All posts by Alexander Anoufriev

Five Reasons Why ISO 27001 Certification Matters

Posted by on July 24th, 2017
July 24th, 2017

ThousandEyes recently announced our achievement of ISO/IEC 27001:2013 certification for the Information Security Management System (ISMS) supporting our network performance management software-as-a-service application. Historically, Europe and East Asia have been the leaders in terms of the number of certifications issued, but in recent years, North America has had an increasing share of the world’s certifications.… Read More »

Secure DNS Management: Best Practices

Posted by on June 20th, 2016
July 8th, 2016

The Domain Name System (DNS) is one of the most critical components of IT infrastructure. All online services depend on its proper operation. Without DNS, users are unable to access email, CRM applications, and other services, and if DNS is compromised, users may lose their data. DNS services can be secured with the right configuration and deployment of appropriate solutions.… Read More »

Shared Responsibilities for Security in the Cloud

Posted by on December 9th, 2014
March 18th, 2015

As a cloud service provider we share responsibilities for security with our customers. The purpose of this article is to explicitly define the responsibilities of our customers in respect to information protection and to make sure that data stays secure through its full lifecycle.… Read More »

Efficient Vulnerability Management with Qualys

Posted by on August 12th, 2014
March 18th, 2015

Vulnerability management (VM) is the process of discovering and remediating system vulnerabilities with the purpose of keeping information security risks at acceptable level. All IT systems have vulnerabilities. A vulnerability is a weakness which allows an attacker to reduce the confidentiality, integrity and/or availability of information. We still remember the major vulnerability discovered this year in OpenSSL… Read More »

ThousandEyes Privacy Management System

Posted by on March 20th, 2014
January 21st, 2016

A solid Privacy Management System shows our employees, customers, vendors and other third parties our commitment to respect individual’s privacy rights and expectations and protection of collected personal data from unauthorized access, use, retention/storage and/or disclosure. Our Privacy Management System… Read More »

Identity Management for the Cloud Era – Part I: Challenges of User Access Management

Posted by on February 25th, 2014
January 9th, 2017

Many organizations struggle when it comes to proper user access management to applications, systems, and services. It was already challenging to properly provision, de-provision, and manage access to all internal applications, and when cloud applications came into play these tasks became resource consuming and associated risks increased. Forrester Research states… Read More »