This article provides an introduction to what is URL Filtering, why it is needed and how it is done at enterprise level. We also have a look at the various factors involved in categorizing the websites and updating them. The advantages and dis-advantages of URL filtering are also discussed.
This article provides an overview of the various options available for securing enterprise email communications like anti-spam, anti-virus, zero-hour anti-virus, content policies, outbound email attachment scanning for DLP, email encryption, confidential data leakage protection and protection for web-based confidential data leakage (through http and ftp) from organizations.
This article attempts to see if bulk enterprise security policies can be applied to portable devices like USB pen drives, mp3 players, cellphone connecting through USB, CD/DVD media, Digital Cameras etc, if they can be managed from a central software application, and the features offered by such an application for Data Leakage Prevention.
This article explains what are Phishing attacks, why it is a network security threat, how emails are used to gain confidential information, what else the phishers can do other than directing to a fradulent website, how such Phishing attacks are mitigated by enterprise companies. There is also a small introduction to a related threat – Pharming.
This article examines the different types of Firewall technologies. The four common types of firewalls are: 1. Packet Filtering Firewalls
2. Circuit level gateway Firewalls
3. Application level gateway Firewalls
4. Stateful multi-layer inspection Firewalls
This article covers an overview of the products and technologies that help maintain network security. We would see small introduction to firewalls, anti-virus, anti-spam, content filtering in email, URL web filtering, Intrusion Prevention Systems (IPS) and UTM (Unified Threat Management).