SlideShare a Scribd company logo
1 of 11
Download to read offline
THE FRENCH SPECIALIST
in file sharing and online collaboration
Security leaflet
APPLICATION SECURITY
Your 100% secure NetExplorer platform
To secure the authentication process,
you can require users to enter a code
that is unique to them, in addition to
their password (OTP, SMS or Yubikey
token). Authentication is then
qualified as 'strong' because it
requires the concatenation of two
authentication factors.
Authentication by
username and password
NetExplorer users log in using the
assigned username and password
chosen. Passwords are never stored
unencrypted; they are "hashed and
salted" to protect their
confidentiality.
Strong authentication
1
4
1
4
1
4
Detection of intrusion
attempts
NetExplorer includes an intrusion
detection system and can identify too
many login attempts on a user
account or from an IP address. When
an intrusion attempt is detected, the
attacker's login and IP address are
banned. The number of pre-ban
attempts and the ban time are
configurable by the administrator.
Anti-theft protection
of sessions
In order to avoid session hijacking and
identity theft through Cross-Site
Request Forgery (CSRF) exploits, the
NetExplorer platform doesn't send
any session cookies to the connected
customer, as is the case with standard
applications. NetExplorer uses a single
token that is sent unidirectionally and
not automatically.Access strategy
NetExplorer features access policies
by user group or account. It is
therefore possible to block certain
methods of access, to limit login
locations (IP address), and to
determine the time slots and days of
connection.
 NetExplorer has a virus scanner and a ransomware detection system.
 Each file deposited on the platform is analysed, regardless of the access method. Items added by
outside contributors via deposit links are also inspected. The anti-virus used is ClamAV. If the file is
corrupted by a virus, it will be rejected by the platform. Similarly, if the ransomware detection system
detects an infection, the user's account is blocked to prevent the spread of ransomware.
 All data exchanged with NetExplorer is encrypted using SSL and a 2048-bit
key.
 All NetExplorer access methods use HTTPS on port 443, providing maximum
security.
 The SSL certificate implementation method applied by NetExplorer provides
strong security guarantees. It has been given grade A+ which is the
maximum grade. This assessment is made by Qualys SSL.
Antiviral and anti-malware protection
Encryption
Password security
 The password security policy is based on the combination of three parameters:
- Minimum password length, in number of characters
- Rejection of passwords used too often (from the list of the 10,000 most frequently used passwords,
and therefore tested first in the event of attack)
- Password complexity index
Password Complexity for the user Security level NetExplorer complexity
index
1gZ6f4HsG Impossible to remember Medium (only 39 days needed to decode it) 25
We are NetExplorer Very simple Very high (1042 years needed to decode it) 35
Traceability
 NetExplorer ensures full traceability of all actions performed by users: login, adding a file, modifying a folder,
deleting a document, etc.
 All the actions are grouped together in event logs, allowing a filter and an accurate search of the various
operations. Search by:
- Keyword
- User concerned
- IP address of the user
- Date of the event (beginning and end)
- Event status: success or error
- Object type: user, folder, file, annotation, etc.
- Type of action: login, addition, modification, deletion, download, etc.
 This traceability makes it possible to check and control the actions carried out on the platform, and to provide
evidence in case of dispute.
 As part of the PCI DSS certification, the NetExplorer application has successfully passed the 54,000 intrusion
tests performed by the Nessus app. These tests verify the absence of application security vulnerabilities,
such as SQL injections, XSS vulnerabilities, etc.
 For more details: http://www.tenable.com/solutions/pci-dss.
 Before every release or upgrade, NetExplorer undergoes more than 5,000 unit tests to check for bugs and
security breaches.
Unit tests
External security audits
INFRASTRUCTURE SECURITY
Highly secure French storage
Data centres
 NetExplorer servers are located in France and
more specifically in Paris. All the data stored is
therefore governed by French law and is not
subject to the American Patriot Act.
 Our infrastructure operates two Data Centres
classified Tier 3+ and Tier 4: Zayo and Equinix
(ISO 9001 and ISO 27001 certified). Tier 4 (the
highest classification) provides an availability
rate of over 99.995%.
Private cloud
 All NetExplorer platforms are architected in
a private cloud to guarantee an excellent
level of confidentiality. The stored data is
completely partitioned in independent areas
between customers. A NetExplorer instance
includes a customer-specific database and a
dedicated storage system.
• The database contains all the platform information
(user accounts, groups, etc.), the stored content
tree menu, and the metadata. It ensures
consistency of information and controls security for
data access.
• The NetExplorer storage system only backs up the
file's binary data in an arbitrary format that is
completely independent from the actual document
tree. In addition, the document name and its
extension are obfuscated.
CLIENT A INSTANCE
CLIENT B INSTANCE
Dedicated
database
INTERNET PROXIES SERVERS
(Applications, Web,
Database, Mini, Indexing,
etc.)
Dedicated storage
directories
Dedicated
database
Dedicated storage
directories
NETEXPLORER
PRIVATE
CLOUD
Availability and integrity of data
 Data availability: to ensure a very high level of availability and not be vulnerable to hardware failures, the
storage system provides local and remote information redundancy.
 Data integrity: the NetExplorer storage system calculates integrity every time a file is deposited. During file
transfers, a second integrity check is performed to ensure that the stored data is identical to the initial data,
and that it has not been altered during the transport of the information.
Data replication policy (backup)
Replication of files in real time
At NetExplorer, data is replicated in real time
across three different storage clusters. The first
two are located in the main data centre, and
the final server is in a second data centre,
located 30 km away. As such, in the event of a
major incident in one data centre, the data is
always stored securely in the second.
Data retention
All deleted files are kept for 30 days in the
backup logs. It is possible to restore a file or the
entire platform from up to 30 days back, even if
the document was inadvertently deleted.
Main
datacentre
Emergency
datacentre
ISO 27001 CERTIFICATION
A certification that guarantees the security of your data
By opting for an ISO 27001 certified company, you choose a company that :
 Guarantees the security of the customer’s information and data
 Controls it’s suppliers that impact the security of information
 Demonstrates its continuous improvement approach
 Ensures its performance with quantified indicators
 Complies with the information security regulations
 Respects an internationally recognized standard
The ISO 27001 certifies the establishment’s information security management system. This certification
is an international reference, recognized for its high degree of requirements.
NetExplorer is certified ISO 27001 (2013 version) for all of its activities by the international certification
organism BSI.
NetExplorer’s main concern is the protection of its customers’ data and so ensures a high level of
vigilance in terms of confidentiality, availability, integrity and traceability.
NetExplorer, at the service of your data
PCI DSS CERTIFICATION
PCI DSS Certification
 The Payment Data Industry Data Security Standard (PCI DSS) is a data security standard initially
implemented for industries handling banking information to protect data and prevent information
leakage. See the reference website for more details.
The NetExplorer PCI DSS package
 We offer (custom service) a NetExplorer platform that is PCI DSS level 3 compliant.
 The perfect balance between cost and security, our PCI DSS Level 3 package includes:
- A 100% dedicated PCI DSS server (dedicated resources)
- Enhanced outsourcing
- Encryption of stored data and backups
- Nessus security audits and intrusion tests
- A final audit report issued to the customer
N.B. infrastructure certification is carried out by Nessus.
PCI DSS standard applied to your data
 The PCI DSS standard provides a very high level of security and is internationally recognised. That is why
we've chosen this standard to meet your security and privacy needs.
 The PCI DSS certification applied to your NetExplorer platform allows you to:
- Have a very high level of security inherited from best practices applied in the banking field
- Benefit from concrete measures to protect your data
- Attest to the security of data storage with your partners and customers thanks to an internationally
recognised standard
Recognised certification for a high level of security
CONTACT US
A professional team, always at your side
.fr
contact@netexplorer.fr
www.netexplorer.fr/en
TOULOUSE
11 boulevard Déodat de Séverac
31770 Colomiers
PARIS
24 Boulevard des frères Voisin
92130 Issy-les-Moulineaux

More Related Content

What's hot

DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting Shah Sheikh
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsAaron ND Sawmadal
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Sabreen Irfana
 
IT security for busines
IT security for businesIT security for busines
IT security for businesAdi Saputra
 
SafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSectricity
 
Data Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallData Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallManish Kumar
 
Storage on cloud using dynamic encryption
Storage on cloud using dynamic encryptionStorage on cloud using dynamic encryption
Storage on cloud using dynamic encryptionMphasis
 
Talos threat-intelligence
Talos threat-intelligenceTalos threat-intelligence
Talos threat-intelligencexband
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System AdminMD SAHABUDDIN
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applicationswebhostingguy
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxANJUMOHANANU
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfANJUMOHANANU
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfANJUMOHANANU
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security CertificationVskills
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture Yovan Chandel
 

What's hot (20)

DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting DTS Solution - Wireless Security Protocols / PenTesting
DTS Solution - Wireless Security Protocols / PenTesting
 
Ch03 Protecting Systems
Ch03 Protecting SystemsCh03 Protecting Systems
Ch03 Protecting Systems
 
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft WindowsInvestigation of CryptoLocker Ransomware Trojans - Microsoft Windows
Investigation of CryptoLocker Ransomware Trojans - Microsoft Windows
 
Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt Data security in local network using distributed firewall ppt
Data security in local network using distributed firewall ppt
 
Approach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed FirewallsApproach of Data Security in Local Network Using Distributed Firewalls
Approach of Data Security in Local Network Using Distributed Firewalls
 
IT security for busines
IT security for businesIT security for busines
IT security for busines
 
SafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto ManagementSafeNet Enterprise Key and Crypto Management
SafeNet Enterprise Key and Crypto Management
 
Network Security Tools
Network Security ToolsNetwork Security Tools
Network Security Tools
 
Data Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed FirewallData Security in Local Area Network Using Distributed Firewall
Data Security in Local Area Network Using Distributed Firewall
 
Storage on cloud using dynamic encryption
Storage on cloud using dynamic encryptionStorage on cloud using dynamic encryption
Storage on cloud using dynamic encryption
 
Talos threat-intelligence
Talos threat-intelligenceTalos threat-intelligence
Talos threat-intelligence
 
Network security and System Admin
Network security and System AdminNetwork security and System Admin
Network security and System Admin
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
 
mcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdfmcq edu03 Anju 23.pdf
mcq edu03 Anju 23.pdf
 
Edu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdfEdu 03Anju 23 assignment.pdf
Edu 03Anju 23 assignment.pdf
 
Network Security Certification
Network Security CertificationNetwork Security Certification
Network Security Certification
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Firewall Architecture
Firewall Architecture Firewall Architecture
Firewall Architecture
 

Similar to NetExplorer security leaflet

Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersRishabh Gupta
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMJournal For Research
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft CloudEuropean Collaboration Summit
 
Datasheet: Security
Datasheet: SecurityDatasheet: Security
Datasheet: SecurityVoIPstudio
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESwebhostingguy
 
Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaperrun_frictionless
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityBrian Kesecker
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxMohammad512578
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkErni Susanti
 
Mailjet Security Presentation 2017
Mailjet Security Presentation 2017Mailjet Security Presentation 2017
Mailjet Security Presentation 2017Mailjet
 
CLOUD SECURITY.pptx
CLOUD SECURITY.pptxCLOUD SECURITY.pptx
CLOUD SECURITY.pptxMrPrathapG
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3CCG
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storageZTech Proje
 

Similar to NetExplorer security leaflet (20)

Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
Datasheet: Security
Datasheet: SecurityDatasheet: Security
Datasheet: Security
 
SKIRE HOSTING SERVICES
SKIRE HOSTING SERVICESSKIRE HOSTING SERVICES
SKIRE HOSTING SERVICES
 
12
1212
12
 
12
1212
12
 
Information Security Whitepaper
Information Security WhitepaperInformation Security Whitepaper
Information Security Whitepaper
 
en_secur_br_secure_access_mobility
en_secur_br_secure_access_mobilityen_secur_br_secure_access_mobility
en_secur_br_secure_access_mobility
 
Zyncro security
Zyncro securityZyncro security
Zyncro security
 
CSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptxCSE_Instructor_Materials_Chapter7.pptx
CSE_Instructor_Materials_Chapter7.pptx
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
 
Mailjet Security Presentation 2017
Mailjet Security Presentation 2017Mailjet Security Presentation 2017
Mailjet Security Presentation 2017
 
CLOUD SECURITY.pptx
CLOUD SECURITY.pptxCLOUD SECURITY.pptx
CLOUD SECURITY.pptx
 
Azure Fundamentals Part 3
Azure Fundamentals Part 3Azure Fundamentals Part 3
Azure Fundamentals Part 3
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
Circuit security
Circuit securityCircuit security
Circuit security
 
Network security
Network securityNetwork security
Network security
 
Psdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storagePsdot 12 a secure erasure code-based cloud storage
Psdot 12 a secure erasure code-based cloud storage
 

More from NetExplorer

Présentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgPrésentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgNetExplorer
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerNetExplorer
 
Plaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgPlaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgNetExplorer
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer NetExplorer
 
Présentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgPrésentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgNetExplorer
 
Plaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgPlaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgNetExplorer
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerNetExplorer
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer NetExplorer
 
Manuel administrateurs NetExplorer
Manuel administrateurs NetExplorerManuel administrateurs NetExplorer
Manuel administrateurs NetExplorerNetExplorer
 
Guide de prise en main NetExplorer
Guide de prise en main NetExplorerGuide de prise en main NetExplorer
Guide de prise en main NetExplorerNetExplorer
 
Présentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgPrésentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgNetExplorer
 
Plaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgPlaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgNetExplorer
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer NetExplorer
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerNetExplorer
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerNetExplorer
 
Plaquette de présentation de la sécurité de la solution NetExplorer
Plaquette de présentation de la sécurité de la solution NetExplorerPlaquette de présentation de la sécurité de la solution NetExplorer
Plaquette de présentation de la sécurité de la solution NetExplorerNetExplorer
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer NetExplorer
 
Manuel administrateurs NetExplorer
Manuel administrateurs NetExplorerManuel administrateurs NetExplorer
Manuel administrateurs NetExplorerNetExplorer
 
Guide de prise en main
Guide de prise en main Guide de prise en main
Guide de prise en main NetExplorer
 
Plaquette NetExplorer for Outlook
Plaquette NetExplorer for OutlookPlaquette NetExplorer for Outlook
Plaquette NetExplorer for OutlookNetExplorer
 

More from NetExplorer (20)

Présentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgPrésentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - Luxembourg
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorer
 
Plaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgPlaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - Luxembourg
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer
 
Présentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgPrésentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - Luxembourg
 
Plaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgPlaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - Luxembourg
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorer
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer
 
Manuel administrateurs NetExplorer
Manuel administrateurs NetExplorerManuel administrateurs NetExplorer
Manuel administrateurs NetExplorer
 
Guide de prise en main NetExplorer
Guide de prise en main NetExplorerGuide de prise en main NetExplorer
Guide de prise en main NetExplorer
 
Présentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - LuxembourgPrésentation fonctionnelle de la solution NetExplorer - Luxembourg
Présentation fonctionnelle de la solution NetExplorer - Luxembourg
 
Plaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - LuxembourgPlaquette de présentation NetExplorer - Luxembourg
Plaquette de présentation NetExplorer - Luxembourg
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorer
 
Présentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorerPrésentation fonctionnelle de la solution NetExplorer
Présentation fonctionnelle de la solution NetExplorer
 
Plaquette de présentation de la sécurité de la solution NetExplorer
Plaquette de présentation de la sécurité de la solution NetExplorerPlaquette de présentation de la sécurité de la solution NetExplorer
Plaquette de présentation de la sécurité de la solution NetExplorer
 
Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer Plaquette de présentation NetExplorer
Plaquette de présentation NetExplorer
 
Manuel administrateurs NetExplorer
Manuel administrateurs NetExplorerManuel administrateurs NetExplorer
Manuel administrateurs NetExplorer
 
Guide de prise en main
Guide de prise en main Guide de prise en main
Guide de prise en main
 
Plaquette NetExplorer for Outlook
Plaquette NetExplorer for OutlookPlaquette NetExplorer for Outlook
Plaquette NetExplorer for Outlook
 

Recently uploaded

WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburgmasabamasaba
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in sowetomasabamasaba
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...masabamasaba
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxAnnaArtyushina1
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnAmarnathKambale
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park masabamasaba
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2
 

Recently uploaded (20)

WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
Abortion Pill Prices Boksburg [(+27832195400*)] 🏥 Women's Abortion Clinic in ...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
WSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security ProgramWSO2CON 2024 - How to Run a Security Program
WSO2CON 2024 - How to Run a Security Program
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 

NetExplorer security leaflet

  • 1. THE FRENCH SPECIALIST in file sharing and online collaboration Security leaflet
  • 2. APPLICATION SECURITY Your 100% secure NetExplorer platform
  • 3. To secure the authentication process, you can require users to enter a code that is unique to them, in addition to their password (OTP, SMS or Yubikey token). Authentication is then qualified as 'strong' because it requires the concatenation of two authentication factors. Authentication by username and password NetExplorer users log in using the assigned username and password chosen. Passwords are never stored unencrypted; they are "hashed and salted" to protect their confidentiality. Strong authentication 1 4 1 4 1 4 Detection of intrusion attempts NetExplorer includes an intrusion detection system and can identify too many login attempts on a user account or from an IP address. When an intrusion attempt is detected, the attacker's login and IP address are banned. The number of pre-ban attempts and the ban time are configurable by the administrator. Anti-theft protection of sessions In order to avoid session hijacking and identity theft through Cross-Site Request Forgery (CSRF) exploits, the NetExplorer platform doesn't send any session cookies to the connected customer, as is the case with standard applications. NetExplorer uses a single token that is sent unidirectionally and not automatically.Access strategy NetExplorer features access policies by user group or account. It is therefore possible to block certain methods of access, to limit login locations (IP address), and to determine the time slots and days of connection.
  • 4.  NetExplorer has a virus scanner and a ransomware detection system.  Each file deposited on the platform is analysed, regardless of the access method. Items added by outside contributors via deposit links are also inspected. The anti-virus used is ClamAV. If the file is corrupted by a virus, it will be rejected by the platform. Similarly, if the ransomware detection system detects an infection, the user's account is blocked to prevent the spread of ransomware.  All data exchanged with NetExplorer is encrypted using SSL and a 2048-bit key.  All NetExplorer access methods use HTTPS on port 443, providing maximum security.  The SSL certificate implementation method applied by NetExplorer provides strong security guarantees. It has been given grade A+ which is the maximum grade. This assessment is made by Qualys SSL. Antiviral and anti-malware protection Encryption Password security  The password security policy is based on the combination of three parameters: - Minimum password length, in number of characters - Rejection of passwords used too often (from the list of the 10,000 most frequently used passwords, and therefore tested first in the event of attack) - Password complexity index Password Complexity for the user Security level NetExplorer complexity index 1gZ6f4HsG Impossible to remember Medium (only 39 days needed to decode it) 25 We are NetExplorer Very simple Very high (1042 years needed to decode it) 35
  • 5. Traceability  NetExplorer ensures full traceability of all actions performed by users: login, adding a file, modifying a folder, deleting a document, etc.  All the actions are grouped together in event logs, allowing a filter and an accurate search of the various operations. Search by: - Keyword - User concerned - IP address of the user - Date of the event (beginning and end) - Event status: success or error - Object type: user, folder, file, annotation, etc. - Type of action: login, addition, modification, deletion, download, etc.  This traceability makes it possible to check and control the actions carried out on the platform, and to provide evidence in case of dispute.  As part of the PCI DSS certification, the NetExplorer application has successfully passed the 54,000 intrusion tests performed by the Nessus app. These tests verify the absence of application security vulnerabilities, such as SQL injections, XSS vulnerabilities, etc.  For more details: http://www.tenable.com/solutions/pci-dss.  Before every release or upgrade, NetExplorer undergoes more than 5,000 unit tests to check for bugs and security breaches. Unit tests External security audits
  • 7. Data centres  NetExplorer servers are located in France and more specifically in Paris. All the data stored is therefore governed by French law and is not subject to the American Patriot Act.  Our infrastructure operates two Data Centres classified Tier 3+ and Tier 4: Zayo and Equinix (ISO 9001 and ISO 27001 certified). Tier 4 (the highest classification) provides an availability rate of over 99.995%. Private cloud  All NetExplorer platforms are architected in a private cloud to guarantee an excellent level of confidentiality. The stored data is completely partitioned in independent areas between customers. A NetExplorer instance includes a customer-specific database and a dedicated storage system. • The database contains all the platform information (user accounts, groups, etc.), the stored content tree menu, and the metadata. It ensures consistency of information and controls security for data access. • The NetExplorer storage system only backs up the file's binary data in an arbitrary format that is completely independent from the actual document tree. In addition, the document name and its extension are obfuscated. CLIENT A INSTANCE CLIENT B INSTANCE Dedicated database INTERNET PROXIES SERVERS (Applications, Web, Database, Mini, Indexing, etc.) Dedicated storage directories Dedicated database Dedicated storage directories NETEXPLORER PRIVATE CLOUD
  • 8. Availability and integrity of data  Data availability: to ensure a very high level of availability and not be vulnerable to hardware failures, the storage system provides local and remote information redundancy.  Data integrity: the NetExplorer storage system calculates integrity every time a file is deposited. During file transfers, a second integrity check is performed to ensure that the stored data is identical to the initial data, and that it has not been altered during the transport of the information. Data replication policy (backup) Replication of files in real time At NetExplorer, data is replicated in real time across three different storage clusters. The first two are located in the main data centre, and the final server is in a second data centre, located 30 km away. As such, in the event of a major incident in one data centre, the data is always stored securely in the second. Data retention All deleted files are kept for 30 days in the backup logs. It is possible to restore a file or the entire platform from up to 30 days back, even if the document was inadvertently deleted. Main datacentre Emergency datacentre
  • 9. ISO 27001 CERTIFICATION A certification that guarantees the security of your data By opting for an ISO 27001 certified company, you choose a company that :  Guarantees the security of the customer’s information and data  Controls it’s suppliers that impact the security of information  Demonstrates its continuous improvement approach  Ensures its performance with quantified indicators  Complies with the information security regulations  Respects an internationally recognized standard The ISO 27001 certifies the establishment’s information security management system. This certification is an international reference, recognized for its high degree of requirements. NetExplorer is certified ISO 27001 (2013 version) for all of its activities by the international certification organism BSI. NetExplorer’s main concern is the protection of its customers’ data and so ensures a high level of vigilance in terms of confidentiality, availability, integrity and traceability. NetExplorer, at the service of your data
  • 10. PCI DSS CERTIFICATION PCI DSS Certification  The Payment Data Industry Data Security Standard (PCI DSS) is a data security standard initially implemented for industries handling banking information to protect data and prevent information leakage. See the reference website for more details. The NetExplorer PCI DSS package  We offer (custom service) a NetExplorer platform that is PCI DSS level 3 compliant.  The perfect balance between cost and security, our PCI DSS Level 3 package includes: - A 100% dedicated PCI DSS server (dedicated resources) - Enhanced outsourcing - Encryption of stored data and backups - Nessus security audits and intrusion tests - A final audit report issued to the customer N.B. infrastructure certification is carried out by Nessus. PCI DSS standard applied to your data  The PCI DSS standard provides a very high level of security and is internationally recognised. That is why we've chosen this standard to meet your security and privacy needs.  The PCI DSS certification applied to your NetExplorer platform allows you to: - Have a very high level of security inherited from best practices applied in the banking field - Benefit from concrete measures to protect your data - Attest to the security of data storage with your partners and customers thanks to an internationally recognised standard Recognised certification for a high level of security
  • 11. CONTACT US A professional team, always at your side .fr contact@netexplorer.fr www.netexplorer.fr/en TOULOUSE 11 boulevard Déodat de Séverac 31770 Colomiers PARIS 24 Boulevard des frères Voisin 92130 Issy-les-Moulineaux