Erudio Security

Latest Content From Erudio Security

Whitepaper: Desktop Application Virtualization and Application Streaming: Function and Security Benefits

by Erudio SecurityJan 01, 2008

Current security issues caused by an increasing number of threats, application vulnerabilities and the growing complexity of many computing environments is making traditional approaches to system maintenance and support very difficult to manage. Exacerbating the problem of endpoint management are the user demands for freedom to install their favorite productivity applications or use the latest handheld Personal Data Assistant (PDA). In this paper, the author examines the challenges facing managers as they attempt to provide secure, continuous processing capabilities on one’s endpoint devices, specifically large clients.

Whitepaper: Keystroke Dynamics: Low Impact Biometric Verification

by Erudio SecurityJan 01, 2008

Biometrics is one of the solutions advertised by security vendors to meet multifactor authentication objectives. However, user acceptance and cost issues often avert organizations from adopting biometrics as an answer. The capital expenses and on-going maintenance costs of token-based systems are often higher than those for biometrics. Solutions based on keystroke dynamics might help meet these business challenges. This white paper overviews at biometrics in general that includes success factors for implementation and user acceptance. This white paper also takes a look at how the effectiveness of biometric solutions is measured.

Whitepaper: Fundamentals of Storage Media Sanitation

by Erudio SecurityJan 01, 2008

Data in transit or at rest is the primary focus of administrative, physical and technical safeguards. Security professionals are doing better every day when it comes to defending information in static production environments. But what happens when magnetic, optical, or semiconductor media is repurposed or retired? This white paper defines media sanitation and how it fits into an overall security program, examines how attackers extract information from electronic media even after it’s been overwritten and it explores ways one can protect the organization from attacks, both casual and highly motivated.