Topic | "Intrusion Detection Systems"

Penetration Testing

By Subraya Mallya

Penetration Testing is a process wherein you simulate the actions of a real hacker. A series of activities, aimed at various parts of a IT infrastructure, are performed to gain access to the data and network devices that one should not be having access to. The activities conducted during a penetration testing could assume the […]

Comments (0)

Tags: , ,

Intrusion Detection

By Subraya Mallya

Intrusion Detection is the process by which you determine if there has been attempts to gain authorized access to data or application that is deemed as confidential. The source of  intrusion could be through any of the following means application, either through Unauthorized Accounts, SQL injection, URL hacking or cracking passwords network infrastructure, through open […]

Comments (0)

Tags: , , ,

SaaS: Data Security – Should I be concerned?

By Subraya Mallya

One of the key concerns associated with Software-as-a-Service (SaaS) is and will be data security. The fact that your business data goes out of your network and resides in the software vendor’s data center should warrant concern. But with upfront due diligence and ongoing oversight, you should be able to get you past your inhibitions […]

Comments (12)

Tags: , , , , ,

SaaS Buyer’s Guide: Governance Controls

By Subraya Mallya

In the last two posts, I covered considerations to be made in Choosing a SaaS vendor and Technology Considerations. In this post I will go into the governance controls you should include in your evaluation checklist of a SaaS vendor. In this day and age of increasing governance and regulatory compliance mandates, the evaluation of […]

Comments (8)

Tags: , , , , , , , , , , , , , , ,
Back to Top