Improved security in Web services possible

June 2004 Cyber Security

Without proper planning and precaution, an enterprise can experience disastrous security intrusions that can result in lost revenue and decreased productivity, especially from today's new breed of debilitating online security threats.

However, says Lodewyk de Beer, solutions architect at Sun Microsystems SA, with Sun's Secure Web Server Reference Architecture, running on Sun's low-cost x86 systems, businesses have access to improved performance and decreased complexity with greater Web security on pre-tested and proven solutions.

"This Secure Web Server Reference Architecture has been updated to include the Sun Fire V20z AMD Opteron processor-based server and runs Solaris for x86 Operating System (OS) and the Sun Java System Web Server 6.1.

"It is designed to speed the implementation of Web-serving solutions without the risks of compromise associated with competing platforms," De Beer explains.

In addition, the new architecture identifies the equipment and software required for given traffic loads as well as configurations. The architecture documents the optimal balance between security settings, configurations and performance.

A blueprint for solution design, the Secure Web Server Reference Architecture equips Sun's iForce partners with the means to deliver pre-tested, pre-integrated secure Web serving solutions, minimising the time and risk associated with technology deployments.

For more information contact Elise Roscoe, Sun Microsystems SA, 011 256 6300,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Industrial control systems under attack
News Cyber Security
According to Kaspersky ICS CERT statistics, from January to September 2022, 38% of computers in the industrial control systems (ICS) environment in the META region were attacked using multiple means.

OSINT: A new dimension in cybersecurity
Cyber Security
The ancient Chinese strategist Sun Tzu noted, you should always try to know what the enemy knows and know more than the enemy.

Sasol ensures Zero Trust for SAP financials with bioLock
Technews Publishing Editor's Choice Cyber Security Security Services & Risk Management
Multi-factor authentication, including biometrics, for SAP Financials from realtime North America prevents financial compliance avoidance for Sasol.

Building a holistic application security process
Altron Arrow Cyber Security
Altron Arrow asks what it means to build a holistic AppSec process. Learn what’s involved in a holistic approach and how to get started.

Managing data privacy concerns when moving to the cloud
Cyber Security
While the cloud offers many business benefits, it can also raise concerns around compliance, and some organisations have taken the approach of staying out of the cloud for this reason.

Accelerating your Zero Trust journey in manufacturing
IT infrastructure Cyber Security Industrial (Industry)
Francois van Hirtum, CTO of Obscure Technologies, advises manufacturers on a strategic approach to safeguarding their businesses against cyber breaches.

The democratisation of threats
Cyber Security
Bugcrowd looks at some of the primary vulnerabilities the world faced in 2021, and the risks moving forward with growing attack surfaces and lucrative returns on crime.

Protecting yourself from DDoS attacks
Cyber Security Security Services & Risk Management
A DDoS attack, when an attacker floods a server or network with Internet traffic to prevent users from accessing connected online services, can be costly in both earnings and reputation.

Exploiting Android accessibility services
Cyber Security
Pradeo Security recently neutralised an application using Android accessibility services that exploits the permission to perform fraudulent banking transactions.

Cyber resilience is more than cybersecurity
Technews Publishing Editor's Choice Cyber Security Integrated Solutions IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.