Topic "Data Security"

Unified Intelligent Data Protection

The General Data Protection Regulation (GDPR) took center stage in 2018 and made data governance and data privacy and protection a common topic of discussion around the dinner table, on the nightly news, and on the front page of the paper, even for those outside of the IT “club.” Such focus on GDPR increased the... more

A New Dimension for Data Security Intelligence: Identity

Most organizations should leverage intelligent data security as a foundation for a systemic data privacy and protection program. Many market forces drive this need, including the chronic barrage of data losses, the enactment of powerful privacy regulations, consumers demanding the protection and control of their data, and the broad use of personal data to drive... more

The Kerberos Conundrum — A Proxy’s Plight

This post talks about the complexities that creep in when a Proxy Server is introduced into an environment using Kerberos mode of authentication and also a potential generic solution. Kerberos overview Kerberos is an authentication mechanism between a client and server on a network using symmetric keys and tickets. Kerberos mode ensures that a password is... more

Data Privacy and Protection Takes Center Stage

Businesses today are seeing a perfect storm of data privacy and protection, driven by unyielding forces centered around a customer’s private information. These forces include the chronic barrage of data breaches, the enactment of powerful privacy regulations and the growing consumer and citizen awareness of their rights to control their personal data. In this perfect... more

Masking Data on the Web (HTTP Masking)

One of the primary problems faced by Enterprises these days is “Data Security”. Below is a hypothetical conversation with a prospective customer who is on the lookout for a Data Masking solution that would work seamlessly as per their needs without amalgamating into their business logic. Customer: Our organization has lots of data and we need... more

User Activity Monitoring and User Behavior Analytics for Enterprise Security

Sensitive data (Customer data – PII, PCI, PHI, Intellectual property etc.) is the most important asset of a company. Lack or even lag in the ability to detect and respond to security threats can be costly for businesses of all sizes. Challenges for securing today’s IT environment The attack surface and threat is ever increasing... more