Posts

Showing posts with the label Firewall

Cloud Security - a chain is as strong, as its weakest link !!

Image
Cloud Security ensures encryption and key management software that helps organizations lock down virtual machines and their data so they remain secure throughout their life-cycle in the private, public or hybrid cloud. Broadly speaking, it does. But, there is more to it. We need to see a holistic picture of the cloud pointing to the security check points. There are numerous of end points to be considered to get a feeler that how exhaustive this intangible monster could be? Let’s look at the various aspects of the cloud that we must discuss and take a deep dive to get a thorough understanding to build a security, we can    trust! Let’s step back a little before we take a long jump. The advent of Internet, as we know, it started as a public sector project that quickly transformed, into what it is today - a large, interconnected network that never turns off and connects an unimaginable number of different devices in the public and private sectors. Moreover it...

Think you are protected? Think Again.

Three basic IP VPN technologies are used today to create network architectures: Multi Protocol Label Switching (MPLS), IP Security (IPSec), and Secure Socket Layer (SSL). Many companies are using combinations of these technologies to develop unique solutions for specific business needs. Understanding the options can help network managers make good choices, and design an optimized infrastructure that effectively uses the available technologies. Businesses that want to protect their networks from external attacks have a number of powerful tools at their disposal. Firewalls , for example, do a very good job of filtering and, in many cases, analyzing data packets to ensure that potentially destructive data is caught before it can do any harm. But most companies that are really serious about keeping troublemakers off of their networks also employ a technology that is specifically designed to target the presence of potential attackers: IDPS (Intrusion Detection and Prevention Systems).IDP...

Information Security Enterprise Architecture

Image
We strive to focus on architectures, methodologies, best practices and the latest technologies designed for proactive strategies that can be used for reducing the IT security risks and meeting the new security challenges. Well, I decided to write this blog inspired by Gartner's information security model. Infrastructure Protection The technology infrastructure is a fundamental to security and it must be fundamentally secure. Enterprises must prevent and limit damage to their business operations by deploying policies, processes, and technologies to detect and block attacks – both internal and external. We endeavour to minimize the vulnerabilities that enable attacks. The enterprise threat environment is changing rapidly, as are the approaches, applications, and technologies enterprises use to engage customers and partners. Therefore, the strategies must change with them. I believe the right approach is to focus on the processes, technologies, and services needed to protect data, app...

Vikas Sharma

Senior AI & Digital Transformation Advisor  |  AI Governance  |  Enterprise Architecture

🏠 Home LinkedIn Medium DigitalWalk X YouTube Email

sharma1vikas ©2026  |  Content for educational purposes only. Not professional advice. Information from public sources — verify independently. Views are author's own.