Teradata Database Security Target

Total Page:16

File Type:pdf, Size:1020Kb

Teradata Database Security Target Teradata Database Version 2 Release 6.1.0 (V2R6.1.0) Security Target Version 2.0 February 2007 TRP Number: 541-0006458 NCR, Teradata and BYNET are registered trademarks of NCR Corporation. Microsoft, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. TERADATA DATABASE SECURITY TARGET TABLE OF CONTENTS 1. INTRODUCTION................................................................................................................. 1 1.1 SECURITY TARGET IDENTIFICATION AND OVERVIEW .......................................................... 1 1.2 TOE IDENTIFICATION .......................................................................................................... 1 1.3 COMMON CRITERIA CONFORMANCE.................................................................................... 2 2. TOE DESCRIPTION ........................................................................................................... 3 2.1 TOE OVERVIEW .................................................................................................................. 3 2.2 TOE ARCHITECTURE ........................................................................................................... 4 2.2.1 TOE Physical Boundaries....................................................................................... 5 2.2.2 TOE Logical Boundaries ........................................................................................ 6 2.3 TOE DOCUMENTATION........................................................................................................ 7 3. TOE SECURITY ENVIRONMENT................................................................................... 9 3.1 ASSUMPTIONS ...................................................................................................................... 9 3.2 THREATS............................................................................................................................ 10 3.3 ORGANIZATIONAL SECURITY POLICIES.............................................................................. 11 4. SECURITY OBJECTIVES ............................................................................................... 12 4.1 SECURITY OBJECTIVES FOR THE TOE ................................................................................ 12 4.2 SECURITY OBJECTIVES FOR THE ENVIRONMENT ................................................................ 13 5. SECURITY REQUIREMENTS........................................................................................ 15 5.1 TOE SECURITY FUNCTIONAL REQUIREMENTS................................................................... 15 5.1.1 Security Audit (FAU) ........................................................................................... 16 5.1.2 User Data Protection (FDP).................................................................................. 18 5.1.3 Identification and Authentication (FIA) ............................................................... 20 5.1.4 Security Management (FMT) ............................................................................... 22 5.1.5 Protection of the TSF (FPT) ................................................................................. 24 5.1.6 Resource Utilization (FRU) .................................................................................. 24 5.1.7 TOE Access (FTA) ............................................................................................... 25 5.2 IT ENVIRONMENT SECURITY FUNCTIONAL REQUIREMENTS .............................................. 25 5.2.1 Identification and Authentication (FIA) ............................................................... 25 5.2.2 Protection of the TSF (FPT) ................................................................................. 26 5.3 TOE SECURITY ASSURANCE REQUIREMENTS .................................................................... 27 5.3.1 Configuration management (ACM)...................................................................... 27 5.3.2 Delivery and operation (ADO) ............................................................................. 29 5.3.3 Development (ADV)............................................................................................. 30 5.3.4 Guidance documents (AGD)................................................................................. 34 5.3.5 Life cycle support (ALC)...................................................................................... 35 5.3.6 Tests (ATE)........................................................................................................... 37 5.3.7 Vulnerability assessment (AVA) .......................................................................... 39 6. TOE SUMMARY SPECIFICATION............................................................................... 42 6.1 TOE SECURITY FUNCTIONS ............................................................................................... 42 6.1.1 TOE Access.......................................................................................................... 42 6.1.2 Identification and Authentication ......................................................................... 42 6.1.3 User Data Protection............................................................................................. 44 i TERADATA DATABASE SECURITY TARGET 6.1.4 Security Audit....................................................................................................... 46 6.1.5 Security Management ........................................................................................... 48 6.1.6 Resource Utilization..............................................................................................50 6.1.7 Protection of the TSF............................................................................................ 51 6.2 ASSURANCE MEASURES..................................................................................................... 52 6.2.1 Configuration management (ACM)...................................................................... 52 6.2.2 Delivery and operation (ADO) ............................................................................. 54 6.2.3 Development (ADV)............................................................................................. 54 6.2.4 Guidance documents (AGD)................................................................................. 58 6.2.5 Life cycle support (ALC)...................................................................................... 60 6.2.6 Tests (ATE)........................................................................................................... 61 6.2.7 Vulnerability assessment (AVA) .......................................................................... 63 7. PROTECTION PROFILE CLAIMS................................................................................ 65 8. RATIONALE ...................................................................................................................... 66 8.1 SECURITY OBJECTIVES RATIONALE ................................................................................... 66 8.2 SECURITY REQUIREMENTS RATIONALE ............................................................................. 71 8.3 EXPLICIT REQUIREMENTS RATIONALE............................................................................... 78 8.4 TOE SUMMARY SPECIFICATION RATIONALE ..................................................................... 79 8.5 TOE ASSURANCE REQUIREMENTS RATIONALE ................................................................. 80 8.6 STRENGTH OF FUNCTION RATIONALE ................................................................................ 81 8.7 DEPENDENCIES RATIONALE............................................................................................... 81 8.8 PROTECTION PROFILE CLAIMS RATIONALE ....................................................................... 82 APPENDIX A - ACRONYMS ................................................................................................... 83 ii TERADATA DATABASE SECURITY TARGET LIST OF FIGURES Figure 2-1 TOE Physical Boundaries ............................................................................................. 6 LIST OF TABLES Table 5-1 TOE Security Functional Requirements....................................................................... 15 Table 5-2 Auditable Events .......................................................................................................... 16 Table 5-3 IT Environment Security Functional Requirements..................................................... 25 Table 5-4 TOE Security Assurance Requirements ....................................................................... 27 Table 6-1 Configuration Management Assurance Measures........................................................ 52 Table 6-2 Delivery and Operation Assurance Measures .............................................................. 54 Table 6-3 Development Assurance Measures............................................................................... 55 Table 6-4 Guidance Documents Assurance Measures.................................................................. 58 Table 6-5 Life Cycle Support Assurance Measures ..................................................................... 60 Table 6-6 Tests Assurance Measures...........................................................................................
Recommended publications
  • Introduction to Teradata
    What would you do if you knew?™ Teradata Database Introduction to Teradata Release 16.00 B035-1091-160K December 2016 The product or products described in this book are licensed products of Teradata Corporation or its affiliates. Teradata, Applications-Within, Aster, BYNET, Claraview, DecisionCast, Gridscale, MyCommerce, QueryGrid, SQL-MapReduce, Teradata Decision Experts, "Teradata Labs" logo, Teradata ServiceConnect, Teradata Source Experts, WebAnalyst, and Xkoto are trademarks or registered trademarks of Teradata Corporation or its affiliates in the United States and other countries. Adaptec and SCSISelect are trademarks or registered trademarks of Adaptec, Inc. Amazon Web Services, AWS, [any other AWS Marks used in such materials] are trademarks of Amazon.com, Inc. or its affiliates in the United States and/or other countries. AMD Opteron and Opteron are trademarks of Advanced Micro Devices, Inc. Apache, Apache Avro, Apache Hadoop, Apache Hive, Hadoop, and the yellow elephant logo are either registered trademarks or trademarks of the Apache Software Foundation in the United States and/or other countries. Apple, Mac, and OS X all are registered trademarks of Apple Inc. Axeda is a registered trademark of Axeda Corporation. Axeda Agents, Axeda Applications, Axeda Policy Manager, Axeda Enterprise, Axeda Access, Axeda Software Management, Axeda Service, Axeda ServiceLink, and Firewall-Friendly are trademarks and Maximum Results and Maximum Support are servicemarks of Axeda Corporation. CENTOS is a trademark of Red Hat, Inc., registered in the U.S. and other countries. Cloudera, CDH, [any other Cloudera Marks used in such materials] are trademarks or registered trademarks of Cloudera Inc. in the United States, and in jurisdictions throughout the world.
    [Show full text]
  • Fidelity® Extended Market Index Fund
    Quarterly Holdings Report for Fidelity® Extended Market Index Fund May 31, 2021 SEI-QTLY-0721 1.816014.116 Schedule of Investments May 31, 2021 (Unaudited) Showing Percentage of Net Assets Common Stocks – 99.8% Shares Value Shares Value COMMUNICATION SERVICES – 6.0% CarGurus, Inc. Class A (a) 481,276 $ 13,581,609 Diversified Telecommunication Services – 0.5% Cars.com, Inc. (a) 356,794 5,212,760 Alaska Communication Systems Group, Inc. 306,734 $ 1,018,357 Creatd, Inc. (a) (b) 42,672 156,606 Anterix, Inc. (a) (b) 65,063 3,218,016 DHI Group, Inc. (a) 262,377 839,606 ATN International, Inc. 49,421 2,336,131 Eventbrite, Inc. (a) (b) 368,036 7,471,131 Bandwidth, Inc. (a) (b) 118,706 14,041,733 EverQuote, Inc. Class A (a) (b) 54,748 1,726,204 Cincinnati Bell, Inc. (a) 265,617 4,090,502 IAC (a) 439,438 70,077,178 Cogent Communications Group, Inc. (b) 226,643 17,134,211 Izea Worldwide, Inc. (a) 258,392 718,330 Consolidated Communications Holdings, Inc. (a) 325,131 3,043,226 Kubient, Inc. (b) 44,094 228,848 Cuentas, Inc. (a) (b) 48,265 108,596 Liberty TripAdvisor Holdings, Inc. (a) 380,876 1,812,970 Globalstar, Inc. (a) (b) 3,272,215 5,235,544 Match Group, Inc. (a) 1,417,570 203,251,187 IDT Corp. Class B (a) 96,642 2,789,088 MediaAlpha, Inc. Class A (b) 91,323 3,864,789 Iridium Communications, Inc. (a) 621,382 23,743,006 Pinterest, Inc. Class A (a) 2,805,904 183,225,531 Liberty Global PLC: Professional Diversity Network, Inc.
    [Show full text]
  • Teradata Corporate Social Responsibility
    2018 REPORT Teradata Corporate Social Responsibility 07.19 REPORT 2018 TERADATA CORPORATE SOCIAL RESPONSIBILITY Table of Contents 3 CEO Communication 4 About This Report 5 1.0 Teradata 7 2.0 Corporate Governance 12 3.0 Industry Involvement 13 4.0 Human Resources 17 5.0 Materiality Assessment and Stakeholder Inclusiveness 21 6.0 Teradata Cares 35 8.0 Global Manufacturing Processes 37 9.0 Facilities 41 10.0 Ethics and Compliance 51 11.0 GRI Index 52 12.0 List of External Reports Referenced in Report Teradata policies and processes to help our customers, community, and employees understand our past performance and continuing commitment to corporate social responsibility 2 TER ADATA .COM CEO Communication (GRI G4-1) Teradata designs technology for the future, and the future demands powerful analytic solutions. These At Teradata, global corporate citizenship, social solutions are intended to meet increasingly stringent responsibility, and environmental sustainability are standards to support the earth’s precious resources, fundamental to our business and our interactions with including efficient usage of power and water, as well as customers, employees, partners, suppliers, and the space efficiency. We hold our suppliers and business communities where we operate. partners to the same standard we hold ourselves. All must meet or exceed the standards of our Code As a company, our mission is to transform how of Conduct, which includes adherence to ethical, businesses work and people live through the power of responsible and environmentally sustainable business data. This mission, and Teradata associates, are the practices with respect to all their Teradata-related driving forces behind our corporate citizenship.
    [Show full text]
  • Fidelity® Total Market Index Fund
    Quarterly Holdings Report for Fidelity® Total Market Index Fund May 31, 2021 STI-QTLY-0721 1.816022.116 Schedule of Investments May 31, 2021 (Unaudited) Showing Percentage of Net Assets Common Stocks – 99.3% Shares Value Shares Value COMMUNICATION SERVICES – 10.1% World Wrestling Entertainment, Inc. Class A (b) 76,178 $ 4,253,780 Diversified Telecommunication Services – 1.1% Zynga, Inc. (a) 1,573,367 17,055,298 Alaska Communication Systems Group, Inc. 95,774 $ 317,970 1,211,987,366 Anterix, Inc. (a) (b) 16,962 838,941 Interactive Media & Services – 5.6% AT&T, Inc. 11,060,871 325,521,434 Alphabet, Inc.: ATN International, Inc. 17,036 805,292 Class A (a) 466,301 1,099,001,512 Bandwidth, Inc. (a) (b) 34,033 4,025,764 Class C (a) 446,972 1,077,899,796 Cincinnati Bell, Inc. (a) 84,225 1,297,065 ANGI Homeservices, Inc. Class A (a) 120,975 1,715,426 Cogent Communications Group, Inc. (b) 66,520 5,028,912 Autoweb, Inc. (a) (b) 6,653 19,028 Consolidated Communications Holdings, Inc. (a) 110,609 1,035,300 Bumble, Inc. 77,109 3,679,641 Globalstar, Inc. (a) (b) 1,067,098 1,707,357 CarGurus, Inc. Class A (a) 136,717 3,858,154 IDT Corp. Class B (a) (b) 31,682 914,343 Cars.com, Inc. (a) 110,752 1,618,087 Iridium Communications, Inc. (a) 186,035 7,108,397 DHI Group, Inc. (a) (b) 99,689 319,005 Liberty Global PLC: Eventbrite, Inc. (a) 114,588 2,326,136 Class A (a) 196,087 5,355,136 EverQuote, Inc.
    [Show full text]
  • Scanned Document
    ....-.. ~ATl.T Karen Jeisi Room 5458C2 Regulatory & Financial Vice President 295 North Maple Avenue Government Affairs Basking Ridge. NJ 07920 908 221 -6913 FAX 908 221-3406 December 30, 1994 fJ:' ECEIVED Mr. William F. Caton, Acting Secretary ~. Federal Communications Commission .-Ai9S5 1919 M street, N.W. Washington, D.C. 20554 Re: Cost Allocation Manual for the Accounting Separation of the Regulated and Nonregulated Costs of AT&T Communications Dear Mr. Caton: In conformance with the Common Carrier Bureau's March 29, 1988 AT&T Order1 and RAO Letter 19,2 AT&T hereby transmits revisions to its Part 32 Cost Allocation Manual ("Manual") governing the accounting separation of AT&T Communications' regulated and nonregulated costs. The specific changes and updates are described sequentially in the Transmittal Letter Change Matrix, which constitute the initial pages of the Manual filed today. The Matrix identifies both the nature a~d reason for the change and references the pages where the material appears in AT&T's Manual. Very truly yours, Enclosures 1 American Telephone and Telegraph Company's Permanent Cost Allocation Manual for the Separation of Regulated and Nonregulated Costs, 3 FCC Red. 1786, 1798 (1988). 2 Responsible Accounting Officer Letter 19, 6 FCC Red. 7536 (1991) • AT&T Communications Transmittal Letter of Changes Matrix CAM Changes filed December 31,1994 Section / Page(s) Delete or Change from: Add or Change to: Reason for Change is to: Section I p. 1 'American Telephone and AT&T Corp. Reflect official name Telegraph Company change Section II p. 1 ACCUNET Information New nonregulated offering Manager Data Bridge (AIMD) Section II p.
    [Show full text]
  • Annual Report | December 31, 2020
    Annual Report | December 31, 2020 Vanguard U.S. Stock Index Funds Mid-Capitalization Portfolios Vanguard Extended Market Index Fund Vanguard Mid-Cap Index Fund Vanguard Mid-Cap Growth Index Fund Vanguard Mid-Cap Value Index Fund Contents Your Fund’s Performance at a Glance ................ 1 About Your Fund’s Expenses......................... 2 Extended Market Index Fund ........................ 5 Mid-CapIndexFund.................................31 Mid-CapGrowthIndexFund.........................57 Mid-CapValueIndexFund...........................77 Please note: The opinions expressed in this report are just that—informed opinions. They should not be considered promises or advice. Also, please keep in mind that the information and opinions cover the period through the date on the front of this report. Of course, the risks of investing in your fund are spelled out in the prospectus. Your Fund’s Performance at a Glance • Returns for the 12 months ended December 31, 2020, returns for the three Vanguard Mid-Cap Index Funds ranged from 2.43% for Investor Shares of Vanguard Mid-Cap Value Index Fund to 34.48% for Admiral Shares of Vanguard Mid-Cap Growth Index Fund. Vanguard Extended Market Index Fund, which includes both small- and mid-capitalization holdings, returned about 32%. Each fund closely tracked its target index. • The emergence of COVID-19 in early 2020 turned into a global health crisis, and aggressive attempts to contain it resulted in a sharp downturn in economic activity. Unemployment spiked, and sectors where social distancing isn't possible were hit hard. Stocks initially plummeted as infections surged, but they finished the year significantly higher, thanks in part to rapid and robust monetary and fiscal action by policymakers and the rollout of COVID-19 vaccines as the year drew to a close.
    [Show full text]
  • Teradata Expands Successful Offer to Migrate Oracle Users; Dozens of Companies Achieve Better Return on Investment with Teradata Enterprise Data Warehouse
    NCR Corporation Logo Teradata Expands Successful Offer to Migrate Oracle Users; Dozens of Companies Achieve Better Return on Investment with Teradata Enterprise Data Warehouse September 24, 2003 SEATTLE--(BUSINESS WIRE)--Sept. 24, 2003--Teradata, a division of NCR Corporation (NYSE:NCR), announced the expansion of its successful Oracle-to-Teradata migration program that provides companies with the ability to quickly and effectively improve their data warehousing capabilities. With a stronger, more robust data warehouse, companies are better prepared to solve the business problems of how to increase revenue, reduce expenses and identify new business growth opportunities. "Since the public launch of the Oracle-to-Teradata migration program in 2000, more than 120 industry-leading companies have migrated Oracle data marts to the Teradata(R) enterprise data warehouse," said Vickie Farrell, vice president of Teradata warehouse marketing. "The expanded Oracle- to-Teradata migration program makes it even easier for businesses to take advantage of Teradata's superior data warehousing capabilities. The continued increase in business opportunity is what drives us to enhance this program. The better we make it, the easier it is for our customers to improve their data warehouse environment." The expanded Oracle-to-Teradata migration program benefits from the newly released Teradata Warehouse 7.1 suite, more powerful servers and Teradata Database V2R5.1 data warehousing software which includes User Defined Functions (UDFs). UDFs are programming shortcuts that make it easier to create customized database functions. A library of UDFs has been created for use by the Teradata Professional Services consulting team, which includes many standard Oracle and DB2 functions that assist in migration.
    [Show full text]
  • Teradata SQL Assistant/Web Edition User Guide
    Teradata SQL Assistant/Web Edition User Guide Release 12.00.00 B035-2505-067A July 2007 The product or products described in this book are licensed products of Teradata Corporation or its affiliates. Teradata, BYNET, DBC/1012, DecisionCast, DecisionFlow, DecisionPoint, Eye logo design, InfoWise, Meta Warehouse, MyCommerce, SeeChain, SeeCommerce, SeeRisk, Teradata Decision Experts, Teradata Source Experts, WebAnalyst, and You’ve Never Seen Your Business Like This Before are trademarks or registered trademarks of Teradata Corporation or its affiliates. Adaptec and SCSISelect are trademarks or registered trademarks of Adaptec, Inc. AMD Opteron and Opteron are trademarks of Advanced Micro Devices, Inc. BakBone and NetVault are trademarks or registered trademarks of BakBone Software, Inc. EMC, PowerPath, SRDF, and Symmetrix are registered trademarks of EMC Corporation. GoldenGate is a trademark of GoldenGate Software, Inc. Hewlett-Packard and HP are registered trademarks of Hewlett-Packard Company. Intel, Pentium, and XEON are registered trademarks of Intel Corporation. IBM, CICS, DB2, MVS, RACF, Tivoli, and VM are registered trademarks of International Business Machines Corporation. Linux is a registered trademark of Linus Torvalds. LSI and Engenio are registered trademarks of LSI Corporation. Microsoft, Active Directory, Windows, Windows NT, and Windows Server are registered trademarks of Microsoft Corporation in the United States and other countries. Novell and SUSE are registered trademarks of Novell, Inc., in the United States and other countries. QLogic and SANbox trademarks or registered trademarks of QLogic Corporation. SAS and SAS/C are trademarks or registered trademarks of SAS Institute Inc. SPARC is a registered trademarks of SPARC International, Inc. Sun Microsystems, Solaris, Sun, and Sun Java are trademarks or registered trademarks of Sun Microsystems, Inc., in the United States and other countries.
    [Show full text]
  • Technology for Operational Decision Making
    By James Taylor, Decision Management Solutions and Neil Raden, Hired Brains Technology for Operational Decision Making Sponsored by: Technology for Operational Decision Making Table of Contents Executive Summary “Most discussions of decision making assume … that only senior executives’ decisions matter. This is a Executive Summary 2 dangerous mistake.” Applying EDM 5 Peter Drucker Available Technology 8 Success in business relies on making the right decisions at every level. Organizations and executives focus on Requirements for Suitable Products 13 high-impact, strategic decisions. Operational deci- sion making is often neglected because the individual Risks and Issues 16 front-line decisions seem to lack impact. This is An EDM Adoption Scorecard 19 a mistake because these little decisions add up. A company’s brand identity is defined by thousands Reference Architecture 22 of these little decisions: > The price a company offers a particular prospect Conclusion 25 for a product determines if the prospect thinks of the product as expensive or a good value. Glossary of Terms 27 > The way a customer service representative cross Appendix - Product Information from Sponsors 28 sells to a particular customer determines if the customer feels valued or just over-sold. > The options that a website, kiosk, or ATM offers to a particular customer make a company seem easy or hard to do business with. Each of these operational decisions has a very small individual impact, but the cumulative impact is huge because decisions of these types occur so often. Consider this example: A once-a-year contract for a distribution channel worth $1M in profit next year versus the decision to retain customers worth $50 each in profit next year.
    [Show full text]
  • 2014 Teradata Corporate Social Responsibility Report
    2014 Teradata Corporate Social Responsibility Report Teradata’s policies and processes to help our customers, community, and employees understand our past performance and continuing commitment to corporate social responsibility a07.15 EB5902 TERADATA.COM CEO Communication | About This Report | Teradata | Corporate Governance | Industry Involvement | Human Resources | Materiality Assessment and Stakeholder Inclusiveness | Teradata Cares | Environmental Responsibility | Global Manufacturing Processes | Facilities | GRI Index Table of Contents 1 CEO Communication 2 About This Report 3 1.0 Teradata 8 2.0 Corporate Governance 13 3.0 Industry Involvement 15 4.0 Human Resources 28 5.0 Materiality Assessment and Stakeholder Inclusiveness 33 6.0 Teradata Cares 41 7.0 Environmental Responsibility 49 8.0 Global Manufacturing Processes 51 9.0 Facilities 55 10.0 GRI Index 55 11.0 List of External Reports referenced in report 55 End Notes CEO Communication | About This Report | Teradata | Corporate Governance | Industry Involvement | Human Resources | Materiality Assessment and Stakeholder Inclusiveness | Teradata Cares | Environmental Responsibility | Global Manufacturing Processes | Facilities | GRI Index CEO Communication (GRI G4-1) the environment, while optimizing power creation and Global sustainability has become subtler and more consumption. These are just some of the ways our cus- pervasive since it first caught the attention of many tomers become more successful and data driven in the businesses. And as the market rapidly shifts to a more new world. connected and digitalized world, Teradata, like many information technology companies, has a heightened role At the heart of Teradata’s relentless drive for customer beyond simply “going green.” Instead, we must ensure success is our people. Since our inception, Teradata that we are actively engaged in sustainability in a socially, has pledged to hire the very best individuals to unravel financially, and environmentally responsible way.
    [Show full text]
  • The P2V Framework: How Data Warehouse Performance Affects Business Value Richard Hackathorn, Bolder Technology Inc
    A BTI Study The P2V Framework: How Data Warehouse Performance Affects Business Value Richard Hackathorn, Bolder Technology Inc. This study explores a fundamental issue in Information Technology. How does the data warehouse enable a corporation or government agency to realize tangible business value from increasing revenues or decreasing costs? For example, if the data warehouse executes a frequently used query many times faster, how does the company realize greater business value from this increased performance? The study explores how specific performance of the data warehouse enables business value, which is called the Performance-to-Value (P2V) framework. Through real business scenarios across several industries to illustrate this relationship, the P2V framework explains the dynamics based on the S-Curve. Guidelines are suggested to best leverage the performance of data warehouses. Today’s levels of performance are positioning data warehouses as catalysts for innovations in both effectiveness and efficiency. Why Invest in Data Warehouses? ........................................................................... 2 Performance-to-Value Relationship ....................................................................... 2 Norfolk Southern – Where Is My Rail Car? ............................................................. 4 Cabela’s – How Can We Improve Our Marketing? ................................................. 6 Southern California Edison – How Much Electricity Am I Using? ........................... 8 AT&T Retail – What is Happening
    [Show full text]
  • Vet-Friendly Employers
    VET-FRIENDLY EMPLOYERS ABB, Inc. American Tower Baylor Scott & White Health Abbott AmeriHealth Caritas Baystate Health ABBTECH Professional Resources, Amgen BB&T Inc. AmTrust Financial Services BBVA Compass AbbVie Anheuser-Busch BCD Travel ABF Freight System, Inc Anixter BD (Becton, Dickinson and ABS Careers Anthem, Inc Company) Abt Associates AOL Bechtel Corporation Accenture APL BG Group Acosta Sales & Marketing Apollo Group Biomet, Inc. ACT, Inc. Applied Materials Black & Veatch Actavis Apria BlackBerry Corporation Acuity Brands ARAMARK BlackRock Acxiom AREVA Bloomberg Adidas Group ARINC Blue Cross and Blue Shield ADM Armstrong World Industries Association Adobe Systems, Inc. Arrow Electronics BlueCross BlueShield of Advanced Technology Services, Ascension Health Tennessee Inc. Asplundh Tree Expert Co BlueLinx Corporation Advantage Sales and Marketing ASRC Federal Holding Company BMO Harris Bank AECOM Assurant BNY Mellon Aegion Corporation Astellas Pharma Boehringer Ingelheim Aerojet Rocketdyne AstraZeneca Pharmaceuticals LP Bombardier Aerotek AT&T Bosch Aetna Atrium Centers Bose AGL Resources Aultman Health Foundation Boston Properties Agrium Inc Autodesk BP Americas, Inc. Akamai Technologies, Inc. Avanade Inc. Bridgestone Americas Alamo Group Inc. Avery Dennison Bright House Networks Alaska Airlines Avis Budget Group Bristol Myers Squibb Alcatel-Lucent Bristow Group Alcoa Inc. B/E Aerospace, Inc. Broadcom Alion Science and Technology BAE SYSTEMS Brocade Communications Allegion Baker Concrete Construction, Inc. Systems, Inc. Allegis Global Solutions Baker Hughes Brookdale Senior Living Alliance HealthCare Services Ball Corporation / Ball Aerospace Brown -Forman AlliedBarton Security Services Bally Technologies Brunswick Allstate Banfield Pet Hospital/Mars Global BT Alstom Petcare Buck Consultants, LLC. Alutiiq, LLC Bank of America BUNZL American Bankers Association Bank of the West Burns & McDonnell American Electric Power Barclays American Express Barnes & Noble C&A Industries, Inc American Heart Association BASF C.
    [Show full text]