Posts By Author:
Encryption protects the confidentiality of your intellectual property and your customers’ data. If data is stolen, encryption slows down the thieves. Shouldn’t we say “encryption prevents the thieves from reading your data in the clear?” No.
Even though competitors halfway around the world might be looking over your plans for the Model One Outboard Turfenfoil today, you still can thwart their attempts to learn about the Model Two if you apply diligent security measures that prevent further exfiltration.
It’s trick-or-treat time. Fake anti-virus software accounts for about 15% of the malware on the web, and it’s difficult for real anti-virus software to protect against.
Advanced Persistent Threat (APT), is as much a part of the cyber security landscape as viruses, cross site scripting, and identity theft, yet the term is so vague that you might wonder if it applies to you. It does.
The Payment Card Industry Data Security Standard is a respected standard whose guidelines include common sense recommendations that can help make any enterprise more secure. Unisys ClearPath servers provide the necessary security features and flexibility for you to meet these technical requirements.
Symantec Corporation evaluates ClearPath Dorado systems’ resistance to hackers.
They’re out there. If you look at logs for the firewalls that protect your Internet-facing servers, you will probably find a wealth of connection attempts from computers all over the world, and the majority of these will not be from your customers. ClearPath OS 2200 developers help ensure you can protect your ClearPath server against these attacks. Read about technical security insights from a ClearPath OS 2200 security expert.
Technical security insights and ideas on ClearPath OS 2200 Enhanced Security Profiles to enforce virtually any password rules you want.