Cloud security for the 'everywhere enterprise' - SC Magazine UK

Cloud security for the 'everywhere enterprise'
SC Magazine UK
Protection is no longer enough; prevention is key. Smart CIOs and CISOs will be strategically planning their next move to invest in cloud based security-as-a-service to fuel new initiatives. Contributed by Charles Milton, director EMEA channels at Zscaler.
Read More

The hardware used in both the Internet of Things (IoT) and Industrial Control Systems (ICS) have many similarities. Both often involve older systems incapable of running detection tools or monitoring agents due to outdated operating systems, resource limitations, proprietary systems, and odd protocols such as Modbus and DNP3, amongst other restrictions. The lack of visibility […]…Read MoreThe post Sweet Security: Deploying a Defensive Raspberry PI appeared first on The State of Security.
Read More

Similar Messages

  • I have CS4 web Premium -  I am trying to look at the Adobe Cloud option for the 2015 compable product.  However...under my registered produst only Acrobate is listed...I also have the subject Adobe product.  When I type in the serial # from the oriinal ad

    I have CS4 Web Premium -  I am trying to look at the Adobe Cloud options for the 2015 compatible products.  However...under my registered products...only Acrobat is listed...I also have the CS$ Web Premium Adobe product.  When I type in the serial # from the original Adobe CS 4 dvd's package I get a "product already registered"...but I can not find it's registration on any Adobe page and it doesn't show up under registered products on the Adobe Cloud page(s)
    Since it's registered...how/where do I find this verification...
    Thanks   TRinAz
    Message was edited by: Tim Rogers - spelling

    You will have to contact support by web chat to figure out any such issues.
    Mylenium

  • Implementing security for the Projects in OWB

    Hi,
    Can we able to implement the security for the individual projects?
    Thanks
    Vinay

    Hi,
    do not know exactly what kind of security you want to implement. But the below is the excerption from OWB User guide about implementing security at Project level...
    You should be able to find more info in OWB User Guide.
    Freezing Projects
    If you want to freeze the project MY_PROJECT and prevent access to all its contents,
    the following restrictions will apply:
    You cannot create, edit, or delete any objects under a frozen project.
    You cannot invoke any of the services that modify objects within this frozen
    project. For example, you cannot perform an MDL import, a source import, or a
    snapshot restore in this project.
    You can deploy, export, and execute runtime procedures within a frozen project.
    You can validate and generate within a frozen project.
    You cannot add or remove any objects from a frozen project to a snapshot.
    The frozen project security policy is implemented within Warehouse Builder through
    the following files. These files are located on your installation CD under:
    samples/security_feature/frozenproject.
    frozenProject.pkb: Holds the implementation of the security policy.
    frozenProject.sql: Contains a table of the structure as shown in Table 19–2. The
    administrator can freeze projects by inserting them into this table and setting the
    isFrozen flag to 1.
    HTH
    mahesh

  • Screen Level Security for the Material Master

    We need to create security for the material master by screen views. The Purchasing group needs to be able to change the Purchasing and MRP screens but none of the other screens. How would we accomplish this with SAP security?
    Thanks!

    Janet,
    It is hard for us to know how your authorization profiles or roles are constructed.  You really should consult your local authorization expert.
    The Authorization object you are looking for is M_MATE_STA.  It is probably contained in at least one of your Roles or Profiles that are currently assigned to your MM maintenance people. At a minimum, it should exist in standard SAP profile M_MATE_ALL in your system.  You can review all of these types of authorization info in the User Information System (transaction SUIM).
    You would have to create roles or profiles that narrowly define the "User department" fields for M_MATE_STA object.  You would also have to search for existing roles/profiles that contain "*" in this field, and determine if these entries are still appropriate in your new authorization business process you want to begin.
    Below is the SAP help about this authorization object
    M_MATE_STA
    Definition
    Maintenance status authorization for material master records
    The data contained in a material master record is divided into user departments or views (Purchasing, MRP, and so on). The maintenance status is a single-character key for the relevant user department or view.
    This object determines which user departments or views a user is authorized to process; that is, which data he or she may process from this view.
                                                                                    Note                                                                      
    To use material master functions, a user needs the authorization for at least one user department.
    Defined Fields
    Fields               Possible values      Meaning
    ACTVT                01                   User may create data.
                         02                   User may change data.
                         03                   User may display data.
                         06                   User may flag data for deletion.                       
                         08                   User may display change documents. 
    STATM                                     Here, you specify the maintenance status for which the user is authorized.         
    The maintenance statuses possible are as follows:
    User department                Maintenance status
    Work scheduling                   A
    Accounting                        B
    Classification                    C
    MRP                               D
    Purchasing                        E
    Production resources/tools        F
    Costing                           G
    Basic data                        K
    Storage                           L
    Forecasting                       P
    Quality management                Q
    Warehouse management              S
    Sales                             V
    Plant stocks                      X
    Storage location stocks           Z
    Notes
    This authorization object also determines:
    o   Whether a user may flag a material master record for deletion. In this case, 06 must be entered in field ACTVT; the maintenance status is irrelevant here.
    o   Whether a user may change the material type. In this case, 02 must be entered in field ACTVT; the maintenance status is irrelevant here.
    o   Whether a user may process an MRP profile or forecast profile. In this case, the following values must be entered in field ACTVT:
    -   01 to create
    -   02 to change or delete
    -   03 to display
    The maintenance status must be D for the MRP profile or P for the forecast profile.
    o   Whether a user may create an overview of all extendable materials. In this case, 01 must be entered in field ACTVT; the maintenance status is irrelevant here.
    o   Whether a user may call up the materials list. In this case, 03 must be entered in field ACTVT; the maintenance status is irrelevant here.
    o   Whether a user may create or change production versions from task lists. In this case, 02 must be entered in field ACTVT, and A in field STATM.
    Rgds,
    DB49

  • How do I swap my individual creative cloud license for the educational discounted cloud license

    How do I swap my individual creative cloud license for the educational discounted cloud license?

    Hi Josh,
    I checked under your account and found that the subscription which was purcahsed has been cancelled,
    Please purchase a new subscription with the lower princing from the below link
    https://creative.adobe.com/join/edu
    ^Ani

  • Security for the deployed EAR

    Hi All,
    i have deployed the EAR in SAP WEbAS 6.40. after deployment, server internally copied ear into several locations. i can easily reverse engineering them. How can i provide a security for the ears that have been copied by the server after deployment.
    Thanks & Regards,
    NagaLaxmi

    Hi,
    I'm not sure what you mean by providing security. Do you mean preventing access to the ear or preventing reverse engeneering?
    regards,
    Dion

  • How do I set up multiple Creative Cloud accounts for the same login?

    I have a number of Macs of various flavors.  I want to install Creative Cloud apps on four of these units.
    I have a subscription currently which I am using for my MBP 17, and a 27" iMac.
    I want to add an account for my MB Air and Mac Pro, and I'm willing to double my subscription fees to do it.  (I use different apps on each of the computers, though I like the idea of having the ability to use them all on each.) How do I accomplish this addtional subscription without having to add a new Adobe account?
    Second Question:
    I have the one-year special on my current subscription due to licensed PS 5.5. ($29.95/mo).  Would I be eligible on my second subscription for the same deal due to the license on the PS 5.5, or would I qualify due to being a Acrobat Pro 8 owner... or Licensed owner of previous versions of PS?  OR.... would I immediately be paying $49.95/mo for the second account?
    Either way, I'm in. Just want to do it all under one account if at all possible.
    Thanks in advance for resolution.  Cheers.

    Currently all subscriptions (with the exception of Team Ready) require a separate Adobe ID for each Creative Cloud Membership. Its not possible to have two memberships under the same Adobe ID.
    Adobe has a Team Ready offering for customers interested in a volume license for Creative Cloud. This is a TLP volume license to Master Collection CS6 and includes licensing for Lightroom and Muse. Customers with this will transition to Creative Cloud Team once available later in 2012. This product uses only a single serial # and Adobe ID. It's not the same as Creative Cloud Membership like what is currently available, but rather a means to get customers setup with something now to transition to the volume license Creative Cloud Team offering once available. If this sounds like something you would be interested in please contact a local Adobe Reseller for more info.
    This link has more info:
    http://www.adobe.com/products/creativesuite/companies.html
    This link can help someone find a reseller in NA
    http://partners.adobe.com/resellerfinder/na/reseller.jsp?nav=al
    I just read over the terms of the introductory offer and it is a 1 per customer offer, so it would be 49.95/mo for a second account.
    https://creativecloud-specialoffer.adobe.com/special-offer/?loc=en_US
    Hope that helps,
    -Dave

  • Password security for the IP phone

    I want to secure the IP phone by giving the password so that the ip phone will prompt for the password when ever the user want to make the cal.Please let me know what are the setting for the password security.
    Thanks.

    Hi Lal,
    There is no simple way to do this, but here are two methods that will "Lock down" the IP Phone.Have a look;
    The Cisco CallManager Extension Mobility feature allows users to configure any Cisco IP Phone 7940 or Cisco IP Phone 7960 as their own, on a temporary basis, by logging in to that phone. After a user logs in, the phone adopts the user individual user default device profile information, including line numbers,Long distance access, speed dials, services links, and other user-specific properties of a phone. For example, when user A occupies a desk and logs in to the phone, that user's directory number(s), services, speed dials, and other properties appear on that phone; but when user B uses the same desk at a different time, user B's information appears. The Cisco CallManager Extension Mobility feature dynamically configures a phone according to the current user.
    From this doc;
    http://www.cisco.com/en/US/products/sw/voicesw/ps556/products_administration_guide_chapter09186a00803edae9.html
    Cisco CallManager Extension Mobility
    http://www.cisco.com/en/US/products/sw/voicesw/ps556/products_administration_guide_chapter09186a00803f3a8d.html#wp51829
    Or you could use Forced Authorization Codes (FAC);
    The Forced Authorization Codes (FAC) feature, which allows you to regulate the types of calls that certain users can place, forces the user to enter a valid authorization code on the phone before the call completes.
    From this doc;
    http://www.cisco.com/en/US/products/sw/voicesw/ps556/products_administration_guide_chapter09186a00803ed710.html
    Configuring Forced Authorization Codes
    http://www.cisco.com/en/US/products/sw/voicesw/ps556/products_administration_guide_chapter09186a00803f3af7.html#wp1078125
    Hope this helps!
    Rob

  • I am on the Adobe Cloud, but for the past few days every time I attempt to open indesign I get the message missing plug-in Actions. RPLN, and the app will not open.

    I am on Adobe Cloud but over the past few days every time I try to open indesign I get the message that there is a missing plug-in Actions. RPLN, and the app will not open. Any ideas?

    Hi, when I try to open indesign itself this message comes up:
    Adobe Indesign cannot load the ACTIONS.RPLN plug-in. The plug-in requires
    the 10.1 version of indesign.. Please contact the vendor to get a
    compatible version of ACTIONS.RPLN.
    I am not able to click off the message to make the box disappear, so have
    to crash out.
    Paul

  • Security for the l2 ports of 4506 catalyst

    Hi
    I have users of around 4000 in a building . They were configured for their project subnet and we have a guest network for the external users who come to visit their project people..We have to put them in a guest subnet where his access is restricted...But Many of my users would come calling up their guests and make them to sit along with them and our employee would give up his port to the guest where he would also be a project network and the guest would have all the possibilities to see our employees project details coupled with our company resources...
    I want to have a remedy for this..
    I tried configuring the Mac-based port restrictions . But we have lot of pc's moving internally , so our intervention in configuring the ports also increases day by day....
    What i would like to have is ...
    I must have all the mac-addresses of our company network .....When a mac-address apart from this is received it should block that ....so that the guest laptop plugged int to the employees port must get blocked and whereas any of the prescribed lap tops mac-address must not get blocked in taht port...
    Is there any for this....?
    pls reply
    Reagrds.....
    Gokulakrishnan.

    Hi Gokulakrishnan -
    Yes - the NAC Appliance is a hw/sw solution for you.
    There are a few components
    - the NAC Manager - this is where the policy is defined (also called CAM)
    - the NAC Server - this enforces the policy and is placed nearest the user (also called CAS)
    - the NAC Agent - this installs on the computers to provide posture information
    Eval Units are available through your account team.
    Please let me know if you have additional questions.
    thxs
    peter

  • Overall Best Security for the WRT54G v8

    I bought the WRT54G v.8 and wanted to know if anyone out there knows the best way of securing this router from leechers and hackers. I just read a book that details how to hack into wireless routers (scary) and I understand that there are layers of security that can be implemented to prevent from you being attacked. 
    Can anyone please remind us what that is?
    Any good reputable web sites that can help us?
    Thanks!
    Spydurrmann 

    To set up your wireless, at first, leave the router at its default settings, and then use your pc to connect wirelessly to the router. Test your wireless Internet connection and make sure it is working correctly. You must have a properly working wireless connection before setting up wireless security.
    To set up wireless security, you must use a computer that is wired to the router.
    Where to find the router settings: The router's login password is usually on one of the "Administration" pages. The other settings are all found in the "Wireless" section of the router's setup pages, located at 192.168.1.1
    Give your router a unique SSID. Don't use "linksys".
    "SSID Broadcast" should be set to "enabled".
    Retest the system, and make sure your wireless Internet connection still works.
    To implement wireless security, you need to do one step at a time, then verify that you can still connect your wireless computer to the router.
    Next, encrypt your wireless system using the highest level of encryption that all of your wireless devices will support. Common encryption methods are:
    WEP - poor (see note below)
    WPA (sometimes called PSK) - good
    WPA2 (sometimes called PSK2) - best
    WPA and WPA2 sometimes come in versions of "personal" and "enterprise". Most home users should use "personal". Also, if you have a choice between AES and TKIP, and your wireless equipment is capable of both, choose AES. With any encryption method, you will need to supply a key (sometimes called a "password" ).
    The wireless devices (computers, printers, etc.) that you have will need to be set up with the SSID, encryption method, and key that matches what you entered in the router.
    Retest your system and verify that your wireless Internet connection is still working correctly.
    For additional security, on many routers, you can limit wireless access to just the MAC addresses of the wireless devices that you own. If possible, you should also use this feature.
    And don't forget to give your router a new login password.
    Picking Passwords (keys): You should never use a dictionary word as a password. If you use a dictionary word as a password, even WPA2 can be cracked in a few minutes. When you pick your login password and encryption key (or password or passphrase) you should use a random combination of capital letters, small letters, and numbers. A login password, should be 12 characters or more. WPA and WPA2 passwords should be at least 32 characters.
    Most home users should have their routers set so that "remote management" of the router is disabled. If you must have this option enabled, then your login password must be increased to a minumum of 24 random characters.
    One additional issue is that Windows XP requires a patch to run WPA2. Go to Microsoft Knowledge base, article ID=893357 and it will direct you to the patch.
    Sadly, the patch is not part of the automatic Windows XP updates, so lots of people are missing the patch.
    Note:
    WEP is no longer recommended. The FBI has demonstrated that WEP can be cracked in just a few minutes using software tools that are readily available over the Internet. Even a long random character password will not protect you with WEP. You should be using WPA or preferably WPA2 encryption.

  • What security for the form that customer sends via email?

    I made a form and posted the link for patients to request new appointment. When they send the form back, is that HIPAA appropriate?
    I understand that my login as user is secure but is the transmission of the completed form to the assigned email secure?
    How can it be made secure?
    thanks

    You can add links to any text within a form. You can, for instance, add a Formatted Text field and add the text "Adobe FormsCentral Security Information".  You would then select the part of the text you wanted to add the link to the select menu item Insert->Link.  In the resulting dialog you can add the link and modify the text it is associated with.
    FormsCentral does not support add a link to an image (icon).  If this is something that you would like to see added to the product you can add it to the list of feature ideas at:
    http://forums.adobe.com/community/formscentral?view=idea
    If you need to add a new idea click "Create an idea" under "Actions" in the top right.
    -Jeff Canepa

  • Enadling Security for the cxf webservice

    I have created a CXF webservice and exposed it through a Secured (HTTPS) webdomain. From my client directly i access the webservice without even using the SSL certificate of that webdomain.
    In my client code i am explicitly setting to trust all the certificates due to which, it not even checks the authenticity of the client. This should not ideally happen for me.
    On doing some analysis, I see it is possible to do it using the tag <httpj:engine-factory bus="cxf"> (http://fusesource.com/docs/framework/2.1/security/HTTPCompatible.html#i488847). even after adding those entries to my wsdl, i am unable to secure my webservice through my webdomain cert.
    Could some one please advice ?

    More info:
    By specifying the header properties in the bpel.xml BPEL generates the following header data in the SOAP message (obtained using obtunnel):
    <soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/"
    xmlns:xsd="http://www.w3.org/2001/XMLSchema"
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
    <soapenv:Header>
    <wsse:Security soapenv:actor="http://schemas.xmlsoap.org/soap/actor/next"
    soapenv:mustUnderstand="1"
    xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd">
    <wsse:UsernameToken xmlns:wsu="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd">
    <wsse:Username>username</wsse:Username>
    <wsse:Password Type="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText">clearTextPassword</wsse:Password>
    </wsse:UsernameToken>
    </wsse:Security>
    </soapenv:Header>
    <soapenv:Body>
    theBody
    </soapenv:Body>
    </soapenv:Envelope>
    As you can see it uses the #PasswordText which indicates the use of a cleartext password.
    Thus the question remains: how to get the Nonce, the CreationTime and the PasswordDigest in the SOAP Header of the message (BPEL 10.1.2.1.0)?
    Thanks, Sjoerd

  • Security for the Web Analysis reports

    I created a report using my user id in Web Analysis studio version 11.1.1.3. When I login as another user, I can't see the report. How do I give access to other users? Do I need to change owner? I created the report under directory, where all the reports are and the users can get to those reports.
    Any help would be appreciated.

    You would have to go into Workspace and Edit Permissions for that report to grant access to the report.
    Nick

  • I cannot get my Apple TV to connect to my Netgear router. I can get it to connect if I disable the security for the password but once I enable it it won't connect.

    I have an issue with connecting to my Netgear router. I have tried a lot of different options on my router but the only way I can get it to connect is to disable my security password and I don't want to leave my network exposed without a password. I have tried resetting, updating my software and restarting the Apple TV. I just bought this last week and haven't gotten to use it yet.

    then it throws and error message.
    What is the error message?
    <edit>
    Also have yo had a look at Apple TV (2nd and 3rd generation): Troubleshooting Wi-Fi networks and connections

Maybe you are looking for

  • IPOD Mini - Updating Playlists

    When I try to update my IPOD Mini, I get the following error message: "Songs on the IPOD cannot be updated because all of the playlists selected for updating no longer exist" How do I fix this?

  • 16:9 settings

    I'm still in a pickle over this, and am wanting to sort it for once and for all. I am shooting in 16:9 (although when importing it to FC Studio, it does not look widescreen). When I drop it in the timeline it says my sequence settings don't match, do

  • Internet Explorer doesnt load Applet.

    Hi, I have a simple applet called HelloWorld.class with this simple code: import java.applet.*; import java.awt.*; public class HelloWorld extends Applet public void init() n public void stop() public void paint(Graphics g) g.drawString("Hey hey hey"

  • Will eDiscovery pick up e-mails using Entrust?

    I am curious if the eDiscovery feature will search and find emails that use Entrust for encryption. Does anyone know if this is possible?

  • How to embed Flash Movie to on intro

    Hi friends, I want to embed a movie (flash/avi, etc) on the intro dialog of an application. can any one help me please. Hope to heare from u. Thankyou Khurram