Remove CTO Remove Firewall Remove Policies
article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. Lack of clarity in InfoSec policies can lead to catastrophic damages which cannot be recovered. Security policies are tailored to the specific mission goals.

Policies 268
article thumbnail

Koch CTO teams up to get cloud networking right

CIO Business Intelligence

Traditionally, to integrate its acquisitions, Koch would flatten the acquired company’s core network, says Matt Hoag, CTO of business solutions at Koch. Matt Hoag, CTO of business solutions, Koch Industries Koch Industries. Now, we can set policy and have the entire network abide within 24 hours.”. Laying the foundation.

CTO 243
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Deepfakes are a real threat to India’s FSI sector, say tech leaders

CIO Business Intelligence

Vamsi Ithamraju, CTO, Axis Mutual Fund reiterates, “Consider a scenario where a deep fake impersonates a business leader, alleging false information that could influence stock prices or market dynamics. Ajay Poddar, CTO, HDFC Retirement Tech firmly that with great power, comes great responsibility. “To Finally, Advocate (Dr.)

article thumbnail

How Orange’s CTO is driving network transformation

TM Forum

As Orange Group’s CTO and Senior Vice President Orange Innovation Networks he is responsible for steering the evolution of the operator’s networks, including their software transformation. And we want to apply policies to automatically activate/deactivate the containers according to certain criteria.”

CTO 130
article thumbnail

Maturing Security Posture and Mitigating Concerns with FireMon

CTOvision

A good deal of effort goes into migration of existing network security infrastructure, and more importantly network security policies, to support cloud services. FireMon has not only addressed the issues in their “ State of the Firewall Report ,” but also among their customers and most large enterprises. Related articles.

Security 150
article thumbnail

Getting a business grip on security frameworks

CIO Business Intelligence

According to Gartner, which coined the term, SASE combines network security with WAN capabilities , and can encompass multiple components such as SD-WAN, secure web gateways, cloud access security broker functions, firewall as a service, and zero trust network access (ZTNA) in a cloud-native delivery model.

Security 241
article thumbnail

How OPM Could Have Avoided the Data Breach

CTOvision

Knowing the interaction of firewall rules, and uncovering vulnerabilities introduced by misconfiguration, is vital. Uncovering unused, hidden, and redundant rules, which can have unforeseen impact on overall security, would help to simplify the overall firewall environment. One such integrated tool suite is produced by FireMon.

Data 150