Social Network For Security Executives: Help Make Right Cyber Security Decisions
To protect sensitive/critical data available on users’ laptops we implemented a remote backup solution that can back up the important files and folders on the users’ laptop to a remote server. The main purpose was to safeguard the sensitive/critical information against the accidental loss/damage/ corruption and ensure its availability as and when required, by making an additional copy on a remote server kept at a secured location. Organization’s Need is cost effective solution, on demand or…Continue
Added by pritha on October 21, 2014 at 3:00pm — No Comments
Kotak Mahindra Bank has initiated the DLP implementation across all business units in a phased manner and the implementation was started 6 months ago with critical business units. The solution monitors all channels, viz. Internet, Email and End point.
1. Proper strategy and planning are vital for successful DLP implementation.
2. Get management support for the Project. Identify the critical business units considered for DLP implementation.
3. Get the data classification…Continue
This project mainly aims to have an enterprise wide ITAM (IT Asset Management) Systems and endpoint protection and also to maintain the hardware and software inventory. It also brought in centralized IT management and control mechanisms for polices enforcement, monitoring and reporting to present a complete picture of endpoint status of the organization.
(Read more: …Continue
Added by pritha on October 21, 2014 at 2:30pm — No Comments
Shellshock is a security vulnerability(CVE-2014-6271) in the widely used Unix Bash Shell which was discovered by Stéphane Chazelas on 12 September 2014 and disclosed on 24 September 2014. Subsequently, various researchers have discovered multiple other vulnerabilities in bash.…Continue
Added by Nilanjan De on October 1, 2014 at 4:00pm — No Comments