Pritha's Blog – July 2014 Archive (8)

Vulnerability Management System:How to Evaluate a Vendor?

Vulnerability Management System was implemented as a practice within the Organization across the Global Business Unit (India, Middle East & Africa). The implementation included Vulnerability Assessment and Remediation. The assessment is made based on Severity Levels (Actual & Potential) obtained through vulnerability…


Added by pritha on July 23, 2014 at 8:30pm — No Comments

How To Evaluate Network Security Vendor

As per our IT Security Audit report of Ernst and Young, We have to protect our network for misuse of the Internet and we required proper analyzer to analyze our network, they also guide us for the Implementation of BYOD policy in the company and Protection of ERP thru Dual authentication. We have to protect our ERP application by using SSL VPN for remote location also. Our top management interested to protect our network in a proper way and reduced some bandwidth cost.

( Read more:…


Added by pritha on July 10, 2014 at 9:30pm — No Comments

Checklist for E-Procurement Portal

E-Procurement Portal has been set up for providing state-of-the-art e-Procurement services in India to Govt. Departments, Public Sector Organisations and Large Private Sector Enterprises. This e-procurement portal comprehensively addresses almost every nuance of the formal Public Procurement process having ‘Legal’, ‘Security’ and ‘Transparency’ related significance.

( Read more:  CISO Guide…


Added by pritha on July 10, 2014 at 2:00am — No Comments

Implementation Guide For Secure Wireless Network

When we started this project of Secure Wireless LAN implementation in our organization, the key considering while evaluation that the solution must be robust, stable and highly secured so as to avoid security hassles and wireless threats.

Most companies go to great lengths to keep unauthorized users off their networks, but Wi-Fi access points can provide hackers with a convenient way in. That's because Wi-Fi signals are often broadcast for outside network - an enticing invitation for…


Added by pritha on July 10, 2014 at 2:00am — No Comments

How To Evaluate An ERP Project

Agriculture Insurance Company of India Ltd. (AIC) provides crop insurance coverage to 2.4 crore farmers annually, 86% of whom belong to the small and marginal category. To balance the twin challenge of crop insurance business, viz. reaching the remotest farmer at minimum service cost, AIC has developed a web-based, integrated, 360-degree IT Systems Solution Project titled "ANNAPOORNA", envisioned as an enabler for streamlining the business processes of the Company and an automator of the…


Added by pritha on July 10, 2014 at 1:30am — No Comments

Announcing Call for Speakers @ CISO Platform Annual Summit 2014

I am highly excited to tell you the most exciting event and all the buzz of Annual Summit is back ! 

Further more I am more excited because now is the time when we will receive your innovation, those billions of papers and the most exciting hacks of this year. …


Added by pritha on July 9, 2014 at 8:30pm — No Comments

Checklist to Evaluate A Cloud Based WAF Vendor

These days’ web applications are under siege. Commercially motivated Hackers, bots, and fraudsters are attacking around the clock, attempting to steal data, disrupt…


Added by pritha on July 4, 2014 at 1:00am — No Comments

Monthly Archives










© 2019   Created by CISO Platform.   Powered by

Badges  |  Report an Issue  |  Privacy Policy  |  Terms of Service