Statewide Information Technology Security Plan

Safeguarding and protecting Florida’s IT resources is a top priority. AST is committed to maintaining the highest level of data security, while embracing new capabilities and ensuring information protection for citizens and businesses in the state. As AST progresses toward a more hardened IT climate, this strategic IT security plan will focus on three long-term strategies spanning 2015 through 2018. Emphasis for this plan is on year one objectives which are designed to build security into the very fabric of state IT operations and processes. These are foundational strategies that will position AST to take on horizon-driven initiatives in an organized and secure manner.

Spotlight

HexaTier

Established in 2009, HexaTier offers greater database security and compliance in the cloud, on-premise and on Database as a Service (DBaaS) platforms with its unified solution that provides database security, dynamic data masking, database activity monitoring and discovery of sensitive data. Utilizing purpose-built, patented Database Reverse Proxy technology, the company protects against both internal and external security threats. Backed by leading investors such as JVP, Magma VC and Rhodium, HexaTier is the first and only company worldwide to provide security for cloud-hosted databases and DBaaS platforms through a streamlined and simple solution. Headquartered in Tel Aviv with offices in Irvine, CA and Boston, MA, HexaTier secures databases for nearly 200 organizations globally.

OTHER WHITEPAPERS
news image

Security, privacy, and compliance with Illumina Connected Analytics

whitePaper | August 23, 2022

Advances in next-generation sequencing (NGS) technologies have dramatically increased the amount of data generated, creating challenges in data analysis and interpretation. Illumina Connected Analytics (ICA) is a secure genomic data platform to operationalize informatics and drive scientific insights. ICA provides an extensible platform with a rich set of RESTful application program interfaces (APIs) and a command-line interface (CLI) tool to maximize workflow efficiency.

Read More
news image

Cyber Risk Appetite: Defining and Understanding Risk in the Modern Enterprise

whitePaper | January 16, 2020

Managing risk is a balancing act for organizations of all sizes and disciplines. While some organizations take on too much risk, others arguably do not take on enough. Complicating this equation is the emergence of cyber as one of the most impactful sources of risk in the modern enterprise. In fact, cyber security is now increasingly reviewed by corporate boards of directors and often discussed with financial analysts who see cyber security risk as an imminent and paramount business risk. Because the consequences of cyber security failures can be damaging to business revenues and brand reputation, CEOs have lost their positions as a result of data breaches and inept preparation and planning.

Read More
news image

Network Traffic Analysis (NTA): A Cybersecurity ‘Quick Win’

whitePaper | February 27, 2020

According to research from ESG and the Information Systems Security Association (ISSA), 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 This level of cyber-risk demands immediate attention and action from CISOs, CIOs, and business executives. As a result, 62% of organizations plan to increase cybersecurity spending in 2020.2 Here’s the problem: Increasing security budgets alone isn’t enough. CISOs need quick and easy wins that can greatly bolster security efficacy and streamline operations without demanding massive projects and vast resources. There is a lot of work ahead. This white paper concludes.

Read More
news image

Pulumi Cloud Security Whitepaper

whitePaper | October 24, 2022

Pulumi is a venture-backed cloud computing company in Seattle, WA, founded by industry veterans with decades of experience creating and operating Enterprise software at companies like Microsoft, Amazon, and Google. Pulumi’s user base includes companies of all shapes and sizes, including ISVs, SIs, and Fortune 500s.

Read More
news image

22 Cybersecurity Tips for 2022

whitePaper | June 13, 2022

Many cyber-attacks involve ransomware, a form of malicious software or malware, designed to deny access to a computer system or data until a ransom is paid and a decryption key (commonly called a decryptor) is given to the victim. The encryption is virtually unbreakable without the decryption key, and you should not spend valuable time seeking a way around the encryption if you are attacked with it. Ransomware can spread in multiple ways, but most typically, through phishing emails or by unknowingly visiting an infected website. Ransomware can be catastrophic to healthcare and other organizations, preventing critical information and systems for patient care from being accessed, for example.

Read More
news image

Exadata Database Service on Cloud@Customer Security Controls

whitePaper | July 11, 2023

This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your access to and use of this confidential material is subject to the terms and conditions of your Oracle software license and service agreement, which has been executed and with which you agree to comply. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.

Read More

Spotlight

HexaTier

Established in 2009, HexaTier offers greater database security and compliance in the cloud, on-premise and on Database as a Service (DBaaS) platforms with its unified solution that provides database security, dynamic data masking, database activity monitoring and discovery of sensitive data. Utilizing purpose-built, patented Database Reverse Proxy technology, the company protects against both internal and external security threats. Backed by leading investors such as JVP, Magma VC and Rhodium, HexaTier is the first and only company worldwide to provide security for cloud-hosted databases and DBaaS platforms through a streamlined and simple solution. Headquartered in Tel Aviv with offices in Irvine, CA and Boston, MA, HexaTier secures databases for nearly 200 organizations globally.

Events