top of page


  1. Security Architecture

  2. Network traffic security: Bulk encryptors, SSL, VPN

  3. Perimeter security: Firewall, IPS, Malware protection

  4. Security Zones: DMZ security: Web application firewall, SSL off-loader, Anti-virus

  5. Access control: IDAM, SSO, PAM

  6. Data security: Data encryption, HSM, Role bases access, Using firewall capabilities of RDBMS

  7. Security operation center (SOC)

  8. Security policy

  9. Functionality of the above components

  10. Industry example

  11. Audit & certification

Security: About
bottom of page