Topic | "Intrusion Prevention Systems"

Penetration Testing

By Subraya Mallya

Penetration Testing is a process wherein you simulate the actions of a real hacker. A series of activities, aimed at various parts of a IT infrastructure, are performed to gain access to the data and network devices that one should not be having access to. The activities conducted during a penetration testing could assume the […]

Comments (0)

Tags: , ,

Intrusion Detection

By Subraya Mallya

Intrusion Detection is the process by which you determine if there has been attempts to gain authorized access to data or application that is deemed as confidential. The source of  intrusion could be through any of the following means application, either through Unauthorized Accounts, SQL injection, URL hacking or cracking passwords network infrastructure, through open […]

Comments (0)

Tags: , , ,

SaaS: Data Security – Should I be concerned?

By Subraya Mallya

One of the key concerns associated with Software-as-a-Service (SaaS) is and will be data security. The fact that your business data goes out of your network and resides in the software vendor’s data center should warrant concern. But with upfront due diligence and ongoing oversight, you should be able to get you past your inhibitions […]

Comments (12)

Tags: , , , , ,
Back to Top