Our Partners close more business.

Use these powerful resources to win more business, faster, with less effort.  
Call 877-411-2220 x121 for personal support with any opportunity.

RESET SEARCH

Hosting Quote Estimator

GET a FREE Sandbox or Trial Environment NOW

How To Use This Tool:  

To find answers to common RFP and RFI questions, select a tag, or, search for terms like "security", "performance", etc.  You will find common questions and answers grouped together in one record.  Follow the tag links to refine your search.  Supporting downloads and documentation are available, below.

Please login to obtain download access to additional supporting documentation.  Registered users can also contribute to the database.  You can request access by Contacting Us.

© Omegabit LLC, 2023

Enter a Search Phrase or Select a Tag

Content with tag device access .

Device Authentication

Q:

Do you uniquely identify and authenticate devices before establishing a connection?


A:

N/A; trust relationships are typically configured at the application layer and are specific to design and implementation of the customer portal. Digital signatures are typically employed for validation.



No comments yet. Be the first.

System and Component Access

Q:

Do you track, control, authorize, and monitor information system components entering and exiting the facilities and maintain records for those items?

Do you control physical access to information system output devices (e.g. monitors, printers, audio devices, and etc.) to prevent unauthorized individuals from obtaining the output?

Are there third party service providers who have access to client related data and information systems? If Yes, provide subcontractor names and services provided.


A:

Physical items received into inventory are documented using conventional means including shipping log history and notations by Receiving. As it relates to facilities, equipment added to or removed from the racks is documented in the Omegabit Operations Wiki in a manner that is timestamped, auditable, and tracked for historical purposes.

Shared common or public resources for the exchange or reproduction of secure data are not employed or permitted by policy except where explicitly approved by the Client ; storage devices are encrypted for portalbe delivery and electronic transfer is performed via secure protocols and encrypted/keyed document storage. Printers are not employed to output secure information except under strictly controlled conditions (e.g. hard-copy archival output of sensitive information for secure storage, as an example, would occur under specifically controlled conditions; invoicing is another example of controlled output that is limtied to customers that specifically require paper processing by devices with limited access by authorized personnel); Omegabit prefers electronic, individually permissioned and audit logged access controls and methods of information exchange, for the purposes of security and whenever possible. Be advised that by default, passwords are communicated to authorized Client users via clear-channel communications to pre-authorized destinations, e.g., email or txt message, or telephone. This can happen via both automated means (e.g., Liferay can mail a password or password reset link to pre-confirmed email destinations), or, a Support representative may communmicate a password change to a verified and authorized user via email or txt communication. All of this can be disallowed and disabled at the Client's discretion.

None; all data and storage is maintained and operated exclusively by Omegabit and specially authorized and trained personnel with special awareness for Liferay operations. No proposed services, or facilities in this proposal are to be outsourced to an additional third party and will be satisfied exclusively by Liferay and Omegabit and its affiliated facilities partners where named.



No comments yet. Be the first.