If you ve been living under a rock

Size: px
Start display at page:

Download "If you ve been living under a rock"

Transcription

1

2 What is Dropbox? If you ve been living under a rock

3 What is Dropbox? Your life s work, wherever you are

4 The Good

5 The Good A System Administration marvel 300 million files saved per day as of 5/23/2011 That s 1 million files every 5 minutes! Must handle backup/versioning for all these files Smart idea: a lot of the computationally expensive work is done locally (hashing, comparing, indexing) A local DB caches what it knows about server to save time Using hashes, only save each file once with millions of users each with a Lady Gaga mp3, this obviously helps GZIP compression LAN Sync

6 The Good A useful tool for a sysadmin s personal use Store your documentation, access anywhere Automatic versioning Collaboration with other system admins

7 The Good Can outsource backup and synchronization with it As a System Admin, telling your users to use Dropbox for their work files; no need to make your own backup or sync solution then Works for small organizations without strict policies. A high school comes to mind, where a teacher can store their lesson plans and even personal data in their Dropbox the school s IT department doesn t need to worry about this challenging issue of backup/sync.

8 The Good Symbolic links can give Dropbox super powers Want to sync something, but can t move it to your Dropbox because a program depends on it staying where it is? Just make a symlink! Game saves Application settings Windows supports it (mklink), and obviously so does Unix-based systems including OSX (ln). Similarly, sync programs like SyncToy (Windows) or Conduit (Gnome) help similar use cases

9

10 The Good/Cool Random cool things you can do Dropbox as a CDN for a Wordpress site, similar performance to S3 and Google CDN Save automatic home video captures to your Dropbox to monitor from anywhere; no need to setup video server Have torrent client monitor a folder inside your Dropbox for new.torrent files, to automatically start torrent downloads at home from work/school Set Windows 7 desktop to be a slideshow of a shared Dropbox folder; your friends can add photos and you ll automatically start seeing them

11 The Good/Cool More random cool things you can do Store your itunes Library in your Dropbox works seamlessly, and can stream the music (albeit without playlists) from anywhere via website or mobile apps MailDrop monitors IMAP folder for attachments, automatically puts them in Dropbox Synchronize your passwords by putting a portable password manager like KeePass in your Dropbox

12 The Bad

13 The Bad User s personal files going through your network Even with all the tricks Dropbox uses to minimize network traffic, if a user has their itunes Library synced, there is going to be some serious bandwidth usage. Who knows what kind of files they have synced, which are now traveling into your network viruses, illegal music, etc.

14 The Bad Doesn t scale for organizational use clearly meant for individual use and very specific sharing use cases No Role-Based Access Control to files No sense of hierarchy to sharing No central administration no way to know how much data is improperly shared

15 The Bad Users demand synchronization At the very least, they expect their work on their smart phones we already heard a story in class about how badly this can expose a company With the many devices everyone has, they will find some way of sharing files, whether you want them to or not

16 The Ugly

17 The Ugly Compliance What if a doctor transmits a patient s health care record? What if a broker transmits a stock recommendation? These are against federal law and regulations, not to mention data leak issues.

18 The Ugly Company leaks Save a confidential document in your Dropbox at work. Gets synchronized to your iphone while at a Wi-Fi hotspot. SSL to the rescue you hope. Data leakage internally, or externally, can lead to: loss of competitive advantage, regulatory violations, and fraud.

19 The Ugly Security concerns Not encrypted correctly To enable disk space savings, Dropbox hashes your unencrypted data and stores it in a way so that their servers can access the unencrypted data. This is a huge personal privacy concern, as well as an issue for corporations with confidential data. Not to mention, the 4 hours when anyone could access anyone s Dropbox files. /dropbox/

20 Solutions?

21 In Many Cases, Blocked Many System Administrators respond very simply, by blocking access to Dropbox altogether. At two Fortune 100 companies I worked at, employees were physically unable to install their own software due to security constraints. In one case, even the Dropbox.com website was blocked. As a System Admin, we can block the sites and the programs, but that s not a real solution.

22 Try to create your own solution: DIY Secure workspaces to storing, syncing, sharing files. Require 24/7 protection, password authentication, encryption, role-based access control Central administrative oversight: monitoring, revocation, auditing, reporting Integrate with existing authentication (SSO, LDAP, etc.) Add in versioning, redundancy, and ubiquity (mobile/web/crossplatform) Still want to block Dropbox/etc. to force usage of DIY solution This is a HUGE engineering undertaking only large enterprises with tons of resources can pull this off. You d still be hard-pressed to design a system where human stupidity cannot compromise your data

23 Recommendation: Middle Ground A personal-focused off-the-shelf solution (Dropbox) lacks controls a mediumsized company needs. A DIY solution is beyond the scope of what most IT departments can handle. Middle ground: Off-the-shelf enterprise-focused solution. An example: Virtual, hosted desktops (e.g. VMWare View). Your company-wide SSO can log you into your desktop session on any company-owned computer, globally. Has all your files/ /etc. Allow login from home via secure VPN, but only to access the virtual desktop never to use your own personal system to access a company network. This accomplishes synchronization/ubiquity, and the hosted systems can be made redundant and highly available with usual techniques. The virtual sessions can be easily monitored and audited. Does not address: data sharing, versioning.

24 VMWare View Video If have time:

25 The End

Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox.

Cloud Computing. An introduction using MS Office 365, Google, Amazon, & Dropbox. Cloud Computing An introduction using MS Office 365, Google, Amazon, & Dropbox. THIS COURSE Will introduce the benefits and limitations of adopting cloud computing for your business. Will introduce and

More information

INTRODUCTION TO CLOUD STORAGE

INTRODUCTION TO CLOUD STORAGE INTRODUCTION TO CLOUD STORAGE GETTING STARTED PAGE 02 Class Overview What You Will Learn WHAT IS THE CLOUD? PAGE 03 Basic Vocabulary Advantages of the Cloud Disadvantages of the Cloud CLOUD STORAGE SERVICES

More information

Learn how to get started with Dropbox: Take your stuff anywhere. Send large files. Keep your files safe. Work on files together. Welcome to Dropbox!

Learn how to get started with Dropbox: Take your stuff anywhere. Send large files. Keep your files safe. Work on files together. Welcome to Dropbox! Learn how to get started with Dropbox: 1 2 3 4 Keep your files safe Take your stuff anywhere Send large files Work on files together Welcome to Dropbox! 1 Keep your files safe Dropbox lets you save photos,

More information

The Dropbox Problem: It s Worse than You Think

The Dropbox Problem: It s Worse than You Think The Dropbox Problem: It s Worse than You Think The Dropbox Problem: It s Worse than You Think Overview The unsanctioned use of consumer-oriented file sharing services in business is a growing issue. It

More information

Managing Devices and Corporate Data on ios

Managing Devices and Corporate Data on ios Managing Devices and Corporate Data on ios Overview Businesses everywhere are empowering their employees with iphone and ipad. Contents Overview Management Basics Separating Work and Personal Data Flexible

More information

Manual Sync Contacts On My Iphone To Gmail Account Without Itunes

Manual Sync Contacts On My Iphone To Gmail Account Without Itunes Manual Sync Contacts On My Iphone To Gmail Account Without Itunes You can keep contacts from your Google account up to date on your ios device. Apple Store Mac iphone Watch ipad ipod itunes Support not

More information

Box Competitive Sheet January 2014

Box Competitive Sheet January 2014 This document is a comparison of file sharing and collaboration capabilities offered by Soonr Workplace and Box. Narrative is provided when there is no direct comparison between the capabilities or when

More information

Secure communications simplified

Secure communications simplified Secure communications simplified Cirius is a powerful, secure, cloud-based communications and information management solution that enables regulated and non-regulated organizations to effectively protect,

More information

Synchronizing Your PC

Synchronizing Your PC Synchronizing Your PC A Guide to -- 2018 APCUG Spring VTC AN INTERNATIONAL ASSOCIATION OF TECHNOLOGY AND COMPUTER USER GROUPS Introduction There are numerous ways to sync desktops, laptops, tablets and

More information

Media-Ready Network Transcript

Media-Ready Network Transcript Media-Ready Network Transcript Hello and welcome to this Cisco on Cisco Seminar. I m Bob Scarbrough, Cisco IT manager on the Cisco on Cisco team. With me today are Sheila Jordan, Vice President of the

More information

Synchronizing Your PC

Synchronizing Your PC Synchronizing Your PC A Guide to -- North Texas PC Users Group November 18, 2017 AN INTERNATIONAL ASSOCIATION OF TECHNOLOGY AND COMPUTER USER GROUPS 1 Introduction There are numerous ways to sync desktops,

More information

Top. Reasons Legal Teams Select kiteworks by Accellion

Top. Reasons Legal Teams Select kiteworks by Accellion Top 10 Reasons Legal Teams Select kiteworks by Accellion Accellion Legal Customers Include: Top 10 Reasons Legal Teams Select kiteworks kiteworks by Accellion enables legal teams to manage their increasing

More information

How to Backup Your Computer. Adele Berenstein Jan 17, 2018

How to Backup Your Computer. Adele Berenstein Jan 17, 2018 How to Backup Your Computer Adele Berenstein Jan 17, 2018 Agenda Why Backup? What is a Backup? Location of your Backup Your Backup Strategy What Files to Backup? Structure of your Backup External Hard

More information

FilesAnywhere Features List

FilesAnywhere Features List FilesAnywhere Feature List FilesAnywhere Page 1 of 9 Contents Basic Features... 3 Advanced Features... 7 Enterprise Features... 9 FilesAnywhere Page 2 of 9 Basic Features No File Size Limit: There is no

More information

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT

More information

Datasheet. Only Workspaces delivers the features users want and the control that IT needs.

Datasheet. Only Workspaces delivers the features users want and the control that IT needs. Datasheet Secure SECURE Enterprise ENTERPRISE File FILE Sync, SYNC, Sharing SHARING and AND Content CONTENT Collaboration COLLABORATION BlackBerry Workspaces makes enterprises more mobile and collaborative,

More information

Single Sign-On. Introduction

Single Sign-On. Introduction Introduction DeliverySlip seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

AUDIENCE PARTICIPATION PORTION OF PROGRAM

AUDIENCE PARTICIPATION PORTION OF PROGRAM AUDIENCE PARTICIPATION PORTION OF PROGRAM PLEASE SET YOUR PHONES TO AIRPLANE MODE NOW OR TURN OFF PHONE S WI-FI HANDS-ON DEMO WON T BE POSSIBLE WITHOUT SUFFICIENT BANDWIDTH, WHICH IS VERY LIMITED IN THE

More information

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk Wayward Wi-Fi How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk 288 MILLION There are more than 288 million unique Wi-Fi networks worldwide. Source: Wireless Geographic Logging

More information

Storing your Data in the Cloud

Storing your Data in the Cloud Storing your Data in the Cloud Why store your data in the cloud Since the beginning of the internet, technology has been steadily moving away from local storage to remote, server-based storage and processing

More information

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT

More information

Enterprise Mobile Management (EMM) Policies

Enterprise Mobile Management (EMM) Policies Enterprise Mobile Management (EMM) Policies Best Practices Guide Copyright 2016 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software

More information

CipherPost Pro. Secure communications simplified. Feature Sheet

CipherPost Pro. Secure communications simplified. Feature Sheet Feature Sheet CipherPost Pro Secure communications simplified CipherPost Pro is a powerful, secure, cloud-based communications and information management solution that enables regulated and non-regulated

More information

Cirius Secure Messaging Single Sign-On

Cirius Secure Messaging Single Sign-On Cirius Secure Messaging seamlessly integrates into your enterprise SSO to give your users total email security and an extra set of robust communications tools. Single sign-on (SSO) systems create a single

More information

Remote Desktop Access for the Mobile Workforce

Remote Desktop Access for the Mobile Workforce Remote Desktop Access for the Mobile Workforce Security White Paper May 2013 Splashtop Inc. 1/12 Table of Contents 1. Situation Analysis... 3 2. Architecture... 4 2.1. Splashtop Enterprise App... 4 2.2.

More information

Admin console design changes

Admin console design changes Admin console design changes New icons and navigation for the toolbar Settings open in card view Managing your users Managing user accounts inline Managing multiple users Filtering your organization units

More information

Accessing CharityMaster data from another location

Accessing CharityMaster data from another location Accessing CharityMaster data from another location When all of your computers are on the same Local Area Network (LAN), you can place the back end files (including your data and the Word templates) onto

More information

How to Access Protected Health Information from Anywhere and Stay Compliant

How to Access Protected Health Information from Anywhere and Stay Compliant How to Access Protected Health Information from Anywhere and Stay Compliant Secure, HIPAA-compliant file sharing & data storage with mobile data access Safeguard protected health information (PHI), support

More information

Single Sign-On. Introduction. Feature Sheet

Single Sign-On. Introduction. Feature Sheet Feature Sheet Single Sign-On Introduction CipherPost Pro seamlessly integrates into your enterprise single sign-on (SSO) to give your users total email security and an extra set of robust communications

More information

2015 Cloud Collaboration and Mobility Guide

2015 Cloud Collaboration and Mobility Guide 2015 Cloud Collaboration and Mobility Guide The cloud has become an essential tool in nearly every business and industry. No longer are the cloud s benefits seen as luxuries. The efficiencies and opportunities

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

Introduction to

Introduction to Introduction to Email gcflearnfree.org/print/email101/introduction-to-email Introduction Do you ever feel like the only person who doesn't use email? You don't have to feel left out. If you're just getting

More information

BlackBerry Mobile Voice System

BlackBerry Mobile Voice System BlackBerry Mobile Voice System BlackBerry Mobile Voice System Mobile Unified Communications Mobile Voice System ( MVS) is designed to unify desk phone features on smartphones and Wi-Fi networks to optimize

More information

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd.

Securing Amazon Web Services (AWS) EC2 Instances with Dome9. A Whitepaper by Dome9 Security, Ltd. Securing Amazon Web Services (AWS) EC2 Instances with Dome9 A Whitepaper by Dome9 Security, Ltd. Amazon Web Services (AWS) provides business flexibility for your company as you move to the cloud, but new

More information

News and Updates June 1, 2017

News and Updates June 1, 2017 Microsoft Azure News and Updates June 1, 2017 Azure Backup for Windows Server System State Modern Backup Storage with Azure Backup Server v2 vcenter/esxi 6.5 support for Azure Backup Server Larger Disk

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Maximize your move to Microsoft in the cloud

Maximize your move to Microsoft in the cloud Citrix and Microsoft 365: Maximize your move to Microsoft in the cloud 3 reasons to manage Office 365 with Citrix Workspace Pg. 2 Pg. 4 Citrix.com e-book Maximize your Citrix Workspace 1 Content Introduction...3

More information

Original Article Written at by Ashish Technospot.net

Original Article Written at   by Ashish Technospot.net Original Article Written at http://www.technospot.net/blogs/ipad-starter-guide-for-a-windowsuser/ by Ashish Mohta @ Technospot.net My Brother in Law got a new ipad 2 and had sent across a couple of queries

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer INTRODUCTION Meeting HIPAA and HITECH security and compliance requirements is a formidable challenge.

More information

DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE

DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE DATA DISASTER AVERTED! HOW TO BACK UP YOUR ANDROID SMARTPHONE Planning ahead is the easiest way to make sure your data isn t lost to the ether, even if your phone is destroyed. Luckily, Google automatically

More information

AirWatch for Android Devices for AirWatch InBox

AirWatch for Android Devices for AirWatch InBox Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.

More information

SECURITY AND DATA REDUNDANCY. A White Paper

SECURITY AND DATA REDUNDANCY. A White Paper SECURITY AND DATA REDUNDANCY A White Paper Security and Data Redundancy Whitepaper 2 At MyCase, Security is Our Top Priority. Here at MyCase, we understand how important it is to keep our customer s data

More information

Six steps to control the uncontrollable

Six steps to control the uncontrollable Six steps to control the uncontrollable Learn how to use Microsoft Enterprise Mobility Suite to protect cloud apps, manage devices, and guard against advanced threats today Introduction Employees today

More information

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA)

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA) Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA) Introduction: Welcome to Honesty and Confidentiality Lesson Three: The False Claims Act is an important part

More information

CAMPUSPRESS TECHNICAL & SECURITY GUIDE

CAMPUSPRESS TECHNICAL & SECURITY GUIDE CAMPUSPRESS TECHNICAL & SECURITY GUIDE CAMPUSPRESS 2 WHAT IS IN THIS GUIDE? TABLE OF CONTENTS INTRODUCTION... 3 HOSTING... 5 DATACENTERS & HOSTING REGIONS... 6 BACKUPS AND DISASTER RECOVERY... 8 RELIABILITY

More information

Going Mobile at Northwestern

Going Mobile at Northwestern NUIT Tech Talk Going Mobile at Northwestern May 17, 2011 NUIT Support Center staff Today s Agenda Popular Mobile Devices iphone/ipod Touch Android Phone Windows Phone 7 BlackBerry Laptops, Tablets, and

More information

Password & Tutorials Packet

Password & Tutorials Packet & Tutorials Packet Print, staple, and use this & Tutorials Packet Sign up for Secure Backup Service: visit rowleyservices.com for a free trial & setup info Follow attached: Check iphone Camera Settings

More information

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple

TECHNOLOGY Introduction The Difference Protection at the End Points Security made Simple APPGATE TECHNOLOGY UNIFIED TECHNOLOGY Introduction The AppGate solution truly delivers holistic security and access control where other approaches fall short. It is designed to address the security and

More information

IT SECURITY FOR LIBRARIES PART 1: SECURING YOUR LIBRARY BRIAN PICHMAN EVOLVE PROJECT

IT SECURITY FOR LIBRARIES PART 1: SECURING YOUR LIBRARY BRIAN PICHMAN EVOLVE PROJECT IT SECURITY FOR LIBRARIES PART 1: SECURING YOUR LIBRARY BRIAN PICHMAN EVOLVE PROJECT AGENDA A high level overview of what to implement in your library to make it secure. With the rise of data breaches,

More information

The First Six Steps to Securing Remote Locations 1

The First Six Steps to Securing Remote Locations 1 Solutions for the Distributed Enterprise The First Six Steps to Securing Remote Locations 1 Table of Contents What is a Distributed Enterprise... 3 Market Drivers... 5 What Problems... 7 Step 1: Centralized

More information

CommTech White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync

CommTech White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync CommTech White Paper: 8 Ways to Boost Employee Productivity and Morale with Business-Grade File Sync October 2015 Copyright 2015 CommTech Introduction The rapid adoption of consumer-grade file sync services

More information

Cloud-enable your NetApp Storage with EgnytePlus File Sharing Infrastructure

Cloud-enable your NetApp Storage with EgnytePlus File Sharing Infrastructure w w w. e g n y t e. c o m Cloud-enable your NetApp Storage with EgnytePlus File Sharing Infrastructure White Paper Revised Dec 30, 2012 Table of Contents Cloud Storage 3 File Sharing and Collaboration

More information

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often

More information

Security Specification

Security Specification Security Specification Security Specification Table of contents 1. Overview 2. Zero-knowledge cryptosystem a. The master password b. Secure user authentication c. Host-proof hosting d. Two-factor authentication

More information

How to Really Use Your ipad for Business. Presented by: Christopher Breen Senior editor, Macworld

How to Really Use Your ipad for Business. Presented by: Christopher Breen Senior editor, Macworld How to Really Use Your ipad for Business Presented by: Christopher Breen Senior editor, Macworld 1 On today s menu General Productivity Effective input Organizing your data and apps Apps for the business

More information

icloud History & Services Dr. Leon Chapman

icloud History & Services Dr. Leon Chapman icloud History & Services Dr. Leon Chapman 1 icloud History & Services Apple ID & Accounts Overview Online Backup Services Cloud Storage & File Sharing 2 Off-Site Backup? icloud What is it? File storage?

More information

OWASP Thailand. Proxy Caches and Web Application Security. OWASP AppSec Asia October 21, Using the Recent Google Docs 0-Day as an Example

OWASP Thailand. Proxy Caches and Web Application Security. OWASP AppSec Asia October 21, Using the Recent Google Docs 0-Day as an Example Proxy Caches and Web Application Security Using the Recent Google Docs 0-Day as an Example Tim Bass, CISSP Chapter Leader, Thailand +66832975101, tim@unix.com AppSec Asia October 21, 2008 Thailand Worldwide

More information

Tracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory

Tracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory Tracking changes in Hybrid Identity environments with both Active Directory and Azure Active Directory Presenters: Sander Berkouwer Senior Consultant at SCCT 10-fold Microsoft MVP Active Directory aficionado

More information

Adding a POP/IMAP

Adding a POP/IMAP Adding a POP/IMAP Email POP and IMAP are used for webmail (i.e. your company does not have an exchange server). POP and IMAP are two different protocols but are added the same way. The settings are split

More information

The Essential Guide to VIRTUAL TEAM. Building Tools

The Essential Guide to VIRTUAL TEAM. Building Tools The Essential Guide to VIRTUAL TEAM Building Tools The Essential Guide to Virtual Team Building Tools By Chris Ducker Thank you for checking out this guide on all my personal favourite tools and resources

More information

How Do I Sync My Iphone To Another Computer Without Losing Everything

How Do I Sync My Iphone To Another Computer Without Losing Everything How Do I Sync My Iphone To Another Computer Without Losing Everything to transfer content from your current iphone, ipad, or ipod touch to another device. You should connect the device to itunes to sync

More information

What s Over-The-Top (OTT) voice and SMS?

What s Over-The-Top (OTT) voice and SMS? What s Over-The-Top (OTT) voice and SMS? OTT refers to services being carried over the top of another carrier s network, without the provider being actively involved in the network s operations. The openness

More information

SAS and F5 integration at F5 Networks. Updates for Version 11.6

SAS and F5 integration at F5 Networks. Updates for Version 11.6 SAS and F5 integration at F5 Networks Updates for Version 11.6 Managing access based on Identity Employees Partner Customer Administrator IT challenges: Control access based on user-type and role Unify

More information

Anchor Competitive Sheet May 2015

Anchor Competitive Sheet May 2015 This document is a comparison of file sharing and collaboration capabilities offered by Soonr Workplace and Anchor. Narrative is provided when there is no direct comparison between the capabilities or

More information

Office 365 Adoption eguide

Office 365 Adoption eguide Office 365 Adoption eguide Identity and Mobility Challenges Okta Inc. I 301 Brannan Street, Suite 300 I San Francisco CA, 94107 info@okta.com I 1-888-722-7871 Mind the Identity Gap Executive Summary Microsoft

More information

Compliance in 5 Steps

Compliance in 5 Steps Email Compliance in 5 Steps Introduction For most businesses, email is a vital communication resource. Used to perform essential business functions, many organizations rely on email to send sensitive confidential

More information

A company built on security

A company built on security Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for

More information

itunes What Is It Good For? 2018 Becky Diamond 1

itunes What Is It Good For? 2018 Becky Diamond 1 itunes What Is It Good For? 2018 Becky Diamond 1 In the Beginning The original iphone smartphone required itunes for activation and, until the release of ios 5 in 2011, itunes was required for installing

More information

OpenIAM Identity and Access Manager Technical Architecture Overview

OpenIAM Identity and Access Manager Technical Architecture Overview OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...

More information

Workshare imanage Integration File Sharing & DMS Mobility. Getting Started Guide

Workshare imanage Integration File Sharing & DMS Mobility. Getting Started Guide Workshare imanage Integration File Sharing & DMS Mobility Getting Started Guide R Work s about to get smarter We have one goal to give you a simpler, faster way to work on documents. We help you work outside

More information

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by:

Welcome. Password Management & Public Wi-Fi Security. Hosted by: Content by: Welcome Password Management & Public Wi-Fi Security Hosted by: Content by: Presenter: Ray Cool, CEO PBSI Technology Solutions Webinar will begin at 1:00 Welcome Foster & Motley Clients to Security Education

More information

Encrypted containers for secure file transport

Encrypted containers for secure file transport Encrypted containers for secure file transport Use Zed! encrypted containers to protect your file transports regardless of the method used (email attachment, USB stick, removable device, file transfer,

More information

Adobe Spark. Schools and Educators. A Guide for. spark.adobe.com

Adobe Spark. Schools and Educators. A Guide for. spark.adobe.com Adobe Spark A Guide for Schools and Educators spark.adobe.com CONTENTS 1: What Is Adobe Spark?... 3 2: What is Adobe Spark for Education?... 4 3: How Much Does Adobe Spark Cost?... 5 4: How Do Students

More information

LeakDAS Version 4 The Complete Guide

LeakDAS Version 4 The Complete Guide LeakDAS Version 4 The Complete Guide SECTION 4 LEAKDAS MOBILE Second Edition - 2014 Copyright InspectionLogic 2 Table of Contents CONNECTING LEAKDAS MOBILE TO AN ANALYZER VIA BLUETOOTH... 3 Bluetooth Devices...

More information

Enterprise file sync and share using Citrix ShareFile and IBM Storwize V7000 Unified system

Enterprise file sync and share using Citrix ShareFile and IBM Storwize V7000 Unified system Enterprise file sync and share using Citrix ShareFile and IBM Storwize V7000 Unified system A technical report Sandeep Zende IBM Systems ISV Enablement January 2016 Table of contents Abstract... 1 Scope...

More information

Outlook 2010 Anywhere Setup

Outlook 2010 Anywhere Setup Outlook 2010 Anywhere Setup Scope: this document will describe how to setup Outlook 2010 from off campus using the Outlook Anywhere setup. 1) Start Outlook 2010 for the first time. If you are prompted

More information

Cloud FastPath: Highly Secure Data Transfer

Cloud FastPath: Highly Secure Data Transfer Cloud FastPath: Highly Secure Data Transfer Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. Tervela has been creating high performance

More information

Virtru Microsoft Protection

Virtru Microsoft  Protection Virtru Microsoft Email Protection Seamless Experience, Automatic Protection, Persistent Control Encrypt Outlook and OWA on the client-side with the flip of a switch Track and control access to emails and

More information

How should I grade projects? WEB 2.0 TOOLS TO ENHANCE THE CLASSROOM MAY What are Web 2.0 Tools? Todays Sites:

How should I grade projects? WEB 2.0 TOOLS TO ENHANCE THE CLASSROOM MAY What are Web 2.0 Tools? Todays Sites: WEB 2.0 TOOLS TO ENHANCE THE CLASSROOM MAY 2014 What are Web 2.0 Tools A new way of creating, collaborating, editing and sharing user generated content online. Pushes computing power off the desktop and

More information

APPS & MOBILE DEVICES

APPS & MOBILE DEVICES WORKSMART 5 Must-Have Mobile Apps for Chamber Executives BY RYAN WILFAHRT 2013 THERE S AN APP FOR THAT Get Directions. Have Groceries Delivered. Talk Face to Face. Read a Book. Share a Video. Send a Gift.

More information

2017 NMUG CLASSES MANAGING THE IPHONE AND IPAD IN IOS 10

2017 NMUG CLASSES MANAGING THE IPHONE AND IPAD IN IOS 10 2017 NMUG CLASSES MANAGING THE IPHONE AND IPAD IN IOS 10 1 iphone Overview Your Apple ID is the account you use for just about everything you do with Apple. If you already have an Apple ID use it when

More information

Control Do Not Spy in Win 10 Courtesy of Jim Palfini

Control Do Not Spy in Win 10 Courtesy of Jim Palfini Control Do Not Spy in Win 10 Courtesy of Jim Palfini 08.24.2015 http://www.foxnews.com/tech/2015/08/05/stop-windows-10-spying-dead-in-its-tracks-with-one-free-app/?intcmp=trending¹ The verdict is in: people

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes Workspace ONE UEM v9.6 Have documentation feedback? Submit

More information

Mastering Your iphone Session 1

Mastering Your iphone Session 1 Mastering Your iphone Session 1 June 2017 Susan Braaten History of the iphone 10 amazing years! Network settings Wi-Fi network is PantherNET Bluetooth a standard for the shortrange wireless interconnection

More information

Storing Data and Pictures in the Cloud for Free

Storing Data and Pictures in the Cloud for Free Storing Data and Pictures in the Cloud for Free By Phil Goff Branch 116 November 15, 2012 1 Cloud Storage is the Future 2 Storing Data and Pictures in the Cloud for Free Not Intended as Primary Backup

More information

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP AN IPSWITCH WHITEPAPER The Definitive Guide to Secure FTP The Importance of File Transfer Are you concerned with the security of file transfer processes in your company? According to a survey of IT pros

More information

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems

Technical Overview of DirectAccess in Windows 7 and Windows Server 2008 R2. Microsoft Windows Family of Operating Systems Technical Overview of in Windows 7 and Windows Server 2008 R2 Microsoft Windows Family of Operating Systems Published: January 2009 This document supports a preliminary release of a software product that

More information

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com : HIPPA Compliance GoToMyPC Corporate HIPAA Compliance Privacy, productivity and remote access 2 The healthcare industry has benefited greatly from the ability to use remote access to view patient data

More information

Table of Contents... ii. Go Ahead Bring Your Own Device to Work... 1 Requirements... 1

Table of Contents... ii. Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 Table of Contents... ii Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: Activate AT&T Toggle... 1 1.1: Welcome Email with ORANGE Banner... 1 1.2: Welcome Email with BLUE Banner... 2 1.3:

More information

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION Establish Create Use Manage SIMPLE. SECURE. SMART. ALL FROM A SINGLE SOURCE. As the ways to access your organization and its sensitive data increase,

More information

Welcome to Secure Wi-Fi. Your company enrolled you in this service to ensure the business and personal data on your device remains secure.

Welcome to Secure Wi-Fi. Your company enrolled you in this service to ensure the business and personal data on your device remains secure. Secure Wi-Fi User Guide Welcome to Secure Wi-Fi. Your company enrolled you in this service to ensure the business and personal data on your device remains secure. Secure Wi-Fi protects on all Wi-Fi networks

More information

Go Ahead Bring Your Own Device to Work... 1 Requirements... 1

Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 Table of Contents Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: Activate AT&T Toggle... 1 1.1: Welcome Email with ORANGE Banner... 1 1.2: Welcome Email with BLUE Banner... 2 1.3: Orange

More information

Adobe Spark. Schools and Educators. A Guide for. spark.adobe.com

Adobe Spark. Schools and Educators. A Guide for. spark.adobe.com Adobe Spark A Guide for Schools and Educators spark.adobe.com CONTENTS 1: What Is Adobe Spark?... 3 2: How Much Does Adobe Spark Cost?... 4 3: Is Adobe Spark A Web Application Or An App?... 4 4: Three

More information

Pulseway Security White Paper

Pulseway Security White Paper Pulseway Security White Paper Table of Contents 1. Introduction 2. Encryption 2.1 Transport Encryption 2.2 Message Encryption 3. Brute-Force Protection 4. DigiCert Code Signing Certificate 5. Datacenter

More information

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta

More information

WordPress Security Implementation Guideline

WordPress Security Implementation Guideline WordPress Security Implementation Guideline Good practices and epic fails of WordPress implementations About Me Information Security Consultant Application Security Secure SDLC Dan VASILE http://www.pentest.ro

More information

1. Type in your account and password. If you have Windows, Mac, iphone, or Android, you can download corresponding applications here

1. Type in your account and password. If you have Windows, Mac, iphone, or Android, you can download corresponding applications here SmartStor Cloud Web I. Login to SmartStor Cloud 1. Type in your account and password 2. Click If you have Windows, Mac, iphone, or Android, you can download corresponding applications here II. Document

More information

SURFdrive AN OWNCLOUD SYNC & SHARE SERVICE. TF-storage Rogier Spoor SURFnet 22 SEPT 2014

SURFdrive AN OWNCLOUD SYNC & SHARE SERVICE. TF-storage Rogier Spoor SURFnet 22 SEPT 2014 SURFdrive AN OWNCLOUD SYNC & SHARE SERVICE TF-storage Rogier Spoor SURFnet 22 SEPT 2014 Top 5 reasons to use a personal cloud storage solution 1 2 Users always have access to their documents, regardless

More information

Automile User Guide. Last updated May 2017

Automile User Guide. Last updated May 2017 Automile User Guide Last updated May 2017 Welcome to Automile We are excited to have you onboard. In this guide, you will find detailed instructions on how to install your Automile Box and how to use both

More information