ICAP stands for Internet Content Adaption Protocol and it is a protocol aimed at providing inspection for web content. An ICAP client routes HTTP content to an ICAP server in order to process it or adapt the content. The adapted content is then returned to the ICAP client in the form of an HTTP response or an HTTP request.

Clearswift SECURE Email Gateway can detect PGP encrypted messages. When a message contains a PGP encrypted attachment, it is not able to process it and the message is treated as Unknown Binary. Inter Engineering was able to extract common patterns in files encrypted with PGP or with the open source counterpart GnuPG (GPG).

If you’ve been paying any attention to geopolitical news of late, you might have heard about the storm around Kaspersky. The Russia-based antivirus firm has been responding to allegations that it collected top secret NSA files from a customer machine and shared them with Russian intelligence agencies.

GDPR is the most comprehensive data protection legislation to date and it's revolutionizing the information security landscape. The impending enforcement of the regulation is forcing organizations to understand, and transform, the way they collect, process and store data.

Cyber attackers target privileged accounts and organizations with weak security practices can easily fall prey to privileged identity theft; the compromise of privileged account credentials. Armed with credentials to administrative and service accounts with access to critical IT assets, an attacker can steal data on an industrial scale.

Two-factor authentication (2 factor authentication or 2FA) is the authentication process where two of the three possible factors of authentication are combined.

The possible factors of authentication are:

  • something the user knows (e.g. a password, PIN code, or answer to secret question)
  • something the user has (e.g. a token, a mobile phone, a USB, a key fob)
  • something the user is (e.g. face or voice recognition, behavioral biometrics, fingerprint, retina or iris scan)

As the date that GDPR will become effective approaches, most organizations are at complete loss and still looking for the right course of actions. We have prepared a solutions matrix that maps certain aspects of GDPR to specific technologies and solutions. If you have any enquiries, do not hesitate to contact us. We are more than willing to help you throught the tedious task of complying to GPDR legislation.

Page 2 of 3

Active Care Support Service Overview

Health Check

We proactively perform periodic health checks in your environment

Virtual Replication

We replicate your environment for troubleshooting and reviewing changes

Remote Support

Our engineers connect remotely to your system for immediate support

Support engineer

You have your own personal support engineer

 Copyright © 2019. All rights reserved. Designed & Built by Inter Engineering.