DATA PROTECTION AND PRIVACY IN SMART ICT

October 5, 2018

Today, modern computing techniques are capable of easily storing, processing and analyzing large amounts of and a variety of data. These techniques could correlate diverse datasets in order to create individual’s profiles, to gain insights, and to offer new digital services. Among others, three technologies that could play a major role in gaining these capabilities are Cloud computing, Internet of Things (IoT) and Big data. Although developed independently, the integration of these three technologies (referred to as Smart ICT) has accelerated the growth of data-driven applications and has unleashed numerous opportunities for businesses, individuals and the society at large.

Spotlight

Drainware

Company dedicated to the development of disruptive technology in the field of information security solutions to provide network security and endpoint to our customers. Our portfolio includes some specific services for enterprises (SMEs and large).

OTHER WHITEPAPERS
news image

VMware vSphere Compute Virtualization

whitePaper | March 15, 2021

This guide provides an overview of the licensing, pricing and packaging for VMware vSphere. The key topics discussed in this guide include: VMware vSphere overview Licensing overview – Licensing metric and management Packaging overview – Packaging options for editions (including VMware vCenter Server®), kits, vSphere Bitfusion and Tanzu Basic Version upgrade entitlements for existingcustomers Paid edition upgrades from vSphere 7 vSphere Platinum end of availability

Read More
news image

Can Zero Trust Network Access Replace Your VPN?

whitePaper | October 11, 2022

Secure, seamless remote network access is a business enabler — boosting remote user productivity and reducing the time spent by IT teams to onboard and maintain user-to-application connectivity with agility and resilience. And yet, remote access remains a challenge for many organizations

Read More
news image

IBM Cloud for VMware Cloud Foundation

whitePaper | May 12, 2022

VMware Cloud Foundation provides a ubiquitous hybrid cloud platform for both traditional enterprise apps and modern apps. Based on a proven and comprehensive software-defined stack including VMware Cloud Foundation with VMware Tanzu, VMware vSAN, VMware NSX-T Data Center, and VMware vRealize Suite, VMware Cloud Foundation provides a complete set of software-defined services for compute, storage, network security, Kubernetes management, and cloud management. The result is agile, reliable, efficient cloud infrastructure that offers consistent operations across private and public clouds.

Read More
news image

Building a Successful Cloud Infrastructure Security and Compliance Practice

whitePaper | August 15, 2022

Cloud security truly is a team sport that requires strong collaboration between security, IT and line of business teams. The dynamic nature of cloud is forcing information security teams to rethink how they operate and partner with other groups to address emerging security and compliance challenges their organizations face

Read More
news image

Technology Companies RealizeTransformative Benefits From Advanced SD-WAN With Integrated Security

whitePaper | October 25, 2022

Technology-driven organizations have the lead in embracing new technology trends for their digital transformation initiatives. The COVID-19 pandemic introduced unprecedented challenges in terms of disrupted operations, changed delivery models, and the urgent need to support remote work for enterprises in all industries. Technology companies were best able to adjust to the new circumstances, since most were already well into their digital transformation journey. The pandemic further emphasized the need to accelerate digital maturity and align IT investments with changing business needs. Organizations are thus prioritizing solutions that enable IT resource optimization; operational efficiency and customer experience improvement; as well as support an increasingly distributed workforce.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | October 12, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More

Spotlight

Drainware

Company dedicated to the development of disruptive technology in the field of information security solutions to provide network security and endpoint to our customers. Our portfolio includes some specific services for enterprises (SMEs and large).

Events