INSTALLATION REQUIREMENTS

Microsoft Active Directory environment is required to implement AreaGuard Neo.

 

System requirements

SERVER

  • Microsoft Active Directory Domain Services
  • Microsoft SQL Server 2005 or higher, (Express Edition as an option)
  • Microsoft Internet Information Service (IIS) 6.0/7.0/7.5
  • .NET Framework 3.5 SP1

Hardware configuration

  • Processor: 1,5 GHz server-class CPU
  • Memory: 2 GB RAM (3 GB optimum)
  • Storage: 5 GB available disk space (10 GB optimum)

Supported operating systems

CLIENT

  • Users and computers in Active Directory domain
  • Microsoft Visual C++ redistributable package 2008
  • .NET framework min. 2.0

Hardware configuration

  • Processor: 1,5 GHz Intel Pentium-class CPU
  • Memory: 512 MB RAM (1 GB optimum)

Supported operating systems

TWO FACTOR AUTHENTICATION REQUIREMENTS

  • Two factor login is supported with PKCS #11 (Public-Key Cryptography Standards) security tokens or chip cards
  • Functionality guaranteed with security tokens and/or chip cards from SafeNet, a respected leader in the authentication industry

Supported operating systems

Company size

The issue of securing confidential business and personal data is extremely important. Unfortunately, many companies underestimate or disregard the issue because it’s not ‘revenue-generating’. Because of this, companies often have an unsystematic or random approach to security, typically depending on individuals having to remember to followad hoc security rules. As companies grow, they reach a point at which it is no longer enough to depend only on personal accountability – a more systematic approach is required.

The need for data security isn’t simply a question of size – the number of employees, computers or revenue. Yet there are several common denominators that stress the necessity of investing time and company resources into protecting data and information.

How does your company measure up in the critical mass areas of data security? Have you reached the point where data security can no longer be handled arbitrarily?

  • The value of data and information: as a company grows, so does the value of the data stored on computers and external devices. In many countries, personal (customer) data is protected by law, and any loss or misuse is punishable by fines and other penalties.
  • Impromptu security is no longer enough: having one individual make rules and manually watch over all corporate data quickly becomes unmanageable even in the smallest companies. A systematic approach is needed – one that establishes central responsibility for the information and data that flow through your company, while removing the element of human error.
  • Adequate technical infrastructure and capabilities are essential when installing a solution to protect your data. Often, these are factors that limit companies from choosing quality security software. Understanding your IT infrastructure is just as important as your business requirements when choosing the right data security solution.

If any of the following apply to your company, then you need a quality, centrally managed and administered tool to protect your data and information:

  • Has your company outgrown a ‘management by one’? Is there just too much going on to count on one individual to watch everything and everyone?
  • Do you have confidential, valuable, or personal data that is protected by law stored on your company’s computers?
  • Have you passed the critical point with your technical infrastructure when an ad hoc approach just isn’t enough?

Core business

Personal data, financial information, confidential company and personal information – these are all basic types of data that must be protected in every company by a security plan. The type of business does not necessarily dictate the value of the data, instead it determines the nature of data being collected. Every company collects some personal data. These can be employee records or customer files.

Financial information is always sensitive, but the associated risks increase significantly, for example, when the company is publicly traded on the stock exchange, or when the information would provide a significant advantage to a competitor. We are all familiar with confidential company and personal data: company letters, databases, documents containing confidential intellectual property information, and a host of other examples. We often do not appreciate the value of data, or how they could be misused, until after they have been lost or stolen. Prevention is the only appropriate weapon against external and internal enemies, and even simple human mistakes.

As you can see, your company’s core business is actually irrelevant when it comes to protecting data.


TOPlist