By Subraya Mallya
Penetration Testing is a process wherein you simulate the actions of a real hacker. A series of activities, aimed at various parts of a IT infrastructure, are performed to gain access to the data and network devices that one should not be having access to. The activities conducted during a penetration testing could assume the […]
Tags: Firewall, Intrusion Detection Systems, Intrusion Prevention Systems
By Subraya Mallya
Intrusion Detection is the process by which you determine if there has been attempts to gain authorized access to data or application that is deemed as confidential. The source of intrusion could be through any of the following means application, either through Unauthorized Accounts, SQL injection, URL hacking or cracking passwords network infrastructure, through open […]
Tags: Firewall, Intrusion Detection Systems, Intrusion Prevention Systems, Password Encryption
By Subraya Mallya
One of the key concerns associated with Software-as-a-Service (SaaS) is and will be data security. The fact that your business data goes out of your network and resides in the software vendor’s data center should warrant concern. But with upfront due diligence and ongoing oversight, you should be able to get you past your inhibitions […]
Tags: Intrusion Detection Systems, Intrusion Prevention Systems, PCI-DSS, Sarbanes Oxley (SOX) 404, SAS-70 Type II Certification, Single Sign-On
By Subraya Mallya
In the last two posts, I covered considerations to be made in Choosing a SaaS vendor and Technology Considerations. In this post I will go into the governance controls you should include in your evaluation checklist of a SaaS vendor. In this day and age of increasing governance and regulatory compliance mandates, the evaluation of […]
Tags: Access Control, business continuity, Change Management, Data Leaks, Data Portability, Data Retention, Data Separation, Disaster Recovery, Encryption, GLBA, HIPAA, Intrusion Detection Systems, Log Management, PCI-DSS, Sarbanes Oxley (SOX) 404, Scheduled Maintenance
Recent Comments