Access control

S K Rudra

At C K Birla Hospitals, S K Rudra and his team implemented centralized monitored and managed Urchin Tracking Module (UTM), as the only route for all the outgoing and incoming traffic. It established gateway IPS, anti-virus, anti-spyware, anti-spam, application filter and web filter in place. It further, enforced identity and MAC-based access control policies. 

Dinesh Pal

At ICICI Prudential Dinesh Pal led the implementation of a one-stop control mechanism using the technology architecture of the organisation by developing an Application Access Rights Management solution. 

Dharmendra Kumar

Tata Power Delhi Distribution faced the need to simplify security operations and monitor grids and critical offices on a 24x7 basis. Dharmendra Kumar was instrumental in rolling out a central management system and command & control center, an access control system and a perimeter intrusion detection system.

Fortinet Acquires Bradford Networks

Strengthens Fortinet Security Fabric and extends segmentation and security to the edge of the enterprise network including Internet of Things (IoT).

How Facebook protects data with physical security

Acting as a final layer to a perimeter defense, Facebook’s global security data centers team guards intellectual property. It’s an integrated approach where even the company’s office buildings are designed to put physical protection between servers and the public.

Negligent Employee: A dangerous internal cyber threat

As organizations cope with the changing world of cybersecurity which continues to evolve at a frantic pace, they sometimes forget to neglect the danger that stares at them in their face.

How privacy is moving data security to the top of corporate agendas

It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.

What is a Chief Security Officer? Understanding this critical role

The Chief Security Officer (CSO) is the executive responsible for the organization's entire security posture, both physical and cyber, and has the big picture view of the company's operational risk.

Why securing containers and microservices is a challenge

Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.

GDPR-defined personal data can be hard to find—here's where to look

The General Data Protection Regulation (GDPR) puts the onus on organizations to better manage and personal data. But do they know where to find it? We list the areas most likely to be overlooked.

New Georgia law criminalizes good-faith security research, permits vigilante action

Georgia cybersecurity folks are outraged about SB 315, and warn that it could cost the state jobs.

Partner Content
Gemalto provides customers enhanced data security for cloud, hybrid and on-premises data storage deployments with NetApp

Gemalto SafeNet KeySecure integration with NetApp provides centralized key management for thousands of volumes across multiple clusters