Other solutions include concepts like blacklisting (use of antivirus), whitelisting, system management, system hardening
, keeping systems regularly updated and following a zone-and-conduit strategy as additional measures.
Additional features comprise device encryption, system hardening
, peripheral control and management, which should increase the ability to execute and assess security guidelines while reducing down on support and maintenance expenses.
Trusted Computer Solutions (TCS), a leading developer of cross domain, operating system and network security solutions, today announced that it has partnered with Vicom Infinity, an IBM Premier Business Partner System z reseller, to offer TCS' automated operating system hardening
tool to customers across all industries, especially finance and insurance, throughout North America, Canada and Australia.
Exacter is also being used as a quality assurance technology to measure system hardening
and Smart Grid readiness.
He is an internationally recognized top expert on power system asset management, risk management, reliability, planning, aging infrastructure, storm performance, system hardening
, and the application of business management to traditional engineering and planning functions.
Focusing on one particularly time consuming process that system administrators face, the next question was "What is the primary method of system hardening
you or your organization engage in today?
Shackleford heads up Configuresoft's team of security and compliance experts dedicated to researching and understanding the myriad of security configuration benchmarks, system hardening
best practices and regulatory standards in order to allow customers to adopt and manage security and compliance policies effectively.
TCS's new solution should be a useful tool for those organizations looking to simplify system hardening