Technical Architecture. Section 1. System Infrastructure & Scalability. Yes No Comments
|
|
- Mervyn Lane
- 5 years ago
- Views:
Transcription
1 Technical Architecture Section 1. System Infrastructure & Scalability Requirement 1) Hardware configuration operates on industry standard Intel servers such as IBM or HP. 2) Operating system environment supports, the following minimum system requirements, Microsoft Windows 2000/XP Professional and Microsoft Windows 2003 Server. 3) System can be configured with complete redundancy with no single point of failure as well as Active-Passive set-up where both nodes will be handling different types. 4) Use clustering software to load balance and demonstrate quick, automatic failover across all servers. 5) Support a web-based interface. 6) Support Citrix. 7) Recommended hardware platform provides capability for hot swappable, mirrored/raided disk drives. 8) Support the ability to conduct routine backup procedures without the users having to be off the system. 9) Support a variety of point of care and input devices, specifically: Signature Capture Hand held/portable - Radio Frequency Laptops Touch Screen Pen Voice Recognition Keyboard/Mouse Page 1
2 PDA Requirement 10) System is based on a relational database management system. 11) Delivery options for in-house environment (ICO) as well as a host-based environment (SaaS). 12) System has "master files" where universal information can be entered once and accessed by other applications. 13) Data elements can be viewed, printed, interfaced, updated, reported on and/or listed as needed. 14) Required fields are user-definable. 15) Provide Common Reporting Tools and Analytics that are compatible with recognized, industry standard reporting tools such as Microsoft SQL, Crystal Reporting. 16) Vendor provides load testing tools and load testing as part of their implementation. 17) System is scalable to accommodate additional utilization, users, transactions and/or additional local/remote sites. 18) Support multiple environments including test, production and training. 19) Provide a data dictionary. 20) Database tools are provided to allow enduser access for queries and extraction or output of data into other file formats. 21) Allow for server virtualization. 22) Management of client/pc software is centrally managed. 23) Application can be monitored via common enterprise monitoring systems. 24) Application provides an alerting and monitoring utility. 25) Application exposes data via Web Services. 1. Does your solution employ a true Service Oriented Architecture (SOA)? Explain Page 2
3 2. In the context of a true SOA, explain how your data and service modeling is done and what advantages it provides to the customer. 3. Describe the vendor s approach to data integrity and redundancy. 4. Describe the vendor s approach and tools for backup, recovery and SAN/NAS recommendations. 5. Detail the number of environments that are recommended for implementation and their purposes, ex. Test, Development, QA, Production? 6. Describe the process of environment management and migrating from one environment to another. 7. What is the source code for the application written in? 8. How many application releases per year does the vendor provide? 9. How are minor and major releases communicated and provided to the client? 10. Detail the printing process for the application. Page 3
4 Section 2. Network Capabilities Requirement 1) Each server must have an appropriate Network Interface Card (NIC) to connect to the Local Area Network. 2) In Ethernet environments, all servers should be placed on dedicated 100 Mbps Full-Duplex switch ports for maximum throughput and performance. 3) System can be integrated into a wireless environment 4) Wireless protocols such as a, b, or g should be used. 5) The recommended WAN connection should be a Frame Relay or ATM network. A fractional-t1, T1 or greater network of appropriate bandwidth must be installed. 6) Critical data (security/authentication data) is passed between various layers using 128 bit encryption. The browser/server communication can also be set using standard SSL based authentication. 7) Capable of using IP and the standard network protocol. 8) Support secure TCP/IP remote access for users (e.g., PPTP, SSL, Kerberos, etc.). 9) Required network devices can be managed from a central location. 10) Support Network Load Balancing to offer higher throughput for increased user load. 11) Support Layer 3 switching 1. Please describe your LAN/WAN network requirements. 2. On the Wide Area Network, what is the minimum bandwidth requirement? 3. Describe in detail the remote access methods you currently support for your application and how you would support devices at remote locations. 4. What cellular protocols does the system support? Page 4
5 5. What are the throughput response time requirements? Section 3. Security Requirement 1) Support Role Based Access. 2) Support task-based and object-based user authorization profiles. 3) Provide an audit trail that can be used to identify transactions or data accesses that have been performed by: Function Terminal Patient User 4) Provide audit log reporting features. 5) Log all unsuccessful logons and lock out users after a certain number of unsuccessful attempts as defined by the customer. 6) Provide a time out feature that automatically signs off a user if a workstation has been left unattended for a user-defined time period. 7) Support Active Directory and/or LDAP. 8) Report on access levels by patient, user, and location. 9) Provide functions to restrict access to specific patient records for individual users. 10) Support electronic signature. 11) Authenticate user based upon a minimum of one-factor authentication utilizing one or more of the following in combination with a User ID: Page 5
6 Password Requirement Biometric Identification Proximity Controls (RFID) Token (e.g., Secure ID) 12) Provide interoperability with patient context (CCOW). 13) Permit creation of temporary user accounts with specific expiration timeframes. 14) Permit the security administrator to specify that User IDs and passwords must contain a combination of alphabetic, numeric, and special characters. 15) Permit the security administrator to specify that passwords must adhere to strong password guidelines. 16) Permit the security administrator to specify a minimum password length that will be enforced by the system. 17) Force a user to select a password at initial sign-on and when the password has been reset. 18) Prohibit the reuse of User IDs and passwords per user based upon security administrator controllable setting. 19) Support the encryption of the password file and password information. 20) Permit the security administrator to set events that are considered security violations as well as provide real-time notification of any violations. 1. Discuss the system s ability to define and control user and role profiles within and across facilities. 2. Describe the system user name and password structure and the ability to enforce it. 3. Discuss the authentication process including encryption and wireless devices. 4. How does your system support single sign-on? Page 6
7 5. Does the system provide audit logs/error logs to detect unauthorized access or activity? 6. Describe the system components in place that support a user/ client s adherence to the HIPAA security regulations. Page 7
8 Section 4. Interoperability Requirement 1) Support the use of industry standard interface engines. 2) Provide pre-defined interfaces that expedite interface development time and automatic wizards that can be used to implement model definitions. 3) Support standard HL7 interfaces. 4) Support industry standards such as DICOM and XML. 5) Interface with legacy systems, departmental systems, repository systems, foreign systems, modalities and devices. 6) Software logic is parameterized or table driven for convenient modification by EPT, tables, and external database query. 7) Users can view a display of archived transactions and audit file as well as the transactions as they are being processed. 8) Includes flexible table features that enable a user to build tables for the translation of data. 9) Support the ability to conditionally map data and the ability to compare and group condition tests. 10) Provide a custom adapter development kit such as COM or API, making it possible for a user to create utilities and applications that can communicate directly. 11) The generation of alert messages can be configured by the time of day and day of week, for each interface via user-defined peak, off-peak and scheduled downtimes. 12) Alert messages can be sent to any device including, pagers and printers as well as to other interfaces. Alerts can also be configured based on change of interface status, idle time and excessive transaction backlog. Page 8
9 Requirement 13) Support data mapping and conditional routing. 14) The following data types are supported: ASCII, BLOB, EBCDIC, hex16, hex32, printable, raw, signed binary and unsigned binary. 15) Error Monitoring provides an alert subsystem which generates alert messages that are stored and viewable online and can be routed via various mechanisms such as and pagers. 16) Include a variety of monitoring and troubleshooting tools that allow for the immediate identification and correction of any problem you may encounter. These intuitive tools are easy to access via point and click or drag and drop features. 17) A field can easily be setup such that some values are translated and others are passed through without translation. 18) Templates exist for various protocol, connections types and interface ports. 19) Holds message waiting to be processed in memory and writes them to disk. Each message is flagged with a status that indicates whether it has been processed and received by the destination system. 20) Provide templates that allow users to assign attributes to a particular definition then copy these attributes for other similar builds are provided. 21) Support for IHE 1. Provide your definition and vision of interoperability and how you are incorporating interoperability within your solutions. 2. Describe your method for establishing HL7 connectivity as well as the version you support. 3. Describe your overall design approach to developing, testing, implementing and upgrading system interfaces. 4. Describe how you support systems without standard interfaces. 5. What tools does your system provide to allow monitoring and guaranteed delivery of your interfaces? Page 9
10 6. What interface engines have your existing clients used? 7. Describe the auditing capabilities to verify the counts of records sent or received by your system. Section 5. Software as a Service (SaaS) OVERVIEW Software as a Service (SaaS), also know as Cloud Computing, provides application software to customers as an on-demand service. SaaS vendors deliver software over the Internet by hosting the software themselves or through a third party Application Service Provider (ASP). While SaaS solutions include many costs, they are generally less expensive than traditional solutions hosted at your own facilities. For example, a SaaS solution minimizes upfront capital costs for hardware and ongoing costs for hardware and software support and maintenance. Because SaaS offers an attractive delivery approach, it is rapidly becoming available, and in some cases, vendors only offer this option. This non-traditional approach requires adding some new items to your RFP and removing others than are no longer applicable. A SaaS agreement should also include some specific contract provisions. Here are some examples of non-contract items to include in a SaaS RFP: Architecture Use of Rich Internet Application (RIA) technology. RIA features allow the SaaS application to execute functions locally on user workstations rather than via an Internet-based web server. This reduces connection time and delays communicating between your computer and the SaaS application. An application configured by the vendor to comply with your organization s web accessibility and presentation standards. Ownership of your data. Provision of a suitable method for retrieving your data in a format you can use with other applications or tools, should you terminate your relationship with the SaaS vendor. Automated load-testing tools as part of the vendor implementation. Examples of information SaaS RFPs do not include are as follows: Requirements for the proposed hardware platform, e.g., hardware model, system software or database software. Separately itemized hardware or system software costs. Separately itemized requirements for ongoing hardware platform maintenance and associated staffing and costs. Limited desktop configuration requirements, e.g., web browser support. Performance Reliability Page 10
11 Detail your performance metrics for Service Level Agreements (SLAs) for measuring application availability, performance, and network connectivity. Detail any tools offered to measure application availability offered to report on realtime or historical performance information (uptime, outages, degradations). Disclose any use of 3 rd party server hosting companies. How are sudden demand surges managed without adversely affecting system use? How is planned growth in demand managed without adversely affecting system use? Where are your data centers located? How are application and server upgrades conducted, scheduled, and communicated to the customer? Is off-line data access available in the event of a loss of connectivity? Detail your high availability capabilities. Attach a copy of your disaster recovery plan. Describe your backup and recovery capabilities that ensure prompt and complete data recovery. Security Detail how your organization would respond to a data security breach. Detail the number and roles of your data security personnel. Vendor maintains a well-document security infrastructure. Detail the level of auditing that is available and what access the customer has to audit logs. Describe any use of incident protection and detection software. encrypted data storage and transmission while compensating for performance implications. Vendor maintains infrastructure standards certification like International Standards Organization/International Electrical Commission (ISO/IEC 27002). An estimated response time from vendor support personnel when contacted regarding security issues. Can the customer s data be moved among multiple data centers? If so, how is the customer notified? Will you allow for the storage of a customer s data outside the United States of America? Do you provide for the delegation of user provisioning administration to the customer? What physical controls exist to manage the ingress/egress of the software production/delivery facility? Will the software code be placed in escrow and buyer assumption of hosting responsibilities if your company stops offering the application due to bankruptcy, etc.? If not, detail the situation for customers in the event that your company can no longer continue operations. Page 11
12 Page 12
Atmosphere Fax Network Architecture Whitepaper
Atmosphere Fax Network Architecture Whitepaper Contents Introduction... 3 The 99.99% Uptime Fax Network... 4 Reliability and High Availability... 5 Security... 7 Delivery... 9 Network Monitoring... 11
More informationOverview SENTINET 3.1
Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7
More informationSparta Systems TrackWise Digital Solution
Systems TrackWise Digital Solution 21 CFR Part 11 and Annex 11 Assessment February 2018 Systems TrackWise Digital Solution Introduction The purpose of this document is to outline the roles and responsibilities
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationConcord Fax Network Architecture. White Paper
Concord Fax Network Architecture White Paper Page 2 Table of Contents Introduction 3 The 99.99% Uptime Fax Network 4 Reliability and High Availability 5 Security 9 Delivery 14 Network Monitoring 19 About
More informationHIPAA Controls. Powered by Auditor Mapping.
HIPAA Controls Powered by Auditor Mapping www.tetherview.com About HIPAA The Health Insurance Portability and Accountability Act (HIPAA) is a set of standards created by Congress that aim to safeguard
More informationSparta Systems TrackWise Solution
Systems Solution 21 CFR Part 11 and Annex 11 Assessment October 2017 Systems Solution Introduction The purpose of this document is to outline the roles and responsibilities for compliance with the FDA
More informationTECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
More informationSupport for the HIPAA Security Rule
white paper Support for the HIPAA Security Rule PowerScribe 360 Reporting v1.1 healthcare 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe
More informationCMB-207-1I Citrix Desktop Virtualization Fast Track
Page1 CMB-207-1I Citrix Desktop Virtualization Fast Track This fast-paced course covers select content from training courses CXA-206: Citrix XenApp 6.5 Administration and CXD-202: Citrix XenDesktop 5 Administration
More informationTechnical Brief SUPPORTPOINT TECHNICAL BRIEF MARCH
Technical Brief 1 SupportPoint Cloud is a SaaS solution that makes it easy for people to get the information and guidance they need to navigate through complex business processes. SupportPoint Cloud Client
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationNetworks - Technical specifications of the current networks features used vs. those available in new networks.
APPENDIX V TECHNICAL EVALUATION GUIDELINES Where applicable, the following guidelines will be applied in evaluating the system proposed by a service provider: TABLE 1: HIGH LEVEL COMPONENTS Description
More informationDHIS2 Hosting Proposal
www.knowarth.com 1 Table of Contents 2 Cloud Consulting & Hosting... 3 2.1 Cloud Consulting & Hosting includes... 3 2.2 DHIS2 Hosting features... 4 2.2.1 Best-practice installation... 4 2.2.2 Uptime and
More informationSentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
More informationAlliance Key Manager A Solution Brief for Partners & Integrators
Alliance Key Manager A Solution Brief for Partners & Integrators Key Management Enterprise Encryption Key Management This paper is designed to help technical managers, product managers, and developers
More informationDirectory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
More informationSystem Overview. Security
ImageSilo is an ultra-secure, on-demand Enterprise Content Management (ECM) system. As the largest on-demand installation of PaperVision Enterprise, it offers all the same features and functionality. ImageSilo
More informationInterCall Virtual Environments and Webcasting
InterCall Virtual Environments and Webcasting Security, High Availability and Scalability Overview 1. Security 1.1. Policy and Procedures The InterCall VE ( Virtual Environments ) and Webcast Event IT
More informationIBM Security Intelligence on Cloud
Service Description IBM Security Intelligence on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients
More informationPage 1 of 15. Applicability. Compatibility EACMS PACS. Version 5. Version 3 PCA EAP. ERC NO ERC Low Impact BES. ERC Medium Impact BES
002 5 R1. Each Responsible Entity shall implement a process that considers each of the following assets for purposes of parts 1.1 through 1.3: i. Control Centers and backup Control Centers; ii. Transmission
More informationData Processing Amendment to Google Apps Enterprise Agreement
Data Processing Amendment to Google Apps Enterprise Agreement The Customer agreeing to these terms ( Customer ) and Google Inc., Google Ireland, or Google Asia Pacific Pte. Ltd. (as applicable, Google
More informationIntegrated Cloud Environment Security White Paper
Integrated Cloud Environment Security White Paper 2012-2016 Ricoh Americas Corporation R i c o h A m e r i c a s C o r p o r a t i o n R i c o h A m e r i c a s C o r p o r a t i o n It is the reader's
More informationEchidna Concepts Guide
Salt Group Concepts Guide Version 15.1 May 2015 2015 Salt Group Proprietary Limited. All rights reserved. Information in this document is subject to change without notice. The software described in this
More informationSECURITY DOCUMENT. 550archi
SECURITY DOCUMENT 550archi Documentation for XTM Version 10.3 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of this publication may be reproduced or
More informationCOURSE OUTLINE IT TRAINING
CMB-207-1I Citrix XenApp and XenDesktop Fast Track Duration: 5 days Overview: This fast-paced course covers select content from training courses CXA-206 and CXD- 202 and provides the foundation necessary
More informationSample Security Risk Analysis ASP Meaningful Use Core Set Measure 15
Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15 Risk Analysis with EHR Questions Example Answers/Help: Status What new electronic health information has been introduced into my practice
More informationTechnical and Functional Standards for Digital Court Recording
Technical and Functional Standards for Digital Court Recording As of February 2015 Overview This document provides detailed specifications for Digital Court Recording (DCR) systems which meet the court
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means and includes the company, its authorized users or recipients of the
More informationIBM Proventia Management SiteProtector Installation Guide
IBM Internet Security Systems IBM Proventia Management SiteProtector Installation Guide Version2.0,ServicePack8.1 Note Before using this information and the product it supports, read the information in
More informationMinimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise
Minimum Requirements for Cencon 4 with Microsoft R SQL 2008 R2 Enterprise SQL 2008 R2 Enterprise Restrictions 8 CPU 2 TB Ram Use Limit 524 PB Database Size High Availability Options Database Mirroring,
More informationHIPAA Security and Privacy Policies & Procedures
Component of HIPAA Security Policy and Procedures Templates (Updated for HITECH) Total Cost: $495 Our HIPAA Security policy and procedures template suite have 71 policies and will save you at least 400
More informationCriminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud
Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud Introduction The Criminal Justice Information Security (CJIS) Policy is a publically accessible document that contains
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud
More informationXceedium Xio Framework: Securing Remote Out-of-band Access
Xceedium Xio Framework: Securing Remote Out-of-band Access 1 Common Scenario A major corporation, with many domestic and international offices, has a massive network infrastructure that spans across many
More informationManaged WAN SLA. Contents
Managed WAN SLA Contents Terminology... 2 Service Description... 2 Service Offerings... 2 Private Network Services... 2 Ethernet Connectivity... 2 T-1 Connectivity... 3 Other Connectivity... 3 Internet
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationSystem Requirements VERSION 2.5. Prepared for: Metropolitan Transportation Commission. Prepared by: April 17,
TO 8-06: Regional Real-Time Transit Architecture Design, Procurement and Technical Assistance Real-Time Transit Information System System Requirements VERSION 2.5 Prepared for: Metropolitan Transportation
More informationEXHIBIT A. - HIPAA Security Assessment Template -
Department/Unit: Date: Person(s) Conducting Assessment: Title: 1. Administrative Safeguards: The HIPAA Security Rule defines administrative safeguards as, administrative actions, and policies and procedures,
More informationThe power of centralized computing at your fingertips
Pinnacle 3 Professional The power of centralized computing at your fingertips Philips Pinnacle 3 Professional specifications The power of centralized computing in a scalable offering for mid-size clinics
More informationATTACHMENT 1 Vendor Compliance Matrix Request for Proposal 3093 CCAC Infrastructure Upgrade Phase 1: Campus Core Switch Upgrade Project
Vendor must indicate at what level its proposed solution will the College s requirements as delineated in the referenced sections of the RFP: 2.3 Solution Vision 2.3 Solution Vision The vendor of the selected
More informationSCLIntra Enterprise Product Summary
SCLIntra Enterprise Product Summary SCLIntra uses barcoding technology to monitor and control the flow of tangible objects mail, parcels, property, files or people as they enter and move through a facility.
More informationOn line Thermal Performance Monitoring System. Annexure B1. IEC IT Compliance & Cyber Security Requirements
POWER & ENERGY GROUP GENERATION DEVISION MONITOR & DIAGNOSTICS CENTER On line Thermal Performance Monitoring System Annexure B1 IT Compliance & Cyber Security Requirements Approved by: Name / Signature
More informationSub Meter Data Import & Storage Platform RFP Questions/Answers
Sub Meter Data Import & Storage Platform RFP Questions/Answers ADDED 10/12/2015 Q: The latter sections of the RFP indicate that you are looking for dashboarding features. Will VEIC accept a proposal that
More informationIBM Content Manager OnDemand on Cloud
Service Description IBM Content Manager OnDemand on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of
More informationORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers
All Affiliate Research Policy Subject: HIPAA File Under: For Researchers ORA HIPAA Issuing Department: Office of Research Administration Original Policy Date Page 1 of 5 Approved by: May 9,2005 Revision
More informationSAS SOLUTIONS ONDEMAND
DECEMBER 4, 2013 Gary T. Ciampa SAS Solutions OnDemand Advanced Analytics Lab Birmingham Users Group, 2013 OVERVIEW SAS Solutions OnDemand Started in 2000 SAS Advanced Analytics Lab (AAL) Created in 2007
More informationCloud FastPath: Highly Secure Data Transfer
Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance
More informationManaged WAN SLA. Contents
Managed WAN SLA Contents Terminology... 2 Service Description... 2 General... 2 Levels and Offerings... 2 Private Network Services... 2 Features... 2 Internet Access... 3 Features... 3 Service Level Metrics...
More informationPinnacle3 Professional
Pinnacle3 Professional Pinnacle3 Professional centralized computing platform X6-2 specifications sheet A fast and flexible server solution for demanding small to mid-size clinics Compact and powerful,
More informationTable of Contents. Page 1 of 6 (Last updated 27 April 2017)
Table of Contents What is Connect?... 2 Physical Access Controls... 2 User Access Controls... 3 Systems Architecture... 4 Application Development... 5 Business Continuity Management... 5 Other Operational
More informationIvanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines
Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates
More informationHow Parallels RAS Enhances Microsoft RDS. White Paper Parallels Remote Application Server
How Parallels RAS Enhances Microsoft RDS White Paper Parallels Remote Application Server Table of Contents Introduction... 3 Overview of Microsoft Remote Desktop Services... 3 Microsoft RDS Pain Points...
More informationIBM System Storage DS5020 Express
IBM DS5020 Express Manage growth, complexity, and risk with scalable, high-performance storage Highlights Mixed host interfaces support (FC/iSCSI) enables SAN tiering Balanced performance well-suited for
More informationMicrosoft Office Groove Server Groove Manager. Domain Administrator s Guide
Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without
More informationSecurity and Reliability of the SoundBite Platform Andy Gilbert, VP of Operations Ed Gardner, Information Security Officer
Security and Reliability of the SoundBite Platform Andy Gilbert, VP of Operations Ed Gardner, Information Security Officer 2007 SoundBite Communications, Inc. All Rights Reserved. Agenda Scalability Capacity
More informationfor Windows 2000 Servers. Application server software for enterprises to compete in the digital economy.
Citrix MetaFrame for Windows 2000 Servers. Application server software for enterprises to compete in the digital economy. Citrix is the world leader in application server software and services that provide
More informationDeploy. Your step-by-step guide to successfully deploy an app with FileMaker Platform
Deploy Your step-by-step guide to successfully deploy an app with FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements, and
More informationCitrix XenApp 6.5 Administration
Citrix XenApp 6.5 Administration CXA206; 5 Days, Instructor-led Course Description Citrix XenApp 6.5 Administration training course provides the foundation necessary for administrators to effectively centralize
More informationSphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data
Sphinx List Summary Version Order # Included software components Sphinx Enterprise S-30 Install Sphinx Logon Manager software and desktop card readers on end-user computers. Pre-configured Sphinx CardMaker
More informationCourse CXA-206: Citrix XenApp 6.5 Administration
Course CXA-206: Citrix XenApp 6.5 Administration Course Length: 5 days Overview Citrix XenApp 6.5 Administration training course provides the foundation necessary for administrators to effectively centralize
More informationVersion v November 2015
Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise
More informationNetwork Security Policy
Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business
More informationAXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure
AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical
More informationWindows Server 2003 Network Administration Goals
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management
More information201 CMR COMPLIANCE CHECKLIST Yes No Reason If No Description
Do you have a comprehensive, written information security program ( WISP ) WISP) applicable to all records containing personal information about a resident of the Commonwealth of Massachusetts ( PI )?
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationHIPAA Technical Safeguards and (a)(7)(ii) Administrative Safeguards
HIPAA Compliance HIPAA and 164.308(a)(7)(ii) Administrative Safeguards FileGenius is compliant with all of the below. First, our data center locations (DataPipe) are fully HIPAA compliant, in the context
More informationVMware vcloud Air SOC 1 Control Matrix
VMware vcloud Air SOC 1 Control Objectives/Activities Matrix VMware vcloud Air goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a
More informationTABLE OF CONTENTS. Page 1 of 59
Page 1 of 59 TABLE OF CONTENTS Introduction... 3 Features... 4 General Features... 4 IBackup Professional lets you view the log files of backup, restore, scheduled backup and the details of files and folders
More informationSage 300 People & Web Self Service Technical Information & System Requirements
Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People Architecture The Sage 300 People application is a 2-tier application with the program and database residing
More informationStandard CIP Cyber Security Critical Cyber Asset Identification
Standard CIP 002 1 Cyber Security Critical Cyber Asset Identification Standard Development Roadmap This section is maintained by the drafting team during the development of the standard and will be removed
More informationScale and secure workloads, cost-effectively build a private cloud, and securely connect to cloud services. Beyond virtualization
Beyond virtualization Scale and secure workloads, cost-effectively build a private cloud, and securely connect to cloud services The power of many servers, the simplicity of one Efficiently manage infrastructure
More information90 % of WAN decision makers cite their
WHITEPAPER So many ways to WAN How the most essential technology for distributed enterprises has evolved and where it s headed One of the most critical components to the success of any growth-oriented
More informationNextGen Patient Portal. User Guide.
2.4.3 NextGen Patient Portal User Guide www.nextgen.com Copyright 2014-2017 QSI Management, LLC. All Rights Reserved. The registered trademarks listed at http://www.qsii.com/legal_notices.shtml are the
More informationenicq 6 Installation Guide
Vermont Oxford Network enicq 6 Documentation enicq 6 Installation Guide Release 1.4 Published January 2018 2018 Vermont Oxford Network. All Rights Reserved. enicq 6 Installation Guide Introduction Welcome
More informationALERT LOGIC LOG MANAGER & LOG REVIEW
SOLUTION OVERVIEW: ALERT LOGIC LOG MANAGER & LOG REVIEW CLOUD-POWERED LOG MANAGEMENT AS A SERVICE Simplify Security and Compliance Across All Your IT Assets. Log management is an essential infrastructure
More informationAutomate sharing. Empower users. Retain control. Utilizes our purposebuilt cloud, not public shared clouds
EXECUTIVE BRIEF SHAREBASE BY HYLAND Automate sharing. Empower users. Retain control. With ShareBase by Hyland, empower users with enterprise file sync and share (EFSS) technology and retain control over
More informationAccess Control Procedure
HIPAA Security Procedure # Last Revised: 3/15/2006 Approved: Scope of Procedure The scope of this Policy covers the unique user identification and password, emergency access, automatic logoff, encryption
More informationMetasys System Extended Architecture Overview
Technical Bulletin Issue Date March 31, 2003 Metasys System Extended Architecture Overview Metasys System Extended Architecture Overview...2 Introduction... 2 Key Concepts... 4 Metasys System Extended
More informationDocument Number: rev D Intuitive Surgical, Inc. OnSite Overview. for the da Vinci Xi and da Vinci Si Surgical System.
OnSite Overview for the da Vinci Xi and da Vinci Si Surgical System Page 1 Table of Contents 1. OnSite for the da Vinci Xi and Si System Overview... 3 2. Requirements... 5 3. Detailed Hardware, Software
More informationRSA Authentication Manager 7.1 Administrator s Guide
RSA Authentication Manager 7.1 Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA
More informationSystem Requirements. v7.5. May 10, For the most recent version of this document, visit kcura's Documentation Site.
System Requirements v7.5 May 10, 2013 For the most recent version of this document, visit kcura's Documentation Site. Table of Contents 1 System requirements overview 3 1.1 Scalable infrastructure example
More information2010 Product Line Catalog
2010 Product Line Catalog emerge Embedded Software Systems w Part of Access SySTEM From enterprise-wide security management to small and mid-size access control, Linear s IEI brand has a choice of, giving
More information1 Data Center Requirements
1 Data Center Requirements The following are MassDOT s standard Data Center requirements. 1.1 Data Center General Requirements 1.1.1 The CSC Operator shall furnish, or contract with a third-party provider
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationCLOUD DISASTER RECOVERY. A Panel Discussion
CLOUD DISASTER RECOVERY A Panel Discussion SPEAKERS Michael Kemps Founder & CEO Innovative Computing Systems, Inc. Mike Paul CTO Innovative Computing Systems, Inc. Sonny Sheth Senior Systems Engineer Innovative
More informationTECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
More informationVMware Mirage Getting Started Guide
Mirage 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationBoundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:
Application control : Boundary control : Access Controls: These controls restrict use of computer system resources to authorized users, limit the actions authorized users can taker with these resources,
More informationCourse AZ-100T01-A: Manage Subscriptions and Resources
Course AZ-100T01-A: Manage Subscriptions and Resources Module 1: Managing Azure Subscriptions In this module, you ll learn about the components that make up an Azure subscription and how management groups
More informationAUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE
AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated
More informationDon t just manage your documents. Mobilize them!
Don t just manage your documents Mobilize them! Don t just manage your documents Mobilize them! A simple, secure way to transform how you control your documents across the Internet and in your office.
More informationTRACKVIA SECURITY OVERVIEW
TRACKVIA SECURITY OVERVIEW TrackVia s customers rely on our service for many mission-critical applications, as well as for applications that have various compliance and regulatory obligations. At all times
More informationDue Diligence March 2018 Page 1 of 6. Company
Page 1 of 6 Company Company details Services offered Selectapension Limited, Selectapension House, Eridge Road, Crowborough, East Sussex, TN6 2SL, 01892 669494, www.selectapension.com. Registered in England
More informationemarketeer Information Security Policy
emarketeer Information Security Policy Version Date 1.1 2018-05-03 emarketeer Information Security Policy emarketeer AB hereafter called emarketeer is a leading actor within the development of SaaS-service
More informationMozy. Administrator Guide
Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license
More informationAlliance Key Manager A Solution Brief for Technical Implementers
KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key
More informationMobile Data Security Essentials for Your Changing, Growing Workforce
Mobile Data Security Essentials for Your Changing, Growing Workforce White Paper February 2007 CREDANT Technologies Security Solutions White Paper YOUR DYNAMIC MOBILE ENVIRONMENT As the number and diversity
More information