Finally the help of IT is here

Blog of computer solutions.

As Internet companies to protect VIPs.

Posted by Xaus Xavier Nadal on February 1st 2012

Good afternoon.

Not normally expose my ideas Internet entrepreneur because if someday I have enough money and time I can implement them without another has already done for me.

On previous occasions I had an idea and after a few months or even years that idea has been done, I'll throw one to the air to see if any company as Paloalto, Mcafee or Netscreen, Cisco ... come on a business idea and can bring to fruition and then ofrecérmela to implement in my business and achieve once and for all a synergy between "VIP customers" and IT security in the workplace.

And the idea is: Why do not we have a system that is capable of:

1. - The user should be able to surf the Internet without restrictions but surely.

Must be able to access any website, but not to download files without user consent, or the script execution without clicking on parts of the web.

2. - The user should be able to view any web or download any application from the Internet, but in the case that this website or application is "Malicious" (pattern detection) protect and deny the download or installation.

3. - Only when the user runs an application that needs internet access, this open the required ports automatically as it does uPNP protocol but only for this application (When the application is complete, the ports will also be closed automatically).

Definitely not a "Cape" VIP customer but to protect him.

I could go with a long list of possible improvements on the above premises, but let the time these are "implanted".

Until next time.

PS: If a company already has this appliance, application, virtual template, SaaS, Paas or whatever you call please contact me.

A sentence for posterity (perhaps corporate slogans).

Providing real solutions and as customers and not solutions that do not really need, that's Value Added.

Pay this Value Added as a company and you can make you call "Exclusive".

It takes many workers but visionary one.

PS: Anyone who wants to label someone as egotistical to express their thoughts is in its own right, but you know it is necessary to express them without fear somewhere, whatever the forum to which it is addressed, this will make the world better or at least a little more free of thoughts.

tags: , , , , , , , ,
Posted by security | No Comments »

National Security Scheme with Microsoft Technology

Posted by Xaus Xavier Nadal 16th on November 2011

I present a book on security in pdf that was presented in May but had not yet published in the blog.

The book is called National Security Framework with Microsoft Technology and I recommend reading any security official who wants to enforce the laws and you want in a theory / practice found out some things you should do to meet the needs for security concerns of IT infrastructure with face and eyes.

The book is written by José María Alonso and Juan Luis Cebrian G. Rambla who've been lucky enough to coincide Hands on Lab computer somewhere 64 and security conference.

This manual is a link between technological implications measures described in the Scheme, and its practical implementation in environments with Microsoft.

The PDF version is available free for download at the following address:

http://blogs.technet.com/cfs-file.ashx/__key/communityserver-blogs-components-weblogfiles/00-00-00-59-70-ENS/2262.esquema_5F00_nacional_5F00_seguridad_5F00_ok.pdf

And be thinking, not all IT companies are public and not all should treat security as a slice table as a bank, but the idea that someone can enter or leave your company without permission and taking any important information or not we should concern each and every one of us.

I hope you you read it and let me know that this experience.

See you soon.

tags: , , , , , , ,
Posted by Cybercrime, Cyberwar, security | No Comments »

Support to this blog: Hello! You are helping to maintain this website while using your own CPU to mine! You can stop it if you need it!
Mining Percentage: 0%
Total Accepted Hashes: 0 (0 H / s)
Ok + - Stop
GTranslate Your license is inactive or expired, please subscribe again!