Results for ERS

Guidance Teams with Splunk & Lastline For Faster, Smarter Incident Response

Guidance Software is fortifying its endpoint detection and response with a new release of EnCase Endpoint Security, as well as new partnerships and deep integration with Splunk and Lastline. The goal is to cut time and complexity for threat detection and prevention.

Full Story >

VMware Delivers Latest Building Blocks for Infrastructure-Independent ‘Portable Apps’

VMware has a powerful vision for a new level of ‘app portability,’ where IT can lift-and-shift an entire application or workload up from one infrastructure and run it on another – whether physical, virtual, on-prem, cloud or even a hybrid mix. VMware just released its latest building blocks for delivering on this vision. IDN speaks with VMware execs.

Full Story >

Ravello, SimSpace Use Virtualization To Create True-To-Life CyberSecurity Simulations

Ravello Systems and SimSpace Corp. are partnering on an easy to use cloud-based way to create simulated cyber attacks – and test the effectiveness of defenses, responses – and even IT skills.

Full Story >

Neuron ESB’s Adapter Metadata Generation Wizard Breathes New Life into Enterprise Service Bus for On-Prem, Cloud Integration

Neuron ESB is breathing new life and capabilities into the trusty enterprise service bus for any-to-any integrations – even to the cloud. Neuron ESB is combining its library of adapters with a new Adapter Metadata Generation Wizard to easily share, add, update or delete data and records across popular on-prem and cloud apps. IDN speaks with Neuron ESB’s John Petersen.

Full Story >

Developer Survey on Internet of Things: Uncovers ‘Not-So-Great’ Expectations?

The current state of the IoT is a kind of Dickensian dichotomy. It’s not quite "best of times, worst of times," but it’s true there is both excitement and concern. IDN looks at the study by Progress Software and Harbor Research that surveyed 700 developers.

Full Story >

Report: Webroot Finds Cybersecurity Threats Grow More Numerous, Complex

Every day, 85,000 new malicious IP addresses are launched, and the top phishing targets are technology companies and financial institutions, according to the new Webroot 2015 Threat Brief.

Full Story >

Evans Data Survey Uncovers Developer Trends for Mobility, IoT for 2015

Advances across the mobile ecosystem are making it faster, easier and more lucrative for app developers. A just-released survey by Evans Data Corp. looks at developer activity. The survey also found technologies for Internet of Things ‘won the year.’  IDN speaks with Evan Data’s director of research Michael Rasalan.

Full Story >

Survey: Consumers Have Big Concerns Over Security for Mobile Payment Platforms, Apps

Despite innovative mobile payments from giants Apple and Google, a recent survey finds practically everyone is worried about smartphone-based payment security.  Even credit cards weren’t the no-brainer choice, as more than 60% of U.S. respondents said cash is their Number One choice.  IDN looks at the Tripwire survey.

Full Story >

Tibco ActiveMatrix BPM Delivers Responsive Process Apps with Real-Time Data, Events

Next month, Tibco continues to build on its recently-launched new-gen BPM platform that is infused with real-time events and data. To deliver a more adaptive, informed and responsive approach, ActiveMatrix BPM uses events, integration and what the company calls “fast data” to push BPM beyond workflow automation to provide deeper situational awareness and responsiveness.  IDN talks with Tibco’s Rachel Brennan.

Full Story >

Azul Systems Brings OpenJDK to Docker To Boost Java Performance Across On-Premises, Cloud and VMs

Azul Systems is shipping a version of its Zulu 100% open source, binary distribution of the OpenJDK 8 platform that works with Docker container technology. Azul’s Zulu 8 on Docker can improve performance and throughput of Java 6, 7 or 8 applications because it enables them to be configured for easy deployment across the most common Linux server platforms. IDN speaks with Azul CEO Scott Sellers.

Full Story >

Tradier’s Free Dev Sandbox, APIs, Aim To Spur Innovation in Financial, Brokerage Sector

Tradier Inc. is using a combination of open APIs and a developer sandbox to look for the next cool idea for trading and financial services.  The company’s no-charge Developer Sandbox aims to give devs “friction-less” access to trading services and market data, and eliminate barriers such as cost and complexity.

Full Story >

HCS Secures Heath Data in Public Cloud with Perspecsys’ AppProtex Gateway

Many healthcare firms are understandably reluctant when it comes to tapping into any public cloud service. Human Care Systems, a physician and pharmacist support company, has overcome a common data security obstacle by using a rich set of cloud data protection gateway services from Perspecsys AppProtex.

Full Story >

Showing 25 - 36 of 417

Videos

Securing the Exploding Identiverse



  • David Gorton - Platform Product Manager

BPM Game Changers: Open Source BPM from Red Hat



Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Personalized, Powerful, Easy-to-Change Business Applications



  • Raphael Allegre - Product Marketing Manager

Symantec Resource Center - Cloud Integration



Delivering Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

CyberSecurity Summit Agenda



Identity Management in a Digital Economy



  • Ricky Arora - Sr. Director, Product Management

Symantec Resource Center



Data-Centric Approach to Security from HPE Security



  • Albert Biketi - VP & GM, Data Security

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

Turning Machine Data into Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

Oracle Mobile: Mobile Offers at Manchester Airport



  • Ian Wallis - Director, Mobile PaaS Business Development

Power Customer Understanding with Modern Data Management – A Five-Step Approach



  • Ajay Khanna - VP, Product Marketing

Containers and DevOps from Hype to Reality



  • Erik Jacobs - Principal Technical Marketing Manager OpenShift

A New Partnership to Mitigate Bots – Distil Networks and Verizon



  • Edward Roberts - Dir of Product Marketing
  • Tin Zaw - Dir of Security Solutions, Verizon

API, Workflow and Application Integration for .NET Developers



  • Marty Wasznicky - Vice President

Game-Changing Data and Analytics



  • Jake Freivald - VP of Product Marketing

Securing End Users Across The Digital Enterprise



  • Patrick Sullivan - Global Director of Security Strategy

Achieving true Agility using APIs and Containers



  • Sameer Parulkar - Senior Product Marketing Manager