Case Studies

HID Global introduced the ActivID Tap Authentication platform for convenient and secure multi-factor authentication to cloud applications and web services. HID Global's new ActivID Tap Authentication...
Apr 10, 2015
5,724
0
1.2 billion passwords reportedly stolen by Russian hackers. Before that it was Heartbleed. After a widespread, nonspecific data breach, the conventional wisdom is that people should change all their...
Aug 22, 2014
4,247
0
Encryption is widely recognized as the gold standard for protecting data privacy, but encryption is only as strong as its key management. Critical credential files such as Oracle wallet files, Java...
Aug 11, 2014
4,161
0
Encryption is widely recognized as the gold standard for protecting data privacy, but encryption is only as strong as its key management. Critical credential files such as Oracle wallet files, Java...
Aug 11, 2014
4,714
0
A Russian group has reportedly hacked 1.2 billion user names and passwords, belonging to over 500 million email addresses, according to a report by Hold Security. The firm claims that the information...
Aug 08, 2014
3,820
0
Cyberspace is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information and communication technology (ICT) devices and...
Aug 06, 2014
6,155
1
It shall come into force on such date as the Central Government may, by notification,appoint and different dates may be appointed for different provisions of this Act and any referencein any such...
Aug 06, 2014
4,803
3
With the advancement of convergent communication technologies and shared Information system in India, Critical Sectors are becoming more dependent on their Critical Information Infrastructures (CIIs...
Aug 06, 2014
6,252
2
53% of companies are willing to invest in software specifically designed to protect financial transactions, using either components installed in their own infrastructure or provided by a third-party...
Jul 17, 2014
4,469
0
DDoS has become the primary threat to the availability of enterprise networks. DDoS was once a basic high volume attack that flooded the pipes of its targets. The modern DDoS threat is a complex...
Jul 15, 2014
4,676
2
DDoS attacks against customers remain the number one operational threat seen by respondents during the survey period, with DDoS attacks against infrastructure being the top concern for 2014. This...
Jul 15, 2014
5,468
4
Lessons from the past for the connected future. The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace—and justly raising alarms...
Jun 11, 2014
4,162
1
Organizations are increasingly adopting a model in which multiple access control use cases and identities can be supported on one card or smartphone. This convergence of use cases and identities...
Jun 11, 2014
3,465
1
CISOs need to look at solutions which will identify, contain, respond, remediate and ultimately mitigate the impact of the breach, faster and more efficiently. Download this report to know more....
Jun 11, 2014
3,892
0
Cloud has finally started to move beyond the hype and into the very fabric of today’s enterprise. Organizations around the world are gaining valuable insight into not only the potential benefits of...
Jun 11, 2014
5,482
3
Android phones and tablets are not allowed in many enterprises to enter the corporate network either be it to download emails or to access files or network, as they consider Android as very...
Jun 10, 2014
4,359
0
This technical brief provides a solution feature overview of the array and discusses how these features can benefit a business’s Oracle environment. Download this report to know more. Zip Boots...
Jun 10, 2014
3,517
0
Data Loss Preventions  or DLP implementations are expected to surge in the year ahead. The theft of intellectual property (IP) is driving the need more than compliance requirements, as organizations...
Jun 02, 2014
8,887
0
No Organization Is Immune From a Data BreachVerizon security researchers, using advanced analytical techniques, have found that 92 percent of the 100,000 security incidents analyzed over the past ten...
Jun 02, 2014
5,222
5