Encapsulating Security Protocol (ESP)

Finjan TeamBlog, data security

Finjan Encapsulating Security Protocol (ESP)

Messages, documents, and files sent via the internet are transmitted in the form of data packets using one or more transfer mechanisms or protocols such as TCP/IP. But how can we ensure that the information received is the authentic material which the originator of the message claims to have sent? That its confidentiality has been preserved along the way? And … Read More

What is Non-Repudiation? A Closer Look at the Principles, Techniques and Best Practices

Finjan TeamBlog, data security

Finjan What is Non Repudiation? A Closer Look at the Principles, Techniques and Best Practices

The “He said, She said” dilemma – where one person claims a certain version of events that’s in partial or complete opposition to the story maintained by another – has been part of human interaction pretty much since the dawn of communication itself. Disputes of this kind are typically resolved through a majority show of faith in one of the … Read More

A Closer Look at the Authentication Header and its Role in Data Transmission and Integrity

Finjan TeamBlog, data security

Finjan A Closer Look at the Authentication Header and its Role in Data Transmission and Integrity

Given that one of the preferred methods for spies and cyber-attackers is to intercept a data stream as it moves from its source to its destination, information security practitioners have to focus much of their effort on ensuring the integrity of data in transit. The Authentication Header is an important part of this. What is an Authentication Header? An Authentication … Read More

Spread Spectrum

Finjan TeamBlog, data security

Finjan Spread Spectrum

You’ve doubtless heard about the dangers of WiFi, and the security risks resulting from wireless communications like Bluetooth over unencrypted channels. Though much of the threat in these technologies lies in the fact that information is being transmitted over them in a clear text form that’s easy for hackers to read, another aspect of the danger lies in the nature … Read More

What Businesses Need From a Robust Mobile Device Management Solution?

Finjan TeamBlog, data security

Finjan What Businesses Need From a Robust Mobile Device Management Solution?

Like many other companies, Finjan is rolling out a Mobile Device Management (MDM) solution in order to manage enterprise resources on corporate dedicated devices and employee-owned devices. Here’s a closer look at MDM and how we are meeting this business challenge. Mobile Device Management The consumerization of IT has disrupted the business world in a big way. The desktop-dependent lifestyles … Read More

5 Reasons Why You Need a Data Rights Management Policy

Finjan TeamBlog, data security

Finjan 5 Reasons Why You Need a Data Rights Management Policy

The old saying has it that “Time is Money” – but these days, “Information” carries equal weight. If confidential or proprietary data is lost, stolen, or illegally copied, it can have consequences for a business that are just as catastrophic as the collapse of all its investments and the loss of its capital base. That’s why having an effective Data … Read More