Data Security, Enterprise Security, Platform Security

Apple Platform Security

May 26, 2022

Apple Platform Security
Apple designs security into the core of its platforms. Building on the experience of creating the world’s most advanced mobile operating system, Apple has created security architectures that address the unique requirements of mobile, watch, desktop, and home.

Spotlight

Innovative Solutions SA

Innovative Solutions (IS) is a specialized professional services company delivering topnotch Information Security and Products development for Saudi Arabia and the Gulf region. We offer Products development including SMS gateway, OTP, and Security Awareness. Our Cyber Security Services includes ISO 27001 implementations, penetration testing, source code reviews, vulnerability and risk assessment & management. We specialize in providing information security solutions including SOC implementations, WAF, firewalls, IDS/IPS, and more.. Innovative Solutions is a winner of CITC Tahfeez program, SAGIA 100 Fast Growth companies and an ISO 27001 certified company, Winner of MRM Business Award 2014 in the services category, and won F5 best partner award.

OTHER WHITEPAPERS
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

Ransomware Data Recovery Architectures

whitePaper | September 26, 2022

Ransomware attacks have been on the rise in recent years. They are extremely insidious in nature and have been foremost in many CEOs’ and CIOs’ minds lately. Ransomware is malware that prevents an enterprise from accessing and using its data, usually by encrypting the data in an inconspicuous manner so the victim does not know the attack is occurring.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

Post-Covid-19: Digital Transformation and OT Cyber Security in Asia

whitePaper | November 2, 2022

Digital transformation has been dramatically accelerated by the Covid-19 pandemic, requiring businesses and operations to quickly set up infrastructures to maintain business continuity. And no part of the network has been impacted more than the OT environment. New systems allow employees to operate from home and for equipment vendors to connect remotely to the network to maintain production. And as we emerge from the pandemic, organisations are now more cognisant of the advantages of scaling their business and operations beyond their traditional network perimeters than ever before.

Read More
news image

IoT Application Provisioning for Security Using FDO and TPM

whitePaper | December 29, 2022

The Internet of Things (IoT) offers the appealing possibility of harnessing millions of devices that measure or modify real world things and allows processes to be optimized. There are many opportunities: thermostats optimized for tomorrow’s weather, shipping containers optimized for packing before their contents arrive, assembly lines that reconfigure automatically for each item, street lighting adjusted to make streets safer, and so on.

Read More
news image

Is Cyber Security Meeting Today’s Intensifying Challenges?

whitePaper | September 22, 2022

Cybersecurity has always been critical, but it’s taken on new urgency today. Cyberattacks have escalated in intensity and volume. At the same time, IT is experiencing the pressing challenges of a technology modernization revolution. Driving this tech revolution are remote work environments, a skills shortage and unprecedented growth in cloud deployments. These developments bring increasing requirements to proactively secure environments, deflect risks and rapidly respond to cyberattacks.

Read More

Spotlight

Innovative Solutions SA

Innovative Solutions (IS) is a specialized professional services company delivering topnotch Information Security and Products development for Saudi Arabia and the Gulf region. We offer Products development including SMS gateway, OTP, and Security Awareness. Our Cyber Security Services includes ISO 27001 implementations, penetration testing, source code reviews, vulnerability and risk assessment & management. We specialize in providing information security solutions including SOC implementations, WAF, firewalls, IDS/IPS, and more.. Innovative Solutions is a winner of CITC Tahfeez program, SAGIA 100 Fast Growth companies and an ISO 27001 certified company, Winner of MRM Business Award 2014 in the services category, and won F5 best partner award.

Events