With the current interest in Information Exchange Gateways (IEGs), I wanted to update you on the work that we have been doing with the European Defence Agency over the last year or so. Continue reading “Deploying Information Exchange Gateway solutions”
Guards and gateways are full application layer proxies that connect to two or more networks. They accept data passed on an inbound network interface, ‘process it’, and then pass data to the outbound network interface. The difference between the two is in the ‘process it’ step.
Continue reading “What is the difference between a Guard and a Gateway?”
Content scanning and filtering products are a crucial part of a security ecosystem, validating that files being moved in or out of a network conform to expectation. But how do you determine what is expected, if the file extension (for example file.PDF) is not reliable.
Continue reading “Can you be sure a file is what it claims to be?”
The Forrester report Strategy Deep Dive: Define Your Data (free download, registration required) has an in-depth look at the topic of data classification and defines a framework for data protection, but appears to lack in detail on the “defending the data” step.
In the announcement I am quoted as saying:
Continue reading “Common Criteria Certification for Nexor Sentinel”