TallyVault & Password Policy

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Code Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing these QT sheets.
Advertisements

With Microsoft Access 2010© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Access.
Thoughts on Technology Issues for Small Business Implementing Technical Safeguards to support Your Policies.
GW Introduction to Google Drive Security and Smart Sharing Practices.
This presentation will take a look at to prevent your information from being discovered by and investigator.
Understand Database Security Concepts
Access Control Methodologies
Information Systems Audit Program. Benefit Audit programs are necessary to perform an effective and efficient audit. Audit programs are essentially checklists.
Using a Password Manager Are your passwords safe? Ryan Leavitt DoIT Security.
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
Chinese wall model in the internet Environment
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
THE DICOM 2014 Chengdu Workshop August 25, 2014 Chengdu, China Keeping It Safe Brad Genereaux, Agfa HealthCare Product Manager Industry Co-Chair, DICOM.
Document Management System
7-Access Control Fundamentals Dr. John P. Abraham Professor UTPA.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Inventory Management & Administration System Tourism suite What is the PCI DSS? The PCI DSS stands for Payment Card Industry Data Security Standard.
SECURITY POLICIES Indu Ramachandran. Outline General idea/Importance of security policies When security policies should be developed Who should be involved.
Hands-On Microsoft Windows Server 2008
The University of Akron Dept of Business Technology Computer Information Systems DBMS Functions 2440: 180 Database Concepts Instructor: Enoch E. Damson.
Hands-On Microsoft Windows Server Security Enhancements in Windows Server 2008 Windows Server 2008 was created to emphasize security –Reduced attack.
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
CIS 450 – Network Security Chapter 8 – Password Security.
1 Chapter Overview Configuring Account Policies Configuring User Rights Configuring Security Options Configuring Internet Options.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Information Systems Security
ACM 511 Introduction to Computer Networks. Computer Networks.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
CHAPTER Creating and Managing Users and Groups. Chapter Objectives Explain the use of Local Users and Groups Tool in the Systems Tools Option to create.
Database Security. Multi-user database systems like Oracle include security to control how the database is accessed and used for example security Mechanisms:
Password Security Review Your password is the last line of defense. Keep your data safe with good password practices. Mikio Olin Kevin Matteson.
Chapter 4- Part3. 2 Implementing User Profiles A local user profile is automatically created at the local computer when you log on with an account for.
Page 1 of 17 To the ETS – Password Reset Online Training Course Clients have the ability to automatically update passwords at any time through the automated.
Password Security Module 8. Objectives Explain Authentication and Authorization Provide familiarity with how passwords are used Identify the importance.
Company Proprietary and Confidential Texas Association of Community Health Centers - Proprietary and Confidential Fourth and Goal: Score with Meaningful.
Understanding Security Policies Lesson 3. Objectives.
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
Chapter 6 Password, Profiles, Privileges, and Roles
V 0.1Slide 1 Security - User Account How to maintain user account ? Access Control Other Information Configuration  maintain user group and access rights.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
6 Copyright © 2005, Oracle. All rights reserved. Administering User Security.
How to Enable Account Key Sign Instead Of Password In Yahoo? For more details:
What is Information Security?
Database System Implementation CSE 507
Understanding Security Policies
ActiveSync & DLP management in Exchange Online
Chapter One: Mastering the Basics of Security
Configuring Windows Firewall with Advanced Security
Introduction to Operating Systems
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 6: Planning, Configuring, And Troubleshooting WINS.
Password Escrow Service
Service Owner: Andrea Beesing 9 February 2016
Audit Findings: SQL Database
Enterprise Single Sign-On
Fun gym Cambridge Nationals R001.
Overview of managing access for a Bill to ID
Cryptography and Network Security
Information Security Awareness
Security Control.
OBSERVE ETHICAL PRACTICES
Greta Mameniskyte IV course 3rd group
Chinese wall model in the internet Environment
Web Information Systems Engineering (WISE)
Introducing NTFS Reliability Security Long file names Efficiency
Batches in Tally.ERP 9.
Session 1 – Introduction to Information Security
Contract Management Software 100% Cloud-Based ContraxAware provides you with a deep set of easy to use contract management features.
Presentation transcript:

TallyVault & Password Policy

Agenda Introduction on TallyVault Enabling Vault Change/Remove TallyVault Recover TallyVault Password policy Password Strength Password Expiry Password History Password Overriding User to change Password Product Demo Q&A session.

TallyVault Data Security has been a matter of concern to the Business Owner as most businesses depend on the confidentiality of the information. TallyVault is a feature in Tally.ERP 9 that will help the business to maintain confidentiality of information by encrypting the data. The technology of TallyVault is such that the password is NOT STORED anywhere “The data is never available in an unencrypted form – it never exists in this form”. “As a result, data in TallyVault is most SECURE and RELIABLE”.

Product Walk Through

Password Policy Keeping financial data safe is of utmost importance to preserve its purity, avoid unauthorized changes and to keep customers’ financial information safe. A good password policy will enhance data security and allow only authorized users to view financial data. In Tally.ERP 9, the Administrator can set a password policy in place; which users will have to adhere to, while creating and managing passwords for their company. Password Policy Functionality Password Strength Password Expiry Password History Password Overriding User to change Password User Status To prevent all this, a strong Password policy should be in place. With Release 3.6, Tally.ERP 9 allows Administrators to define a strong Password Policy for their company, to ensure their company data.

Password Strength Benefits Features Product Walk Through Password Strength is the level of complexity which is attributed to your password, which will keep it safe from unauthorized attempts to retrieve or guess it. The components that decide the strength of a password are its length, complexity and unpredictability. Benefits The administrator can set the strength of a password; hence make set standards for data security. Features Minimum password length can be defined. Complexity of the password in terms of the number of characters, digits and special characters. Product Walk Through Password Strength The Administrator can set the length and complexity for a password, hence making it difficult for unauthorized users to access the company data.

Password Expiry Benefits Features Product Walk Through Password Expiry is a mechanism which requires users to change their passwords regularly. This is done because, over time users tend to give out their passwords, write it down, or otherwise compromise the secrecy of their passwords. Passwords leaked over time pose a security risk, which is mitigated by Password Expiry. Benefits Reduces security risks due to password leaks. Features Administrator can define after how many days a password expires. The users can be notified before the password expires and hence they can change it on time. Product Walk Through Making users change their password on a regular time interval is a good way of ensuring data security. Tally.ERP 9 also notifies the users before the current password expires. Both the time period for expiry and notification period can be defined by the Administrator. One more aspect of Password Policy in Tally.ERP 9 is, that the Administrator can disallow users to use previously used passwords. The number of passwords stored in the Password History determines the previous passwords that the user cannot keep when the password is changed. Password history :- •Disallows users to use old passwords that are stored in the password history. •The number of passwords to be stored in the password history can be defined. Password Overriding : - BENEFITS •Allows the Administrator to choose the users for whom the Password Policy is applicable. FEATURES •Administrator can remove the applicability of Password Policy to some users as they may be higher up in the company than the Administrator. User Status :- •Instead deleting a user, Administrator can simply make them inactive. •Can make users active or inactive. In other words, the users can be restricted from accessing the company data by using this option.