Access control

Partner Content
Partner Content
4 Ways to Breach-proof Your Bank’s ATMs

‘ATM Cash-out’ is a meticulously planned, highly choreographed, global cyber attack wherein hackers breach a bank or payment card processor’s cybersecurity systems and use cloned debit cards at multiple ATM machines around the world to fraudulently withdraw millions of dollars within a short period of time. 

What are Amazon Zelkova and Tiros? AWS looks to reduce S3 configuration errors

Amazon’s latest tools help identify where data might be left exposed in your AWS S3 cloud environments.

Partner Content
Your enterprise data may be just a search away: Secure it now

There are a whole host of reasons why organizations should consider encrypting their sensitive data: for protection, for legal reasons, to comply with global compliance policies and safeguard customer interests. 

Partner Content
Tailgating: Security Risks Involved

Let’s visualize another scenario. A group of employees go down to have lunch. One of them swipes their own card and holds it open for everyone to go through. He doesn’t notice that someone else has slipped inside while the door was open.

Cisco pays cool USD 2.3 billion for hot security company Duo

Cisco says integration of its network, device and cloud security platforms with Duo Security’s zero-trust authentication and access products will let customers quickly secure users to any application on any networked device.

What is single sign-on? How SSO improves security and the user experience

Password fatigue, cloud sprawl and developer simplicity are pushing the rise of SSO.

What is network security? Definition, methods, jobs & salaries

Network security is the practice of preventing and protecting against unauthorized intrusion into corporate networks. As a philosophy, it complements endpoint security, which focuses on individual devices; network security instead focuses on how those devices interact, and on the connective tissue between them.

S K Rudra

At C K Birla Hospitals, S K Rudra and his team implemented centralized monitored and managed Urchin Tracking Module (UTM), as the only route for all the outgoing and incoming traffic. It established gateway IPS, anti-virus, anti-spyware, anti-spam, application filter and web filter in place. It further, enforced identity and MAC-based access control policies. 

Dinesh Pal

At ICICI Prudential Dinesh Pal led the implementation of a one-stop control mechanism using the technology architecture of the organisation by developing an Application Access Rights Management solution. 

Dharmendra Kumar

Tata Power Delhi Distribution faced the need to simplify security operations and monitor grids and critical offices on a 24x7 basis. Dharmendra Kumar was instrumental in rolling out a central management system and command & control center, an access control system and a perimeter intrusion detection system.

Fortinet Acquires Bradford Networks

Strengthens Fortinet Security Fabric and extends segmentation and security to the edge of the enterprise network including Internet of Things (IoT).