SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
THE FRENCH SPECIALIST
in file sharing and online collaboration
Security leaflet
APPLICATION SECURITY
Your 100% secure NetExplorer platform
To secure the authentication process,
you can require users to enter a code
that is unique to them, in addition to
their password (OTP, SMS or Yubikey
token). Authentication is then
qualified as 'strong' because it
requires the concatenation of two
authentication factors.
Authentication by
username and password
NetExplorer users log in using the
assigned username and password
chosen. Passwords are never stored
unencrypted; they are "hashed and
salted" to protect their
confidentiality.
Strong authentication
1
4
1
4
1
4
Detection of intrusion
attempts
NetExplorer includes an intrusion
detection system and can identify too
many login attempts on a user
account or from an IP address. When
an intrusion attempt is detected, the
attacker's login and IP address are
banned. The number of pre-ban
attempts and the ban time are
configurable by the administrator.
Anti-theft protection
of sessions
In order to avoid session hijacking and
identity theft through Cross-Site
Request Forgery (CSRF) exploits, the
NetExplorer platform doesn't send
any session cookies to the connected
customer, as is the case with standard
applications. NetExplorer uses a single
token that is sent unidirectionally and
not automatically.Access strategy
NetExplorer features access policies
by user group or account. It is
therefore possible to block certain
methods of access, to limit login
locations (IP address), and to
determine the time slots and days of
connection.
 NetExplorer has a virus scanner and a ransomware detection system.
 Each file deposited on the platform is analysed, regardless of the access method. Items added by
outside contributors via deposit links are also inspected. The anti-virus used is ClamAV. If the file is
corrupted by a virus, it will be rejected by the platform. Similarly, if the ransomware detection system
detects an infection, the user's account is blocked to prevent the spread of ransomware.
 All data exchanged with NetExplorer is encrypted using SSL and a 2048-bit
key.
 All NetExplorer access methods use HTTPS on port 443, providing maximum
security.
 The SSL certificate implementation method applied by NetExplorer provides
strong security guarantees. It has been given grade A+ which is the
maximum grade. This assessment is made by Qualys SSL.
Antiviral and anti-malware protection
Encryption
Password security
 The password security policy is based on the combination of three parameters:
- Minimum password length, in number of characters
- Rejection of passwords used too often (from the list of the 10,000 most frequently used passwords,
and therefore tested first in the event of attack)
- Password complexity index
Password Complexity for the user Security level NetExplorer complexity
index
1gZ6f4HsG Impossible to remember Medium (only 39 days needed to decode it) 25
We are NetExplorer Very simple Very high (1042 years needed to decode it) 35
Traceability
 NetExplorer ensures full traceability of all actions performed by users: login, adding a file, modifying a folder,
deleting a document, etc.
 All the actions are grouped together in event logs, allowing a filter and an accurate search of the various
operations. Search by:
- Keyword
- User concerned
- IP address of the user
- Date of the event (beginning and end)
- Event status: success or error
- Object type: user, folder, file, annotation, etc.
- Type of action: login, addition, modification, deletion, download, etc.
 This traceability makes it possible to check and control the actions carried out on the platform, and to provide
evidence in case of dispute.
 As part of the PCI DSS certification, the NetExplorer application has successfully passed the 54,000 intrusion
tests performed by the Nessus app. These tests verify the absence of application security vulnerabilities,
such as SQL injections, XSS vulnerabilities, etc.
 For more details: http://www.tenable.com/solutions/pci-dss.
 Before every release or upgrade, NetExplorer undergoes more than 5,000 unit tests to check for bugs and
security breaches.
Unit tests
External security audits
INFRASTRUCTURE SECURITY
Highly secure French storage
Data centres
 NetExplorer servers are located in France and
more specifically in Paris. All the data stored is
therefore governed by French law and is not
subject to the American Patriot Act.
 Our infrastructure operates two Data Centres
classified Tier 3+ and Tier 4: Zayo and Equinix
(ISO 9001 and ISO 27001 certified). Tier 4 (the
highest classification) provides an availability
rate of over 99.995%.
Private cloud
 All NetExplorer platforms are architected in
a private cloud to guarantee an excellent
level of confidentiality. The stored data is
completely partitioned in independent areas
between customers. A NetExplorer instance
includes a customer-specific database and a
dedicated storage system.
• The database contains all the platform information
(user accounts, groups, etc.), the stored content
tree menu, and the metadata. It ensures
consistency of information and controls security for
data access.
• The NetExplorer storage system only backs up the
file's binary data in an arbitrary format that is
completely independent from the actual document
tree. In addition, the document name and its
extension are obfuscated.
CLIENT A INSTANCE
CLIENT B INSTANCE
Dedicated
database
INTERNET PROXIES SERVERS
(Applications, Web,
Database, Mini, Indexing,
etc.)
Dedicated storage
directories
Dedicated
database
Dedicated storage
directories
NETEXPLORER
PRIVATE
CLOUD
Availability and integrity of data
 Data availability: to ensure a very high level of availability and not be vulnerable to hardware failures, the
storage system provides local and remote information redundancy.
 Data integrity: the NetExplorer storage system calculates integrity every time a file is deposited. During file
transfers, a second integrity check is performed to ensure that the stored data is identical to the initial data,
and that it has not been altered during the transport of the information.
Data replication policy (backup)
Replication of files in real time
At NetExplorer, data is replicated in real time
across three different storage clusters. The first
two are located in the main data centre, and
the final server is in a second data centre,
located 30 km away. As such, in the event of a
major incident in one data centre, the data is
always stored securely in the second.
Data retention
All deleted files are kept for 30 days in the
backup logs. It is possible to restore a file or the
entire platform from up to 30 days back, even if
the document was inadvertently deleted.
Main
datacentre
Emergency
datacentre
ISO 27001 CERTIFICATION
A certification that guarantees the security of your data
By opting for an ISO 27001 certified company, you choose a company that :
 Guarantees the security of the customer’s information and data
 Controls it’s suppliers that impact the security of information
 Demonstrates its continuous improvement approach
 Ensures its performance with quantified indicators
 Complies with the information security regulations
 Respects an internationally recognized standard
The ISO 27001 certifies the establishment’s information security management system. This certification
is an international reference, recognized for its high degree of requirements.
NetExplorer is certified ISO 27001 (2013 version) for all of its activities by the international certification
organism BSI.
NetExplorer’s main concern is the protection of its customers’ data and so ensures a high level of
vigilance in terms of confidentiality, availability, integrity and traceability.
NetExplorer, at the service of your data
PCI DSS CERTIFICATION
PCI DSS Certification
 The Payment Data Industry Data Security Standard (PCI DSS) is a data security standard initially
implemented for industries handling banking information to protect data and prevent information
leakage. See the reference website for more details.
The NetExplorer PCI DSS package
 We offer (custom service) a NetExplorer platform that is PCI DSS level 3 compliant.
 The perfect balance between cost and security, our PCI DSS Level 3 package includes:
- A 100% dedicated PCI DSS server (dedicated resources)
- Enhanced outsourcing
- Encryption of stored data and backups
- Nessus security audits and intrusion tests
- A final audit report issued to the customer
N.B. infrastructure certification is carried out by Nessus.
PCI DSS standard applied to your data
 The PCI DSS standard provides a very high level of security and is internationally recognised. That is why
we've chosen this standard to meet your security and privacy needs.
 The PCI DSS certification applied to your NetExplorer platform allows you to:
- Have a very high level of security inherited from best practices applied in the banking field
- Benefit from concrete measures to protect your data
- Attest to the security of data storage with your partners and customers thanks to an internationally
recognised standard
Recognised certification for a high level of security
CONTACT US
A professional team, always at your side
.fr
contact@netexplorer.fr
www.netexplorer.fr/en
TOULOUSE
11 boulevard Déodat de Séverac
31770 Colomiers
PARIS
24 Boulevard des frères Voisin
92130 Issy-les-Moulineaux

Mais conteúdo relacionado

Mais procurados

DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting Shah Sheikh
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Sabreen Irfana
 
IT security for busines
IT security for businesIT security for busines
IT security for businesAdi Saputra
 
SafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSectricity
 
Data Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallData Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallManish Kumar
 
Storage on cloud using dynamic encryption
Storage on cloud using dynamic encryptionStorage on cloud using dynamic encryption
Storage on cloud using dynamic encryptionMphasis
 
Talos threat-intelligence
Talos threat-intelligenceTalos threat-intelligence
Talos threat-intelligencexband
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System AdminMD SAHABUDDIN
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxANJUMOHANANU
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfANJUMOHANANU
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfANJUMOHANANU
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security CertificationVskills
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture Yovan Chandel
 

Mais procurados (20)

DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
Ch03 Protecting Systems
Ch03 Protecting SystemsCh03 Protecting Systems
Ch03 Protecting Systems
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
 
IT security for busines
IT security for businesIT security for busines
IT security for busines
 
SafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto Management
 
Network Security Tools
Network Security ToolsNetwork Security Tools
Network Security Tools
 
Data Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallData Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed Firewall
 
Storage on cloud using dynamic encryption
Storage on cloud using dynamic encryptionStorage on cloud using dynamic encryption
Storage on cloud using dynamic encryption
 
Talos threat-intelligence
Talos threat-intelligenceTalos threat-intelligence
Talos threat-intelligence
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdf
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security Certification
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 

Semelhante a NetExplorer security leaflet

Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMJournal For Research
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft CloudEuropean Collaboration Summit
 
Datasheet: Security
Datasheet: SecurityDatasheet: Security
Datasheet: SecurityVoIPstudio
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESwebhostingguy
 
Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaperrun_frictionless
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityBrian Kesecker
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkErni Susanti
 
Mailjet Security Presentation 2017
Mailjet Security Presentation 2017Mailjet Security Presentation 2017
Mailjet Security Presentation 2017Mailjet
 
CLOUD SECURITY.pptx
CLOUD SECURITY.pptxCLOUD SECURITY.pptx
CLOUD SECURITY.pptxMrPrathapG
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3CCG
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 

Semelhante a NetExplorer security leaflet (20)

Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
Datasheet: Security
Datasheet: SecurityDatasheet: Security
Datasheet: Security
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICES
 
12
1212
12
 
12
1212
12
 
Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaper
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
 
Zyncro security
Zyncro securityZyncro security
Zyncro security
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
 
Mailjet Security Presentation 2017
Mailjet Security Presentation 2017Mailjet Security Presentation 2017
Mailjet Security Presentation 2017
 
CLOUD SECURITY.pptx
CLOUD SECURITY.pptxCLOUD SECURITY.pptx
CLOUD SECURITY.pptx
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
Circuit security
Circuit securityCircuit security
Circuit security
 
Network security
Network securityNetwork security
Network security
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 

Mais de NetExplorer

Présentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgPrésentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgNetExplorer
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerNetExplorer
 
Plaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgPlaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgNetExplorer
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer NetExplorer
 
Présentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgPrésentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgNetExplorer
 
Plaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgPlaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgNetExplorer
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerNetExplorer
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer NetExplorer
 
Manuel administrateurs NetExplorer
Manuel administrateurs NetExplorerManuel administrateurs NetExplorer
Manuel administrateurs NetExplorerNetExplorer
 
Guide de prise en main NetExplorer
Guide de prise en main NetExplorerGuide de prise en main NetExplorer
Guide de prise en main NetExplorerNetExplorer
 
Présentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgPrésentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgNetExplorer
 
Plaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgPlaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgNetExplorer
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer NetExplorer
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerNetExplorer
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerNetExplorer
 
Plaquette de présentation de la sécurité de la solution NetExplorer
Plaquette de présentation de la sécurité de la solution NetExplorerPlaquette de présentation de la sécurité de la solution NetExplorer
Plaquette de présentation de la sécurité de la solution NetExplorerNetExplorer
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer NetExplorer
 
Manuel administrateurs NetExplorer
Manuel administrateurs NetExplorerManuel administrateurs NetExplorer
Manuel administrateurs NetExplorerNetExplorer
 
Guide de prise en main
Guide de prise en main Guide de prise en main
Guide de prise en main NetExplorer
 
Plaquette NetExplorer for Outlook
Plaquette NetExplorer for OutlookPlaquette NetExplorer for Outlook
Plaquette NetExplorer for OutlookNetExplorer
 

Mais de NetExplorer (20)

Présentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgPrésentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - Luxembourg
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorer
 
Plaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgPlaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - Luxembourg
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer
 
Présentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgPrésentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - Luxembourg
 
Plaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgPlaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - Luxembourg
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorer
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer
 
Manuel administrateurs NetExplorer
Manuel administrateurs NetExplorerManuel administrateurs NetExplorer
Manuel administrateurs NetExplorer
 
Guide de prise en main NetExplorer
Guide de prise en main NetExplorerGuide de prise en main NetExplorer
Guide de prise en main NetExplorer
 
Présentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgPrésentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - Luxembourg
 
Plaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgPlaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - Luxembourg
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorer
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorer
 
Plaquette de présentation de la sécurité de la solution NetExplorer
Plaquette de présentation de la sécurité de la solution NetExplorerPlaquette de présentation de la sécurité de la solution NetExplorer
Plaquette de présentation de la sécurité de la solution NetExplorer
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer
 
Manuel administrateurs NetExplorer
Manuel administrateurs NetExplorerManuel administrateurs NetExplorer
Manuel administrateurs NetExplorer
 
Guide de prise en main
Guide de prise en main Guide de prise en main
Guide de prise en main
 
Plaquette NetExplorer for Outlook
Plaquette NetExplorer for OutlookPlaquette NetExplorer for Outlook
Plaquette NetExplorer for Outlook
 

Último

How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptrcbcrtm
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 

Último (20)

How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 

NetExplorer security leaflet

  • 1. THE FRENCH SPECIALIST in file sharing and online collaboration Security leaflet
  • 2. APPLICATION SECURITY Your 100% secure NetExplorer platform
  • 3. To secure the authentication process, you can require users to enter a code that is unique to them, in addition to their password (OTP, SMS or Yubikey token). Authentication is then qualified as 'strong' because it requires the concatenation of two authentication factors. Authentication by username and password NetExplorer users log in using the assigned username and password chosen. Passwords are never stored unencrypted; they are "hashed and salted" to protect their confidentiality. Strong authentication 1 4 1 4 1 4 Detection of intrusion attempts NetExplorer includes an intrusion detection system and can identify too many login attempts on a user account or from an IP address. When an intrusion attempt is detected, the attacker's login and IP address are banned. The number of pre-ban attempts and the ban time are configurable by the administrator. Anti-theft protection of sessions In order to avoid session hijacking and identity theft through Cross-Site Request Forgery (CSRF) exploits, the NetExplorer platform doesn't send any session cookies to the connected customer, as is the case with standard applications. NetExplorer uses a single token that is sent unidirectionally and not automatically.Access strategy NetExplorer features access policies by user group or account. It is therefore possible to block certain methods of access, to limit login locations (IP address), and to determine the time slots and days of connection.
  • 4.  NetExplorer has a virus scanner and a ransomware detection system.  Each file deposited on the platform is analysed, regardless of the access method. Items added by outside contributors via deposit links are also inspected. The anti-virus used is ClamAV. If the file is corrupted by a virus, it will be rejected by the platform. Similarly, if the ransomware detection system detects an infection, the user's account is blocked to prevent the spread of ransomware.  All data exchanged with NetExplorer is encrypted using SSL and a 2048-bit key.  All NetExplorer access methods use HTTPS on port 443, providing maximum security.  The SSL certificate implementation method applied by NetExplorer provides strong security guarantees. It has been given grade A+ which is the maximum grade. This assessment is made by Qualys SSL. Antiviral and anti-malware protection Encryption Password security  The password security policy is based on the combination of three parameters: - Minimum password length, in number of characters - Rejection of passwords used too often (from the list of the 10,000 most frequently used passwords, and therefore tested first in the event of attack) - Password complexity index Password Complexity for the user Security level NetExplorer complexity index 1gZ6f4HsG Impossible to remember Medium (only 39 days needed to decode it) 25 We are NetExplorer Very simple Very high (1042 years needed to decode it) 35
  • 5. Traceability  NetExplorer ensures full traceability of all actions performed by users: login, adding a file, modifying a folder, deleting a document, etc.  All the actions are grouped together in event logs, allowing a filter and an accurate search of the various operations. Search by: - Keyword - User concerned - IP address of the user - Date of the event (beginning and end) - Event status: success or error - Object type: user, folder, file, annotation, etc. - Type of action: login, addition, modification, deletion, download, etc.  This traceability makes it possible to check and control the actions carried out on the platform, and to provide evidence in case of dispute.  As part of the PCI DSS certification, the NetExplorer application has successfully passed the 54,000 intrusion tests performed by the Nessus app. These tests verify the absence of application security vulnerabilities, such as SQL injections, XSS vulnerabilities, etc.  For more details: http://www.tenable.com/solutions/pci-dss.  Before every release or upgrade, NetExplorer undergoes more than 5,000 unit tests to check for bugs and security breaches. Unit tests External security audits
  • 7. Data centres  NetExplorer servers are located in France and more specifically in Paris. All the data stored is therefore governed by French law and is not subject to the American Patriot Act.  Our infrastructure operates two Data Centres classified Tier 3+ and Tier 4: Zayo and Equinix (ISO 9001 and ISO 27001 certified). Tier 4 (the highest classification) provides an availability rate of over 99.995%. Private cloud  All NetExplorer platforms are architected in a private cloud to guarantee an excellent level of confidentiality. The stored data is completely partitioned in independent areas between customers. A NetExplorer instance includes a customer-specific database and a dedicated storage system. • The database contains all the platform information (user accounts, groups, etc.), the stored content tree menu, and the metadata. It ensures consistency of information and controls security for data access. • The NetExplorer storage system only backs up the file's binary data in an arbitrary format that is completely independent from the actual document tree. In addition, the document name and its extension are obfuscated. CLIENT A INSTANCE CLIENT B INSTANCE Dedicated database INTERNET PROXIES SERVERS (Applications, Web, Database, Mini, Indexing, etc.) Dedicated storage directories Dedicated database Dedicated storage directories NETEXPLORER PRIVATE CLOUD
  • 8. Availability and integrity of data  Data availability: to ensure a very high level of availability and not be vulnerable to hardware failures, the storage system provides local and remote information redundancy.  Data integrity: the NetExplorer storage system calculates integrity every time a file is deposited. During file transfers, a second integrity check is performed to ensure that the stored data is identical to the initial data, and that it has not been altered during the transport of the information. Data replication policy (backup) Replication of files in real time At NetExplorer, data is replicated in real time across three different storage clusters. The first two are located in the main data centre, and the final server is in a second data centre, located 30 km away. As such, in the event of a major incident in one data centre, the data is always stored securely in the second. Data retention All deleted files are kept for 30 days in the backup logs. It is possible to restore a file or the entire platform from up to 30 days back, even if the document was inadvertently deleted. Main datacentre Emergency datacentre
  • 9. ISO 27001 CERTIFICATION A certification that guarantees the security of your data By opting for an ISO 27001 certified company, you choose a company that :  Guarantees the security of the customer’s information and data  Controls it’s suppliers that impact the security of information  Demonstrates its continuous improvement approach  Ensures its performance with quantified indicators  Complies with the information security regulations  Respects an internationally recognized standard The ISO 27001 certifies the establishment’s information security management system. This certification is an international reference, recognized for its high degree of requirements. NetExplorer is certified ISO 27001 (2013 version) for all of its activities by the international certification organism BSI. NetExplorer’s main concern is the protection of its customers’ data and so ensures a high level of vigilance in terms of confidentiality, availability, integrity and traceability. NetExplorer, at the service of your data
  • 10. PCI DSS CERTIFICATION PCI DSS Certification  The Payment Data Industry Data Security Standard (PCI DSS) is a data security standard initially implemented for industries handling banking information to protect data and prevent information leakage. See the reference website for more details. The NetExplorer PCI DSS package  We offer (custom service) a NetExplorer platform that is PCI DSS level 3 compliant.  The perfect balance between cost and security, our PCI DSS Level 3 package includes: - A 100% dedicated PCI DSS server (dedicated resources) - Enhanced outsourcing - Encryption of stored data and backups - Nessus security audits and intrusion tests - A final audit report issued to the customer N.B. infrastructure certification is carried out by Nessus. PCI DSS standard applied to your data  The PCI DSS standard provides a very high level of security and is internationally recognised. That is why we've chosen this standard to meet your security and privacy needs.  The PCI DSS certification applied to your NetExplorer platform allows you to: - Have a very high level of security inherited from best practices applied in the banking field - Benefit from concrete measures to protect your data - Attest to the security of data storage with your partners and customers thanks to an internationally recognised standard Recognised certification for a high level of security
  • 11. CONTACT US A professional team, always at your side .fr contact@netexplorer.fr www.netexplorer.fr/en TOULOUSE 11 boulevard Déodat de Séverac 31770 Colomiers PARIS 24 Boulevard des frères Voisin 92130 Issy-les-Moulineaux