Tigera Secure Cloud Edition (CE)

July 11, 2018

Enforce Critical Security & Compliance Controls for Applications Running on AWS Tigera Secure Cloud Edition provides security and compliance controls for applications running on Amazon Web Services. Microservice applications are often customer-facing and must meet strict compliance requirements when handling customer data. Compliance requirements include network security, access controls, and the ability to demonstrate compliance with those policies now and historically. Tigera Secure CE provides network visibility and compliance monitoring, and monitors the network for illegitimate traffic while identifying indicators of compromise (IoC).

Spotlight

SonicWall Inc

SonicWALL Solutions is South Africa's most competitive SonicWALL solutions provider. We offer services from pre-sales consultation and solution development, to every day support, sales and disaster recovery. We have over 10 years International experience in Enterprise level Internet based Solutions and networking, as well as extensive experience with SonicWALL products from live Data Centre environments to home networking security. With this experience as a foundation and a focused business model we have been able to offer excellent pricing as well as a extremely high quality service level.

OTHER WHITEPAPERS
news image

Cloud Collaboration Security Technical Paper Series: Webex Messaging

whitePaper | December 17, 2022

Webex is a cloud collaboration platform that provides messaging, calling, and meeting features. This paper describes the architecture and security features related to the Webex Messaging service and the suite of tools that the Webex Messaging service provides to keep customers’ data safe from Cisco as well as external attackers.

Read More
news image

Protecting Against Sophisticated Bot Attacks

whitePaper | November 18, 2022

Bot-generated attacks have risen in visibility, and defending against these attacks is now a priority for most organizations. Yet challenges persist in accurately identifying bot traffic; protecting a distributed, heterogeneous application environment from these attacks; and minimizing the impact to legitimate users while doing so. To address these issues, intelligent protection against sophisticated bots is a necessity. This should include strong analytics coupled with human expertise, a frictionless user experience, and consistent coverage across different architectures and platforms. F5 Distributed Cloud Bot Defense, built on Google Cloud, supports these requirements and can help prevent fraud and abuse against public-facing web applications.

Read More
news image

Secure by Design: Lexmark Print Devices

whitePaper | October 27, 2022

As organizations enhance the security of their infrastructure and move towards security methodologies and strategies, such as, Secure Access Service Edge (SASE), defense in depth, assume breach, and zero trust to provide tighter access controls, the print infrastructure must also adapt. It must become a strategic initiative to secure the print infrastructure and consider both internal and external threats. Data has become a cornerstone for innovation and has become a company's most valuable asset. Some of the challenges that companies face are inadequate security practices and too much data to manage. It is important to remember that security is not a solo sport, and as a community, we are stronger together.

Read More
news image

The EU Cybersecurity Certification Scheme

whitePaper | September 28, 2022

GlobalPlatform is a technical standards organization that enables the efficient launch and management of innovative, secure-by-design digital services and devices, which deliver end-to-end security, privacy, simplicity, and convenience to users. It achieves this by providing standardized technologies and certifications that empower technology and service providers to develop, certify, deploy, and manage digital services and devices in line with their business, security, regulatory, and data protection needs.

Read More
news image

2022 Global Cybersecurity Awareness Training Study

whitePaper | August 31, 2022

The benefit awareness cybersecurity awareness training, particular phishing simulations, have gained wide acceptance in business and the public sector.

Read More
news image

Dashlane’s Security Principles & Architecture

whitePaper | May 16, 2023

Dashlane Business supports login with single sign-on (SSO), using any SAML 2.0 enabled IdP. In a single-sign-on setup, the user doesn’t have to input UserMP . Instead, a random key is generated at account creation. This key (the data encryption key) is delivered to the Dashlane app after the user successfully logs in to the IdP, and it is used as a symmetric encryption key to encrypt and decrypt the user data.

Read More

Spotlight

SonicWall Inc

SonicWALL Solutions is South Africa's most competitive SonicWALL solutions provider. We offer services from pre-sales consultation and solution development, to every day support, sales and disaster recovery. We have over 10 years International experience in Enterprise level Internet based Solutions and networking, as well as extensive experience with SonicWALL products from live Data Centre environments to home networking security. With this experience as a foundation and a focused business model we have been able to offer excellent pricing as well as a extremely high quality service level.

Events