Skip to main content

Home/ ITGS News/ Group items tagged 1.2security

Rss Feed Group items tagged

Yuval S

NAEA Deployed CipherOptics Advanced IPSec Network Encryption Solution - 0 views

  •  
    Cipheroptics give data security and network encryption solutions to security enterprises, financial institutions, health care, and government agencies. NAEA (North American Energy Alliance) utilized Cipheropitics to protect their data, using encryption. Dominick Birolin, the network engineer for NAEA, states that the company was "looking for a solution that could protect our critical cyber assets and meet our unique deployment requirements when we found CipherOptics." They chose this over others because CipherOptics offers security solutions for high performance networks. In addition to that, "the company's wire-speed encryption appliances are able to secure any network without changing the underlying infrastructure or application performance." Encryption works: initially by the business putting the sensitive data in plaintext. Plaintext is the normal, readable digital text. The business, using Cipheroptics, then converts the text into ciphertext. This text is made in a way that it can only be read by someone who has the key to put it back into plaintext and make it readable. The business holds the private key, which enables them to encrypt, and keep private, the data while still managing to access it when necessary.
Mariam B

Cisco Security Exec Cheers on Android's Security Flaws - 0 views

  •  
    This article discusses the security flaw that is present in the current mobile device, Android. The Android is easily able to download applications onto the phone, however certain applications may contain Trojan horses and other malicious malware. This impacts businesses and employment because large companies allow their employees to use the Android during work in order to record, send and transmit important information. However with lack of security, certain applications may have the ability to leak sensitive and private company information to others. This impacts the stakeholders: which includes the company whose information is being leaked and the employee that is using the device to store their data and send files to one another. Due to the lack of security that is enabled on the applications and the phone, certain applications make it harmful to store private company data. This becomes an issue of security because the applications are not secure and therefore the phone cannot be used for business purposes because the lack of security causes a threat on privacy as well. Solutions to this are a closed application approval process which is what apple does with its application- each one is viewed in order to see if it is secure. This step should be taken with the applications that are on the Android as well in order to make it more secure.
1 - 2 of 2
Showing 20 items per page