Data Security, Enterprise Identity

ScienceLogic Global Security

September 30, 2022

ScienceLogic Global Security
As organizations become more digital in nature, securing the data becomes a top-of-mind priority given the cybersecurity challenges. ScienceLogic is committed to making the necessary investments in security and providing the transparency to gain the trust of our customer and partners.

Spotlight

SecSign Technologies Inc.

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with nextgeneration security for company networks, websites, platforms, and devices. Using advanced cryptography, SecSign eliminates passwords, simplifies authentication, and provides messaging and file data solutions that make it virtually impossible for hackers to compromise accounts or access sensitive information. Founded in 1998, we put our heart and soul into developing security software to provide our customers and their users with the highest level of security. SecCommerce was one of the first companies in the world to guarantee security for data archiving and communication for large insurance companies, banks, and national institutions by using electronic signature components. Government agencies and social insurance agencies, which must follow strict guidelines and meet high standards of security and privacy, rely on our solutions every day to provide maximum protection for sensitive

OTHER WHITEPAPERS
news image

Cisco Secure Email Buyer's Guide

whitePaper | October 20, 2022

Organizations continue to face a daunting challenge. Email is simultaneously the most important business communication tool and the leading attack vector for security breaches. The ubiquitous, and casual, use of email makes it the perfect avenue to deliver threat-centric content, insert malware into corporate systems, steal data, and extort money.

Read More
news image

Apple Platform Security

whitePaper | May 26, 2022

Apple designs security into the core of its platforms. Building on the experience of creating the world’s most advanced mobile operating system, Apple has created security architectures that address the unique requirements of mobile, watch, desktop, and home.

Read More
news image

Cyber security considerations 2022

whitePaper | September 12, 2022

The threat landscape is expanding. Cybercriminals are as entrepreneurial as ever and using increasingly sophisticated tools and technologies. In this fluid environment, we believe Chief Information Security Officers (CISOs) and their teams should adopt a mindset of enablement — cyber security is no longer just about prevention.

Read More
news image

Zero Trust Maturity Model

whitePaper | April 28, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

Cybersecurity and Financial SystemResilience Report

whitePaper | July 27, 2022

The Consolidated Appropriations Act, 20211 (CAA) requires the Federal Reserve Board (Board) to submit annually for seven years a report focused on cybersecurity to Congress. The CAA calls for a description of measures the Board has undertaken to strengthen cybersecurity within the financial services sector and with respect to the Board’s functions as a regulator, including the supervision and regulation of financial institutions and third-party service providers.

Read More
news image

GE Gas Power Cybersecurity Portal

whitePaper | October 31, 2022

GE Gas Power has developed a product security program based on industry-leading standards, encompassing end-toend cybersecurity through the entire software development lifecycle in conjunction with engineering, sourcing, and vulnerability and incident response. As part of this program, we have also created the Gas Power Cybersecurity Portal, a central, publicly available resource regarding cybersecurity at GE Gas Power.

Read More

Spotlight

SecSign Technologies Inc.

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with nextgeneration security for company networks, websites, platforms, and devices. Using advanced cryptography, SecSign eliminates passwords, simplifies authentication, and provides messaging and file data solutions that make it virtually impossible for hackers to compromise accounts or access sensitive information. Founded in 1998, we put our heart and soul into developing security software to provide our customers and their users with the highest level of security. SecCommerce was one of the first companies in the world to guarantee security for data archiving and communication for large insurance companies, banks, and national institutions by using electronic signature components. Government agencies and social insurance agencies, which must follow strict guidelines and meet high standards of security and privacy, rely on our solutions every day to provide maximum protection for sensitive

Events