archive-lv.com


Web directory, archive
Search archive-lv.com:


Find domain in archive system:
archive-lv.com » LV » D » DSS.LV

Total: 207

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Catbird - Data Security Solutions
    data center In 2007 Catbird announced the first VMware certified Virtual Security Appliance offering comprehensive virtual network security The first Catbird appliance was deployed at banks to protect their critical assets as they moved to virtual architecture and proved out the concept of a non invasive appliance delivering continuous protection to mission critical production deployments At VMworld 2007 Catbird launched its groundbreaking vSecurity product followed in early 2008 by its VMShield and HypervisorShield Catbird also announced founding membership in the VMsafe program At VMworld 2008 Catbird announced the next generation of vSecurity with support for TrustZones the first product delivering location independent network based policy enforcement TrustZones monitors and enforces security in virtualized data centers even across mobility events such as VMotion and brings a policy lens to logical groupings of virtualized assets At VMworld 2009 Catbird announced vCompliance enabling the delivery of comprehensive compliance monitoring and enforcement for virtualized and cloud environments Catbird innovation has led to multiple awards including four Best of Show Finalist Awards at VMworld 2010 2009 and 2008 Gartner Group s Cool Vendor 2011 2010 Government Security News Homeland Security Award Finalist the Windows IT Pro Best of Tech Ed 2008 IT Pro Editors Choice

    Original URL path: http://dss.lv/en/razotaji/catbird/31/ (2013-11-15)
    Open archived version from archive


  • Services/solutions - Data Security Solutions
    co residing in the same virtualized host but subject to very different security policies centrally controlled There are several key attributes of software defined network security Abstraction Security is abstracted away from physical constructs such as stateful port firewalls and wire sniffers and replaced by a set of flexible controls in the form of policy envelopes blanketing the virtualized or physical assets Abstraction is the foundation for establishing common security models that can be deployed repeatedly without concern for underlying physical hardware capabilities Automation As each asset is spun up or redeployed its security policy trails it Concerns about inadvertent operator error are eliminated as software defined security can ensure that no asset can be created without being automatically put into a security trust zone Role based controls assure that only properly privileged administrators can make modifications SDS automation also means wire speed reaction to anomalous security events instantly alerting and quarantining as policy would indicate By contrast traditional security is still heavily dependent on manual detection action and administration Scalability and Flexibility Eliminating dependencies on physical hardware and expense means security can be deployed on a scale appropriate to each host hypervisor growing in scope commensurate with business needs Because this is software only security policy is elastic and can extend across a cluster or a data center It also means that security is available on demand Control Orchestration SDS is designed to integrate a range of network security controls intrusion detection and prevention vulnerability management network segmentation monitoring tools et al into a single coordinated engine for intelligent analysis and action Unlimited sources of security input can be funneled into a policy driven orchestration system greatly improving the accuracy of the data and attendant action Orchestration is critical for successful compliance enforcement as all major compliance standards dictate a variety of controls as parts of the specifications Accomplishing anything like this level of orchestration with traditional silo d physical security based data centers is complex and expensive as varying security devices rarely speak the same language and do not have a single engine analyzing their feeds Portability In a data center governed by Software Defined Security assets carry their security settings with them as they move or scale ITsec and netsec personnel can set it and forget it Visibility By virtue of being software and thus living within the virtualized infrastructure itself Software Defined Security dramatically improves visibility of network activity Network administrators and security personnel can detect anomalous behavior that would be blind to them with physical devices and can therefore thwart and protect with a greater degree of accuracy Network informatics are augmented by this additional data and netflow mapping becomes more extensive and precise Catbird vSecurity is the industry s only fully virtualized network security and compliance solution Catbird vSecurity consists of two architectural elements The Catbird Control Center A mesh of sensors implemented as virtual machines appliances VMAs configured in a classic hub and spoke architecture where the Control Center is the central process

    Original URL path: http://dss.lv/en/pakalpojumi/cloud-computing/virtualization-security/25/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    cloud Catbird vSecurity enables a secure and compliant virtual and private cloud infrastructure vSecurity ensures IT can meet the full complement of auditor required network security controls with a set of features that encompass the seven requirements common to all compliance standards Official webpage Auditing vSecurity captures a rich event stream from its broad offering of technical controls to confirm security posture generate alerts and trigger workflow Inventory Management vSecurity automatically detects VMs and then enforces security policy through immediate quarantine of any VM out of compliance Access Control vSecurity ensures VMs are appropriately managed and isolated irrespective of changes in VM or virtual network configuration Configuration Management Monitors network activity and enforces network configurations Change Management Monitors for changes that may compromise security and compliance posture Provides manual and policy based enforcement actions Incident Response Alerts for security policy violations and takes enforcement actions to mitigate and maintain compliance Vulnerability Management Provides network based checks on the VM and hypervisor configuration including credentialed checks against file formats vSecurity features are built upon multi function technical controls illustrated in the control matrix below Protection built on multifunction correlated controls means stronger security and compliance For example a firewall misconfiguration could

    Original URL path: http://dss.lv/en/pakalpojumi/cloud-computing/security-in-cloud/26/ (2013-11-15)
    Open archived version from archive


  • Cyberoam - Data Security Solutions
    market Cyberoam Cyberoam s product offerings include Cyberoam Identity based Unified Threat Management UTM Cyberoam iView Intelligent Logging and Reporting Cyberoam Central Console CCC Cyberoam NetGenie Cyberoam Technologies Private Limited earlier a division of Elitecore Technologies is now a separate Company led by a strong management team with in depth experience in the security domain Cyberoam Technologies Private Limited has 450 employees with offices in USA Middle East India and

    Original URL path: http://dss.lv/en/razotaji/cyberoam/32/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    visibility and proactive controls over security breaches and eliminating dependence on IP Addresses Cyberoam s unique Layer 8 technology treats USER as the 8th layer in the network stack Also known as the Human layer it penetrates through each of Cyberoam s security modules allowing organizations to create user identity based security policies This offers them complete visibility and control over user activities showing who is doing what anywhere in the network and enables them to take network security decisions based on usernames and not just IP addresses Cyberoam s identity based security offers a high degree of granularity making policy setting an efficient process down to the user level that can be extended to any combination of group job function or application The IP independent nature of Cyberoam allows users to carry their own access rights and policies anywhere in the network even in dynamic IP environments likeDHCPand Wi Fi Cyberoam s Layer 8 technology adds speed to the whole security set up by offering administrators instant visibility into source of attacks enabling them to identify attacker victims by username and achieve immediate remediation to any security breach condition Cyberoam s Identity Based Security Advantages Identifies and controls users through identification policy setting and reporting by username Offers security even in dynamic IP environments like DHCP and Wi Fi Allows binding of user identity with IP address MAC Id Session Id to prevent unauthorized network access Allows real time threat control through identity based reporting on usage and threat patterns of individual users Facilitates regulatory compliance for HIPAA PCI DSS GLBA CIPA etc with on appliance reporting of who is accessing what shortening audit and reporting cycles Cyberoam s Future ready Architecture Cyberoam s Multi core technology offers high security without compromising on performance by allowing parallel processing of

    Original URL path: http://dss.lv/en/pakalpojumi/network-security/unified-threat-management/39/ (2013-11-15)
    Open archived version from archive

  • Accellion - Data Security Solutions
    the ease of use employees need while giving the enterprise organization the security protection it needs More than 1 800 enterprise organizations representing more than ten million business users worldwide rely on Accellion solutions to help keep their enterprise information secure and ensure compliance including Procter Gamble Indiana University Health Kaiser Permanente Foley Mansfield Hogan Lovells Bridgestone Ogilvy Mather Harvard University Guinness World Records US Securities and Exchange Commission Jones Day and NASA Designed with unparalleled flexibility and scalability Accellion provides organizations from less than 100 users to more than 100 000 users with flexible deployment options Implementations can grow from a single office to global distributed deployment Accellion supports deployment on premise or off premise in a virtual public private or hybrid cloud or a FIPS 140 2 certified environment All Accellion deployment options can be mixed and matched in a multi site installation or installed as a standalone single site solution With Accellion solutions organizations can provide their users with secure anytime anywhere access to enterprise information while protecting confidential information ensuring compliance improving employee productivity and reducing IT support Accellion solutions are designed to be cost effective and easy to use for both employees and IT Founded

    Original URL path: http://dss.lv/en/razotaji/accellion/33/ (2013-11-15)
    Open archived version from archive

  • Services/solutions - Data Security Solutions
    and PowerPoint files without having to move the data outside of Accellion s secure container Accellion s all in one office suite enables users to securely create edit view and share Microsoft Office documents Mobile File Sharing Today s mobile workforce needs the ability to securely create view edit and access enterprise content from their mobile devices Accellion mobile file sharing provides secure creation viewing and sharing of enterprise content on popular smartphones and tablets while providing the IT administrative controls to manage user privileges and access rights necessary to ensure enterprise security The Accellion secure mobile file sharing solution integrates with popular MDM solutions including MobileIron Good Mocana and Symantec to enable secure mobile content management an essential component of an overall enterprise mobility strategy Key Features Securely browse create edit view edit send and share files on a mobile device Works with Word Excel PowerPoint PDF JPEG PNG just about any type of file Save files securely on a mobile device for offline use Upload files securely from the device to a secure workspace Share secure links to files or share folders with internal and external users Collaborate in real time by adding or replying to comments Lock and unlock files to control editing of files in Accellion workspaces and SharePoint Bulk upload and download of files Subscribe to notifications to learn who has added files or commented on files Log in using LDAP credentials Mobilize Enterprise Content With a rise in the number of data sources employees today need a unified view of enterprise content to be able to easily access and share business content on mobile devices Accellion provides secure real time mobile access to files stored in SharePoint Windows File Shares and other Enterprise Content Management ECM systems behind the corporate firewall without a VPN Users can easily and securely view edit upload and share files from tablets smartphones laptops or desktops with internal and external stakeholders without duplicating files into a new content system or exposing sensitive documents to a public cloud service Users get all the benefits of mobile file sharing while corporations can leverage and extend their investment in SharePoint Windows File Shares and other content sources ensuring content security and compliance practices can be enforced Key Features Mobilize Secure mobile access to SharePoint 2007 2010 and 2013 files Secure access to Windows File Shares using SMB V1 V2 and CIFS protocols Mobile access via iOS and Android apps Direct access to document of record content not replicated Secure round trip download edit upload files via Accellion Mobile Client iOS only Unify Disparate SharePoint sites and Windows File Shares displayed in single unified folder structure Single UI across ECM systems Accellion kitedrive and Accellion workspaces Similar UI across iOS Android and web interfaces Single login via Accellion app or browser provides secure access to ECM systems file stores Accellion collaboration and file sharing tools Collaborate Easily and securely share SharePoint files with external users No additional SharePoint Client Access Licenses CALs required

    Original URL path: http://dss.lv/en/pakalpojumi/mobile-security/secure-mobile-file-sharing-for-enterprise/44/ (2013-11-15)
    Open archived version from archive

  • Prolexic - Data Security Solutions
    Americas Europe and Asia Visit our Knowledge Center to learn how Prolexic can protect your business from DDoS attacks Why DDoS attacks end here The best DDoS protection Prolexic is the world s largest and most trusted DDoS protection and mitigation provider Our DDoS mitigation solutions leverage more than proprietary DDoS filtering techniques and the world s largest cloud based DDoS mitigation network We also employ advanced routing and patent pending anti DDoS devices to combat all known types of DoS and DDoS denial of service attacks But what does that really mean when your Internet facing infrastructure is under attack It means minimized financial loss for your business our typical DDoS mitigation time is just 1 5 minutes after traffic starts flowing through Prolexic s scrubbing centers We know that minutes count which is why we were the first DDoS protection company in the industry to stand behind a time to mitigate service level agreement SLA Simply put massive DDoS traffic flows that overwhelm others even the largest multi gigabit per second distributed denial of service DDoS attacks end at Prolexic 7 reasons why business choose Prolexic for DDoS protection More capacity No one has a larger global mitigation network to absorb the biggest DDoS denial of service attacks No one More responsiveness Prolexic begins DDoS attack mitigation within minutes and we have a service level agreement SLA to prove it More experience Prolexic fights more DDoS denial of service attacks than many of our competitors combined tens of thousands of DDoS attacks each year and we ve been doing it successfully longer than anyone else More expertise Prolexic classifies and identifies more than 100 different types of DDoS attacks and offers DDoS protection services capable of mitigating ALL of them even new variants that have only just emerged

    Original URL path: http://dss.lv/en/razotaji/prolexic/34/ (2013-11-15)
    Open archived version from archive


archive-lv.com, 2017-08-21