These Pearl Software customer case studies and technical papers document how and why companies are using Pearl Software's cybersecurity solutions to enhance productivity, reduce liabilities and protect and conserve resources.
Connectivity, inexpensive bandwidth and the ubiquity of end user devices have contributed to creating the always-on employee, further blurring the traditional and once-sacred boundary of work and personal time. As a result, employees may feel warranted with the self-proclaimed right to managing their own time while at work. More...
Cybersecurity holes expose government institutions and critical infrastructure. Regulatory mandates such as FISMA, HIPAA and SOX as well as Duty of Care require agencies to implement extensive information security programs while protecting the privacy of US citizens. More...
Healthcare providers are required to maintain technical and physical safeguards to ensure the confidentiality and unauthorized disclosure of patient information. HIPAA stipulates that wrongfully disclosure of a patient’s health information is subject to fines ranging to $250,000 and prison time ranging to 10 years. More...
Managing liabilities is part of the cost of doing business; extraordinary liabilities such as hostile workplace suits, negative public relations and the negligent disclosure of personally identifiable information can go a long way towards sinking a business. For financial institutions, Internet abuse also includes the transmission of sensitive customer data such as Social Security numbers. More...
Internet use is a part of a student’s daily routine, in part because today’s children have grown up with computers. Computers are integrated into their communication habits and are used as a tool to help students work more efficiently. The Internet provides a vast store of online knowledge and resources. Web access in the classroom has a dark side, however, when Internet use becomes Internet abuse. More...
US Law Enforcement requires real-time capability to monitor subjects and supervise offenders and defendants who have access to technology. The solution must consist of a highly secure technology that is designed to comply with existing case law and Federal legal opinions rendered as well as withstand rigorous judicial scrutiny. More...
Programs that compromise electronic data or disable the security of computers are not new however their prevalence has been exacerbated by the connectivity that the Internet provides. Malware are malicious software programs that pretend to be something useful like an image file or desktop screen saver. More...
There are generally three architectures used in order to monitor and/or control the access to content available on the Internet: Pass-Through (Proxy), Pass-By (Sniffer) and Client-Server (Agent). Each has its advantages and disadvantages summarized in what follows. More...