SAP security vulnerabilities, metrics and threats

SAP security vulnerabilities, metrics and threats


SAP security vulnerabilities, metrics and threats

Posted: 15 Jun 2012 04:00 AM PDT

A global report dedicated to SAP security shows various critical services exposed by 5%-25% (depending on the service) of companies that run SAP. One of the goals of the research was to dispel th...

Ghost USB honeypot released

Posted: 15 Jun 2012 02:27 AM PDT

Ghost is a honeypot for malware that spreads via USB storage devices. It detects infections with such malware without the need of any further information. The honeypot emulates a USB storage device...

IT leaders want greater insight

Posted: 15 Jun 2012 01:00 AM PDT

Only 44% of IT decision makers say the line levels of IT feel connected to their organization's strategy and are empowered to execute it, according to TEKsystems. A strong connection between lead...

Cloud-based endpoint security with protection for Exchange Server

Posted: 15 Jun 2012 12:09 AM PDT

Panda Security released Panda Cloud Office Protection Advanced, a cloud-based endpoint security solution with protection for Exchange Server. This new module is fully integrated into the product, resu...

Data privacy protection for Hadoop

Posted: 14 Jun 2012 11:27 PM PDT

Dataguise released DgHadoop, a data privacy protection and risk assessment solution for Hadoop. It provides compliance assessment and enforcement for centralized data privacy protection to simplify da...

BoxCryptor: Cloud storage encryption

Posted: 14 Jun 2012 10:03 PM PDT

BoxCryptor allows you to encrypt entire folders using the AES-256 standard. Any file stored in the virtual BoxCryptor drive is individually encrypted and stored in the destination folder. The fol...

0 comments:

Post a Comment