Protecting corporate data
iHub provides a structured content generation solution for web applications. Deploying Actuate applications developed for the internet, such as Visualization Platform, requires planning for network security.
Internet applications support access to information within an organization from outside that organization. Because the organization’s internal network is connected to the internet, there is the risk of unauthorized access to the corporate network and to the data that resides on that network.
Organizations use one or a combination of the technologies described in the following sections to prevent unauthorized access to the corporate network and protect authentication transactions from intrusion.