TITLE

10 Enterprise All-Star honorable mentions

AUTHOR(S)
Cummings, Joanne
PUB. DATE
November 2007
SOURCE
Network World;11/26/2007, Vol. 24 Issue 46, p43
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article highlights several Enterprise All-Star honorable mention awards recipients for technological advancement in the U.S. Alabama Criminal Justice Information Center uses the AlaCop.gov secure Web portals that serves 864 agencies and 15, 508 law enforcement and criminal justice officers to ameliorate their disaster recovery and data warehousing capabilities. California Department of Health Services integrates enterprise data encryption of the security of the patient's health records as well as decreases operational costs. ING Investment Management has carried out the Symantec's Enterprise vault for their electronic mail system, file system achieve and tiered storage models which aims to speed their business functionality and operations.
ACCESSION #
27661465

 

Related Articles

  • Data Splitting.  // Network Dictionary;2007, p135 

    A definition of the term "Data Splitting" is presented. It refers to an approach to protecting sensitive data from unauthorized access by encrypting the data and storing different portions of a file in different servers.

  • Investigating the Combination of Text and Graphical Passwords for a more secure and usable experience. Singh, C.; Singh, L. // International Journal of Network Security & Its Applications;Mar2011, Vol. 3 Issue 2, p78 

    Security has been an issue from the inception of computer systems and experts have related security issues with usability. Secured systems must be usable to maintain intended security. Password Authentication Systems have either been usable and not secure, or secure and not usable. Increasing...

  • Net Glean: A Methodology for Distributed Network Security Scanning. Manes, Gavin W.; Schulte, Dominic; Guenther, Seth; Shenoi, Sujeet // Journal of Network & Systems Management;Sep2005, Vol. 13 Issue 3, p329 

    Network vulnerability analysis tools today do not provide a complete security awareness solution. Currently, network administrators utilize multiple analysis tools in succession or randomly in a patchwork fashion that provides only temporary assurance. This paper introduces NetGlean as a...

  • MU SECURITY TAKES A HACKER'S APPROACH. McLaughlin, Kevin // CRN;4/17/2006, Issue 1192, p83 

    The article introduces the MU Security's MU-4000 Security Analyzer, a test laboratory appliance that launches a barrage of attacks on network infrastructure prior to deployment. According to Ajit Sancheti, co-founder and CEO of MU Security, the idea is to adopt ethical hacking techniques to...

  • Grid based Approach for Data Confidentiality. Malempati, Sreelatha; Mogalla, Shashi // International Journal of Computer Applications;Jul2011, Vol. 25, p1 

    Network security measures are required to protect data during their transmission. Sensitive information transmitted across a network requires confidentiality. Data confidentiality is the protection of transmitted data from passive attacks. Passive attacks are eaves dropping or monitoring the...

  • If it had teeth, it might bite someone. Bradner, Scott // Network World;3/29/2004, Vol. 21 Issue 13, p28 

    The National Cyber Security Partnership (NCSP) has released the first two of five planned reports concerning various aspects of cyber security. The partnership is an outgrowth of the December 2003 National Cyber Security Summit convened in response to last year's National Strategy to Secure...

  • Analysis of Multiple Keys for Variable Data Length in Multinode Network for Encryption. Kakkar, Ajay; Singh, M. L.; Bansal, P. K. // International Journal of Engineering Science & Technology;2011, Vol. 3 Issue 6, p5237 

    Data security of the model depends upon the combination of keys. The processing speed, latency, S-Boxes, accuracy and key length have been used to determine the strength of the model. The paper deals with the above mentioned parameters for wireless model having multiple nodes. The results have...

  • Encryption Can Play Key Data Privacy Role. Toubba, Karim // Database Trends & Applications;Mar2005, Vol. 19 Issue 3, p10 

    The article discusses the significance of data protection and utilization on the success of a business. Organizations must contend with an onslaught of privacy legislation and security mandates, consequently, these critical assets of corporate intelligence can become liabilities if they are not...

  • Selectively Convertible Authenticated Encryption in the Random Oracle Model.  // Computer Journal;2008, Vol. 51 Issue 4, p419 

    Conventionally, a verified digital signature releases information about both the signing event and the signed content simultaneously, where the signing event proves the truth that someone actually signed something. However, in many cases, the information of the signing event and the signed...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics