cancel
Showing results for 
Search instead for 
Did you mean: 
Marion_Nepomuce
Champ in-the-making
Champ in-the-making

Heading to Community Live? Be sure to attend our classes on Security topics!

Two security-related classes will be offered: "Security and OnBase" (two sessions) and "Encrypt and Protect your Sensitive Information" (one session). Details below.

Security and OnBase

> Sunday, September 13th
        9:00 to 12:30
        Delfino 4101B
> Monday, September 14th
        9:00 to 12:30
        Delfino 4105

Intended audience

OnBase administrators, Information Technology professionals, Infrastructure administrators, User Accounts administrators, Database administrators

Why you should attend

This class will arm you with all the arguments and knowledge you'll need to focus your efforts on securing your OnBase environment. You'll acquire a concrete checklist of security tasks and best practices which you can immediately implement at your organization. You'll also learn about important Software Security principles that can be applied to OnBase as well as other systems in your organization. These basic principles, when followed, greatly enhance the overall security of your sensitive information.

Finally, we'll present relevant OnBase modules that help secure your information beyond traditional means. You'll learn details about Distributed Disk Services, Encrypted DiskGroups, Encrypted Alpha Keywords, etc.

OnBase's encryption modules stand apart in that they add protection (rather than replace or replicate existing protections) to your information through granular cryptography. Consider standard full-disk encryption products: while the disk is in use (which is usually 99.99% of the time), all data on the disk is actually unencrypted so that it can be used by the system. With OnBase, not only can you keep that data encrypted while your systems are up and running, but you can ensure that only OnBase, and only authorized OnBase users, will be able to access that sensitive information. The same is true for Database encryption and Keyword values! Learn how these modules work and how to configure these powerful features.

Overview

  • The importance of Software Security and impact of security incidents
    • By sharing public data on recent security breaches (you may have heard of a few in the news) as well as some raw numbers from recent studies, we aim to highlight the critical importance of Software Security in today's interconnected world.
  • Software Security Principles
    • Software Security is not the new kid on the block. In fact, many incidents could have been avoided simply by acknowledging the basics and applying important, long-standing principles that are simple yet extremely effective. We'll discuss topics like Defense in Depth, Least Privilege, Data and Infrastructure Segregation, etc.

  • Securing OnBase
    • Practical information on securing your OnBase Database at many levels, from infrastructure to network and usage.
    • Module highlights for securing your DiskGroups by limiting access and encrypting your files individually so that they're only accessible through OnBase.
    • Module and feature highlights for securing your Keywords at the database cell level. This keeps your sensitive information protected while at rest, and even away from prying eyes while in use.

  • The Application Security Team
    • How we're working to make OnBase as secure as possible so that all of our customers can enjoy peace of mind. This section will include some details on our internal principles and efforts to that end.
  • Authentication and Authorization in OnBase
    • Arguably the main security control in any transactional system, Authentication & Authorization play a crucial role in securing your OnBase environment. Learn some important OnBase administration practices which are easy to implement and provide immense hardening potential!
  • Securing the OnBase infrastructure
    • However your environment is set up, we have some excellent advice on configuring your OnBase infrastructure to give adversaries a really tough time. From OnBase Client to OnBase Cloud, use this valuable information to make the best security decisions for your systems.
  • Best Practices & Tips
    • Though these are already sprinkled throughout the class, you won't leave without a concrete checklist that you can start implementing right away! The class ends with the top 5 tasks for every OnBase administrator as well as pointers to all of our OnBase Security resources on Community.


Encrypt and Protect your Sensitive Information

> Wednesday, September 16th
        2:15 to 3:00
        San Polo 3505

Intended audience

OnBase administrators, Information Technology professionals

Why you should attend

This class will teach you some important cryptography concepts before diving into relevant OnBase modules that help secure your information beyond traditional means. You'll learn details about Distributed Disk Services, Encrypted DiskGroups, Encrypted Alpha Keywords, etc.

OnBase's encryption modules stand apart in that they add protection (rather than replace or replicate existing protections) to your information through granular cryptography. Consider standard full-disk encryption products: while the disk is in use (which is usually 99.99% of the time), all data on the disk is actually unencrypted so that it can be used by the system. With OnBase, not only can you keep that data encrypted while your systems are up and running, but you can ensure that only OnBase, and only authorized OnBase users, will be able to access that sensitive information. The same is true for Database encryption and Keyword values! Learn how these modules work and how to configure these powerful features.

Overview

  • Hashing vs Encryption
    • These terms should never be used interchangeably, as they refer to very distinct cryptographic operations. Learn where each one is applicable, and how OnBase utilizes hashing as well as encryption for different purposes where applicable.
  • When and What to Encrypt
    • Not all data requires encryption. Can you judge which of your DocTypes or Keyword values should be protected? Did you know OnBase can protect your data at various stages of its lifecycle?
  • OnBase Encryption Features
    • Practical information on securing your OnBase Database at many levels, from infrastructure to network and usage.
    • Module highlights for securing your DiskGroups by limiting access and encrypting your files individually so that they're only accessible through OnBase.
    • Module and feature highlights for securing your Keywords at the database cell level. This keeps your sensitive information protected while at rest, and even away from prying eyes while in use.
    • The information in this section is also contained in the "Security and OnBase" class.