iSquare Consulting

links

Information Security Solutions

 

_________________________

Single Sign On - SSO

Single Sign On (SSO) is a mechanism that allows a user to be authenticated
only once on a system.

Advantages:

  • Once authenticated, user can roam the network freely and access resources and services without being re challenged  for authentication.
  • Easier administration by reducing the number of locations on which an account must be defined
  • Enabled through authentication systems that provide logon credentials automatically when prompted.

 

SSO Methods:

  • Scripts
  • Kerberos
  • SESAME
  • KryptoKnight

 

 

_________________________

 

iSquare Information Security Solutions

E-Mail Security

Email is one of the most widely and commonly used Internet services Methods to improve Email Security

 

  • Restricting access to messages to their intended recipients
  • Maintaining the integrity of messages
  • Authenticate and verify the source of messages
  • Verify the delivery of messages
  • Classify sensitive content within or attached to messages
  • Provide for non repudiation

 

Mailmarshal

  • Enforces security policies and leverages content monitoring and filtering technology to meet regulatory compliance standards and protect against data leakage; provides enhanced Public Key Infrastructure with advanced functionality.

 

Email Security Products

  • M86 MailMarshal SMTP
  • M86 MailMarshal Exchange
  • M86 MailMarshal Service Provider Edition
  • M86 MailMarshal Secure Email Server

 

Web Security Products

  • M86 Secure Web Gateway
  • M86 Web Filtering and Reporting Suite
  • M86 WebMarshal

 

 

Business Continuity Plan (BCP)

BCP  is a system or methodology used to create a plan on how an organization will resume its partially or completely interrupted critical functions within a predetermined time after the occurrence of a disaster or disruption. The aim is to keep critical functions operational.

Business Impact Analysis:

BIA goal is to distinguish which are the most crucial and require  to continue operations if a disaster occurs

Recovery point objective (RPO)—The RPO defines how current the data must be or how much data an organization can afford to lose. The greater the RPO, the more tolerant the process is to interruption.

Recovery time objective (RTO)—The RTO specifies the maximum elapsed time to
recover an application at an alternate site. The greater the RTO, the longer the
process can take to be restored

Details

 

 

_________________________________________________________________________