Thanks for pointing out this broken link. It should be working now.
A client has asked for specific product related questions, can you please advise if you can provide any additional info on these (see below), if not who is the best person to reach out to?
Business applications should be protected against invalid connections by:
a) assuming input from external systems (e.g. Web Services, SOA components and other applications) is insecure
b) checking access permissions when a request is made to access an object (e.g. a database record, file or equivalent)
c) repeating any client validation upon connection to the server, to defend against man-in-the-middle attacks.
Information used by browser-based applications (e.g. configuration files) should be protected against corruption or
unauthorised disclosure by:
a) locating them on partitions inaccessible to web servers (or other connected servers)
b) restricting file permissions.