Mike Rogers Director of Development, Reflection 2007

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
© 2011 All rights reserved to Ceedo. Ceedo - Flexible Computing Certificate-Based Authentication (CBA - 2FA) The organization MUST be able to positively.
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
PC Anywhere By: Neil Meharu Jewel Libid Pete Ramirez Lynn Hy.
Jeff Patton & Doug Whiteley It Service Group IT Roundtable July 15 th, 2009 Thin Clients & Terminal Services.
Transform your desktop with virtualization. 22 Agenda Evolution of VDI VDI Solution VDI Use Cases Questions & Answers.
Shopping and ORM Solutions
Leveraging Windows Vista & Office 2007 with Next Generation Terminal Emulation Kris Lall Product Manager.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Mark O’Shea Partner Technology Advisor – SMB Microsoft Australia.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Terminal Services in Windows Server ® 2008 Infrastructure Planning and Design.
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
Maintaining a Microsoft SQL Server 2008 Database SQLServer-Training.com.
Microsoft Installer Technologies and patch management approaches.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
NiagaraAX Framework Version 3.8 Feature Overview
XPand your capabilities with Citrix ® MetaFrame XP ™ for Windows ®, Feature Release 2.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 5: Designing a Terminal Services Infrastructure.
Microsoft SharePoint Server 2010 for the Microsoft ASP.NET Developer Yaroslav Pentsarskyy
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Planning a Microsoft Windows 2000 Administrative Structure Designing default administrative group membership Designing custom administrative groups local.
Chapter 2 Securing Network Server and User Workstations.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Introduction TO Network Administration
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
Pass Microsoft Installing and Configuring Windows Server 2012 exam in just 24 HOURS! 100% REAL EXAM QUESTIONS ANSWERS Microsoft Installing.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Administering the ACT Online August Online Testing Components.
Successfully Implementing The Information System Systems Analysis and Design Kendall and Kendall Fifth Edition.
ClickOnce Deployment (One-click Deployment)
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
Office 365 Security Assessment Workshop
Deployment Planning Services
Deployment Planning Services
Chapter 5 : Designing Windows Server-Level Security Processes
Deployment Planning Services
Securing the Network Perimeter with ISA 2004
Microsoft SharePoint Server 2016
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
iSeries Access for Web Thursday, August 30, 2018
THE STEPS TO MANAGE THE GRID
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Get Microsoft Exam PDF Braindumps With Verified Question Answers By Realexamdumps.com
Stephen Faig to provide the introduction Mike Ruane, President / CEO
Managing Specialized Devices With Windows Embedded Device Manager 2011
Data Security for Microsoft Azure
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
12/25/2018 5:11 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft PowerPoint 2007 – Unit 2
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
Business Document Platform
Implementation of security elements in database
PLANNING A SECURE BASELINE INSTALLATION
Deploying and Managing Windows To Go
ClickOnce Deployment (One-click Deployment)
Oracle 1z0-928 Oracle Cloud Platform Big Data Management 2018 Associate.
Mark Quirk Head of Technology Developer & Platform Group
Preparing for the Windows 8.1 MCSA
11/25/ :29 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Virtual Academy
OU BATTLECARD: WebLogic Server 12c
Presentation transcript:

Mike Rogers Director of Development, Reflection 2007 Deploying Reflection for IBM 2007 for Maximum Security

Agenda Goals of secure deployment Deployment preparation walkthrough Securing of data stream Limiting user capabilities Preventing unauthorized configurations and macros Protecting sensitive data Preparing your workstation installation Strategic future directions Where to get more information Q & A

Deployment Preparation Walkthrough

Security Considerations Do you want your connectivity to be encrypted? Do you want to use any specialized authentication mechanism? Securing of Data Stream Do you want to control which features are available to users in the product? Limiting User Capabilities Do you want to control which macros and session file end users can use? Preventing Unauthorized Configurations and Macros Do you want to protect users from printing or exporting sensitive data? Protecting Sensitive Data Secure Deployment 5

Securing the Data Stream Goals Protect sensitive data from being transmitted in “the clear.” Utilize strong certificate-based authentication methods. Use ELF for sign on to IBM Mainframes. Tools Security Configuration in Reflection for IBM 2007 Reflection Certificate Manager Results Configuration files that will be deployed to end-users 6

Limiting User Capabilities Goals Prevent users from reconfiguring key configuration values. Hide product functions from users. Tools Access Configuration Utility Ribbon UI Designer Results Access Security Configuration Files UI Configuration Files Capability of elevating to Administrator on end-user PCs 7

Preventing Unauthorized Configurations and Macros Goals Prevent users from running “uncontrolled” macros. Allow users to only connect to hosts you want them to. Centrally manage macros and configuration files. Tools Trusted Locations Configuration User-Interface Results Application Configuration File 8

Protecting Sensitive Data Goals Prevent users from capturing sensitive data on the clipboard, to the printer, and to other applications such as Microsoft Office. Allow users to capture pertinent non-sensitive data while masking sensitive data. Define custom data patterns that are deemed sensitive. Tools Privacy Filters Results Application Configuration File 9

Preparing Your Workstation Installation Goals Create an pre-configured installation that can be used for a group of users. Pre-package configuration data, macros and other files with the product installation. Deliver data into “best practice” locations on the PC. Tools Reflection Customization Tool Results Microsoft Installer Transform File Companion Installer(s) for configuration data and user data 1010

Future Directions 1111

Future Directions Communication Security Information Privacy Continued Support for Emerging Industry Standards and Certifications. Information Privacy Filtering of on-screen data Masking of user-input Configuration and Macro Security Signed macros and session files Platform Integration Microsoft Group Policy Support 1212

Where to get more information Reflection for IBM 2007 product page: http://www.attachmate.com/en-US/Products/Host+Connectivity/Terminal+Emulation/Reflection/ribm/ribm.htm Reflection for IBM 2007 evaluation version download page: http://www.attachmate.com/en-US/Evals/ribm/eval-form.htm Reflection for IBM 2007 technical specification: http://www.attachmate.com/en-US/Products/Host+Connectivity/Terminal+Emulation/Reflection/ribm/tech-specs.htm 1313

Where to get more information (continued) Reflection for IBM 2007 Evaluation Guide: http://www.attachmate.com/docs/Reflection/2007/R1/Eval/R2007EvalGuide.pdf Bryan Grunow, lead software engineer, Bryan.Grunow@attachmate.com Kris Lall, product manager, kris.lall@attachmate.com Damon Dreke, product marketing manager, Damon.Dreke@attachmate.com 1414

Q & A