Today increasingly sophisticated cyber attacks are crafted, honed, and improved by shady groups of hackers, often using custom tools that are directed at high value people, businesses, or even countries.
Meetali Sharma conducted an internal risk assessment with respect to the security standards, identified gaps, and made numerous changes within the environment. This included physical segregation, VLAN segmentation, dual factor authentication, policy alignment, and employee trainings.
Dharampal Satyapal had requirement for a security solution which covers web content filtering, data leak prevention, employee forensics, employee productivity and behavior monitoring, enforced encryption on external devices such as USBs, external hard disk drives for all remote locations. The organization also had a challenge to address all this aspects of information security in single cloud solution to avoid extra bandwidth utilization between datacenter and remote locations. For this, DS implemented InDefend integrated Data Privacy solution.
Over the last few years, the key buzzword has been cybersecurity, thanks to the number of breaches and vulnerabilities that have occurred.
New virtual appliance simplifies management and deployment while lowering cost of ownership to encrypt traffic across all network layers.
From taming the DevOps beast to building a highly resilient architecture, Gerald Beuchelt, CISO at LogMeIn shares his strategy to thrive in the rapidly changing threat landscape.
Makarand Joshi, Area Vice President and Country Head – India Subcontinent at Citrix, talks about GDPR, why it bets on a software-defined perimeter, and what makes its unified workspace solution unique in the market.
Simplification, specialisation and scale are fundamental pillars accelerating our channel blueprint, says Adel Eid, APJ Channel Chief at Sophos.
According to investigations made by the American and the British media, Cambrige Analytica stole personal information from 50 million Facebook user profiles.