Unified Threat Management (UTM) is a comprehensive solution that has gained widespread currency as a primary network gateway defense solution for organizations.
SOA Security – Part 2 – Basics
In this article, we examine how security applies to Service Oriented Architecture (SOA). Continue reading “SOA Security – Part 2 – Basics”
Technical guide on IT Migration Audit
The Committee on Information Technology of the Institute of Chartered Accountants of India has issued a technical guide on IT Migration Audit. We are pleased to have been involved in this initiative of the Institute. We thank the Institute for acknowledging the contribution of the Qadit team comprising of CA N Venkatakrishnan (Special Invitee of the Committee on Information Technology of the Institute of Chartered Accountants of India), CA Mahesh Balan, CA V Vijayakumar, CA N Swameshwar and CA Suresh Rangarajan in the Preface of the publication.
SOA Security – Part 1 – Intro to SOA
SOA Security Model has been doing rounds in recent past in many forums. This prompted me to write on SOA security aspects through a 3 part article. Through this ‘Part 1’, let me introduce you to SOA. A Service Oriented Architecture (SOA) is a framework for integrating business process and supporting IT infrastructure as secure, standardized components services that can be reused and combined to address changing business priorities.
Tech Terminology Demystified – The CPU
The most general description of the CPU is that it is the brain of the computer. This is what everyone is familiar with. Let’s delve a little deeper.
Understanding RAID
RAID or Redundant Array of Inexpensive Disks is a technology for storing the same data across different disks to ensure data redundancy. RAID also employs data stripping (a process where data is divided into blocks and spread over several disks) which improves performance. A RAID appears to the operating system as a single logical hard disk. Continue reading “Understanding RAID”
XBRL – An introduction
XBRL or eXtensible Business Reporting Language is an XML dialect developed for business reporting purposes. It is increasingly becoming the standard for communication of information between businesses on the internet. Continue reading “XBRL – An introduction”
MPLS Architecture – An Overview
As soon as the word ‘MPLS’ (Multi Layered Protocol Switching) is mentioned the term ‘MPLS VPN’ comes to everybody’s mind. This is soon followed by the thought of corporate offices spread across different cities being connected through an ‘MPLS VPN’. Your subconscious mind has also associated ‘confidentiality of my data probably using encryption’ to this whole concept as it is a VPN and VPNs are supposed to provide confidentiality and integrity of my data. Why else should they say ‘private’ in Virtual Private Networks?
Information Rights Management – An Introduction
Information rights management is a technology which aims to protect sensitive and critical documents and information while at the same time ensuring that it is made available for genuine needs. For example, two companies may negotiate to trade a patent during which the patent details would be made available to the buying company. Despite signing an NDA, if the deal doesn’t happen, the company which was supposed to buy the patent can come out with a new product based on that patent (whose details were made available to it during negotiation stage) with some modifications. Continue reading “Information Rights Management – An Introduction”
Thin-Client and Information Security
Concept of thin-client, which has been around for a decade and half, is back in the limelight with cloud computing gaining considerable popularity and acceptance. It is, therefore, relevant to know how thin-clients aid information security. Continue reading “Thin-Client and Information Security”