Companies that demonstrate excellence, innovation and leadership in information security. WINNER FINALISTS Advanced Persistent Threat Protection (APT) Advanced Persistent Threat Protection (APT) WINNER: FINALISTS: Lastline Enterprise (Lastline, Inc.) Adaptive Defense 360 (Panda Security) Failsafe (Damballa) Anti Malware Anti Malware WINNER: FINALISTS: Comodo Advanced Endpoint Protection (Comodo) Isla Web Malware Isolation System … Continue reading Overview best security tools
The management cycle of I&AM. Definition A popular description is; identity management, also known as identity and access management (I&AM) is the security and business discipline that "enables the right individuals to access the right resources at the right times and for the right reasons". Another definition is; … Continue reading Everything about Identity and Access management I&AM
Advanced Endpoint Protection Traps is a better solution than traditional antivirus. AEP traps has a multi-method prevention approach that secures endpoints against known and unknown malware and exploits before they can compromise a system. Traps prevents security breaches and successful ransomware attacks, in contrast to detection and response after critical assets have been compromised. In … Continue reading Advanced Endpoint Protection Traps
EICAR EICAR is a 68-byte .com file detected as "EICAR-Test-File". This IS NOT a virus but is a manipulated file for testing for the presence of Antivirus systems in email, the file system, or other places. This test file simply displays a text message and returns the control to the operating system. Software vendors agreed about developing a uniform … Continue reading High security controls moving from military to the business
Long ago, 20 years, you had a terminal emulator such as 5250-emulator to connect to your system. Now-a-days you have so many devices that can be connected ranging from laptops, tablets, cellphones to printers and any endpoint that has an IP-address. How do you control so many devices that try to access the network from … Continue reading Control your devices in your network!
Herman Rensink Datacenter - / Cloud Architect /CISSP (Associate Member ISC2) The National Institute of Standards and Technology (NIST) is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Its mission is to promote innovation and industrial competitiveness. It is ONE of the many sources on the Internet. NIST's activities … Continue reading NIST Computer Security Publications – NIST Special Publications (SPs)
Security is becoming increasingly important. Cybercrime is sophisticated and it takes more money, resources and most important, it requires a joined effort of our security solutions. Customers, vendors, commercial and non-commercial organisations should work together in order to defeat or minimise the impact of threats. In light of this two major developments in the area … Continue reading STIX and TAXII, standards on security information exchange