Newsletters




What is the Most Secure Enterprise Computing System?


In a new blog on the Open Virtualization Alliance (OVA) website, Jemmee Yung, Vice President for Business Development at Bloombase, writes about best practices for data security:  

Because I work for an information security technology company, I frequently get asked the following question: "What builds the most secure enterprise computing system?" To answer this question, people tend to throw out a lot of jargons and acronyms – intelligent firewall, UTM, IDS, IPS, DLP, VPN, and latest Advanced Persistent Threat (APT) that has captured the world’s attention. True, but these perimeter tools only manage to protect at the surface. Regardless of the acronyms, attacks and breaches have the same goal of stealing your data and business secrets. You and I know that as a best practice, all classified sensitive data should be locked down by encryption simply because technically it is the last line of defense. However, the reality is that for many organizations, encryption is still a large missing piece  … read on. 


Sponsors