Where do you put vulnerability assessment (VA) scanners in a very distributed network? Consider a scenario where a company has a presence in North America, Europe, and South Asia. As part of its annual penetration testing environment, the company wants to conduct vulnerability assessment at all its demilitarized zones (DMZ). North America may have DMZs… Continue reading Placing a Vulnerability Assessment Scanner
Category: Security Architecture
Security Architecture and Models
Difference between SaaS and ASP
An objective comparison between Application Service Provider (ASP) and Software as a Service (SaaS)
Security Architecture Framework
Security Architecture Framework should provide comprehensive view of security in the enterprise and be the reference model for any security architecture artifacts and all design.
Security Architecture Definition
The definition of security architecture has never been consistent among experts. While it is a framework for some, it’s a process or a detailed technical design for others.
EDW Security Considerations
An Enterprise Data Warehouse (EDW), according to California State University, is a collection of data that can be defined and shared across the whole enterprise along the lines of common dimensions to be used for analysis. While you are in the designing phase of an EDW, there are certain security and related functional requirements that needs to be considered.