Categories
security

Web Application Firewalls

Web application firewalls help monitor, filter and protect web applications from malicious attacks and unwanted internet traffic, including bots, injection and application-layer denial of service (DoS).

The WAF will help you establish and manage rules for avoiding internet threats, includin  cross-site scripting (XSS), SQL injection file inclusions, SQL injection, brute force attacks etc.

Web application firewall are deployed to protect web-facing applications and collect access logs for compliance, and analytics.

Categories
security

DMZ Demilitarized Zone

In computer security, a DMZ (sometimes referred to as a perimeter networking) is a physical or logical subnetwork that contains and exposes an organization’s external-facing services to a larger untrusted network, usually the Internet.

The purpose of a DMZ is to add an additional layer of security to an organization’s local area network (LAN); an external attacker only has access to equipment in the DMZ, rather than any other part of the network. The name is derived from the term “demilitarized zone”, an area between nation states in which military action is not permitted.

Most firewalls are network-level security devices, usually an appliance or an appliance in combination with network equipment. They are intended to provide a granular means of access control at a key point in a business network.

Categories
security

Privileged Access Management

Privileged access management (PAM) consists of the cybersecurity strategies and
technologies for exerting control over the elevated (“privileged”) access and permissions
for users, accounts, processes, and systems across an IT environment. By dialing in the
appropriate level of privileged access controls, PAM helps organizations condense their
organization’s attack surface, and prevent, or at least mitigate, the damage arising from
external attacks as well as from insider malfeasance or negligence.

Categories
computing

Patch Management

Patch management is the process for identifying, acquiring, installing, and verifying patches for products and systems. Patches correct security and functionality problems in software and firmware. From a security perspective, patches are most often of interest because they are mitigating software flaw vulnerabilities; applying patches to eliminate these vulnerabilities significantly reduces the opportunities for exploitation. Also, patches are usually the most effective way to mitigate software flaw vulnerabilities, and are often the only fully effective solution.

Categories
security

Endpoint Detection and Response

Endpoints – the laptops, workstations, and other devices we use on a daily basis – are a easy target for attackers. They’re everywhere, prone to security vulnerabilities, and difficult to defend. 2017’s WannaCry attack, for example, is reported to have affected more than 230,000 endpoints across the globe. Endpoint Detection and Response (EDR) is a fast-growing category of solutions that aim to provide deeper capabilities than traditional anti-virus and anti-malware solutions.

From Advanced Persistent Threats (APTs) to file less malware, organizations today face a range of cyber-threats that legacy security products simply miss. Attackers have become highly adept at outmaneuvering signature-based protections like anti-virus software and Intrusion Detection Systems (IDS). Every device that connects to a network is a potential attack vector for cyberthreats, and the rising popularity of mobile devices and remote work erodes the effectiveness of perimeter-based defenses like firewalls.

Categories
Tech. Trends

How business leaders keep remote workers connected, secure and productive

Over the last few years, the business world has been slowly moving toward more remote and work-from home employee policies. Then COVID-19 hit—and as most businesses shut down offices, those plans went into warp speed.

Today, many organizations are faced with workforces that are nearly 100% working from home. And, surprisingly to some, businesses that were more prepared for this transformation are seeing many benefits in productivity and employee satisfaction in this work-from-home age.

Categories
Printers

DevOps and the application development lifecycle

The processes used to build and deploy today’s applications have undergone a dramatic shift. Efforts that were once segregated and performed in isolation are being joined into a single process flow that incorporates both development and operations known as DevOps. DevOps a combination of Software Development and IT Operations bringing together its people, processes and technology with the aim to deliver software rapidly, frequently and reliably.

Categories
computing

Progressive Web Application

Platform-specific applications specific to android/apple/ windows etc, are known for being incredibly rich and reliable. They’re ever-present, on home screens, docks, and taskbars. They work regardless of network connection. They launch in their own standalone experience. They can read and write files from the local file system, access hardware connected via USB, serial or Bluetooth, and even interact with data stored on your device, like contacts and calendar events. In these applications, you can do things like take pictures, see playing songs listed on the home screen, or control song playback while in another app.

Categories
Printers

Software-Defined Infrastructure

Powered by ‘software-driven infrastructure’ intelligent code, IT operations can be transformed to optimize and scale allocation of resources as needed all while maintaining economic control over limited IT budgets. The flexibility offered by a Software defined/driven Infrastructure makes it a cornerstone for the transition to hybrid IT, allowing customers to leverage the benefits of virtualization and cloud computing in a way that is tailored specifically for their business needs, as well as the requirements of their applications. Three main pillars of SDI include:

Categories
computing security

Recovery Point Objective(RPO) and Recovery Time Objective(RTO)

Disaster Recovery is one of the most important terminologies among system administrators as organisations continue to increasingly rely on technology to run their line of websites/apps, emails, various business applications and day to day operations. Two parameters that play an important role in disaster recovery are Recovery Point Objective (RPO) and Recovery Time Objective (RTO). Both this parameter form the basis of an organisation`s disaster recovery and business continuity plans including how the system administrators plan the backup processes, frequency of the backup, the recovery time limits and recovery procedures. Though similar these parameters are largely different. There are other metrics too such as a recovery point actual or recovery point objective which can only be determined during a real-life scenario or a DR drill.