By Subraya Mallya
Penetration Testing is a process wherein you simulate the actions of a real hacker. A series of activities, aimed at various parts of a IT infrastructure, are performed to gain access to the data and network devices that one should not be having access to. The activities conducted during a penetration testing could assume the […]
Tags: Firewall, Intrusion Detection Systems, Intrusion Prevention Systems
By Subraya Mallya
Intrusion Detection is the process by which you determine if there has been attempts to gain authorized access to data or application that is deemed as confidential. The source of intrusion could be through any of the following means application, either through Unauthorized Accounts, SQL injection, URL hacking or cracking passwords network infrastructure, through open […]
Tags: Firewall, Intrusion Detection Systems, Intrusion Prevention Systems, Password Encryption
By Subraya Mallya
One of the key concerns associated with Software-as-a-Service (SaaS) is and will be data security. The fact that your business data goes out of your network and resides in the software vendor’s data center should warrant concern. But with upfront due diligence and ongoing oversight, you should be able to get you past your inhibitions […]
Tags: Intrusion Detection Systems, Intrusion Prevention Systems, PCI-DSS, Sarbanes Oxley (SOX) 404, SAS-70 Type II Certification, Single Sign-On
Recent Comments