Our Partners close more business.

Use these powerful resources to win more business, faster, with less effort.  
Call 877-411-2220 x121 for personal support with any opportunity.

RESET SEARCH

Hosting Quote Estimator

GET a FREE Sandbox or Trial Environment NOW

How To Use This Tool:  

To find answers to common RFP and RFI questions, select a tag, or, search for terms like "security", "performance", etc.  You will find common questions and answers grouped together in one record.  Follow the tag links to refine your search.  Supporting downloads and documentation are available, below.

Please login to obtain download access to additional supporting documentation.  Registered users can also contribute to the database.  You can request access by Contacting Us.

© Omegabit LLC, 2023

Enter a Search Phrase or Select a Tag

Content with tag ssh .

Mobile device encryption

Q:

Do you employ full-device encryption or container encryption to protect the confidentiality and integrity of the client information on mobile devices?


A:

IPSec, SSL, SSH (256-bit)



No comments yet. Be the first.

Remote Network Access

Q:

Do you permit non-VPN remote access to internal network? If yes, what remote access methods are permitted and how is it secured?

Does remote network access to privileged commands and security-relevant information for operational needs require documented rationale and system owner authorization?

Do you route all remote accesses through a limited number of managed access points?


A:

SSH is allowed by default and can be optionally disabled.

By design, secure remote access control and administration is allowed for authorized clients only. Firewall restrictions to further limit access are supported and the use of private BOVPN and SSH tunnel links is highly encouraged and exercised by Omegabit administration personnel.

Configurable per Client requirements.



No comments yet. Be the first.