infrastructure security
-
The Critical Need for an Architecture and Design Review
By Manoj Rai On 6 Jul 2015The security of an application, network or operating system, and their associated functionalities relies primarily on their architecture and design. Which is why an Architecture and Design review is critical in helping you analyze and validate your organization's overall security....
-
Holistic Approach to Security & Compliance in the Cloud
By Raju Chellaton On 7 May 2015Ever since the popular information breach of Target in 2013, the imperative need for enterprises the world over to enable a holistic information security architecture has become top priority. That being said, even today, security and information today, for many...
Access Governance Cloud Governance & Risk Compliance Identity & Access Governance Security
-
Play It Safe, Never Be Sorry!
By Manoj Rai On 22 Sep 2014Mobile apps have been increasingly gaining ground in the communication industry. With more and more customers switching to smart phones, brands today have capitalized this to reach out to their customers directly with more pace, mobility and efficiency than ever...
-
Security threat caused by endpoint vulnerabilities.
By Vijay Bharti On 19 Sep 2014Sitting at the end of a network point or at any of the nodes of a corporate network, are countless PCs, laptops, smartphones, tablets or even equipment such as barcode readers and scanners. Each one of them is a security...
Tag Cloud
Subscribe for blog updates