GoodData Corporation Security Whitepaper 2019

January 9, 2019

This whitepaper is organized into three sections, starting with the executive overview. After the overview, the section titled “GoodData platform security” explains the security measures applied to the GoodData platform and provides guidance for GoodData customers on the security concepts and techniques they should use to ensure security in the cloud.

Spotlight

Becrypt

Becrypt has a long heritage of providing Enterprise Data Protection solutions and Engineering Services to the most security conscious organisations, innovating to provide the highest levels of product assurance. Today, our Secure Mobile solutions allow diverse platforms to be adopted within the enterprise with confidence. We bring together extensive domain knowledge and technical expertise to offer a market-leading cyber security capability that helps organisations optimize the use of new technologies, whilst minimizing risk and complexity.Specialties: IT security, Data protection, Encryption software, Secure remote access, Thin client & VDI, Compliance for Government systems, Full disk encryption, Mobile device and data security.

OTHER WHITEPAPERS
news image

Understanding Ransomware and Strategies to Defeat it

whitePaper | March 5, 2020

Held Hostage in Hollywood: In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. The hospital paid the ransom of 40 Bitcoins (currently worth about $16,664) after a “network infiltration” began on February 5, when employees reported being unable to access the hospital’s network and electronic medical records system. “The malware locked access to certain computer systems and prevented us from sharing communications electronically,” said hospital CEO Allen Stefanek.

Read More
news image

Network Traffic Analysis (NTA): A Cybersecurity ‘Quick Win’

whitePaper | February 27, 2020

According to research from ESG and the Information Systems Security Association (ISSA), 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 This level of cyber-risk demands immediate attention and action from CISOs, CIOs, and business executives. As a result, 62% of organizations plan to increase cybersecurity spending in 2020.2 Here’s the problem: Increasing security budgets alone isn’t enough. CISOs need quick and easy wins that can greatly bolster security efficacy and streamline operations without demanding massive projects and vast resources. There is a lot of work ahead. This white paper concludes.

Read More
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More
news image

Cyber Security for Business

whitePaper | December 17, 2019

At CGI, cyber security is part of everything we do. For more than 40 years, we have helped clients manage complex security challenges with a business focused approach – protecting what is most valuable to them. As our economy becomes even more digital in nature, securing our organisations against cyber-attacks and data breaches has become one of the most important business issues facing senior management.

Read More
news image

Threat Connect Cyber Survey Report

whitePaper | January 4, 2022

Whether you are in financial services, farming, or public infrastructure, the security threat to organizations has never been greater. Today, almost every company is a technology company in some shape or form and this can be a soft underbelly - open to attack. Cyber risk is the fastest-growing risk faced by businesses globally. A wide range of statistics and sources make it clear that attackers have become even more proficient over recent years, using automation to exploit vulnerabilities at an accelerated pace and frequency. Threats are even more widespread and complex than before.

Read More
news image

Recommended Criteria for Cybersecurity Labeling of Consumer Software

whitePaper | February 4, 2022

Software is an integral part of life for the modern consumer. Nevertheless, most consumers take for granted and are unaware of the software upon which many products and services rely. From the consumer’s perspective, the very notion of what constitutes software may even be unclear. While enabling many benefits to consumers, that software that is, software normally used for personal, family, or household purposes can also have cybersecurity flaws or vulnerabilities which can directly affect safety, property, and productivity.

Read More

Spotlight

Becrypt

Becrypt has a long heritage of providing Enterprise Data Protection solutions and Engineering Services to the most security conscious organisations, innovating to provide the highest levels of product assurance. Today, our Secure Mobile solutions allow diverse platforms to be adopted within the enterprise with confidence. We bring together extensive domain knowledge and technical expertise to offer a market-leading cyber security capability that helps organisations optimize the use of new technologies, whilst minimizing risk and complexity.Specialties: IT security, Data protection, Encryption software, Secure remote access, Thin client & VDI, Compliance for Government systems, Full disk encryption, Mobile device and data security.

Events