Technical Brief SUPPORTPOINT TECHNICAL BRIEF MARCH
|
|
- Tabitha Jenkins
- 6 years ago
- Views:
Transcription
1 Technical Brief 1
2 SupportPoint Cloud is a SaaS solution that makes it easy for people to get the information and guidance they need to navigate through complex business processes. SupportPoint Cloud Client Components SupportPoint Cloud s standard deployment provides the following clients: SupportPoint Desktop content viewer SupportPoint Manager content, user management, reporting and administration tool SupportPoint Editor content editor SupportPoint Desktop SupportPoint Desktop delivers context-sensitive information in a narrow window that runs along the right edge of the user s screen. There is a browser version of SupportPoint Desktop and an installed version. The installed version of SupportPoint Desktop is a rich web application for viewing content. It provides functionality not possible in a browser including Context Sensitivity, always on top, auto-start, launch from and minimise to the notification area and notifications in the notification area. The installed version includes an embedded HTML5 customized browser that only works with SupportPoint content. To deploy SupportPoint Desktop, there is a one-time/infrequent installation that delivers full functionality and browser independence. It s deployed via an.msi file and can be configured to meet the Standard Operating Environment (SOE) requirements of most enterprises. End users typically activate the installed version of SupportPoint Desktop by clicking the SupportPoint icon in the Windows notification area. SupportPoint Manager SupportPoint Manager is used to create and maintain content, user accounts and roles, run reports and set configuration options. Only SupportPoint users responsible for content and role management, reports and administration need access to Manager. 2
3 Role-Based Security Permission to perform certain operations or access specific resources is controlled by SupportPoint s end user accounts. Read, write, document ownership, and administration permissions can be set for individual end users and specific groups of users, known as SupportPoint roles. Read and write access can be set for individual documents or at the folder level. Additional SupportPoint components Content Converter The SupportPoint Content Converter allows users to create content in pre-defined Microsoft Word templates which can then be converted to the SupportPoint format. Once converted, the information is imported into SupportPoint Manager and managed by the SupportPoint Authors. Multi-language module The SupportPoint Multi-Language Module enables customers to translate documents into multiple languages. When the global content (e.g. written in English) changes, those changes flow automatically through to all translated versions. SupportPoint Protocols The viewing and management clients connect to the web tier via HTTPS. External API callers connect to the web tier. All connections between SupportPoint clients and the server are initiated by the client. Authentication The SupportPoint Business Application Server manages authentication. End users don t have server accounts or any access to the underlying server operating system. You can configure the SupportPoint Business Application Server to authenticate the identity of end users using various methods, including: Service Provider initiated Single Sign On via SAML 2.0 using an encrypted password SupportPoint uses HTTPS to ensure that all communication including authentication is secure. Stored passwords are all encrypted via a SHA-1 one-way encryption before being stored. Interoperability with other systems SupportPoint Cloud includes an initial range of pre-built connectors that help enable standards-based integration between SupportPoint and other systems including CMIS, SharePoint, Documentum, HL7, Microsoft Dynamics CRM, Salesforce and Zendesk. Other connectors are constantly being added. Context Sensitivity SupportPoint s context sensitivity is unique functionality which enables SupportPoint Desktop to find and display the information a user needs based on the state (screen) of the application they need assistance with. For SupportPoint Desktop to be context-sensitive with Java applets, the Java Access Bridge must be installed on every desktop. SupportPoint's context sensitivity may be accessed via Citrix published applications in the following environments: Citrix desktop is being used and SupportPoint Desktop is part of the desktop SupportPoint Desktop is deployed as a published application which is running in the same session as the published application that it s to be context sensitive with SupportPoint Desktop is running in different session(s) to the published application(s) that it s to be context sensitive with, provided the SupportPoint Citrix CSH agent is installed on all desktops and on the appropriate Citrix servers. 3
4 Client Minimum Requirements SupportPoint Desktop Operating system Windows 7 Windows 8.1 (desktop mode) Windows 10 SupportPoint Manager Windows 7 Windows 8.1 (desktop mode) Windows 10 CPU Intel Core 2 Duo Processor equivalent or greater Intel Core 2 Duo Processor equivalent or greater RAM 1GB 2GB Hard disk space 50MB free space 200MB free space Other.NET V3.5 SP1 (installed version only) WebSocket Protocol 1280 x 768 or higher screen resolution The WebSocket Protocol must be permitted 1280 x 768 or higher screen resolution Supported Browsers If SupportPoint Desktop is not installed, only the most recent stable versions of Internet Explorer and Google Chrome are supported. The installed version of SupportPoint Desktop provides Context Sensitivity, always on top, auto-start, launch from and minimise to notification area and notifications in notification area functionality. Panviva Service Centre Panviva Support operates primarily via the Panviva Service Centre, a secure support portal where customers can access the SupportPoint knowledge base, participate in the forums and log and manage support tickets. The Panviva Service Centre is accessed at Customer Contacts Customers are required to supply and maintain a list of nominated contact(s) for Panviva Support to notify of any existing or scheduled changes to the status of their environments. Related SupportPoint Cloud technical documents For detailed information about SupportPoint Cloud s various technical components, you can access our complete range of resources from the Panviva Service Centre. Some of the technical documents available to you include: SupportPoint Cloud Information Security Model SupportPoint Cloud Content Converter SupportPoint Cloud Quicklinks Grid User Guide SupportPoint Cloud Reports Monitoring Panviva maintains several independent monitoring services and tools to provide the Panviva Support team with a constant reference as to the status of all SupportPoint environments. 4
5 Process Panviva Support monitors all levels of the application. This includes: Application performance Availability/Uptime Network Cloud infrastructure Database (access, job status, performance bottlenecks and other metrics) Panviva Support receives automated notifications from the monitoring services via multiple channels when any service detects a potential status change. All events are analysed to determine if that event is normal or if it is an adverse event/incident. All incidents are logged, triaged and assigned a severity rating as defined in each customer s Support and Maintenance Services document. The severity rating determines the response and communication method and frequency. In accordance with the availability guarantee a monthly uptime report can be made available to customers. Disaster Recovery The Panviva solution leverages both the full DR abilities of Verizon, the cloud provider partner, in addition to its own internal contingency planning. Panviva has a dedicated planning team that oversees Disaster Recovery planning and policies. Disaster Recovery policies are reviewed quarterly and also following any major application or infrastructure change or after any incidents. Datacentre Verizon has multiple clusters deployed within a data centre and also across geographically dispersed data centres. SupportPoint users who must meet regulatory requirements for enhanced business continuity are encouraged to subscribe to data replication across multiple locations. Panviva can also offer backup services that include encryption of data inflight and at rest. Ultimately it is for the customer to consider if these additional services are required as part of their own Business Continuity Plan; and it should be noted that these additional services are entirely separate to the respective operational continuity plans for both the Panviva and Verizon businesses. Network Panviva keeps a complete set of network documentation. In addition, Panviva take snapshots of network configurations and this information is stored in a separate secure location. Instance/Server All servers are backed up regularly and before any major upgrades/changes. The backup schedules follow industry best practices. Application SupportPoint is designed to be horizontally scalable and as such, can be deployed to accommodate any single failure at any tier of the application (as an optional/add-on implementation requiring extra design, implementation and support effort not covered under our standard cost schedule). Database Databases are backed up regularly to redundant locations and the data can be easily retrieved in case of a database server failure. 5
6 Security Panviva understands the critical importance of this issue; both for its clients, but also on behalf of its clients endcustomers. By leveraging the experience gained from a global customer base across multiple industries, Panviva understands the value of data typically stored in SupportPoint, and continues to develop the system with appropriate security controls to protect against the risks that most organizations face when using this powerful tool. Panviva is committed to ensuring that appropriate levels of security can be enabled to provide its clients with the confidence that the SupportPoint platform meets, if not exceeds, its security expectations. Panviva can share with its customers an overview of security policies and procedures (under a non-disclosure agreement). Panviva performs regular vulnerability scans and penetration tests (for both the application and the network) on its environments. These tests are performed by external vendors. Panviva performs regular internal audits on its platform and applications. These tests are based on risk. Any adverse findings are reviewed and addressed by our Security, Technical and Operations teams. Application Security Our web based application is delivered over a secure connection that utilizes TLS/SSL and keys and certificates to ensure secure communication of data while in transit. Access to the SupportPoint application is limited to specific customer IP addresses. Data Security SupportPoint is architected on a role-based security model, i.e. access to resources and the permissions to act on those resources is controlled via roles. This provides a granular level of control over all the information stored on the system (at document or folder level). All customer data is completely isolated and encrypted at rest based on the TDE (Transparent Data Encryption) standard and using the ASE256 algorithm. This ensures that the data is only visible to that specific application and to the authorized users. Backups of our databases are also encrypted as per the above standards. Panviva has controls in place to protect data leakage. Network Security Panviva s cloud environments are all protected by strict access rules. In addition, the networks are further segregated into tiers with strict rules that govern the visibility of these tiers and the communications between them. Maintenance Panviva provides advance notice for any scheduled maintenance. General maintenance windows are scheduled to occur once a month, for more details please visit the Panviva Service Centre. Other upgrade windows may be needed to perform system and/or infrastructure upgrades and these will be communicated as early as possible. Any unscheduled maintenance will be communicated at the time to the nominated customer contact. Panviva provides an availability guarantee agreement. This agreement does not apply to any interruptions during Panviva s standard scheduled maintenance windows or to any other maintenance periods where Panviva has provided at least 5 business days advance notice. Maintenance periods will never be scheduled during regular Business Hours. 6
Technical Brief PANVIVA TECHNICAL BRIEF FEBRUARY
Technical Brief 1 Panviva is a SaaS solution that makes it easy for people to get the information and guidance they need to navigate through complex business processes. Panviva Client Components Panviva
More informationSecurity and Compliance at Mavenlink
Security and Compliance at Mavenlink Table of Contents Introduction....3 Application Security....4....4....5 Infrastructure Security....8....8....8....9 Data Security.... 10....10....10 Infrastructure
More informationTRACKVIA SECURITY OVERVIEW
TRACKVIA SECURITY OVERVIEW TrackVia s customers rely on our service for many mission-critical applications, as well as for applications that have various compliance and regulatory obligations. At all times
More informationVMware vcloud Air User's Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationVMware AirWatch Content Gateway Guide for Windows
VMware AirWatch Content Gateway Guide for Windows Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationVMware AirWatch Content Gateway Guide for Windows
VMware AirWatch Content Gateway Guide for Windows AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationTwilio cloud communications SECURITY
WHITEPAPER Twilio cloud communications SECURITY From the world s largest public companies to early-stage startups, people rely on Twilio s cloud communications platform to exchange millions of calls and
More informationSystem Overview. Security
ImageSilo is an ultra-secure, on-demand Enterprise Content Management (ECM) system. As the largest on-demand installation of PaperVision Enterprise, it offers all the same features and functionality. ImageSilo
More informationVMware AirWatch Content Gateway Guide for Windows
VMware AirWatch Content Gateway Guide for Windows AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationBeBanjo Infrastructure and Security Overview
BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits
More informationVMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Windows VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationOUR CUSTOMER TERMS CLOUD SERVICES - INFRASTRUCTURE
CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE (FORMERLY UTILITY HOSTING)... 2 4 TAILORED INFRASTRUCTURE (FORMERLY DEDICATED HOSTING)... 3 5 COMPUTE... 3 6 BACKUP & RECOVERY... 8
More informationInformation Security Policy
Information Security Policy Information Security is a top priority for Ardoq, and we also rely on the security policies and follow the best practices set forth by AWS. Procedures will continuously be updated
More informationHybrid Data Security Overview
From day one, data security has been the primary focus in designing Cisco Webex Teams. The cornerstone of this security is end-to-end content encryption, enabled by Webex Teams clients interacting with
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationQuickBooks Online Security White Paper July 2017
QuickBooks Online Security White Paper July 2017 Page 1 of 6 Introduction At Intuit QuickBooks Online (QBO), we consider the security of your information as well as your customers and employees data a
More informationNetworks - Technical specifications of the current networks features used vs. those available in new networks.
APPENDIX V TECHNICAL EVALUATION GUIDELINES Where applicable, the following guidelines will be applied in evaluating the system proposed by a service provider: TABLE 1: HIGH LEVEL COMPONENTS Description
More informationVMware AirWatch Content Gateway Guide for Windows
VMware AirWatch Content Gateway Guide for Windows AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationVMware AirWatch Content Gateway Guide for Linux For Linux
VMware AirWatch Content Gateway Guide for Linux For Linux Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationSecurity and Reliability of the SoundBite Platform Andy Gilbert, VP of Operations Ed Gardner, Information Security Officer
Security and Reliability of the SoundBite Platform Andy Gilbert, VP of Operations Ed Gardner, Information Security Officer 2007 SoundBite Communications, Inc. All Rights Reserved. Agenda Scalability Capacity
More informationProjectplace: A Secure Project Collaboration Solution
Solution brief Projectplace: A Secure Project Collaboration Solution The security of your information is as critical as your business is dynamic. That s why we built Projectplace on a foundation of the
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationRed Hat Enterprise Virtualization (RHEV) Backups by SEP
Red Hat Enterprise Virtualization (RHEV) Backups by SEP info@sepusa.com www.sepusa.com Table of Contents INTRODUCTION AND OVERVIEW AGENT BASED BACKUP IMAGE LEVEL BACKUP VIA RHEV API RHEV BACKUP WITH SEP
More informationORACLE FABRIC MANAGER
ORACLE FABRIC MANAGER MANAGE CONNECTIVITY IN REAL TIME KEY BENEFITS Control connectivity across servers from a single screen. Instantly replicate connectivity configurations across a group of servers with
More informationVMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationSecurity Information & Policies
Security Information & Policies 01 Table of Contents OVERVIEW CHAPTER 1 : CHAPTER 2: CHAPTER 3: CHAPTER 4: CHAPTER 5: CHAPTER 6: CHAPTER 7: CHAPTER 8: CHAPTER 9: CHAPTER 10: CHAPTER 11: CHAPTER 12: CHAPTER
More informationCherwell Service Management
Version 9.1.0 April 2017 Legal Notices Cherwell Software, LLC 2017 All Rights Reserved. Cherwell and the Cherwell logo are trademarks owned by Cherwell Software, LLC and are registered and/or used in the
More informationMyCloud Computing Business computing in the cloud, ready to go in minutes
MyCloud Computing Business computing in the cloud, ready to go in minutes In today s dynamic environment, businesses need to be able to respond quickly to changing demands. Using virtualised computing
More informationUNCLASSIFIED. Mimecast UK Archiving Service Description
UNCLASSIFIED 26/05/2016 v2.3 Mimecast UK Email Archiving Service Description Mimecast UK Email Archiving, provides businesses with a secure, scalable cloud-based message archive. It s designed to significantly
More informationSage 300 People & Web Self Service Technical Information & System Requirements
Sage 300 People & Web Self Service Technical Information & System Requirements Sage 300 People Architecture The Sage 300 People application is a 2-tier application with the program and database residing
More informationRelease Notes March 2016
Release Notes March 2016 About the Release Notes... 3 Release Overview... 3 End of Life Announcements... 3 Other Announcements... 5 Enhancements... 6 Doc Launcher for uploading 3 rd party documents and
More informationOracle Communications Services Gatekeeper
Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or
More informationVersion v November 2015
Service Description HPE Quality Center Enterprise on Software-as-a-Service Version v2.0 26 November 2015 This Service Description describes the components and services included in HPE Quality Center Enterprise
More informationSplashtop Enterprise for IoT Devices - Quick Start Guide v1.0
Introduction For information about different deployment choices, please see chapter 3 of the full Splashtop Center Administrator s Guide. Splashtop Enterprise for IoT Devices is comprised of three components:
More informationPerceptive Experience Web Scan
Perceptive Experience Web Scan Technical Specifications Version: 2.2.x Written by: Product Knowledge, R&D Date: Wednesday, April 05, 2017 2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark
More informationOracle Mission Critical Support Platform. General. Installation. Troubleshooting. Inventory and Discovery. Frequently Asked Questions Release 2.
Oracle Mission Critical Support Platform Frequently Asked Questions Release 2.3 E23199-01 May 2011 General What is Oracle Mission Critical Support Platform? Is Oracle Mission Critical Support Platform
More informationSynergetics-Standard-SQL Server 2012-DBA-7 day Contents
Workshop Name Duration Objective Participants Entry Profile Training Methodology Setup Requirements Hardware and Software Requirements Training Lab Requirements Synergetics-Standard-SQL Server 2012-DBA-7
More informationOracle Service Cloud. Release 18D. What s New
Oracle Service Cloud Release 18D What s New TABLE OF CONTENTS Revision History 3 Overview 3 Feature Summary 3 Agent Browser Channels 4 Chat Transfer Enhancements 4 Agent Browser Workspaces 5 Link and Unlink
More informationEnterpriseLink Benefits
EnterpriseLink Benefits GGY a Moody s Analytics Company 5001 Yonge Street Suite 1300 Toronto, ON M2N 6P6 Phone: 416-250-6777 Toll free: 1-877-GGY-AXIS Fax: 416-250-6776 Email: axis@ggy.com Web: www.ggy.com
More informationCloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017
Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationGoogle Cloud & the General Data Protection Regulation (GDPR)
Google Cloud & the General Data Protection Regulation (GDPR) INTRODUCTION General Data Protection Regulation (GDPR) On 25 May 2018, the most significant piece of European data protection legislation to
More informationManaging and Auditing Organizational Migration to the Cloud TELASA SECURITY
Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting
More informationMICROSOFT APPLICATIONS
MICROSOFT APPLICATIONS MICROSOFT SOFTWARE SOLUTIONS THE EFFECTIVE WAY TO DELIVER MICROSOFT APPLICATIONS The Microsoft Office suite of applications are a business essential; one that is used each and every
More informationTechnical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.
Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple
More informationAmazon Web Services (AWS) Solutions Architect Intermediate Level Course Content
Amazon Web Services (AWS) Solutions Architect Intermediate Level Course Content Introduction to Cloud Computing A Short history Client Server Computing Concepts Challenges with Distributed Computing Introduction
More informationDon t just manage your documents. Mobilize them!
Don t just manage your documents Mobilize them! Don t just manage your documents Mobilize them! A simple, secure way to transform how you control your documents across the Internet and in your office.
More informationSecurity and Compliance
Security and Compliance Version 1.3 12/9/2016 Hyperfish Security Whitepaper 1 Table of Contents 1 Introduction... 3 2 Hyperfish... 3 2.1 Product Overview... 3 2.2 How it Works... 3 2.3 Modes of Operation...
More informationIntroduction and Datacenter Topology For Your System
Introduction and Datacenter Topology For Your System This chapter provides an introduction, a datacenter overview, and VMware vcenter requirements for your system. Introducing Cisco WebEx Meetings Server,
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.7 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationIvanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines
Ivanti Service Desk and Asset Manager Technical Specifications and Architecture Guidelines This document contains the confidential information and/or proprietary property of Ivanti, Inc. and its affiliates
More informationOracle Enterprise Manager. 1 Introduction. System Monitoring Plug-in for Oracle Enterprise Manager Ops Center Guide 11g Release 1 (
Oracle Enterprise Manager System Monitoring Plug-in for Oracle Enterprise Manager Ops Center Guide 11g Release 1 (11.1.3.0.0) E18950-03 November 2011 This document provides describes the System Monitoring
More informationWHITE PAPER- Managed Services Security Practices
WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to
More informationCloud Services. Introduction
Introduction adi Digital have developed a resilient, secure, flexible, high availability Software as a Service (SaaS) cloud platform. This Platform provides a simple to use, cost effective and convenient
More informationIntroduction. Architecture Overview
Performance and Sizing Guide Version 17 November 2017 Contents Introduction... 5 Architecture Overview... 5 Performance and Scalability Considerations... 6 Vertical Scaling... 7 JVM Heap Sizes... 7 Hardware
More informationDatabase Level 100. Rohit Rahi November Copyright 2018, Oracle and/or its affiliates. All rights reserved.
Database Level 100 Rohit Rahi November 2018 1 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationPUT DATA PROTECTION WHERE YOU NEED IT
from Carbonite PUT DATA PROTECTION WHERE YOU NEED IT Flexibility is your best friend when it comes to choosing a backup plan. For a backup solution to be considered flexible, it needs to satisfy several
More informationIntroduction and Data Center Topology For Your System
Introduction and Data Center Topology For Your System This chapter provides an introduction, a data center overview, and VMware vcenter requirements for your system. Introducing Cisco WebEx Meetings Server,
More informationM2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres
M2M / IoT Security Eurotech`s Everyware IoT Security Elements Overview Robert Andres 23. September 2015 The Eurotech IoT Approach : E2E Overview Application Layer Analytics Mining Enterprise Applications
More informationPuppet on the AWS Cloud
Puppet on the AWS Cloud Quick Start Reference Deployment AWS Quick Start Reference Team March 2016 This guide is also available in HTML format at http://docs.aws.amazon.com/quickstart/latest/puppet/. Contents
More informationWatson Developer Cloud Security Overview
Watson Developer Cloud Security Overview Introduction This document provides a high-level overview of the measures and safeguards that IBM implements to protect and separate data between customers for
More informationAvoiding the Cost of Confusion: SQL Server Failover Cluster Instances versus Basic Availability Group on Standard Edition
One Stop Virtualization Shop Avoiding the Cost of Confusion: SQL Server Failover Cluster Instances versus Basic Availability Group on Standard Edition Written by Edwin M Sarmiento, a Microsoft Data Platform
More informationService Description CloudCore
CloudCore TITLE: CloudCore DOCUMENT REF NO: QMS REC117 DESCRIPTION: Service description for the CloudCore service. OWNER / AUTHORITY: QMS / ISMS DOCUMENT CROSS REFERENCE: Director of Product and Service
More informationOracle Utilities Opower Solution Extension Partner SSO
Oracle Utilities Opower Solution Extension Partner SSO Integration Guide E84763-01 Last Updated: Friday, January 05, 2018 Oracle Utilities Opower Solution Extension Partner SSO Integration Guide Copyright
More informationCloud Computing Microsoft in the Enterprise. Anthony Murphy, Cloud Solution Specialist Microsoft
Cloud Computing Microsoft in the Enterprise Anthony Murphy, Cloud Solution Specialist Microsoft How Microsoft Defines Enterprise Cloud Hybrid Cloud Drivers How can we respond faster? How can we lower cost
More informationVblock Architecture Accelerating Deployment of the Private Cloud
Vblock Architecture Accelerating Deployment of the Private Cloud René Raeber Technical Solutions Architect Datacenter rraeber@cisco.com 1 Vblock Frequently Asked Questions 2 What is a Vblock? It is a product
More informationExam : Implementing Microsoft Azure Infrastructure Solutions
Exam 70-533: Implementing Microsoft Azure Infrastructure Solutions Objective Domain Note: This document shows tracked changes that are effective as of January 18, 2018. Design and Implement Azure App Service
More informationWHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group
WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.4 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5
More informationA10 HARMONY CONTROLLER
DATA SHEET A10 HARMONY CONTROLLER AGILE MANAGEMENT, AUTOMATION, ANALYTICS FOR MULTI-CLOUD ENVIRONMENTS PLATFORMS A10 Harmony Controller provides centralized agile management, automation and analytics for
More informationSystem Monitoring Plug-in Installation Guide for Microsoft Internet Information Services Release 4 ( ) Versions Supported
Oracle Enterprise Manager System Monitoring Plug-in Installation Guide for Microsoft Internet Information Services Release 4 (2.1.2.1.0) B28047-03 April 2007 This document provides a brief description
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.4.0 Revision B Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 4 New features on page 5
More informationApplication Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode.
Application Notes for Installing and Configuring Avaya Control Manager Enterprise Edition in a High Availability mode. Abstract This Application Note describes the steps required for installing and configuring
More informationDefendX Software Control-Audit for Hitachi Installation Guide
DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi
More informationVMware AirWatch Content Gateway Guide For Linux
VMware AirWatch Content Gateway Guide For Linux AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationService Description Platform.sh by Orange
Service Description Platform.sh by Orange Table des matières 1 DEFINITIONS... 2 2 PURPOSE OF THE DOCUMENT... 2 3 OVERVIEW OF THE SERVICE... 2 3.1 OVERALL DESCRIPTION... 2 3.2 GEOGRAPHICAL FOOTPRINT...
More informationMicrosoft Security Management
Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their
More informationDeploy. A step-by-step guide to successfully deploying your new app with the FileMaker Platform
Deploy A step-by-step guide to successfully deploying your new app with the FileMaker Platform Share your custom app with your team! Now that you ve used the Plan Guide to define your custom app requirements,
More informationInterCall Virtual Environments and Webcasting
InterCall Virtual Environments and Webcasting Security, High Availability and Scalability Overview 1. Security 1.1. Policy and Procedures The InterCall VE ( Virtual Environments ) and Webcast Event IT
More informationLayer Security White Paper
Layer Security White Paper Content PEOPLE SECURITY PRODUCT SECURITY CLOUD & NETWORK INFRASTRUCTURE SECURITY RISK MANAGEMENT PHYSICAL SECURITY BUSINESS CONTINUITY & DISASTER RECOVERY VENDOR SECURITY SECURITY
More informationWORKSHARE SECURITY OVERVIEW
WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationDocument Sub Title. Yotpo. Technical Overview 07/18/ Yotpo
Document Sub Title Yotpo Technical Overview 07/18/2016 2015 Yotpo Contents Introduction... 3 Yotpo Architecture... 4 Yotpo Back Office (or B2B)... 4 Yotpo On-Site Presence... 4 Technologies... 5 Real-Time
More informationCloud Computing An IT Paradigm Changer
Cloud Computing An IT Paradigm Changer Mazin Yousif, PhD CTO, Cloud Computing IBM Canada Ltd. Mazin Yousif, PhD T-Systems International 2009 IBM Corporation IT infrastructure reached breaking point App
More informationSolution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites
Solution Pack Managed Services Virtual Private Cloud Security Features Selections and Prerequisites Subject Governing Agreement DXC Services Requirements Agreement between DXC and Customer including DXC
More informationOracle Communications WebRTC Session Controller
Oracle Communications WebRTC Session Controller Concepts Release 7.0 E40976-01 November 2013 Oracle Communications WebRTC Session Controller Concepts, Release 7.0 E40976-01 Copyright 2013, Oracle and/or
More informationService Description: Software Support
Page 1 of 1 Service Description: Software Support This document describes the service offers under Cisco Software Support. This includes Software Support Service (SWSS), Software Support Basic, Software
More informationSERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING
DATASHEET SERV-U MANAGED FILE TRANSFER SERVER FTP SERVER SOFTWARE FOR SECURE FILE TRANSFER & FILE SHARING If you re looking for a highly professional, no-nonsense FTP server, then you can t do much better
More informationCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,
More informationUsing and Developing with Azure. Joshua Drew
Using and Developing with Azure Joshua Drew Visual Studio Microsoft Azure X-Plat ASP.NET Visual Studio - Every App Our vision Every App Every Developer .NET and mobile development Desktop apps - WPF Universal
More informationSecurity. ITM Platform
Security ITM Platform Contents Contents... 0 1. SaaS and On-Demand Environments... 1 1.1. ITM Platform configuration modes... 1 1.2. Server... 1 1.3. Application and Database... 2 1.4. Domain... 3 1.5.
More informationINFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare
INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore
More informationPrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps
PrepAwayExam http://www.prepawayexam.com/ High-efficient Exam Materials are the best high pass-rate Exam Dumps Exam : SAA-C01 Title : AWS Certified Solutions Architect - Associate (Released February 2018)
More informationQUALITY IT SUPPORT TAILORED FOR NOT FOR PROFITS
QUALITY IT SUPPORT TAILORED FOR NOT FOR PROFITS WORKING TOGETHER FOR THE COMMUNITY// F1 Solutions is committed to providing positive change in our community. That is why we offer more than a service, it
More informationData Protection Modernization: Meeting the Challenges of a Changing IT Landscape
Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape Tom Clark IBM Distinguished Engineer, Chief Architect Software 1 Data growth is continuing to explode Sensors & Devices
More informationAUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE
AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated
More informationIBM Case Manager on Cloud
Service Description IBM Case Manager on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and recipients of the Cloud
More informationThis guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights.
HP JetAdvantage Insights Deployment Guide This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights. 1. Overview HP JetAdvantage Insights provides
More informationIBM Information Server on Cloud
Service Description IBM Information Server on Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized users and recipients
More informationA company built on security
Security How we handle security at Flywheel Flywheel was founded in 2012 on a mission to create an exceptional platform to help creatives do their best work. As the leading WordPress hosting provider for
More information