searchable enterprise content management (ECM) system. Securley store, share and collaborate on any type of information with unlimited users inside. 800.422.1330

More information

Vendor Security Questionnaire

Vendor Security Questionnaire Business Associate Vendor Name Vendor URL Vendor Contact Address Vendor Contact Email Address Vendor Contact Phone Number What type of Service do You Provide Covenant Health? How is Protected Health Information

More information

Storage Made Easy. SoftLayer

Storage Made Easy. SoftLayer Storage Made Easy Providing an Enterprise File Fabric for SoftLayer STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR SOFTLAYER The File Fabric is a comprehensive multi-cloud data security solution built on

More information

Layer Security White Paper

Layer Security White Paper Layer Security White Paper Content PEOPLE SECURITY PRODUCT SECURITY CLOUD & NETWORK INFRASTRUCTURE SECURITY RISK MANAGEMENT PHYSICAL SECURITY BUSINESS CONTINUITY & DISASTER RECOVERY VENDOR SECURITY SECURITY

More information

MaintMaster Technical White Paper

MaintMaster Technical White Paper MaintMaster Technical White Paper Welcome to MaintMaster! MaintMaster is a leading tool for return on operational reliability for discrete manufacturing. This White Paper covers most of the technical aspects

More information

Augmenting security and management of. Office 365 with Citrix XenMobile

Augmenting security and management of. Office 365 with Citrix XenMobile Office 365 with Citrix XenMobile Augmenting security and management of Office 365 with Citrix XenMobile There are quite a few reasons why Microsoft Office 365 is so popular with enterprise customers. Citrix.com

More information

Sparta Systems Stratas Solution

Sparta Systems Stratas Solution Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

Evidence.com March 2017 Release Notes

Evidence.com March 2017 Release Notes Evidence.com March 2017 Document Revision: B Evidence.com Version 2017.3 Apple, ios, and Safari are trademarks of Apple, Inc. registered in the US and other countries. Firefox is a trademark of The Mozilla

More information

Colligo Briefcase. for Good Technology. Administrator Guide

Colligo Briefcase. for Good Technology. Administrator Guide for Good Technology Administrator Guide Contents Introduction... 2 Target Audience... 2 Overview... 2 Key Features... 2 Platforms Supported... 2 SharePoint Security & Privileges... 3 for Good Technology...

More information

SIMSme Management Cockpit Documentation

SIMSme Management Cockpit Documentation Introduction SIMSme Management Cockpit Documentation Version 2.1 February 2018 Table of Contents 1 INTRODUCTION... 2 2 USERS... 3 3 LICENSES... 5 4 GROUPS... 7 5 CHANNELS... 8 6 DASHBOARD...10 7 APP SETTINGS...12

More information

MYOB Advanced SaaS. Why choose MYOB Advanced? Fact Sheet. What is MYOB Advanced SaaS?

MYOB Advanced SaaS. Why choose MYOB Advanced? Fact Sheet. What is MYOB Advanced SaaS? Fact Sheet MYOB Advanced SaaS Why choose MYOB Advanced? When you re considering a cloud-based ERP system for your business, you can be overwhelmed with the copious amount of options. Before selecting the

More information

Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service.

Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service. Citrix Analytics Data Governance Collection, storage, and retention of logs generated in connection with Citrix Analytics service. Citrix.com Data Governance For up-to-date information visit: This section

More information

Storage Made Easy. Mirantis

Storage Made Easy. Mirantis Storage Made Easy Providing an Enterprise File Fabric for Mirantis STORAGE MADE EASY ENTERPRISE FILE FABRIC FOR MIRANTIS The File Fabric is a comprehensive multi-cloud data security solution built on top

More information

QuickBooks Online Security White Paper July 2017

QuickBooks Online Security White Paper July 2017 QuickBooks Online Security White Paper July 2017 Page 1 of 6 Introduction At Intuit QuickBooks Online (QBO), we consider the security of your information as well as your customers and employees data a

More information

The Nasuni Security Model

The Nasuni Security Model White Paper Nasuni enterprise file services ensures unstructured data security and privacy, enabling IT organizations to safely leverage cloud storage while meeting stringent governance and compliance

More information

Awareness Technologies Systems Security. PHONE: (888)

Awareness Technologies Systems Security.   PHONE: (888) Awareness Technologies Systems Security Physical Facility Specifications At Awareness Technologies, the security of our customers data is paramount. The following information from our provider Amazon Web

More information

MaaS360 Secure Productivity Suite

MaaS360 Secure Productivity Suite MaaS360 Secure Productivity Suite Frequently Asked Questions (FAQs) What is MaaS360 Secure Productivity Suite? MaaS360 Secure Productivity Suite integrates a set of comprehensive mobile security and productivity

More information

University of Pittsburgh Security Assessment Questionnaire (v1.7)

University of Pittsburgh Security Assessment Questionnaire (v1.7) Technology Help Desk 412 624-HELP [4357] technology.pitt.edu University of Pittsburgh Security Assessment Questionnaire (v1.7) Directions and Instructions for completing this assessment The answers provided

More information

Liferay Security Features Overview. How Liferay Approaches Security

Liferay Security Features Overview. How Liferay Approaches Security Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................

More information

How NOT To Get Hacked

How NOT To Get Hacked How NOT To Get Hacked The right things to do so the bad guys can t do the wrong ones Mark Burnette Partner, LBMC -Risk Services October 25, 2016 Today s Agenda Protecting Against A Hack How should I start?

More information

Document revision: F

Document revision: F Document revision: F Important Notice Copyright 2017 Enforcement Video, L.L.C. (dba WatchGuard Video). All rights reserved. This document and supporting data are the exclusive property of Enforcement Video,

More information

Software Token. Installation and User Guide. 22 September 2017

Software Token. Installation and User Guide. 22 September 2017 Software Token Installation and User Guide 22 September 2017 Notices Following are policies pertaining to proprietary rights and trademarks. Proprietary Rights The information contained in this document

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

Technical Brief SUPPORTPOINT TECHNICAL BRIEF MARCH

Technical Brief SUPPORTPOINT TECHNICAL BRIEF MARCH Technical Brief 1 SupportPoint Cloud is a SaaS solution that makes it easy for people to get the information and guidance they need to navigate through complex business processes. SupportPoint Cloud Client

More information

VERIPATROL App User Guide

VERIPATROL App User Guide Overview VERIPATROL is a secure software system for the storage, retrieval, and management of video files from VIEVU cameras. This guide describes how to operate the VERIPATROL App application. The App

More information

3CX Mobile Device Manager

3CX Mobile Device Manager 3CX Mobile Device Manager Manual 1 Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples

More information

Xerox Audio Documents App

Xerox Audio Documents App Xerox Audio Documents App Additional information, if needed, on one or more lines Month 00, 0000 Information Assurance Disclosure 2018 Xerox Corporation. All rights reserved. Xerox, Xerox,

More information

VST Hospital Administrator Guide. Version 2.0.4

VST Hospital Administrator Guide. Version 2.0.4 VST Hospital Administrator Guide Version 2.0.4 Notice Copyright 2002- Vocera Communications, Inc. All rights reserved. Vocera is a registered trademark of Vocera Communications, Inc. This software is licensed,

More information

AvePoint Online Services 2

AvePoint Online Services 2 2 User Guide Service Pack 7 Issued August 2017 Table of Contents What s New in this Guide...6 About...7 Versions: Commercial and U.S. Government Public Sector...7 Submitting Documentation Feedback to AvePoint...8

More information

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com : HIPPA Compliance GoToMyPC Corporate HIPAA Compliance Privacy, productivity and remote access 2 The healthcare industry has benefited greatly from the ability to use remote access to view patient data

More information

For USA & Europe January 2018

For USA & Europe January 2018 For USA & Europe January 2018 www.sysaid.com SysAid Cloud Architecture Including Security and Disaster Recovery Plan 2 This document covers three aspects of SysAid Cloud: Datacenters Network, Hardware,

More information

Twilio cloud communications SECURITY

Twilio cloud communications SECURITY WHITEPAPER Twilio cloud communications SECURITY From the world s largest public companies to early-stage startups, people rely on Twilio s cloud communications platform to exchange millions of calls and

More information

Object Storage Service. Product Introduction. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD.

Object Storage Service. Product Introduction. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 04 Date 2017-12-20 HUAWEI TECHNOLOGIES CO., LTD. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Don t just manage your documents. Mobilize them!

Don t just manage your documents. Mobilize them! Don t just manage your documents Mobilize them! Don t just manage your documents Mobilize them! A simple, secure way to transform how you control your documents across the Internet and in your office.

More information

Projectplace: A Secure Project Collaboration Solution

Projectplace: A Secure Project Collaboration Solution Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the

More information

BBVA Compass Spend Net Payables

BBVA Compass Spend Net Payables User Guide BBVA Compass Spend Net Payables User Guide Vault Services Table of Contents Introduction 2 Technical Requirements 2 Getting started 3 Sign In 3 General Navigation 4 Upload/Create Payment 5

More information

ZYNSTRA TECHNICAL BRIEFING NOTE

ZYNSTRA TECHNICAL BRIEFING NOTE ZYNSTRA TECHNICAL BRIEFING NOTE Backup What is Backup? Backup is a service that forms an integral part of each Cloud Managed Server. Its purpose is to regularly store an additional copy of your data and

More information

Software Features. Product at a Glance. Powerful VMS

Software Features. Product at a Glance. Powerful VMS Software Features Product at a Glance True standards-based VMS built on ONVIF specifications Designed and built using the latest standard web-based development tools, ensuring optimization of platform

More information

Altius IT Policy Collection

Altius IT Policy Collection Altius IT Policy Collection Complete set of cyber and network security policies Over 100 Policies, Plans, and Forms Fully customizable - fully customizable IT security policies in Microsoft Word No software

More information

Deep Freeze Cloud. Architecture and Security Overview

Deep Freeze Cloud. Architecture and Security Overview Deep Freeze Cloud Architecture and Security Overview 2018 Faronics Corporation or its affiliates. All rights reserved. NOTICE: This document is provided for informational purposes only. It represents Faronics

More information

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT

SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,

More information

For Australia January 2018

For Australia January 2018 For Australia January 2018 www.sysaid.com SysAid Cloud Architecture Including Security and Disaster Recovery Plan 2 This document covers three aspects of SysAid Cloud: Datacenters Network, Hardware, and

More information

Electronic Records and Signatures with the Sievers M9 TOC Analyzer and DataPro2 Software

Electronic Records and Signatures with the Sievers M9 TOC Analyzer and DataPro2 Software Water Technologies & Solutions fact sheet 21 CFR Part 11 Electronic Records and Signatures with the Sievers M9 TOC Analyzer and DataPro2 Software introduction Part 11 of Title 21 of the Code of Federal

More information

Security and Compliance

Security and Compliance Security and Compliance Version 1.3 12/9/2016 Hyperfish Security Whitepaper 1 Table of Contents 1 Introduction... 3 2 Hyperfish... 3 2.1 Product Overview... 3 2.2 How it Works... 3 2.3 Modes of Operation...

More information

Security in Bomgar Remote Support

Security in Bomgar Remote Support Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

BODY WORN CAMERAS TOGETHER, WE SAVE LIVES CATALOG 26 SAFARILAND.COM

BODY WORN CAMERAS TOGETHER, WE SAVE LIVES CATALOG 26 SAFARILAND.COM BODY WORN CAMERAS 2017 CATALOG TOGETHER, WE SAVE LIVES. 26 SAFARILAND.COM 800.347.1200 BODY WORN CAMERAS BODY WORN CAMERAS CONCEALABLE TACTICAL VIEVU is a leading provider of body worn and video technologies,

More information

AT&T Business Messaging Account Management

AT&T Business Messaging Account Management Account Management Administrator User Guide July 2016 1 Copyright 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T

More information

HIPAA Controls. Powered by Auditor Mapping.

HIPAA Controls. Powered by Auditor Mapping. HIPAA Controls Powered by Auditor Mapping www.tetherview.com About HIPAA The Health Insurance Portability and Accountability Act (HIPAA) is a set of standards created by Congress that aim to safeguard

More information

Watson Developer Cloud Security Overview

Watson Developer Cloud Security Overview Watson Developer Cloud Security Overview Introduction This document provides a high-level overview of the measures and safeguards that IBM implements to protect and separate data between customers for

More information

Securing Your Campus

Securing Your Campus Securing Your Campus Copyright CheckVideo LLC. All Rights Reserved. Introduction Security and Safety Officers are committed to providing a safe and welcoming learning environment that prepares students

More information

OneDrive for Business

OneDrive for Business OneDrive for Business Insert Confidentiality Level on title master Personal online file storage, synchronization and sharing OneDrive for Business provides a simple & secure location where people can store,

More information

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE

RADIAN6 SECURITY, PRIVACY, AND ARCHITECTURE ADIAN6 SECUITY, PIVACY, AND ACHITECTUE Last Updated: May 6, 2016 Salesforce s Corporate Trust Commitment Salesforce is committed to achieving and maintaining the trust of our customers. Integral to this

More information

Evaluating Encryption Products

Evaluating  Encryption Products Evaluating Email Encryption Products A Comparison of Virtru and Zix Importance of Email Encryption Most modern email providers, such as Google and Microsoft, offer excellent default security options, but

More information

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018

How-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018 How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment

More information

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control

Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control Whose Cloud Is It Anyway? Exploring Data Security, Ownership and Control SESSION ID: CDS-T11 Sheung-Chi NG Senior Security Consulting Manager, APAC SafeNet, Inc. Cloud and Virtualization Are Change the

More information

Secure, cloud-based workflow, alert, and notification platform built on top of Amazon Web Services (AWS)

Secure, cloud-based workflow, alert, and notification platform built on top of Amazon Web Services (AWS) Technical Overview Secure, cloud-based workflow, alert, and notification platform built on top of Amazon Web Services (AWS) Copyright 2017 by Bluetooth SIG, Inc. The Bluetooth word mark and logos are owned

More information

macos Security Checklist:

macos Security Checklist: WHITE PAPER macos Security Checklist: implementing the Center for Internet Security Benchmark for macos Recommendations for securing macos The Center for Internet Security (CIS) benchmark for macos is

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

UNCLASSIFIED. Mimecast UK Archiving Service Description

UNCLASSIFIED. Mimecast UK  Archiving Service Description UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

FINANCIAL INFORMATION FORUM 5 Hanover Square New York, New York 10004

FINANCIAL INFORMATION FORUM 5 Hanover Square New York, New York 10004 FINANCIAL INFORMATION FORUM 5 Hanover Square New York, New York 10004 212-422-8568 Via Electronic Delivery August 3, 2018 Mr. Vas Rajan Chief Information Security Officer ThesysCAT, LLC 1740 Broadway New

More information

Intermedia s Private Cloud Exchange

Intermedia s Private Cloud Exchange Intermedia s Private Cloud Exchange This is a practical guide to implementing Intermedia s Private Cloud Exchange on AWS. Intermedia, the world s independent provider of Hosted Exchange, and AWS, the leading

More information

The SAP Concur mobile app (Android / iphone / ipad)

The SAP Concur mobile app (Android / iphone / ipad) The SAP Concur mobile app (Android / iphone / ipad) Questions General Information and Requirements... 1 1. How is the SAP Concur mobile app useful?... 1 2. Does the mobile app offer the same functionality

More information

Crash course in Azure Active Directory

Crash course in Azure Active Directory Crash course in Azure Active Directory Crash course in Azure Active Directory Competing today requires a focus on digital transformation and empowering everyone to be creative and work together securely.

More information

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds

Automate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds EXECUTIVE BRIEF SHAREBASE BY HYLAND Automate sharing. Empower users. Retain control. With ShareBase by Hyland, empower users with enterprise file sync and share (EFSS) technology and retain control over

More information