Akamai Bot Manager. Android and ios BMP SDK
|
|
- Crystal May
- 5 years ago
- Views:
Transcription
1 Akamai Bot Manager Android and ios BMP SDK Prabha Kaliyamoorthy January, 2018
2 Contents Bot Manager SDK 4 Identifying Protected Endpoints 5 Identifying the App OS and Version in the user-agent 5 Request Flow 6 Integrating with Android Apps 7 Installation 7 1. Install the SDK 7 2. Initialize the SDK 7 3. Collect Sensor Data 7 4. Send Sensor Data 8 5. Evaluate the Akamai Edge Response 8 Sample Code Getting and Sending Sensor Data 9 Android API 10 Logging 11 Integrating with ios Apps 12 Installation Install the SDK Edit the Build Settings Collect Sensor Data Send Sensor Data Evaluate the Akamai Edge Response 14 Sample Code Getting and Sending Sensor Data 15 ios API 16 Logging 17 Akamai Edge 18 Application Identification 18 Akamai Edge Response 18
3 Bot Manager SDK Akamai Bot Manager automatically detects traffic generated by robots (bots) on web sites, using various strategies that detect human behavior. Akamai Bot Manager SDK (BMP SDK) takes this technology and applies it to native mobile apps. The Bot Manager mobile SDK is a necessary component for customers who have purchased Bot Manager Premier for Mobile product. The BMP SDK collects behavioral data while the user is interacting with the application. The behavioral data, also known as sensor data, includes the device characteristics, device orientation, accelerometer data, touch events, etc. Akamai BMP SDK provides a simple API to detect bot activities and defend against malicious bot and account takeover.
4 Identifying Protected Endpoints The first step is to identify which endpoints need to be protected. In order to prevent false positives, only requests that are triggered by users interacting with the application, and that may be abused by bots to carry out an attack, should be protected with this technology. Typical use cases include: Account login Account signup Search queries Add to cart Checkout Reward and gift card programs For each request you want to protect, you need to collect the full URL, the method, and any other parameters in the request (including in the body for POST requests) that will help identify the request. Identifying the App OS and Version in the user-agent In order to prevent false positives during the initial rollout, we need to be able to identify the application version so that we can conditionally apply bot detection logic to requests that are expected to send the behavior data. Once enough users have upgraded to the latest version of the application, this condition can easily be removed by updating the bot manager configuration in the Luna control center. Also, because the development lifecycle of the ios and the Android application may not follow the the same cadence and speed, we also need to be able to identify which requests come from ios and Android apps. This strategy may help mitigate bot traffic quicker without having to wait for both apps to be at the same level of maturity and user adoption. The edge server uses the User-Agent HTTP header to identify the application that is integrated with the SDK. So we recommend using a standard format like Application-Name/Version-Number (Platform-Information) for the User-Agent header in the REST API request. Examples: HelloApp/1.2.3 (iphone; ios ) MyFirstApp/1.1.2 (Android 7.0; Build/NRD90U)
5 Request Flow Once the SDK has been implemented and the protected endpoints added into the Bot Manager configuration, the protected request is processed as follows: 1. The user interacts with his mobile devices to login to the application. While this happens, the behavior data (devices orientation, device acceleration, device characteristics and touch event will be recorded by the SDK. 2. When the user presses the submit button: a. The application queries the SDK to retrieve the sensor data. b. The sensor data is added to the request as a header. c. The request is sent to the closest available edge server. 3. Akamai edge server evaluates sensor data and takes the predefined action on the request: a. If no threat is found in the sensor data, the request is classified as human and forwarded to the origin web server b. If a threat is detected, the bot manager rule will fire and the associated action executed.
6 Integrating with Android Apps This section describes the overall process used for Android apps. You start by installing and initializing the BMP SDK, and then you re ready to collect and send sensor data. Then you can determine what actions to take depending on the response codes from the edge. Installation The size of the SDK jar file is 65 KB and contains 512 Dex method counts. Requirements Android Studio Android API 15 (Android 4.0.4) and above 1. Install the SDK Install the SDK by downloading the SDK and copying AkamaiBMP.jar into your libs folder. 2. Initialize the SDK Initialize the SDK by calling CYFMonitor.initialize API from your main activity's oncreate method. // Import the class import com.akamai.botman.cyfmonitor ; public class MainActivity extends Activity protected void oncreate ( Bundle savedinstancestate ) { } } // Initialize Akamai BMP SDK CYFMonitor. initialize ( getapplication ()); 3. Collect Sensor Data The BMP SDK s sensor data contains serialized user behavioral data and device information. However, the device information doesn t contain any information that will identify this device uniquely.
7 You can retrieve sensor data from the SDK by calling the CYFMonitor.getSensorData method. Sensor data should be sent in the REST API request as detailed below. // Get the BMP sensor data String sensordata = CYFMonitor. getsensordata (); 4. Send Sensor Data After the sensor data is retrieved from the SDK, it should be sent in X-acf-sensor-data HTTP header as part your applications REST API (HTTP/S) request. We recommend using HTTPS for the REST API request to ensure the integrity of sensor data and prevent eavesdropping. // Set the sensor data header urlconnection. setrequestproperty ( "X-acf-sensor-data", CYFMonitor. getsensordata ()); 5. Evaluate the Akamai Edge Response Akamai edge server inspects sensor data and takes the predefined action on the request if the request is classified as BOT, otherwise Akamai sends the request to the origin server.
8 Sample Code Getting and Sending Sensor Data The following code snippet shows how to get the sensor data and send it in the HTTP request. // Import the class import com.akamai.botman.cyfmonitor ; public class LoginActivity extends Activity protected void oncreate ( Bundle savedinstancestate ) { } // Initialize Akamai BMP SDK CYFMonitor. initialize ( getapplication ()); protected void loginaction () { // Get the BMP sensor data String sensordata = CYFMonitor. getsensordata (); // Initialize HttpURLConnection URL url = new URL ( " ); HttpURLConnection urlconnection = ( HttpURLConnection ) url. openconnection (); // Set the sensor data header urlconnection. setrequestproperty ( "X-acf-sensor-data", sensordata ); // set the POST body and send the request } }
9 Android API CYFMonitor public class CYFMonitor java.lang.object +--> com.akamai.botman.cyfmonitor (added in Version 2.0.0) CYFMonitor provide methods to access the BMP SDK. All methods in this class are static methods and can be accessed from anywhere without initializing an instance and methods can be invoked from any thread. See the individual method details for more information. Public Constants Log Levels Type int int int int Public Methods Log Level INFO: Constant to log all messages from the SDK WARN: Constant to log all warning and error messages from the SDK ERROR: Constant to log only error messages from the SDK NONE: Constant to log no messages from the SDK Initialize static synchronized void initialize ( Application app ) Initialize the Akamai Botman SDK to capture user events for the specified application. getsensordata static synchronized String getsensordata() Get the serialized user behavior data, device events and device information to be sent with the REST api that needs to be protected.
10 Returns: String Serialized sensor data setloglevel static void setloglevel ( int loglevel ) Set the log level for the Akamai BMP SDK. See Logging below for a list of valid values. Parameters: loglevel int: A valid log level value Logging Akamai BMP SDK logs some messages at all log levels to verify the SDK initialization. These messages are helpful in identifying any integration issue and ensure the SDK is initialized successfully. In addition to these messages, the SDK logs additional messages at info, warn and error levels, to verify and debug that the SDK is working correctly. The default log level for the SDK is to log warning and error messages only. This behavior can be changed by calling setloglevel API. To set the log level, call CYFMonitor.setLogLevel API with one of the log levels specified below: CYFMonitor.INFO - Print all messages CYFMonitor.WARN - (Default) Print warning and error messages only CYFMonitor.ERROR - Print error messages only CYFMonitor.NONE - Turn off all log messages from the SDK For example, to see all messages: // Set the log level to Info CYFMonitor. setloglevel ( CYFMonitor. INFO );
11 Integrating with ios Apps This section describes the overall process used for Android apps. You start by installing and initializing the BMP SDK, and then you re ready to collect and send sensor data. Then you can determine what actions to take depending on the response codes from the edge. Installation The size of the SDK framework is 9.4 MB and contains armv7, arm64, i386 & x86_64 architectures. i386 and x86_64 architectures are used in the simulator and will not be included in the final AppStore distributed app. After including the SDK, the app binary size will be increased approximately by 300 KB. Requirements: Xcode 8 and above Akamai BMP SDK is supported in ios 8.0 and above 1. Install the SDK 1. Download the SDK and drag AkamaiBMP.framework into your XCode Project. 2. In the Choose Options dialog box, select Copy items if needed.
12 2. Edit the Build Settings Under Build Settings, navigate to Linking and then under Other Linker Flags add -ObjC. Note that the SDK is initialized automatically for ios, and so unlike Android, no explicit initialization step is required here.
13 3. Collect Sensor Data Now you can collect sensor data. Note that the device information doesn't contain any information that will identify this device uniquely. 1. Import the SDK header into your source file: // Import the SDK header #import <AkamaiBMP/CYFMonitor.h> 2. Akamai BMP's Sensor data contains serialized user behavioral data and device information. To retrive the sensor data from the SDK call the CYFMonitor getsensordata method. Sensor data should be sent in the REST API request as detailed below. // Get the BMP sensor data NSString * sensordata = [ CYFMonitor getsensordata ]; 4. Send Sensor Data After the sensor data is retrieved from the SDK, it should be sent in X-acf-sensor-data HTTP header as part your applications REST API (HTTP/S) request. We recommend using HTTPS for the REST API request to ensure the integrity of sensor data and prevent eavesdropping. // set the sensor-data header [ request addvalue: sensordata ]; 5. Evaluate the Akamai Edge Response Akamai edge server inspects sensor data and takes the predefined action on the request if the request is classified as BOT, otherwise Akamai sends the request to the origin server. See Akamai Edge Response below for more details.
14 Sample Code Getting and Sending Sensor Data The following code snippet shows how to get the sensor data and send it in the HTTP request. // Import the SDK header #import <AkamaiBMP/CYFMonitor.h> //... //... // Example login button action - ( IBAction ) loginaction: ( id ) sender { // Get the BMP sensor data NSString * sensordata = [ CYFMonitor getsensordata ]; // Create the request. NSMutableURLRequest * request = [ NSMutableURLRequest requestwithurl:[ NSURL ]]; // set the sensor-data header [ request addvalue: sensordata ]; } // send the request object using NSURLConnection or NSURLSession
15 ios API class CYFMonitor (added in Version 2.0.0) CYFMonitor provide methods to access the BMP SDK. All methods in this class are class methods and can be accessed from anywhere without creating an instance and methods can be invoked from any thread. See the individual method details for more information. Public Methods getsensordata + ( NSString * ) getsensordata ; Get the serialized user behavior data, device events and device information to be sent with the REST api that needs to be protected. Returns: NSString Serialized sensor data setloglevel + ( void ) setloglevel: ( CYFLogLevel ) loglevel ; Set the log level for the Akamai BMP SDK. See CYFLogLevel for a list of valid values. Parameters: loglevel CYFLogLevel: A valid log level value Enumeration
16 CYFLogLevel (added in Version 2.0.0) The log level to control the logging in the SDK. The values are used with CYFMonitor setloglevel method. Constants CYFLogLevelInfo CYFLogLevelWarn CYFLogLevelError Constant to log all messages from the SDK Constant to log all warning and error messages from the SDK Constant to log only error messages from the SDK CYFLogLevelNone Constant to log no messages from the SDK Logging Akamai BMP SDK logs some messages at all log levels to verify the SDK initialization. These messages are helpful in identifying any integration issue and ensure the SDK is initialized successfully. In addition to these messages, the SDK logs additional messages at info, warn and error levels, to verify and debug that the SDK is working correctly. The default log level for the SDK is to log warning and error messages only. This behavior can be changed by calling setloglevel API. To set the log level, call CYFMonitor setloglevel API with one of the log level specified below: // Set the log level to Info [ CYFMonitor setloglevel: CYFLogLevelInfo ]; These are the available logging levels: CYFLogLevelInfo - Print all messages. CYFLogLevelWarn - (Default) Print warning and error messages only. CYFLogLevelError - Print error messages only. CYFLogLevelNone - Turn off all log messages from the SDK. Akamai Edge
17 Application Identification Akamai edge server intercepts the REST API request and inspects X-acf-sensor-data header to determine if the request is from a BOT or a human user. The REST endpoint can be used by more than one application or platform or multiple version of the same application. The edge server uses the User-Agent HTTP header to identify the application that is integrated with the SDK. So we recommend using a standard format like Application-Name / Version-Number ( Platform-Information ) for the User-Agent header in the REST API request. Examples: HelloApp/1.2.3 (iphone; ios ) MyFirstApp/1.1.2 (Android 7.0; Build/NRD90U) Akamai Edge Response When the app makes a request, Akamai evaluates the sensor data at the edge. If the request is classified as human, the traffic continues to the origin server and the response is sent back to the app. If the request is BOT, there are two possible actions, monitor and deny. If the action is monitor, the traffic is allowed and the request is sent to the origin server. If the action is deny, a 403 HTTP response is sent back to the app, and the app should handle the situation and take appropriate action. Hint: To differentiate a 403 response from your own origin server, check for AkamaiGHost in the Server HTTP response header, which would be a response from Akamai Edge server; your origin server will have a different value.
18
19 As the global leader in Content Delivery Network ( CDN ) services, Akamai makes the Internet fast, reliable, and secure for its customers. The company s advanced web performance, mobile performance, cloud security, and media delivery solutions are revolutionizing how businesses optimize consumer, enterprise, and entertainment experiences for any device, anywhere. To learn how Akamai solutions and its team of Internet experts are helping businesses move faster forward, please visit or blogs.akamai.com, and on Twitter. Akamai is headquartered in Cambridge, Massachusetts in the United States with operations in more than 57 offices around the world. Our services and renowned customer care are designed to enable businesses to provide an unparalleled Internet experience for their customers worldwide. Addresses, phone numbers, and contact information for all locations are listed on Akamai Technologies, Inc. All Rights Reserved. Reproduction in whole or in part in any form or medium without express written permission is prohibited. Akamai and the Akamai wave logo are registered trademarks. Other trademarks contained herein are the property of their respective owners. Akamai believes that the information in this publication is accurate as of its publication date; such information is subject to change without notice. Published 01/18.
TechValidate Survey Report: SaaS Application Trends and Challenges
TechValidate Survey Report: SaaS Application Trends and Challenges TechValidate Survey Report: SaaS Application Trends and Challenges 2 The current growth rates and investments in SaaS are astounding.
More informationINCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.
INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS Protect Critical Enterprise Applications and Cardholder Information with Enterprise Application Access Scope and Audience This guide is for
More informationSurvey: Global Efficiency Held Back by Infrastructure Spend in Pharmaceutical Industry
Survey: Global Efficiency Held Back by Infrastructure Spend in Pharmaceutical Industry Akamai Survey Shows Pharmaceutical Industry Looking for Global Employee Efficiency but may be Held Back by Heavy Infrastructure
More informationOverview of Akamai s Personal Data Processing Activities and Role
Overview of Akamai s Personal Data Processing Activities and Role Last Updated: April 2018 This document is maintained by the Akamai Global Data Protection Office 1 Introduction Akamai is a global leader
More informationAKAMAI WHITE PAPER. Enterprise Application Access Architecture Overview
AKAMAI WHITE PAPER Enterprise Application Access Architecture Overview Enterprise Application Access Architecture Overview 1 Providing secure remote access is a core requirement for all businesses. Though
More informationAKAMAI WHITE PAPER. Security and Mutual SSL Identity Authentication for IoT. Author: Sonia Burney Solutions Architect, Akamai Technologies
AKAMAI WHITE PAPER Security and Mutual SSL Identity Authentication for IoT Author: Sonia Burney Solutions Architect, Akamai Technologies Security and Mutual SSL Identity Authentication for IoT 1 Introduction:
More informationDIGITAL TRANSFORMATION IN FINANCIAL SERVICES
DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation
More informationAndroid AMP SDK v6. Migration Guide: From v5 to v6. Updated: 18-Apr-16
Android AMP SDK v6 Migration Guide: From v5 to v6 Updated: 18-Apr-16 amp-sdk-support@akamai.com TABLE OF CONTENTS 1) Playing a stream 3 2) Play a stream at a specified position (in seconds) 4 3) Getting
More informationQ&A TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL. An interview with John Summers, Enterprise VP and GM, Akamai
TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL An interview with John Summers, Enterprise VP and GM, Akamai Q&A What are the top things that business leaders need to understand about today s cybersecurity
More informationCIO INSIGHTS Boosting Agility and Performance on the Evolving Internet
CIO INSIGHTS Boosting Agility and Performance on the Evolving Internet Boosting Agility & Performance on the Evolving Internet To improve customers web and mobile experiences, organizations must address
More informationakamai s [state of the internet] / security
[Volume 2 / Number 2] akamai s [state of the internet] / security Q2 215 executive summary The Security Report has five research sections: Quarter-over-quarter and year-ago quarterly attack statistics
More informationAKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.
CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE. Threat > The number and size of cyberattacks are increasing rapidly Website availability and rapid performance are critical factors in determining the success
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
More informationAKAMAI THREAT ADVISORY. Satori Mirai Variant Alert
AKAMAI THREAT ADVISORY Satori Mirai Variant Alert Version: V002 Date: December 6, 2017 1.0 / Summary / Akamai, along with industry peers, has identified an updated variant of Mirai (Satori) that has activated
More informationAkamai Quick Start Guides
$ akamai get akamai-open/cli-property Attempting to fetch command... [OK] Installing... [OK] Available Commands: update help list get property See "akamai help [command]" for details. Akamai Quick Start
More informationIntroduction to Kony Fabric
Kony Fabric Introduction to Kony Fabric Release V8 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version stated on the Revision
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationAdobe Marketing Cloud Bloodhound for Mac 3.0
Adobe Marketing Cloud Bloodhound for Mac 3.0 Contents Adobe Bloodhound for Mac 3.x for OSX...3 Getting Started...4 Processing Rules Mapping...6 Enable SSL...7 View Hits...8 Save Hits into a Test...9 Compare
More informationIntegrate Akamai Web Application Firewall EventTracker v8.x and above
Integrate Akamai Web Application Firewall EventTracker v8.x and above Publication Date: May 29, 2017 Abstract This guide helps you in configuring Akamai WAF and EventTracker to receive events. In this
More informationKony MobileFabric Engagement Services QuickStart Guide
Kony MobileFabric (Building a Sample App - Android) Release 7.0 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version stated
More informationMobile App Performance SDK. Configuration Guide
Mobile App Performance SDK Configuration Guide July 3, 2018 Mobile App Performance SDK 1 The Mobile App Performance (MAP) SDK 3 Cache Control 5 Pre-positioning Content 5 Configuration Settings 5 Usage
More informationTHE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES
THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES TABLE OF CONTENTS 3 Introduction 4 Survey Findings 4 Recent Breaches Span a Broad Spectrum 4 Site Downtime and Enterprise
More informationGetting Started with Apple ios Development Link-OS SDK Objective-C
Getting Started with Apple ios Development Link-OS SDK Objective-C Overview This document describes the end to end process of designing, packaging, deploying and running an Apple iphone /ipod application
More information1 Introduction Requirements Architecture Feature List... 4
Contents 1 Introduction... 2 1.1 Requirements... 2 1.2 Architecture... 3 1.3 Feature List... 4 1.3.1 Device Compliance status... 4 1.3.2 Auto grouping for devices... 5 1.3.3 Auto grouping for applications...
More informationOracle Cloud Using the UiPath Robotic Process Automation Adapter with Oracle Integration F
Oracle Cloud Using the UiPath Robotic Process Automation Adapter with Oracle Integration F10982-02 Oracle Cloud Using the UiPath Robotic Process Automation Adapter with Oracle Integration, F10982-02 Copyright
More informationEvidence-based protection of web resources a must under the GDPR. How the Akamai Intelligent Platform helps customers to mitigate risks
AKAMAI WHITE PAPER Evidence-based protection of web resources a must under the GDPR How the Akamai Intelligent Platform helps customers to mitigate risks Table of Contents GDPR: What is it? 1 How can Akamai
More informationEMC White Paper Documentum Client for Outlook (DCO)
EMC White Paper Documentum Client for Outlook (DCO) Troubleshooting Guide Copyright 2005 EMC Corporation. All rights reserved. EMC believes the information in this publication is accurate as of its publication
More informationBiometric Sensor SDK. Integration Guide 4.17
Biometric Sensor SDK Integration Guide 4.17 Disclaimer Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2013 2017 VASCO Data Security, Inc., VASCO Data Security International
More informationAvanan for G Suite. Technical Overview. Copyright 2017 Avanan. All rights reserved.
Avanan for G Suite Technical Overview Contents Intro 1 How Avanan Works 2 Email Security for Gmail 3 Data Security for Google Drive 4 Policy Automation 5 Workflows and Notifications 6 Authentication 7
More informationCounterACT Check Point Threat Prevention Module
CounterACT Check Point Threat Prevention Module Version 1.0.0 Table of Contents About the Check Point Threat Prevention Integration... 4 Use Cases... 4 Additional Check Point Threat Prevention Documentation...
More informationMobile Apps 2010 iphone and Android
Mobile Apps 2010 iphone and Android March 9, 2010 Norman McEntire, Founder Servin Corporation - http://servin.com Technology Training for Technology ProfessionalsTM norman.mcentire@servin.com 1 Legal Info
More informationIntegration Service. Admin Console User Guide. On-Premises
Kony MobileFabric TM Integration Service Admin Console User Guide On-Premises Release 7.3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and
More informationWalkthrough: Binding an ios Objective-C Library
Walkthrough: Binding an ios Objective-C Library Binding an existing ios Objective-C Library with Objective Sharpie Overview When working on ios, you might encounter cases where you want to consume a third-party
More informationWHAT DEVOPS NEED TO KNOW ABOUT MOBILE
WHAT DEVOPS NEED TO KNOW ABOUT MOBILE or really everyone Jon Arne Sæterås twitter: @jonarnes Desktop Mobile Tablet Console 100 80 60 40 20 0 2009-01 2010-01 2011-01 2012-01 2013-01 2014-01 2015-01 2016-01
More informationSymantec Security.cloud
Data Sheet: Messaging Security filters unwanted messages and protects mailboxes from targeted attacks. The service has selflearning capabilities and Symantec intelligence to deliver highly effective and
More informationAkamai White Paper. FedRAMP SM Helps Government Agencies Jumpstart their Journey to the Cloud. FedRAMP. Federal Risk Authorization Management Program
White Paper FedRAMP SM Helps Government Agencies Jumpstart their Journey to the Cloud FedRAMP Federal Risk Authorization Management Program FedRAMP 2 Table of Contents Introduction 3 fedramp overview 3
More informationMcAfee MVISION Mobile Citrix XenMobile Integration Guide
McAfee MVISION Mobile Citrix XenMobile Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active
More informationQ&A TALKING CYBER SECURITY WITH THE BOARD OF DIRECTORS. An interview with Josh Shaul, VP, Web Security Products
TALKING CYBER SECURITY WITH THE BOARD OF DIRECTORS An interview with Josh Shaul, VP, Web Security Products Q&A What are the basics that board members need to know about cyber security today? Josh: Board
More informationCONTENT-AWARE DNS. IMPROVING CONTENT-AWARE DNS RESOLUTION WITH AKAMAI DNSi CACHESERVE EQUIVALENCE CLASS. AKAMAI DNSi CACHESERVE
AKAMAI DNSi CACHESERVE CONTENT-AWARE DNS IMPROVING CONTENT-AWARE DNS RESOLUTION WITH AKAMAI DNSi CACHESERVE EQUIVALENCE CLASS. CacheServe is the telecommunication industry s gold standard for caching DNS.
More informationClient Proxy interface reference
Reference Guide McAfee Client Proxy 2.3.2 Client Proxy interface reference These tables provide information about the settings found in the Client Proxy UI. Policy Catalog On the McAfee Client Proxy page
More informationOracle Cloud Using the Eventbrite Adapter with Oracle Integration
Oracle Cloud Using the Eventbrite Adapter with Oracle Integration E85506-05 January 2019 Oracle Cloud Using the Eventbrite Adapter with Oracle Integration, E85506-05 Copyright 2017, 2019, Oracle and/or
More informationIntegration Service. Admin Console User Guide. On-Premises
Kony Fabric Integration Service Admin Console User Guide On-Premises Release V8 SP1 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the
More informationAddressing Security Loopholes of Third Party Browser Plug ins UPDATED FEBRUARY 2017
Addressing Security Loopholes of Third Party Browser Plug ins UPDATED FEBRUARY 2017 Jay Kelley, 2015-22-12 February 2017 Update Endpoint inspection and network access support with Chrome browser, Firefox,
More informationLogin with Amazon. Getting Started Guide for ios apps
Login with Amazon Getting Started Guide for ios apps Login with Amazon: Getting Started Guide for ios Copyright 2017 Amazon.com, Inc., or its affiliates. All rights reserved. Amazon and the Amazon logo
More informationINSITES CONNECT ADMINISTRATION GUIDE. Version 1.4.3
INSITES CONNECT ADMINISTRATION GUIDE Version 1.4.3 CONTENTS GETTING STARTED... 2 Version Compatibility... 2 Installing the InSites Connect app... 2 APP CONFIGURATION... 4 CONFIGURING PUSH NOTIFICATIONS...
More informationUSER MANUAL. MageMob App Builder TABLE OF CONTENTS. Version: 2.0.0
USER MANUAL TABLE OF CONTENTS Introduction... 1 Benefits of MageMob App Builder... 1 Installation & Activation... 2 Installation Steps... 2 Extension Activation... 3 How it Works?... 4 Back End Configuration:...
More informationOracle Cloud Using the Google Calendar Adapter with Oracle Integration
Oracle Cloud Using the Google Calendar Adapter with Oracle Integration E85501-05 January 2019 Oracle Cloud Using the Google Calendar Adapter with Oracle Integration, E85501-05 Copyright 2017, 2019, Oracle
More informationSalesforce Classic Mobile User Guide for Android
Salesforce Classic Mobile User Guide for Android Version 41.0, Winter 18 @salesforcedocs Last updated: November 21, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered
More informationTopics in Mobile Computing
Topics in Mobile Computing Workshop 1I - ios Fundamental Prepared by Y.H. KWOK What is ios? From Wikipedia (http://en.wikipedia.org/wiki/ios): ios is an operating system for iphone, ipad and Apple TV.
More informationApplying Identity to Secure Mobile Applications. Copyright 2012, Oracle and/or its affiliates. All rights reserved.
Applying Identity to Secure Mobile Applications 1 This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making
More informationZimperium Global Threat Data
Zimperium Global Threat Report Q2-2017 700 CVEs per Year for Mobile OS 500 300 100 07 08 09 10 11 12 13 14 15 16 17 Outdated ios Outdated ANDROID 1 of 4 Devices Introduces Unnecessary Risk 1 out of 50
More informationForeScout Extended Module for Qualys VM
ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...
More informationSymantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes
Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes This document includes the following topics: About
More informationDCLI User's Guide. Data Center Command-Line Interface
Data Center Command-Line Interface 2.10.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit
More informationArise Documentation. Release 2.7. Arise.io
Arise Documentation Release 2.7 Arise.io January 31, 2014 Contents 1 Setup your first A/B test 3 1.1 Overview................................................. 3 1.2 Getting Started..............................................
More informationIP Application Accelerator
Akamai Solution IP Application Accelerator Improve the Performance and Reliability of any IP-Enabled Application Superior Performance Levels for AppRiver AppRiver Website AppRiver, a software-as-a-service
More informationLinkedIn Sales Navigator for MS Dynamics 2016 and 365 Installation Guide
LinkedIn Sales Navigator for MS Dynamics 2016 and 365 Installation Guide The installation process will take less than 30 minutes The LinkedIn Sales Navigator for Microsoft Dynamics application (widget)
More informationImperva Incapsula Product Overview
Product Overview DA T A SH E E T Application Delivery from the Cloud Whether you re running a small e-commerce business or in charge of IT operations for an enterprise, will improve your website security
More informationHPE AppPulse Mobile. Software Version: 2.1. Adding AppPulse Mobile to Your ios App
HPE AppPulse Mobile Software Version: 2.1 Adding AppPulse Mobile to Your ios App Document Release Date: November 2015 Contents How to Add HP AppPulse Mobile to Your ios App 3 Advanced Options 7 Crash Stack
More informationOracle Cloud Using the Eventbrite Adapter. Release 17.3
Oracle Cloud Using the Eventbrite Adapter Release 17.3 E69235-08 September 2017 Oracle Cloud Using the Eventbrite Adapter, Release 17.3 E69235-08 Copyright 2016, 2017, Oracle and/or its affiliates. All
More informationLecture 1 Introduction to Android. App Development for Mobile Devices. App Development for Mobile Devices. Announcement.
CSCE 315: Android Lectures (1/2) Dr. Jaerock Kwon App Development for Mobile Devices Jaerock Kwon, Ph.D. Assistant Professor in Computer Engineering App Development for Mobile Devices Jaerock Kwon, Ph.D.
More informationSoftware Development Kit for ios and Android
Software Development Kit for ios and Android With Bomgar's software development kit for mobile devices, a developer can integrate your mobile app with Bomgar to provide faster support for your app. The
More informationAdFalcon ios SDK Developer's Guide. AdFalcon Mobile Ad Network Product of Noqoush Mobile Media Group
AdFalcon ios SDK 4.1.0 Developer's Guide AdFalcon Mobile Ad Network Product of Noqoush Mobile Media Group Table of Contents 1 Introduction... 3 Prerequisites... 3 2 Install AdFalcon SDK... 4 2.1 Use CocoaPods
More informationWhat is the Selendroid?
When you publish an app to Google play, it must be well tested to avoid the potential bugs. There's a ton of test scenarios that should be executed before publishing an app. To save the testing effort,
More informationFedEx Office Print Online Corporate
Quick Reference Guide Getting Started Log in to FedEx Office Print Online Corporate 1. Open your browser and navigate to: https://printonline.fedex.com/nextgen/abbott-amo 2. Input User ID and Password
More informationSupported Browsers. General. Clicking Cancel in the Create Instance Dialog Redirects to StackRunner Page. Region Must be Selected for New Stack
Oracle Cloud Oracle Autonomous Mobile Cloud Enterprise Known Issues Release 18.2.5 E95341-03 June 2018 Supported Browsers This table describes the minimum requirements for web browsers that supports. Web
More informationios Application Development Course Details
ios Application Development Course Details By Besant Technologies Course Name Category Venue ios Application Development Mobile Application Development Besant Technologies No.24, Nagendra Nagar, Velachery
More informationDelivering Live Video from the Cloud When the World is Watching
WHITE PAPER Delivering Live Video from the Cloud When the World is Watching Ensure Streaming Video Quality at Scale Through Every Phase of the Workflow Delivering Live Events from the Cloud When the World
More informationHow to Select the Right Marketing Cloud Edition
How to Select the Right Marketing Cloud Edition Email Studio, Mobile Studio, and Web Studio ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire
More informationVendor: Cisco. Exam Code: Exam Name: Developing with Cisco Network Programmability (NPDEV) Version: Demo
Vendor: Cisco Exam Code: 600-502 Exam Name: Developing with Cisco Network Programmability (NPDEV) Version: Demo Question Set 1 QUESTION 1 A stock brokerage firm requires that all trades are executed quickly
More informationSalesforce Classic User Guide for Android
Salesforce Classic User Guide for Android Version 36.0, Spring 16 @salesforcedocs Last updated: April 27, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
More informationXcode Release Notes. Apple offers a number of resources where you can get Xcode development support:
Xcode Release Notes This document contains release notes for Xcode 5 developer preview 4. It discusses new features and issues present in Xcode 5 developer preview 4 and issues resolved from earlier Xcode
More informationWorksPad. User Guide
Version 3.0.6 January 2017 MobilityLab, LLC. 2011-2017 MobilityLab, LLC. All rights reserved. MobilityLab,, the logo are trademarks or registered trademarks of MobilityLab, LLC. in the U.S., Russia and
More informationVMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Windows VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More information1.1 PDFium Foxit PDF SDK PDFium version of Foxit PDF SDK Features Evaluation...
TABLE OF CONTENTS 1 Introduction to PDFium version of Foxit PDF SDK... 1 1.1 PDFium... 1 1.2 Foxit PDF SDK... 1 1.3 PDFium version of Foxit PDF SDK... 1 1.4 Features... 2 1.5 Evaluation... 2 1.6 License...
More informationForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3
ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic
More informationYour Apps and the Future of macos Security
#WWDC18 Your Apps and the Future of macos Security Pierre-Olivier Martel, Security Engineering Manager Kelly Yancey, OS Security Garrett Jacobson, Trusted Execution 2018 Apple Inc. All rights reserved.
More informationForeScout Extended Module for ServiceNow
ForeScout Extended Module for ServiceNow Version 1.1.0 Table of Contents About this Integration... 4 Use Cases... 4 Asset Identification... 4 Asset Inventory True-up... 5 Additional ServiceNow Documentation...
More informationF5 Azure Cloud Try User Guide. F5 Networks, Inc. Rev. September 2016
F5 Azure Cloud Try User Guide F5 Networks, Inc. Rev. September 2016 Azureinfo@f5.com Table of Contents Introduction... 3 F5 Web Application Firewall Solution, (WAF) Review... 3 Configuring SSO/Pre-authentication
More informationIntegrating with Microsoft Intune to Enforce Compliance on Mac Computers Managed by Jamf Pro
Integrating with Microsoft Intune to Enforce Compliance on Mac Computers Managed by Jamf Pro Technical Paper Jamf Pro 10.9.0 or Later 29 January 2019 copyright 2002-2019 Jamf. All rights reserved. Jamf
More informationAndroid ATC Android Security Essentials Course Code: AND-402 version 5 Hands on Guide to Android Security Principles
Android ATC Android Security Essentials Course Code: AND-402 version 5 Hands on Guide to Android Security Principles Android Security Essentials Course Code: AND-402 version 5 Copyrights 2015 Android ATC
More informationAT&T Advertising SDK Developer Guide for ios
AT&T Advertising SDK Developer Guide for ios Publication Date: September 24 th 2013 Legal Disclaimer This document and the information contained herein (collectively, the "Information") is provided to
More informationMarketing Cloud Mobile App
Salesforce, Winter 19 @salesforcedocs Last updated: January 9, 2019 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com, inc., as are other
More informationCitrix SD-WAN for Optimal Office 365 Connectivity and Performance
Solution Brief Citrix SD-WAN for Optimal Office 365 Connectivity and Performance Evolving Needs for WAN Network Architecture Enterprise networks have historically been architected to provide users access
More informationDeploying Lookout with IBM MaaS360
Lookout Mobile Endpoint Security Deploying Lookout with IBM MaaS360 February 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved. Lookout, Inc., Lookout,
More informationForescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2
Forescout Version 2.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationZero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection
Zero Trust on the Endpoint Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection March 2015 Executive Summary The Forrester Zero Trust Model (Zero Trust) of information
More informationForeScout App for IBM QRadar
How-to Guide Version 2.0.0 Table of Contents About IBM QRadar Integration... 3 Use Cases... 3 Visualization of CounterACT Endpoint Compliance Status & Connectivity... 3 Agent Health and Compliance for
More informationNotes on building with Xcode for ios: I used Xcode 5 (Developer Preview 3 August 2013)
Notes on building with Xcode for ios: I used Xcode 5 (Developer Preview 3 August 2013) The notes were updated in November 2014 to include information about linking openssl. Open the XMLFoundation library
More informationBeginners Guide to Lazada Open Platform
Beginners Guide to Lazada Open Platform Introduction Become a developer Register an application Retrieve APP key and APP secret Request API permission Start development Seller Authorization Introduction
More informationInstallation Guide - Mac
Kony Visualizer Enterprise Installation Guide - Mac Release V8 SP3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version
More informationAkamai Advanced Flowplayer Provider v 2.3
Akamai Advanced Flowplayer Provider v 2.3 User s Guide (For Flowplayer v 3.2.7) August 12, 2011 Akamai Technologies, Inc Akamai Customer Care: 1-877-425-2832 or, for routine requests, email ccare@akamai.com
More informationVMware AirWatch Content Gateway Guide for Windows
VMware AirWatch Content Gateway Guide for Windows AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationVMware AirWatch Content Gateway Guide for Windows
VMware AirWatch Content Gateway Guide for Windows Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationXcode Release Notes. Apple offers a number of resources where you can get Xcode development support:
Xcode Release Notes This document contains release notes for Xcode 5 developer preview 5. It discusses new features and issues present in Xcode 5 developer preview 5 and issues resolved from earlier Xcode
More informationUser Guide for Cisco Device Assignment Tool
First Published: March 19, 2015 Last Modified: July 16, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
More informationand indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered
1 lchannel Introduction := make(chan ControlMessage);work ercompletechan := make(chan bool); statusp ollchannel Digital security := has make(chan never taken on greater urgency. chan Today we bool); live
More informationInstallation Guide - Windows
Kony Visualizer Enterprise Installation Guide - Windows Release V8 SP3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version
More informationLookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management
Lookout Mobile Endpoint Security Deploying Lookout with BlackBerry Unified Endpoint Management June 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved.
More informationMcAfee MVISION Mobile epo Extension Product Guide
McAfee MVISION Mobile epo Extension 1809 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,
More information