Tuesday, April 9th, 2013
Encryption protects the confidentiality of your intellectual property and your customers’ data. If data is stolen, encryption slows down the thieves. Shouldn’t we say “encryption prevents the thieves from reading your data in the clear?” No.
Thursday, January 24th, 2013
Even though competitors halfway around the world might be looking over your plans for the Model One Outboard Turfenfoil today, you still can thwart their attempts to learn about the Model Two if you apply diligent security measures that prevent further exfiltration.
Thursday, September 13th, 2012
Advanced Persistent Threat (APT), is as much a part of the cyber security landscape as viruses, cross site scripting, and identity theft, yet the term is so vague that you might wonder if it applies to you. It does.
Friday, August 31st, 2012
The Payment Card Industry Data Security Standard is a respected standard whose guidelines include common sense recommendations that can help make any enterprise more secure. Unisys ClearPath servers provide the necessary security features and flexibility for you to meet these technical requirements.
Monday, June 4th, 2012
Symantec Corporation evaluates ClearPath Dorado systems’ resistance to hackers.
Friday, February 24th, 2012
They’re out there. If you look at logs for the firewalls that protect your Internet-facing servers, you will probably find a wealth of connection attempts from computers all over the world, and the majority of these will not be from your customers. ClearPath OS 2200 developers help ensure you can protect your ClearPath server against these attacks. Read about technical security insights from a ClearPath OS 2200 security expert.
Monday, February 20th, 2012
‘Openness’ is widely regarded as a positive attribute of a system. But its not the only desirable attribute of a system. Attributes such as reliability, efficiency, responsiveness to rapidly changing conditions, and security are essential.
Thursday, February 2nd, 2012
Mission-critical systems share common attributes. Problems in one area may affect others. So, even the best systems have to be deployed correctly.