Results for ERS

SailPoint Updates IdentityIQ To Enable Open 'Identity-Awareness' for Enterprise Security, IT Operations

Long-time identity and access management provider SailPoint is taking a bold step to make it easy for organizations to bring IAM into the fight against hackers and data breaches. SailPoint’s IdentityIQ 7.0 IAM platform is now designed to be more easily integrated with other elements of an organization operational and IT security infrastructure.

Full Story >

Survey: IT Gains Confidence, Benefits in Using Cloud for Systems of Record; But Work Remains

A survey of IT execs finds that cloud confidence is rising to the point that many organizations are considering using the cloud for their critical systems of record  IDN looks at the latest survey from Cloud Security Alliance, titled The Cloud Balancing Act for IT: Between Promise and Peril.

Full Story >

Deloitte: For CyberSecurity – Offense Can Be the Best Defense

As 2016 begins, organizations are going on the offense to combat cyber threats, according to a report this month by Deloitte LLP.  Companies and government agencies are no longer satisfied with simply "locking the doors" where cybersecurity is concerned, said the 2016 Deloitte Analytics Trends report.

Full Story >

Survey: Finance Execs Asked To Play Bigger Role in Defending Against Cyber Threats

CFOs and other top finance execs are being asked to play a bigger role in defending their firms against growing cyber threats, according to a recent a survey. As a result, IT may expect in 2016 to get more help in fighting cybercrime from the business side. 

Full Story >

Red Hat Updates CloudForms Hybrid Cloud Management Platform; Adds Support for Microsoft Azure, Containerization

Red Hat’s latest upgrade to its CloudForms hybrid cloud management platform expands its collection of managed platforms to include Microsoft Azure, following the recent Red Hat / Microsoft partnership.  CloudForms 4 also adds management support for container architectures and even self-service features.

Full Story >

Survey: Ping Identity Finds Employee Behaviors Can Be Big Contributors To Security Risks

A recent survey of 1,000 employees at large U.S. enterprise organizations finds that employee inattentiveness, laziness and possible malicious intent add up to constitute a real cyber security concerns.  The research was commissioned by security vendor Ping Identity.

Full Story >

Guidance Teams with Splunk & Lastline For Faster, Smarter Incident Response

Guidance Software is fortifying its endpoint detection and response with a new release of EnCase Endpoint Security, as well as new partnerships and deep integration with Splunk and Lastline. The goal is to cut time and complexity for threat detection and prevention.

Full Story >

VMware Delivers Latest Building Blocks for Infrastructure-Independent ‘Portable Apps’

VMware has a powerful vision for a new level of ‘app portability,’ where IT can lift-and-shift an entire application or workload up from one infrastructure and run it on another – whether physical, virtual, on-prem, cloud or even a hybrid mix. VMware just released its latest building blocks for delivering on this vision. IDN speaks with VMware execs.

Full Story >

Ravello, SimSpace Use Virtualization To Create True-To-Life CyberSecurity Simulations

Ravello Systems and SimSpace Corp. are partnering on an easy to use cloud-based way to create simulated cyber attacks – and test the effectiveness of defenses, responses – and even IT skills.

Full Story >

Neuron ESB’s Adapter Metadata Generation Wizard Breathes New Life into Enterprise Service Bus for On-Prem, Cloud Integration

Neuron ESB is breathing new life and capabilities into the trusty enterprise service bus for any-to-any integrations – even to the cloud. Neuron ESB is combining its library of adapters with a new Adapter Metadata Generation Wizard to easily share, add, update or delete data and records across popular on-prem and cloud apps. IDN speaks with Neuron ESB’s John Petersen.

Full Story >

Developer Survey on Internet of Things: Uncovers ‘Not-So-Great’ Expectations?

The current state of the IoT is a kind of Dickensian dichotomy. It’s not quite "best of times, worst of times," but it’s true there is both excitement and concern. IDN looks at the study by Progress Software and Harbor Research that surveyed 700 developers.

Full Story >

Report: Webroot Finds Cybersecurity Threats Grow More Numerous, Complex

Every day, 85,000 new malicious IP addresses are launched, and the top phishing targets are technology companies and financial institutions, according to the new Webroot 2015 Threat Brief.

Full Story >

Showing 13 - 24 of 411

Videos

Securing the Exploding Identiverse



  • David Gorton - Platform Product Manager

BPM Game Changers: Open Source BPM from Red Hat



Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Personalized, Powerful, Easy-to-Change Business Applications



  • Raphael Allegre - Product Marketing Manager

Symantec Resource Center - Cloud Integration



Delivering Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

CyberSecurity Summit Agenda



Identity Management in a Digital Economy



  • Ricky Arora - Sr. Director, Product Management

Symantec Resource Center



Data-Centric Approach to Security from HPE Security



  • Albert Biketi - VP & GM, Data Security

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

Turning Machine Data into Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

Oracle Mobile: Mobile Offers at Manchester Airport



  • Ian Wallis - Director, Mobile PaaS Business Development

Power Customer Understanding with Modern Data Management – A Five-Step Approach



  • Ajay Khanna - VP, Product Marketing

Containers and DevOps from Hype to Reality



  • Erik Jacobs - Principal Technical Marketing Manager OpenShift