Microsoft Azure datacenters have the highest possible physical security and are considered among the most secure and well protected datacenters in the world. ... Relevant references with additional...
Managing information system security is a priority for every organization. ... In fact, the level of security provided by software vendors has become a differentiating factor for IT purchase decisi...
Internal network communication within Azure includes inter-service communication between Security Guardian components and the On Demand Platform. ... Inter-service communication uses OAuth authenti...
Security Guardian manages the following type of customer data: ... Active Directory objects such as users, groups, computers and domains are provided by the On Demand Hybrid Agent via Event Hubs an...
Quest Operations team members have access to the Quest’s production Azure Subscription and monitor this as part of normal day to day operations. ... Security Guardian developers have no access to Q...
On Demand is included in the scope of the Platform Management ISO/IEC 27001, 27017 and 27018 certifications: ... ISO/IEC 27017 Information technology – Security techniques – Code of practice for in...
Access to source control and build systems is protected by domain security, meaning that only employees on Quest’s corporate network have access to these systems. ... Therefore, should an On Demand...
Security Guardian cryptographic usage is based on Azure FIPS 140-2 compliant cryptographic functions.
Security Guardian security features are only one part of a secure environment. ... Customers must implement their own security practices when proceeding with data handling. ... Special care needs t...
Access to source control and build systems is protected by domain security, meaning that only employees on the Quest corporate network have access to these systems. ... Therefore, should an On Dema...
This section describes how On Demand core services handle data.
Customer data is differentiated using a unique organization identifier. ... This organization identifier is generated securely during customer sign-up. ... This organization identifier is passed to...
For Azure Data Explorer, each organization is contained within a separate database ensuring no mixture of data. ... For Azure Storage, a combination of techniques is employed. ... In Azure Blob Sto...
Managing information system security is a priority for every organization. ... In fact, the level of security provided by software vendors has become a differentiating factor for IT purchase decisi...
Quest On Demand is configured with default roles that cannot be edited or deleted, and also allows you to add custom roles to make permissions more granular. ... Each access control role has a spec...
Authenticating through Microsoft Entra ID provides native granular control and allows you to manage your configuration from a central location. ... It allows configuring advanced security layers th...
On Demand has undergone a third party security assessment and penetration testing yearly since 2017. ... The assessment includes but is not limited to: ... A summary of the results is available upo...
On Demand Core cryptographic usage is based on Azure and AWS FIPS 140-2 compliant cryptographic functions.
Every email sent by the Notification Service is scanned for viruses and malware. ... All request data sent to On Demand Notification Service is persisted by default. ... This includes the notificat...
On Demand Core provides an activity trail log for the following actions: ... Adding and removing hybrid agents, domains and relevant capabilities ... Authorizing and de-authorizing users as an On D...
This guide is a reference for the following: ... SharePlex commands — an overview of the commands that control replication through sp_ctrl, an explanation of command authorization levels, and detai...
Use the stop command to stop a SharePlex replication process gracefully, allowing it to finish reading from, or writing to, its associated queues. ... When you stop a replication process, data accu...
Use the Database Setup utility for Oracle (ora_setup) to establish SharePlex as an Oracle user and create the required SharePlex database objects. ... This setup utility creates the following: ... ...
On the Select Type of Target Storage page, the wizard prompts you to select the type of target storage. ... You can restore public folders to a registered target storage (this includes target stora...
Use the create config command to create a new configuration file. ... This command runs the SharePlex default text editor and opens a new file. ... To create a configuration, follow the instruction...
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy Cookie Preference Center