/home/leansigm/public_html/components/com_easyblog/services

SigmaWay Blog

SigmaWay Blog tries to aggregate original and third party content for the site users. It caters to articles on Process Improvement, Lean Six Sigma, Analytics, Market Intelligence, Training ,IT Services and industries which SigmaWay caters to

Big Data Security Analysis

  •  Big Data enables various capabilities like forensics and the analysis of long-term historical trends. By collecting data and analyzing historical trends, you would be able identify when an attack started, and what were the steps that the attacker took to get a hold of your systems. These techniques could play a key role to detect threats at an early stage. Big Data provides  opportunity to consolidate and analyze logs automatically from multiple sources rather than in isolation. This enhances intrusion detection systems (IDS) and intrusion prevention systems (IPS). Integrating information from physical security systems, such as building access controls and even CCTV, could also enhance IDS and IPS to a point where insider attacks and social engineering are factored in to the detection process. This presents the possibility of significantly more advanced detection of fraud and criminal activities. Big Data could result in far more practical and successful SIEM, IDS and IPS implementations. Read more at-         http://www.techrepublic.com/blog/big-data-analytics/how-big-data-is-changing-the-security-analytics-landscape/
Rate this blog entry:
4321 Hits
0 Comments

Striving for secure unified communications!

Unified communications platforms can be seen not necessarily as end points, but as beginning points for intrusion. It is a growing concern for organizations today. According to Kevin Riley, chief technology officer, Sonus Networks, as landscape architecture surrounds Unified Communication systems, emphasizing more on security is needed. A recent survey by the CIO Playbook reveals that 31% of organizations considered security and privacy issues to be a key challenge while implementing unified communication system. This concern is because integrating platforms requires opening up ports to enable the flow of data, which means additional unwanted traffic is able to flow freely. However, organizations can take precautions, like installing session border controllers (SBCs) to close ports that are not required and protect their networks from dangerous traffic.

To read more, visit the following link:

 

http://searchunifiedcommunications.techtarget.com/feature/Striving-for-secure-unified-communications

Rate this blog entry:
12241 Hits
0 Comments
Sign up for our newsletter

Follow us