DiscoverFTFBTF - For the Founder By the Founder - Privacy Security Unboxed for the SMB businessStep 5 – Review of implementations - controls can be implemented using open source software
Step 5 – Review of implementations - controls can be implemented using open source software

Step 5 – Review of implementations - controls can be implemented using open source software

Update: 2021-05-30
Share

Description

We have rolled out policies, procedures etc. However, it cannot be standalone and cannot be only a one-time review.

Review of implementations like Log Review, Incident Review, SIEM, Monitoring of the various access, set up a helpdesk etc. All of these can be implemented via Open Source solutions.

 

We have now defined policies, procedures, done the technical implementation using all the technologies we had within our setup. This is to ensure that we have generated optimum usage of everything we have spent on. Like learning, investment in technology is not wasted. We will always find use of this in every mode that is possible. Each desktop can be used, each laptop can be used in the defense of cybersecurity. It is not just the biggies like Firewall etc that come to the rescue. Many of the attacks happen through legitimate traffic (e-mail, while browsing) etc and hence the end point (as we call the desktop etc in security parlance) needs to have a defense mechanism as much as the others.

The flow described in this season can be used by in either of the below situations:

  • you and work standalone/ 
  • work with a consultant/expert 
  • can be used to run the show via the Arrka Privacy Management Platform (both for Security and Privacy). 

For details, reach out to us on sameer.anja@arrka.com; sales@arrka.com; twitter: sameeranja, twitter: arrka2; Give a reference of this cast and avail credits on the platform usage and subscription. The Arrka Platform is made by SMB and for the SMB.





Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Step 5 – Review of implementations - controls can be implemented using open source software

Step 5 – Review of implementations - controls can be implemented using open source software

Sameer Anja