Policy Watchdog

Sausner, Rebecca
September 2006
Bank Technology News;Sep2006 Supplement, Vol. 19, p27
Trade Publication
The article focuses on the implementation of Cambia CM security policy-enforcement software by ING Investment Management to track down information and communication technologies connected to its networks and to assess the risks they pose. Any new devices plugged into ING Management's network are immediately scanned to investigate its legitimacy. Visitors are allowed to access the Internet, but not the internal network. In addition, the company has established quarantine workstations and conference rooms.


Related Articles

  • FINDING SECURITY ALTERNATIVES AND MORE. Swift, Billie // Risk Management (00355593);Oct2001, Vol. 48 Issue 10, p26 

    Open source code has begun to receive increased attention due to the fact that, via its inherent collaborative qualities, it can provide tighter computing security for businesses, as well as support for expanding businesses during and after they increase the size and functionality of their...

  • TAKING STOCK OF SECURITY.  // eWeek;07/31/2000, Vol. 17 Issue 31, p40 

    Editorial. Addresses issues in computer system security. Vulnerabilities; Management of risk; Viewing security as a business issue; Fundamental difference of system security from other aspects of information technology (IT); Good security policies.

  • The Enemy Within. Holloway, Jason // Database & Network Journal;Jun2003, Vol. 33 Issue 3, p23 

    The article discusses the implications of the failure of companies to consider the very real threat of internal security breaches that comes within the company itself. Effect of internal security breaches on operations of companies; Comparison between the level of threat between internal and...

  • Building Software Securely from the Ground Up. Ghosh, Anup K.; Howell, Chuck; Whittaker, James A. // IEEE Software;Jan/Feb2002, Vol. 19 Issue 1, p14 

    Introduces a series of articles dealing with how to build software systems securely from the ground up. Enhanced understanding of how security concerns should influence all aspects of software design, implementation and testing; Types of approaches and point solutions advocated by computer...

  • A good defense goes to the desktop. Schwartau // Network World;12/07/98, Vol. 15 Issue 49, p53 

    Explains how to protect corporate computer networks from unauthorized access. Intranet firewalls; Desktop security; Signal 9 Solutions' PCFirewall security software; Internet Relay Chat.

  • Software targets internal leaks. Garretson, Cara // Network World;5/22/2006, Vol. 23 Issue 20, p16 

    The article reports on the plan of the start-up company, NextSentry, to announce a product designed to protect companies from internal security and information leakage threats. The product, called ActiveSentry, uses artificial intelligence to learn an employee's role within an organization to...

  • Data Breaches-Turning The Tide.  // Software World;Sep2005, Vol. 36 Issue 5, p11 

    The article offers advice to information technology security managers on how to prevent data breaches. Security professionals know that before any data can be cost-effectively protected, it must first be classified. The first task in risk assessment is to identify, assess, classify and then...

  • Virtual StoneGate Security Solution.  // Software World;Mar2008, Vol. 39 Issue 2, p26 

    The article discusses the introduction of a comprehensive StoneGate Security Solution by Stonesoft for VMware virtual environment. It is suggested that StoneGate Firewall/VPN is the first virtual appliance that protects the network and guarantees business continuity for both virtual and physical...

  • Managing risk. Dyck, Timothy // eWeek;6/16/2003, Vol. 20 Issue 24, p64 

    Network Security's organizational profile has risen steadily in the past two years, and security concerns are now much more likely to be represented at a senior-management level. As a result, security is as much about technical defense mechanisms as it is about organizational risk management,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics