Topic "Data Security"

The Kerberos Conundrum — A Proxy’s Plight

This post talks about the complexities that creep in when a Proxy Server is introduced into an environment using Kerberos mode of authentication and also a potential generic solution. Kerberos overview Kerberos is an authentication mechanism between a client and server on a network using symmetric keys and tickets. Kerberos mode ensures that a password is... more

Data Privacy and Protection Takes Center Stage

Businesses today are seeing a perfect storm of data privacy and protection, driven by unyielding forces centered around a customer’s private information. These forces include the chronic barrage of data breaches, the enactment of powerful privacy regulations and the growing consumer and citizen awareness of their rights to control their personal data. In this perfect... more

Masking Data on the Web (HTTP Masking)

One of the primary problems faced by Enterprises these days is “Data Security”. Below is a hypothetical conversation with a prospective customer who is on the lookout for a Data Masking solution that would work seamlessly as per their needs without amalgamating into their business logic. Customer: Our organization has lots of data and we need... more

User Activity Monitoring and User Behavior Analytics for Enterprise Security

Sensitive data (Customer data – PII, PCI, PHI, Intellectual property etc.) is the most important asset of a company. Lack or even lag in the ability to detect and respond to security threats can be costly for businesses of all sizes. Challenges for securing today’s IT environment The attack surface and threat is ever increasing... more