Post image for Read the entire second issue of the Security Practices Knowledge Circle

Read the entire second issue of the Security Practices Knowledge Circle

by tapangarg on July 28, 2011

[issuu showflipbtn=true documentid=110728091244-87c8bd1634804edabb95877dcf6b764f docname=spkc_v1i2 username=ciopublications loadinginfotext=SPKC-2 showhtmllink=false tag=cio width=420 height=297 unit=px]

It’s not everyday that an organization can claim to be a door-opener in their space or chosen initiative. But Nucleus Software, featured in our lead story in this issue of Security Practices Knowledge Circle (SPKC), can safely say that of their web and data security initiative. Nucleus partnered with Websense to find the right web and data security solution, which not only helped them keep their IP and data protected even with a mobile workforce but also opened up the Internet access for business leverage. Interestingly, it also threw up a number of facets that the Nucleus ISO hadn’t tracked. But not before Websense also challenged itself to define and deliver a solution like never before. Learn more about that in this issue.

Taking a cue, other organizations are eager to protect their confidential data, and also look to allow free Internet access enterprise wide but only after ensuring protection from real time web-threats and malware for their employees. Which is why, our second story throws light on the types of security you should look at, as you do this. We close with an interesting piece by Parag Deodhar of Bharati AXA General Insurance Company Limited. Parag throws light on the recently formalized IT Rules 2011 by the Government of India and explores areas of security that are impacted by these rules. Data capturing, storing, transfer, and destruction all fall under the purview of these laws and this story equips you to handle these sensitive areas in your organization.

As always, we continue to dig for stories that will add value to your role and enterprise. Look out for the next issue, as we announce workshops that will enlighten CIOs on security trends. Do write to us with feedback, suggestion, and initiatives that you would like us to cover.

Related Posts:

Previous post:

Next post: