Managing information system security is a priority for every organization. In fact, the level of security provided by software vendors has become a differentiating factor for IT purchase decisions. Dell strives to provide its customers with their desired level of security, whether it relates to privacy, authenticity and integrity of data, availability, or protection against malicious users and attacks.
This document describes the security features of Active Roles 6.8. It reviews access control, protection of customer data, secure network communication, and more. An appendix details how Active Roles' security features meet the NIST’s recommended federal information security standards as detailed in the Federal Information Security Management Act (FISMA).