SECURITYAND HOSTINGMortgage ComputerOgden, Utah
Attack Prevention ServicesAttack Prevention Services analyze attack readiness and provide recommendations for remediation.Prevention services are avai
Ozone is aggressively priced at $20 per VLAN (one template is allowed per VLAN). An additionalfee is charged for moving servers between VLANS. Custome
Operating System HardeningOS Hardening, a process of securing, a server can serve to mitigate the risk of being hacked or ofsuffering a denial of serv
Detection and Incident Response ServicesDetection and Response Services recognize and stop attempted intrusions, prevent further intrusionsfrom occurr
The Planet monitors all traffic entering the network, except MatriXtreme, for possible networkfloods or Distributed Denial of Service (DDoS) with Arbo
The Cyberguard SG575 Security Appliance enables administrators to deploy a powerful, fullyintegrated firewall, VPN and Intrusion Detection System (IDS
The PIX 515E “Unrestricted” (PIX 515E-UR), unrestricted software license model, extends thecapabilities of the family with support for stateful failov
The Cisco PIX 535 Unrestricted (PIX 535-UR), unrestricted software license model, extends thecapabilities of the security appliance with support for s
Cisco Guard DDoS MitigationThe Planet handles a DDoS attack with Cisco® Guard XT 5650 DDoS Mitigation Appliance. Whena flood attack is detected by Arb
SecurePack Security ReportingThe Planet’s all new security services reporting is available through SecurePack. Customers receiveaccess to Arbor, Tippi
PrefaceThe Hosted Server uses industry standard 128-bit data encryption with SSL public key/private key(PKI) certificates. All information relayed bet
Threat EliminationWhen new vulnerabilities are detected against any managed system, The Planet has a variety ofresponses available:C Managed Operating
Application Specific HardeningThe Planet’s Security Engineering Team, administrators and developers are experienced in securinga multitude of applicat
21MC Software Security and Hosting
Required Internet ExplorerBrowser Settings for MC SoftwareOpen your browser and click on Tools in either of the two locations indicated below.Select I
Browsing HistoryClick Settings under Browsing history.24MC Software Security and Hosting
C Under Check for newer versions of stored pages, indicate Every time I visit the webpage. C MC also recommends setting the Disk space to use to 1024.
SecurityOn the Internet Options screen, select the Security tab.Click on Trusted Sites and then click Sites.26MC Software Security and Hosting
C Remove the checkmark from Required server verification.C Use the Add this website to the zone option to add individual Web sites. Enter the Webaddre
Security LevelOn the same Security screen, make sure the Security level for this zone is set to Low.Click Apply.28MC Software Security and Hosting
AdvancedOn the Internet Options screen, select the Advanced tab.Scroll down in the settings and uncheck the box for Reuse windows for launching shortc
C Continue scrolling down and check the box for Empty Temporary Internet Files folderwhen browser is closed.C Click Apply to save the changes and then
MCSoftware
MC Software Company LoginA different saying displays each time MC Software is selected.Enter the Company ID and Password unique to your organization a
MC Software Web LoginUser NameEnter your assigned user name. The program will only allow one logon per user name andpassword, and requires the passwor
Update PasswordCurrent PasswordEnter your current password. The program requires the current password to be sure thecorrect operator is requesting th
MC Software Helpful HintsAmpersand and Quotes The ampersand (&) and quotes (“ ”) are used in programminglanguage and are not to be used in the i
The Print button within the MC Software displays reports, forms,etc., in PDF (portable document format). The toolbar within the PDFdisplay screen cont
MC Software SecurityLogin NamesThe MC Software Maintenance program is flexible and powerful. Login Names and User Groupscontrol who is allowed to acce
Security and HostingContents - Updated October 18, 2013System Requirements ... 4The Data Center ..
NameFirst and last name of the operator.E-mailE-mail address of the operator. To send an e-mail, click on the e-mail address and the new e-mailmessage
Allowable IP and Subnet AddressesEach company hosted by Mortgage Computer will indicate an ACL (access control list), limitingthe IP addresses by user
User Security AccessTo set up an individual operator's access within MC Software, click on Edit on the UserMaintenance screen after creating a us
Interviewer's License NumberEnter the operator's license number. The license number prints on Section X. Information forGovernment Monitorin
DU/LP Acct OverrideIf this option is enabled, the following screen displays to allow the input of the operator's username and password to overrid
Menu ItemsDetermine the items that will display on the main MC Software menu for each operator. If theitem is not checked, it will not display and, th
Although all MC Software options may display on themain menu, an operator's access to the fields within thoseoptions can be protected. Click on P
User GroupsUser groups can be created for collectors, processors, loan officers, etc., to streamline the setupprocess and assure each operator's
As with Login Names, the access within each of the main menu options can also becontrolled. Click on the main menu option to display any additional pr
System RequirementsSupported SystemsWindows 7 or Windows 8 with all current service packs and critical updates applied. MC suggestsat least 4 gig mini
Data Center, Dallas, TexasThe Data Center5MC Software Security and Hosting
The FacilitiesThe data center that houses the servers is located in Dallas, Texas. The facility offers completeredundancy in power, HVAC, fire suppres
Security monitoring roomInside the computer roomPower equipment roomSecurity monitored 24x7Diesel generators outside data centerOne of the two diesel
Securing The PlanetThe Internet has experienced a surge in malicious traffic including denial of service attacks, wormsand viruses. Worldwide, in the
Kommentare zu diesen Handbüchern