February 2017

Top 7 Vendors in Cyber Threat Intelligence market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates a tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape.   Threat Intelligence Program is a set of people, process and technology which enables you to proactively Identify, collect, enrich and analyze threat information, strategic and… Read More »Top 7 Vendors in Cyber Threat Intelligence market at RSAC 2017

Top 5 Vendors in Email Security Market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates a tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape. Email security gateways prevent malware, phishing attacks, spam and other unwanted emails from reaching their recipients and compromising their devices, user credentials or sensitive data. Email… Read More »Top 5 Vendors in Email Security Market at RSAC 2017

Top 5 Vendors in Web application Firewall (WAF) market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape. WAF is specialized firewall designed to protect  web applications (HTTP applications) from attacks such as cross-site scripting (XSS), SQL injection and other vulnerabilities that may exist in.… Read More »Top 5 Vendors in Web application Firewall (WAF) market at RSAC 2017

Top 6 Vendors in IT Governance, Risk and Compliance (IT GRC) market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates a tremendous opportunity for vendors, users, and practitioners to innovate, educate and discuss around the current security landscape.This blog enlists the top IT GRC vendors at RSAC 2017. IT-GRC solutions allow organizations to effectively manage IT and Security risks while reducing the cost and complexity… Read More »Top 6 Vendors in IT Governance, Risk and Compliance (IT GRC) market at RSAC 2017

Top 6 Vendors in EPS market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates a tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape. This blog enlists the top End point Security vendors at RSAC 2017   Endpoint security solutions are suite of products that apply centralized policy based controls… Read More »Top 6 Vendors in EPS market at RSAC 2017

Technology Stack for Ransomware Protection

Top 6 Vendors in Secure Web Gateways (SWG) market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape.   Web Security Gateway Vendors provide solutions to protect web-surfing PCs from infection and enforce company and regulatory policy compliance. These gateways must, at a minimum,… Read More »Top 6 Vendors in Secure Web Gateways (SWG) market at RSAC 2017

Top 5 Vendors in Identity & Access Management (IAM) market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape. Identity and Access Management is the practice of managing digital identities through-out their life-cycle, managing access rights to enterprise resources and auditing of user access rights,… Read More »Top 5 Vendors in Identity & Access Management (IAM) market at RSAC 2017

Top 7 Vendors in Application Security Testing (AST) market at RSAC 2017

RSA conference is one of the leading security conference worldwide.  It creates tremendous opportunity for vendors, users and practitioners to innovate, educate and discuss around the current security landscape.   Application security testing are tools and services that helps you discover security vulnerabilities in all kinds of applications. Current application security practices/tools available broadly falls into… Read More »Top 7 Vendors in Application Security Testing (AST) market at RSAC 2017

Data Leakage Protection (DLP) via email gateway and Regulated Internet access

About Project The scope of the project encompassing Business Units, Support Functions, 200+ Processes and 8500+ employees. The project was an outcome of the data pilferage risk envisaged in terms of sensitive customer information and financial data. The risk assessment took inputs from various avenues such as internal audits, external audits, risk event, control committees… Read More »Data Leakage Protection (DLP) via email gateway and Regulated Internet access

Top 6 Reasons Why Data Loss Prevention(DLP) Implementation Fails

Below are Top 6 Reasons Why/ Data Leakage Prevention/Data Loss Prevention Fails:   Lack of business/key-stakeholders involvement: Failure to include key stakeholders (Including Business and C-level executives) while defining requirements and formulating DLP policy make implementation harder. A clear ‘Data Loss Prevention policy’ from the management and Board clearly sets up the expectations, allocate needful resources… Read More »Top 6 Reasons Why Data Loss Prevention(DLP) Implementation Fails