Professional Documents
Culture Documents
S H E E T
The extended enterprise is staring at a stark situation of intellectual property theft and uncontrolled
information disclosure unless the necessary steps are taken to lock-down all sensitive information –
across time and space. Information self defense systems are crucial to persistently protect data
across its life-cycle – in-processing, in-transit as well as in-storage.
Forum Systems Inc. develops and markets Content Security Infrastructure that actively guards
data as it moves between and within enterprises – at the origin, during transmission, and after it
™
Trust Management – prevent unauthorized data access, spying, forgery and tampering
Identity Authentication Message Confidentiality
Access Control Payload Integrity
Threat Protection – protection against application and data miss-use and abuse
Intrusion Detection and Prevention Virus Detection
Traffic Management Application Availability
g a t e w a y
F O R U M
prevent As more information moves between applications that are not in the immediate control of the originator, it
unauthorized information becomes essential to guarantee that only the intended recipients are given appropriate access privileges to
disclosure during the information – wherever it resides. This means a document that is sent across to a trading partner needs
p g p
collaborative activities to be sealed until the time of processing. Assurances need to be made that information is not only tamper-
proof and confidential during transit but also upon arrival, in-storage and during processing.
guard Collaborative applications using peer-to-peer, store-and-forward or grid networks expose business data to a
sensitive application new and extended group of users – in real-time and across corporate boundaries. Strict enforcement of doc-
interfaces & document ument accessibility goes beyond access control and must include confidentiality across boundaries, auditing
workflows and accountability. Assurances need to be made that access to documents is constantly monitored against
intrusions, attacks and other threats from trusted as well as un-trusted users.
comply Sweeping regulations (corporate and government) to protect the privacy of end-user and client information
with government initiatives require enterprises to take ownership of information security across its lifecycle. All of the industry-specific
such as Federal E-SIGN law, regulations are focused on content security and policies that enforce information security across time and
eGov Strategies, HIPPA space. Assurance need to be made that information is, at minimum, persistently protected and that best
and Gramm-Leach-Bliley
practices for each of the regulations are systematically enforced.
protect Mobility through laptops and wireless devices can quickly lead to highly sensitive information lying unpro-
data on desktops, applica- tected on hard disks and data stores. Assurances need to be made that information is protected end-to-end
tion servers, databases and and throughout its lifecycle.
mobile devices
w w w . f o r u m s y s t e m s . c o m
managing & accelerating xml web services security
S H E E T
Business document workflows are one of the weakest links in enterprise information security. A disgruntled
worker or unauthorized contractor can readily duplicate, modify or steal business documents without any
enterprise fail safe mechanisms. In fact, a 2003 CSI / FBI security report stresses that security risks from internal
threats are on the rise with consequences more lethal than external user hacking.
Many organizations are turning to PGP (Pretty Good Privacy) as a means to persistently protect their
mission-critical enterprise documents because of its universality. PGP offers company’s a standards based
D A T A
approach to encrypting and digitally signing documents between business parties. It is becoming a de-facto
standard for secure content exchange offering similar benefits to XML Encryption and S/MIME.
Unfortunately, today’s options for deploying PGP-enabled enterprise applications are anything but pretty –
requiring the development of scripted programs using custom APIs. On top of tedious and repetitive PGP
implementations, organizations are then charged exorbitant and recurring license fees for PGP technology
that is freely available as open source.
™
P R E S I D I O
Bottom line: Using PGP is costly and high maintenance – until Forum Presidio™
a p p l i a n c e
With Presidio, Forum Systems delivers the world’s first PGP in an Appliance solution that significantly
reduces the Total Cost of Ownership by offering instant secure content exchanges between collaborative
e-business applications.
g a t e w a y
Presidio™ Authenticate
Encrypt
Decrypt
Key Gen
Sign / Verify
c o m p a n y A
managing & accelerating xml web services security
S H E E T
Immediate Compliance with regulations including: GLB, HIPAA, SEC Books & Records, etc.
P R E S I D I O
• Removes client side software and moves IT toward zero end-user intervention
F O R U M
St a r t D e f e n d i n g A l l Yo u r I n f o r m at i o n To d ay
The Presidio™ is the only secure content exchange solution that provides both PGP data encryption
as well as XML Web Services security, allowing organizations to maintain their current EDI technology
p g p
By supporting the full range of XML Web Services Security functionality (Digital Signatures, XML
Encryption, SAML etc.), the Presidio is a future-proof security solution that bridges legacy data to
XML-based Web Services.
Discover how Presidio can save your company time and money while preparing for the future at
www.forumsystems.com
w w w . f o r u m s y s t e m s . c o m
managing & accelerating xml web services security
S H E E T
• Key deletion
• Key backup and recovery
• SysLog
• SNMP v2 and v3 with FORUM MIB
Access Control
• Local user authentication at the gateway
• Remote user authentication from the FTP server
• Can disable user@host syntax for tighter control
• LDAP integration
Local Authentication
• Bind keys to users
• Route users based on login to different back end FTP servers
IDP/DOS
• Configure the number of connections per listener
• Configure the timeout per connection
w w w . f o r u m s y s t e m s . c o m