TapeTrack Documentation

Because there is more to tape management than you ever realized

User Tools

Site Tools


common:security_details

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
common:security_details [2017/06/20 22:09] – [Source Code Escrow] Gerard Nicolcommon:security_details [2025/01/21 22:07] (current) – external edit 127.0.0.1
Line 8: Line 8:
  
 In addition to this, many of our employees have worked in military and law enforcement roles and have obtained the required clearances to perform these functions. In addition to this, many of our employees have worked in military and law enforcement roles and have obtained the required clearances to perform these functions.
 +
 +{{:common:staff.png|}}
 +
 ===== Design Methodology ===== ===== Design Methodology =====
 Security and reliability are our primary considerations when developing and maintaining TapeTrack. Our changes are extensively beta tested by experts who use the product on a daily basis. Security and reliability are our primary considerations when developing and maintaining TapeTrack. Our changes are extensively beta tested by experts who use the product on a daily basis.
Line 21: Line 24:
  
 The TapeTrack End User License Agreement (EULA) was written in consultation with our customers. The EULA clearly and fairly outlines your rights as a Licensee of our product. The TapeTrack End User License Agreement (EULA) was written in consultation with our customers. The EULA clearly and fairly outlines your rights as a Licensee of our product.
 +
 +{{:common:license.png|}}
 +
 ===== Source Code Escrow ===== ===== Source Code Escrow =====
  
Line 38: Line 44:
  
 Where we provide third-party DLL’s and executables, these will either be signed with the owner’s Digital Certificate, or in the absence of a signature, signed with GazillaByte LLC’s certificate. Where we provide third-party DLL’s and executables, these will either be signed with the owner’s Digital Certificate, or in the absence of a signature, signed with GazillaByte LLC’s certificate.
-===== THE TAPETRACK PROTOCOL =====+===== The TapeTrack Protocol =====
  
 TapeTrack uses a proprietary TCP/IP protocol. TapeTrack uses a proprietary TCP/IP protocol.
 +
 This protocol uses only one port (usually 5000), but can also be tunneled through a HTTPS proxy server (TapeTrack clients use an outbound connection and the server accepts inbound connections). This protocol uses only one port (usually 5000), but can also be tunneled through a HTTPS proxy server (TapeTrack clients use an outbound connection and the server accepts inbound connections).
-===== ENCRYPTION =====+===== Encryption =====
  
 TapeTrack uses symmetric AES encryption to encrypt data and all passwords are hashed and stored using the MD5 algorithm. TapeTrack uses symmetric AES encryption to encrypt data and all passwords are hashed and stored using the MD5 algorithm.
-===== ACCESS CONTROL =====+===== Access Control ===== 
 + 
 +TapeTrack has its own native access control mechanism. This access control is independent of Active Directory to ensure that in the event of a disaster recovery there is no dependence between TapeTrack and systems which may need to be recovered.
  
-TapeTrack has its own native access control mechanism. This access control is independent of Active Directory1 to ensure that in the event of a disaster recovery there is no dependence between TapeTrack and systems which may need to be recovered. 
 TapeTrack’s native access control mechanism can limit access to TapeTrack and TapeTrack resources based upon: TapeTrack’s native access control mechanism can limit access to TapeTrack and TapeTrack resources based upon:
-1. The connecting interface. + 
-2. The connecting IP Address or IP Sub-Net. +  - The connecting interface. 
-3. The User’s access rights to individual resources and functions. +  The connecting IP Address or IP Sub-Net. 
-===== HIGH AVAILABILITY =====+  The User’s access rights to individual resources and functions. 
 +===== High Availability =====
  
 TapeTrack’s High Availability Option provides one or more read-only TapeTrack systems which replicate with the primary system in real-time. This replication requires no supporting middleware and uses very little bandwidth. TapeTrack’s High Availability Option provides one or more read-only TapeTrack systems which replicate with the primary system in real-time. This replication requires no supporting middleware and uses very little bandwidth.
-===== SIMPLE HOT BACKUP =====+===== Simple Hot Backup =====
  
 In addition to High Availability Replication, the TapeTrack database can be simply backed up using a supplied command line utility even when the system is active. In addition to High Availability Replication, the TapeTrack database can be simply backed up using a supplied command line utility even when the system is active.
  
common/security_details.1497996555.txt.gz · Last modified: 2025/01/21 22:07 (external edit)