Cloud-Based Identity and Certificate Management

Digital certificates have emerged to serve as the trust foundation for identities, communication, transactions and information security due to their flexibility in terms of deployment and their high level of inherent security.

Spotlight

Comodo

Comodo is a leading global provider of Digital Security, Identity and Trust Assurance services that include a comprehensive portfolio of High-Assurance Digital Certificates and Managed PKI solutions, eCommerce Acceleration, Authentication (Multi-Factor) and Network Vulnerability Scanning services certified for PCI Compliance reporting. Comodo Security Solutions, with over 15,000,000 endpoint installations of its threat prevention products, offers an extensive suite of security software and support services for businesses and consumers alike. Continual innovation, a core competence in PKI and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet's ongoing development. With offices in the US, UK, China, India, Romania and the Ukraine, Comodo secures and authenticates the online transactions and communications for over 200,000 business customers and millions of consumers.

OTHER WHITEPAPERS
news image

Security Operations Maturity Model

whitePaper | February 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threats early — before damage occurs. Whether your SOC is a virtual team of two to three or a 24x7 operation, maturing your security operations capabilities will help you achieve a faster mean time to detect (MTTD) and mean time to respond (MTTR) to cyberthreats. This white paper explores LogRhythm’s Security Operations Maturity Model (SOMM), which explains how to measure the effectiveness of your security operations. Through the model, you can learn how to mature your security operations capabilities, improving your resilience to cyberthreats.

Read More
news image

MEC security; Status of standards support and future evolutions

whitePaper | September 28, 2022

The present White Paper will focus on MEC (Multi-access Edge Computing) technologies and intends to explore security-related use cases and requirements with the aim of identifying aspects of security where the nature of edge computing results in insufficient industry approaches to cloud security. Edge computing environments are by nature characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment including both HW and SW devices. Given this overall level of system heterogeneity, the areas of security, trust, and privacy are key topics for the edge environments. Finally, the advent of edge cloud federations and the presence of (far) edge devices, e.g., in Internet-ofThings environments, requires tackling MEC security with an end-to-end (E2E) approach by leveraging existing standards relevant in the area, as carefully selected to be applicable in edge computing systems.

Read More
news image

HMC 1030 Connectivity Security White Paper

whitePaper | March 14, 2023

This document describes data that is exchanged between the Hardware Management Console (HMC) and the IBM Service Delivery Center (SDC). In addition, it also covers the methods and protocols for this exchange. This includes the configuration of “Call Home” (Electronic Service Agent) on the HMC for automatic hardware error reporting. All the functionality that is described herein refers to Power Systems HMC and the HMC that is used for the IBM Storage System DS8000.

Read More
news image

Data Security: The Key to Defeating Ransomware Attacks

whitePaper | May 26, 2022

Ransomware attacks have become increasingly pervasive and pernicious. Many organizations have suffered from at least one ransomware attack, and many ransomware victims have unfortunately been left with no resort other than paying the ransom and hoping to recover their data.

Read More
news image

Managed Security Services Platform for SOC

whitePaper | November 23, 2022

Managed Security Services (MSS) uses a combination of People, Process and Technology to deliver Intelligent SOC Capabilities. CyberRes MSS platform collects and correlates data from multiple enterprise log sources & specialized security toolsets along with integrated with custom Threat Intelligence, SOC Portal to provide comprehensive Threat Detection & Response capabilities plus better overall security outcomes.

Read More
news image

Webex App Security Cloud Collaboration Security Technical Paper

whitePaper | November 24, 2022

Webex is a cloud collaboration platform that provides messaging, calling, and meeting features. The Webex App is a client application that connects to this platform and provides a comprehensive tool for teamwork. Users can send messages, share files, make calls, and meet with different teams, all in one place. This security technical paper provides an overview of the security features of Webex App running on Windows, Mac, iOS, Android, Linux, ChromeOS, and Web.

Read More

Spotlight

Comodo

Comodo is a leading global provider of Digital Security, Identity and Trust Assurance services that include a comprehensive portfolio of High-Assurance Digital Certificates and Managed PKI solutions, eCommerce Acceleration, Authentication (Multi-Factor) and Network Vulnerability Scanning services certified for PCI Compliance reporting. Comodo Security Solutions, with over 15,000,000 endpoint installations of its threat prevention products, offers an extensive suite of security software and support services for businesses and consumers alike. Continual innovation, a core competence in PKI and a commitment to reversing the growth of Internet-crime distinguish the Comodo companies as vital players in the Internet's ongoing development. With offices in the US, UK, China, India, Romania and the Ukraine, Comodo secures and authenticates the online transactions and communications for over 200,000 business customers and millions of consumers.

Events