Tag Archives: IT outsourcing risk

Encrypted Channel Monitoring – Crypto Auditor

Crypto Auditor is a centrally managed inline appliance or virtual appliance which has the ability to monitor, audit and control encrypted SSH, SFTP and RDP sessions without having to deploy agents or change end user experience. The centralized management architecture … Continue reading

Crypto Auditor , , , , , , ,

Management of IT outsourcing risks

IT outsourcing comes in many forms and permutations. Some of the most common types of IT outsourcing are in systems development and maintenance, support to DC operations, network administration, disaster recovery services, application hosting, and cloud computing. Outsourcing can involve … Continue reading

MAS Technology Risk Management Guidelines