Skip to main content
 

dmz

Results 1 - 4 of 4Sort Results By: Published Date | Title | Company Name
Published By: e-DMZ Security LLC     Published Date: Nov 16, 2010
This whitepaper discusses how e-DMZ Security's Total Privileged Access Management enhances host controls to deliver PCI compliance.
Tags : 
e-dmz security, pci compliance, compliance, pci dss, access control, password management, privileged users
    
e-DMZ Security LLC
Published By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : 
lan, lan security, network security, security policies, security policy, policy management, best practices, nevis, nevis networks, dos, infrastructure, dmz, access control, precision prospects
    
Nevis Networks
Published By: e-DMZ Security LLC     Published Date: Sep 27, 2010
This white paper discusses key issues and offers innovative solutions to support granting access to production resources.
Tags : 
e-dmz security. emergency access, production access, access control, compliance, developer access, mission-critical, business-critical, datacenter security
    
e-DMZ Security LLC
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : 
viruses, malware, hackers, leaks, supply chain interruptions, stuxnet, scada, usb, multi-zone architecture, dmz
    
Globalscape
Search      

Add Research

Get your company's research in the hands of targeted business professionals.