TapeTrack Documentation

Because there is more to tape management than you ever realized

User Tools

Site Tools


common:security_details

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
common:security_details [2017/06/20 21:58] – [LICENSE AGREEMENT] Gerard Nicolcommon:security_details [2025/01/21 22:07] (current) – external edit 127.0.0.1
Line 8: Line 8:
  
 In addition to this, many of our employees have worked in military and law enforcement roles and have obtained the required clearances to perform these functions. In addition to this, many of our employees have worked in military and law enforcement roles and have obtained the required clearances to perform these functions.
 +
 +{{:common:staff.png|}}
 +
 ===== Design Methodology ===== ===== Design Methodology =====
 Security and reliability are our primary considerations when developing and maintaining TapeTrack. Our changes are extensively beta tested by experts who use the product on a daily basis. Security and reliability are our primary considerations when developing and maintaining TapeTrack. Our changes are extensively beta tested by experts who use the product on a daily basis.
Line 21: Line 24:
  
 The TapeTrack End User License Agreement (EULA) was written in consultation with our customers. The EULA clearly and fairly outlines your rights as a Licensee of our product. The TapeTrack End User License Agreement (EULA) was written in consultation with our customers. The EULA clearly and fairly outlines your rights as a Licensee of our product.
-===== SOURCE CODE ESCROW ===== 
  
-The TapeTrack source code is regularly deposited for escrow with EscrowTech in Salt Lake City and The NCC Group in LondonAs a TapeTrack Licensee, our License Agreement ensures your right to register as an Escrow Beneficiary. This protects your rights as a Licensee should a dispute arise around your use of our intellectual property. +{{:common:license.png|}}
-===== DIGITAL CODE SIGNING =====+
  
-All TapeTrack executable code for the Microsoft Windows platform is Digitally Signed with GazillaByte LLC’s Code Signing Certificate. Where we provide third-party DLL’s and executables, these will either be signed with the owner’s Digital Certificate, or in the absence of a signature, signed with GazillaByte LLC’s certificate. +===== Source Code Escrow ===== 
-===== THE TAPETRACK PROTOCOL =====+ 
 +The TapeTrack source code is regularly deposited for escrow with EscrowTech in Salt Lake City and The NCC Group in London.  
 + 
 +As a TapeTrack Licensee, our License Agreement ensures your right to register as an Escrow Beneficiary. This protects your rights as a Licensee should a dispute arise around your use of our intellectual property. 
 + 
 +{{:common:escrow.png|}} 
 + 
 +===== Digital Code Signing ===== 
 + 
 +All TapeTrack executable code for the Microsoft Windows platform is Digitally Signed with GazillaByte LLC’s Code Signing Certificate.  
 + 
 +Our Code Signing Certificate is provided by GoDaddy. 
 + 
 +{{:common:code_signing.png|}} 
 + 
 +Where we provide third-party DLL’s and executables, these will either be signed with the owner’s Digital Certificate, or in the absence of a signature, signed with GazillaByte LLC’s certificate. 
 +===== The TapeTrack Protocol =====
  
 TapeTrack uses a proprietary TCP/IP protocol. TapeTrack uses a proprietary TCP/IP protocol.
 +
 This protocol uses only one port (usually 5000), but can also be tunneled through a HTTPS proxy server (TapeTrack clients use an outbound connection and the server accepts inbound connections). This protocol uses only one port (usually 5000), but can also be tunneled through a HTTPS proxy server (TapeTrack clients use an outbound connection and the server accepts inbound connections).
-===== ENCRYPTION =====+===== Encryption =====
  
 TapeTrack uses symmetric AES encryption to encrypt data and all passwords are hashed and stored using the MD5 algorithm. TapeTrack uses symmetric AES encryption to encrypt data and all passwords are hashed and stored using the MD5 algorithm.
-===== ACCESS CONTROL =====+===== Access Control ===== 
 + 
 +TapeTrack has its own native access control mechanism. This access control is independent of Active Directory to ensure that in the event of a disaster recovery there is no dependence between TapeTrack and systems which may need to be recovered.
  
-TapeTrack has its own native access control mechanism. This access control is independent of Active Directory1 to ensure that in the event of a disaster recovery there is no dependence between TapeTrack and systems which may need to be recovered. 
 TapeTrack’s native access control mechanism can limit access to TapeTrack and TapeTrack resources based upon: TapeTrack’s native access control mechanism can limit access to TapeTrack and TapeTrack resources based upon:
-1. The connecting interface. + 
-2. The connecting IP Address or IP Sub-Net. +  - The connecting interface. 
-3. The User’s access rights to individual resources and functions. +  The connecting IP Address or IP Sub-Net. 
-===== HIGH AVAILABILITY =====+  The User’s access rights to individual resources and functions. 
 +===== High Availability =====
  
 TapeTrack’s High Availability Option provides one or more read-only TapeTrack systems which replicate with the primary system in real-time. This replication requires no supporting middleware and uses very little bandwidth. TapeTrack’s High Availability Option provides one or more read-only TapeTrack systems which replicate with the primary system in real-time. This replication requires no supporting middleware and uses very little bandwidth.
-===== SIMPLE HOT BACKUP =====+===== Simple Hot Backup =====
  
 In addition to High Availability Replication, the TapeTrack database can be simply backed up using a supplied command line utility even when the system is active. In addition to High Availability Replication, the TapeTrack database can be simply backed up using a supplied command line utility even when the system is active.
  
common/security_details.1497995922.txt.gz · Last modified: 2025/01/21 22:07 (external edit)