Posts Tagged ‘Encryption’


Is the today’s cost of data security out of reach for most companies?

January 11, 2012

Price Tag: The cost of a currently available effective security platform depends on a firm’s current technology and risk, but it can range from tens of thousands of dollars to millions of dollars. Before devising a data security strategy, one must first must assess their risks and the potential consequences of a breach; then they must assess their existing tools and controls to identify weak points. The price tag on holistic fraud prevention includes external expenses (i.e., vendor software and implementation services) as well as internal development/integration costs.


GoSecure Enterprise Version is under development for customization for selected partners. Its underlying core technology is flexible, scalable and adaptable to support a broad portfolio of innovative products and solutions. GoSecure is committed to seamless end-point security solutions with zero incremental investment in infrastructure.

GoSecure is based on a simple principle: robust, innovative products that are easy to use will lead to mass adoption when they are reasonably priced. GoSecure will serve companies, government agencies, service organizations to the mass market. It can be customized for companies, countries and languages requirements.


Security Will Top IT Concerns for 2012

January 7, 2012

“In 2012, we will see progressive organizations applying a risk-based, continuous approach to security,” said Torsten George, vice president of worldwide marketing at Agiliance.

The company’s top five predictions for the coming year are:

  • Mobile Devices and Social Media: New products and services will emerge that deal with issues regarding employer-owned versus employee-owned data on mobile devices. These products will go beyond anti-virus and malware software. For social media threats, the capabilities of security tools will be extended to tackle increased social media cyberwarfare.
  • Cloud Computing Security: There will be an acceleration of efforts to create standards around cloud security, and independent, continuous monitoring of cloud-service providers’ security controls will become a standard part of service-level agreements.
  • Legislative Initiatives: In the second half of 2012, a government mandate will be passed that will circulate the implementation of a proactive Information Security Risk Management system and related best practices to tackle cybersecurity threats.
  • Anti-Cybercrime Collaboration: Sharing of sensitive threat information will become vital to prevent widespread cyberattacks across different verticals and industries. The increase in cybersecurity attacks and data breaches will lead to the introduction of a formal information-sharing database.
  • Risk is Security’s New Compliance: There will be a further increase in demand for software tools that provide both advanced reporting capabilities and interconnectivity to ensure that remediation actions can be triggered and followed through easily. To better describe the capabilities of these tools, analysts will create a new software category called Security Risk Management.

Source Security Will Top IT Concerns for 2012


Share your thoughts

December 23, 2011

IBM 2011 Tech Trends Report: Mobile

November 21, 2011

FTC Welcomes a New Privacy System for the Movement of Consumer Data Between the United States and Other Economies in the Asia-Pacific Region

November 18, 2011


The Federal Trade Commission welcomed the approval by the forum on Asia-Pacific Economic Cooperation (APEC) of a new initiative to harmonize cross-border data privacy protection among members of APEC. The initiative is designed to enhance the protection of consumer data that moves between the United States and other APEC members, at a time when more consumer information is moving across national borders.


On November 13, 2011, President Obama and representatives from the other APEC economies endorsed the APEC Cross-Border Privacy Rules at a meeting in Honolulu, Hawaii. The APEC privacy system is a self-regulatory code of conduct designed to create more consistent privacy protections for consumers when their data moves between countries with different privacy regimes in the APEC region.


“With personal information now moving around the world in the blink of an eye, we need pragmatic ways to bridge the gaps between different legal systems and privacy regimes. The APEC privacy rules have the potential to significantly benefit companies, consumers, and privacy regulators and move us closer to global interoperability of privacy regimes,” FTC Commissioner Edit Ramirez said.

Source FTC



Amazon S3 Encryption for Cloud Storage – How to Encrypt S3 Data

November 4, 2011

IT Governance: A Manager’s Guide to Data Security and ISO 27001 / ISO 27002

October 24, 2011