Results for ERS

Red Hat Updates CloudForms Hybrid Cloud Management Platform; Adds Support for Microsoft Azure, Containerization

Red Hat’s latest upgrade to its CloudForms hybrid cloud management platform expands its collection of managed platforms to include Microsoft Azure, following the recent Red Hat / Microsoft partnership.  CloudForms 4 also adds management support for container architectures and even self-service features.

Full Story >

Survey: Ping Identity Finds Employee Behaviors Can Be Big Contributors To Security Risks

A recent survey of 1,000 employees at large U.S. enterprise organizations finds that employee inattentiveness, laziness and possible malicious intent add up to constitute a real cyber security concerns.  The research was commissioned by security vendor Ping Identity.

Full Story >

Guidance Teams with Splunk & Lastline For Faster, Smarter Incident Response

Guidance Software is fortifying its endpoint detection and response with a new release of EnCase Endpoint Security, as well as new partnerships and deep integration with Splunk and Lastline. The goal is to cut time and complexity for threat detection and prevention.

Full Story >

VMware Delivers Latest Building Blocks for Infrastructure-Independent ‘Portable Apps’

VMware has a powerful vision for a new level of ‘app portability,’ where IT can lift-and-shift an entire application or workload up from one infrastructure and run it on another – whether physical, virtual, on-prem, cloud or even a hybrid mix. VMware just released its latest building blocks for delivering on this vision. IDN speaks with VMware execs.

Full Story >

Ravello, SimSpace Use Virtualization To Create True-To-Life CyberSecurity Simulations

Ravello Systems and SimSpace Corp. are partnering on an easy to use cloud-based way to create simulated cyber attacks – and test the effectiveness of defenses, responses – and even IT skills.

Full Story >

Neuron ESB’s Adapter Metadata Generation Wizard Breathes New Life into Enterprise Service Bus for On-Prem, Cloud Integration

Neuron ESB is breathing new life and capabilities into the trusty enterprise service bus for any-to-any integrations – even to the cloud. Neuron ESB is combining its library of adapters with a new Adapter Metadata Generation Wizard to easily share, add, update or delete data and records across popular on-prem and cloud apps. IDN speaks with Neuron ESB’s John Petersen.

Full Story >

Developer Survey on Internet of Things: Uncovers ‘Not-So-Great’ Expectations?

The current state of the IoT is a kind of Dickensian dichotomy. It’s not quite "best of times, worst of times," but it’s true there is both excitement and concern. IDN looks at the study by Progress Software and Harbor Research that surveyed 700 developers.

Full Story >

Report: Webroot Finds Cybersecurity Threats Grow More Numerous, Complex

Every day, 85,000 new malicious IP addresses are launched, and the top phishing targets are technology companies and financial institutions, according to the new Webroot 2015 Threat Brief.

Full Story >

Evans Data Survey Uncovers Developer Trends for Mobility, IoT for 2015

Advances across the mobile ecosystem are making it faster, easier and more lucrative for app developers. A just-released survey by Evans Data Corp. looks at developer activity. The survey also found technologies for Internet of Things ‘won the year.’  IDN speaks with Evan Data’s director of research Michael Rasalan.

Full Story >

Survey: Consumers Have Big Concerns Over Security for Mobile Payment Platforms, Apps

Despite innovative mobile payments from giants Apple and Google, a recent survey finds practically everyone is worried about smartphone-based payment security.  Even credit cards weren’t the no-brainer choice, as more than 60% of U.S. respondents said cash is their Number One choice.  IDN looks at the Tripwire survey.

Full Story >

Tibco ActiveMatrix BPM Delivers Responsive Process Apps with Real-Time Data, Events

Next month, Tibco continues to build on its recently-launched new-gen BPM platform that is infused with real-time events and data. To deliver a more adaptive, informed and responsive approach, ActiveMatrix BPM uses events, integration and what the company calls “fast data” to push BPM beyond workflow automation to provide deeper situational awareness and responsiveness.  IDN talks with Tibco’s Rachel Brennan.

Full Story >

Azul Systems Brings OpenJDK to Docker To Boost Java Performance Across On-Premises, Cloud and VMs

Azul Systems is shipping a version of its Zulu 100% open source, binary distribution of the OpenJDK 8 platform that works with Docker container technology. Azul’s Zulu 8 on Docker can improve performance and throughput of Java 6, 7 or 8 applications because it enables them to be configured for easy deployment across the most common Linux server platforms. IDN speaks with Azul CEO Scott Sellers.

Full Story >

Showing 13 - 24 of 407

Videos

Securing the Exploding Identiverse



  • David Gorton - Platform Product Manager

BPM Game Changers: Open Source BPM from Red Hat



Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Personalized, Powerful, Easy-to-Change Business Applications



  • Raphael Allegre - Product Marketing Manager

Symantec Resource Center - Cloud Integration



Delivering Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

CyberSecurity Summit Agenda



Identity Management in a Digital Economy



  • Ricky Arora - Sr. Director, Product Management

Symantec Resource Center



Data-Centric Approach to Security from HPE Security



  • Albert Biketi - VP & GM, Data Security

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

Turning Machine Data into Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

Oracle Mobile: Mobile Offers at Manchester Airport



  • Ian Wallis - Director, Mobile PaaS Business Development

Power Customer Understanding with Modern Data Management – A Five-Step Approach



  • Ajay Khanna - VP, Product Marketing

Containers and DevOps from Hype to Reality



  • Erik Jacobs - Principal Technical Marketing Manager OpenShift