Securing Your Network and Application Infrastructure

For all the attention data security has received in recent years and all the technical advances in risk detection now available to protect network infrastructures, you might imagine that data are safer than ever before. Unfortunately, the number of recent, frighteningly large data breaches contradicts that notion. In the past 18 months alone, we have seen breaches at Adobe, eBay, JPMorgan Chase, Target, Home Depot, Community Health Services, and the US Government that together compromised more than 500 million records.

Spotlight

Management Science Associates, Inc.

Management Science Associates, Inc. is a diversified information management company that for over five decades has given market leaders the competitive edge in data management, advanced analytics and technology. Our research focus and innovative solutions not only transform industrial and institutional practices, they illuminate the range, reach and potential of what we can do to infuse your organization with new energy. Whether within a process, across the enterprise or throughout the supply chain, we help our partners put their data to work in powerful new ways.

OTHER WHITEPAPERS
news image

How to meet the IoT security requirements of today and tomorrow

whitePaper | February 21, 2023

Governments around the world are creating Internet of Things (IoT) security legislation and regulations designed to keep users safe in an increasingly connected world. Connectivity is good and, in fact, great but bad things can happen to people with unprotected or poorly protected IoT devices. Failing to meet government regulations or guidelines may lead to the inability to sell products in a region and thus to lost revenue. However, the regulations are constantly in a state of flux. This white paper provides updated background on what governments are suggesting or requiring as well as specific details on how to implement security defenses and obtain security certifications that can satisfy current and even future government requirements

Read More
news image

IPU Based Cloud Infrastructure

whitePaper | December 31, 2022

2020 will go down in history as the year the world met with one of its most significant challenges in nearly a century – the great coronavirus pandemic. The resulting situation can be aptly described by the term “VUCA,” an acronym standing for Volatility, Uncertainty, Complexity and Ambiguity. In other words, the world faced a crisis.

Read More
news image

Cisco ACI and F5 BIG-IP Design Guide

whitePaper | May 12, 2022

The document discusses load balancer design considerations and deployment options in Cisco ACI, specifically with F5 BIG-IP from three aspects: network design, F5 design, and multi-tenant design. This document covers features up to Cisco ACI Release 5.2. One of the key considerations of the network design with load balancer is to ensure incoming and return traffic go through the same load balancer (one exception is direct server return (DSR), which doesn't have this requirement). There are various options you can use to insert the load balancer. One way is to use the load balancer as a gateway for servers or as a routing next hop for routing instances. Another option is to use Source Network Address Translation (SNAT) on the load balancer or use ACI Policy-Based Redirect (PBR) to make the return traffic go back to the load balancer.

Read More
news image

How to process data securely on third-party infrastructure

whitePaper | December 14, 2022

Confidential computing is a technology that shields computer workloads from their environments and keeps data encrypted even during processing. The vast and previously unsolved problem that confidential computing addresses is the following: How to process data on a computer that is potentially compromised? This computer could be operated by yourself, your company, or a third party like a cloud provider.

Read More
news image

Independent DeltaV™ Domain Controller

whitePaper | October 17, 2022

Active Directory was introduced by Microsoft with the release of the Windows 2000 Server Operating System (O/S). DeltaV systems work in conjunction with specific Active Directory features to provide a more secure and manageable production environment. Windows domains provide centralized user accounts and groups, and combined with Windows forests you also get administration, redundancy, and scalability as part of the computers network environment. This whitepaper provides details about the Independent DeltaV Domain Controller (IDDC) functionality introduced in DeltaV version 14.LTS. This whitepaper assumes that you understand the concept of Windows domains and forests.

Read More
news image

Bringing companies on-chain

whitePaper | January 2, 2023

Brickken is creating a dApp (decentralized application) which provides the infrastructure needed for companies to bring their assets on-chain and self-fund themselves via Security Token Offerings, and for DAOs to be able to operate in a legally compliant environment. Our goal is to bridge offline to online, and web2 to web3 to prepare the world for a new fully tokenized reality.

Read More

Spotlight

Management Science Associates, Inc.

Management Science Associates, Inc. is a diversified information management company that for over five decades has given market leaders the competitive edge in data management, advanced analytics and technology. Our research focus and innovative solutions not only transform industrial and institutional practices, they illuminate the range, reach and potential of what we can do to infuse your organization with new energy. Whether within a process, across the enterprise or throughout the supply chain, we help our partners put their data to work in powerful new ways.

Events