InfoSec Policies and Standards: Some strategic context for those just diving into this world

infosec1

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. Lack of clarity in InfoSec policies can lead to catastrophic damages which cannot be recovered. So an organization makes different strategies in implementing a security policy successfully. An information […]

The CISO Technology Report: Twice A Week Review For Enterprise Security Professionals

securitypadlock-360x200

Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. We also tailor this reporting in a twice weekly CISO Technology Report. This […]

HawkEye-G: Addressing key enterprise security technology needs

cybersecuritylock

We have previously written about Hexis Cyber Solutions (see evaluation here). With this post we provide more context on some of the enterprise security needs addressed by HawkEye-G from Hexis. The following are some key technology considerations from an enterprise technology perspective: Over the years, CIOs, CTOs, CISOs and world class best cyber defense professionals have collaborated on the […]

Hexis Cyber Solutions: Fielding An Active Defense Grid For Enterprise Cyber Defense

haweye

Hexis Cyber Solutions is fielding one of the most virtuous enterprise cyber security solutions I have evaluated, a capability called HawkEye G. I’ve tracked this capability since it was a concept on a white board and watched as experienced professionals turned those concepts into working models and proven/successful offerings. I was recently treated to an […]

Video of Bandura Systems at @FedCyber

David_Maestas_promo-150

SecureNinjaTV’s Alicia Webb continues coverage of FEDcyber 2013 by speaking with Bandura Systems CTO David Maestas about their PoliWall appliance that can restrict access to networks by country. This video includes a great discussion and also a live demo of the interface and overview/demo of how policies can be updated, all visually. Bandura Systems is […]

Zettaset Orchestrator: Providing independent management and security layers

zettaset-logo

Zettaset Orchestrator™ is an enterprise software application which functions as an independent management and security layer, sitting on top of any Apache Hadoop distribution. Orchestrator is the only solution that has been specifically designed to meet the security requirements of the distributed architectures which predominate in big data and Hadoop environments. Orchestrator creates a comprehensive […]