ANX Corporate Blog: Posts tagged as security
Showing 11 through 15 of 33 total posts
Aug 9th 2011, 09:54
ANX Adds New Secure Cloud Gateway to PCI Security & Compliance Solution
New gateway helps smaller businesses more cost-effectively achieve and maintain PCI DSS compliance
SOUTHFIELD, Mich. (August 15, 2011)– ANXeBusiness Corp. (ANX), a leading provider of managed security, compliance and connectivity solutions, today announced Secure Cloud Gateway, an enhancement to its PCI Compliance & Security solution for small businesses. Secure Cloud Gateway includes proprietary technology with features that focus on ensuring merchant PCI DSS compliance.
The ANX PCI Compliance & Security solution affords merchants and small businesses all of the cost benefits of cloud-based technology by delivering a suite of cloud-based UTM services that eliminate threats from viruses, worms, Trojan horses, spyware and other malware launched from
SOUTHFIELD, Mich. (August 15, 2011)– ANXeBusiness Corp. (ANX), a leading provider of managed security, compliance and connectivity solutions, today announced Secure Cloud Gateway, an enhancement to its PCI Compliance & Security solution for small businesses. Secure Cloud Gateway includes proprietary technology with features that focus on ensuring merchant PCI DSS compliance.
The ANX PCI Compliance & Security solution affords merchants and small businesses all of the cost benefits of cloud-based technology by delivering a suite of cloud-based UTM services that eliminate threats from viruses, worms, Trojan horses, spyware and other malware launched from
Jun 3rd 2011, 12:14
Can You Stomach The SPAM?
Most of us go through our daily routines of digesting a healthy amount of SPAM without ever noticing its nutritional value. There are several factors that help those responsible for securing ourselves with understanding the multiple flavors this wonderful package brings us in the form of email. For security administrators, we often choose "delete" like every other user, but certainly there are some value in determining the various trends associated that make people want more SPAM! Why? Because if it didn't work, we would no longer have all this SPAM sitting around.
Don't knock it 'till you try it! Go ahead, open up that email and take a look at the messaging involved, and you'll notice the increasing smell
Don't knock it 'till you try it! Go ahead, open up that email and take a look at the messaging involved, and you'll notice the increasing smell
May 26th 2011, 11:14
CCSK Training in San Jose, June 8-10
This week I was planning on writing about my experience with the CSA's CCSK certification exam. There has been a slight change of plans. Once I started going through the CCSK study guides (CSA's Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 and the ENISA report Cloud Computing: Benefits, Risks and Recommendations for Information Security) did I realize just how much material the exam covers. While I have "real world" hands on experience through my work here at ANX, and have been through the study material several times, I was beginning to doubt my readiness for the CCSK. For those of you that will be taking the test soon, how confident are you about passing the exam?Well, thankfully, the CSA has us covered. On June 8-10 the CSA will be
May 18th 2011, 11:27
Outsourcing Security? Think Responsibly!
All good intentions don’t always end up with the desired result we were originally seeking or desired. The same can be said when it comes to the ever changing world of information technology and security. The popular move right now is toward consolidation and hosting systems in the cloud. While there are many great financial benefits associated with cloud offerings, it’s important to understand the bigger picture in terms of risk and business continuity.
It’s understood that risks change over time that could pose new threats and vulnerabilities to the applications and systems in which are now hosted by a third party. The agreements in place with your provider will often detail the terms of the agreement, but often
It’s understood that risks change over time that could pose new threats and vulnerabilities to the applications and systems in which are now hosted by a third party. The agreements in place with your provider will often detail the terms of the agreement, but often
Apr 28th 2011, 12:28
CSA Certificate of Cloud Security Knowledge
Unless you’ve been living under a rock for the last couple of years, you’ve probably heard many companies touting the benefits of cloud computing ad nauseam. These days it seems like everyone has gone nebulous and jump on the cloud computing bandwagon. While services like Gmail, Netflix and Salesforce.com have become household names, how do we as industry professionals sort through the buzz and distinguish true cloud players from those who are just blowing smoke? The Cloud Security Alliance (CSA) may have the answer.
In September of 2010, the CSA announced the availability of its Certificate of Cloud Security Knowledge, or CCSK, certification. More and more organizations are looking to take advantage of cloud computing in order to lower
In September of 2010, the CSA announced the availability of its Certificate of Cloud Security Knowledge, or CCSK, certification. More and more organizations are looking to take advantage of cloud computing in order to lower