MBA Alumni | MBA Students | MBA Aspirants | MBA Forums
--- MBA Home ---

CoolAvenues.com

offers
Advertising
Services

on the web  
 

Home     |    MBA Jobs      |     Knowledge Zone      |     Seminars      |     Placement Report      |     Admission Alert       |     café     |     Search

Technology Management | Enterprise Security Consultancy Market in India

Technology @ Knowledge Zone

 Home

 Knowledge Zone Home

 General Management

 Finance

 Marketing

 Human Resource

 System

 Operations

 Knowledge Seminar

 MBA Forums
 Search
 Join e-Communities
 Be a CoolAssociate
 Give Suggestions

 Company Search
 
 

Subscribe:
Seminar & MDP Alert
   To keep yourself updated with the latest Seminars & MDP happenings in the country, join Knowledge Seminar& MDP mailing lists.


Latest Management Discussion on CoolAvenues Forums



Enterprise Security Consultancy Market in India

by Prasun Goel *

Previous

Page - 5

Bangalore Labs provides VPN security to some of its key customers in India like Hathaway and Pidilite Industries.

Intrusion Detection Systems

IDS inspect all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. An ID differs from a firewall in that a firewall looks out for intrusions in order to stop them from happening. The firewall limits the access between networks in order to prevent intrusion and does not signal an attack from inside the network. IDS evaluates a suspected intrusion once it has taken place and signals an alarm. An IDS also watches for attacks that originate from within a system.

Authentication/Access control

Authentication can be based upon what someone has (a smart card, token, or ID card), what he or she knows (a password or PIN), what he or she is (a biometric like a fingerprint or voiceprint), or any combination of these. Distinction can be made between authentication and authorization; the former deals with validating that users are who they say they are, while the latter deals with validating which specific resources the user has permission to access.

Red Hat Linux (RHL) comes with substantial security features like IP tables that provide authentication and allow administrators to create rules and policies.

RSA Security India has some of the largest MNCs using RSA SecureID in India, including the likes of ABN Amro, HSBC, Citibank, ICICI Bank and Netscape AOL.

Encryption

It is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. RSA, Symantec and other organizations provide Encryptio solutions.

Technology tools manage various risk factors and prevent security breaches. These tools need to be reviewed periodically, to keep them up-to-date so that they can tackle new security threats.

Next


* Contributed by: -
Prasun Goel,
PGDM (2nd Year)
Symbiosis Centre for Management and Human Resource Development,
SCMHRD, Pune


Post Your Comments       |       E-mail to Friend       |       Want to Contribute

Send this E-mail this Article

 

MBA Jobs
MBA Preparation
B-Schools
MBA Forums
About CoolAvenues
Senior Mgmt Jobs CAT / MAT/ CET Dean talk CAT Preparation Post a Job
Finance Jobs Admission Alert B-School Profile Executive MBA Advertise with Us
Marketing Jobs MBA Insider B-School Diary Career Help Contact us
HR MBA Jobs MBA Admission Process Summer GMAT Privacy
Operations MBA Jobs English Preparation MBA News Companies Copyrights
IT MBA Jobs MBA Abroad MBA Events B-Schools About CoolAenues
Consulting MBA Jobs CAT / MAT / CET test papers MBA Placements Summer Guidance
Resume Design Tips MBA in India Summers Guide Classifieds

© All Copyrights exclusive with Zebra Networks
Part or full of the contents can not be published, copied or reproduced
in any form without the prior written exclusive permission of Zebra Networks. Pls refer to CoolAvenues Copyright section.