Results for Security

MapR Adds Native JSON Support for Hadoop; Drives Scale, Time-To-Value for Big Data Apps

Document databases are riding a huge spike in popular, thanks to an explosion in JSON use for web, mobile and Internet of Things. MapR is making sure big data users can easily go along for the ride, as it adds native JSON-support to its distro. IDN speaks with MapR’s Jack Norris. 

Full Story >

As Halloween Approaches, Splunk Uses Analytics To Make Cyber Attacks Less Scary

This year, Splunk will move to make Halloween less scary for enterprises worried about cyber attacks. On Oct 31, Splunk is set to ship technologies to help analysts better detect, diagnose and respond to security attacks. IDN learns more from Splunk’s chief security evangelist Monzy Merza.

Full Story >

Ravello, SimSpace Use Virtualization To Create True-To-Life CyberSecurity Simulations

Ravello Systems and SimSpace Corp. are partnering on an easy to use cloud-based way to create simulated cyber attacks – and test the effectiveness of defenses, responses – and even IT skills.

Full Story >

Cloudera Intensifies Commitment to Unify Hadoop and Spark for Enterprise-Class Big Data

This fall, Cloudera is intensifying its commitment to make Apache Spark a replacement for MapReduce in the Hadoop ecosystem as the core data execution engine for workloads. Cloudera execs speak with IDN about their next roadmap for improving Spark’s scale, security, management and more.

Full Story >

LogRhythm Extends Threat Analytics Suite with Endpoint Module

Security intelligence firm LogRhythm is looking to help IT more quickly detect intruders with its latest offering Endpoint Threat Analytics Module. It supplements LogRythm’s current threat analytics modules for network and end user visibility.

Full Story >

SailPoint Extends IAM To Govern Unstructured Data with Acquisition of Whitebox Security

SailPoint, a long-time identity and access management provider, is beefing up its ability to protect unstructured data with its acquisition of Whitebox Security and the WhiteOPS unstructured data governance solution.

Full Story >

Akana Boosts DevOps, Automation and Security for API Management; Focus on Mobile and IoT

In a sign that APIs are driving wider aspects of enterprise architecture, Akana Inc. has integrated capabilities for DevOps automation and enterprise-class identity management into its API management platform.

Full Story >

Ping’s ‘Identity Defined Security’ Initiative Aims To Protect Mobile, APIs and IoT Projects

Ping Identity is delivering on its position that identity will be the best way to deliver security to the growing wave of extended enterprise use cases, including mobile, cloud and event IoT. IDN reviews components of Ping’s ‘Identity Defined Security’ initiative.

Full Story >

With Amazon API Gateway, AWS Opens a New Door on Backend Applications

Running applications for over a million customers in 190 countries, Amazon Web Services is hosting data and business logic in various back-end services, such as Amazon Elastic Compute Cloud (Amazon EC2) and AWS Lambda.

Full Story >

Axway Strikes a Balance for New-Gen MFT: Ad Hoc, Embedded File Transfers with Governance and Security

Axway is pushing managed file transfer to deliver new levels of enterprise-class responsiveness for digital business. The latest update to Axway SecureTransport supports ad hoc and embedded file transfers across traditional, cloud and even mobile  – and ensure security and governance.  IDN speaks with Axway’s Shawn Ryan.

Full Story >

Report: Webroot Finds Cybersecurity Threats Grow More Numerous, Complex

Every day, 85,000 new malicious IP addresses are launched, and the top phishing targets are technology companies and financial institutions, according to the new Webroot 2015 Threat Brief.

Full Story >

Build Your API Like It’s an App; The Importance of Testing & Monitoring

APIs are one of the most attractive of today’s developer trend. SmartBear’s Lorinda Brandon says an overlooked secret to API success is to think about (and build) your API like it’s an application.  She shares a savvy step-by-step guide.

Full Story >

Showing 25 - 36 of 222

Videos

Building a Secure Open Hybrid Cloud



  • Dave Egts - Principal Architect

  • Chris Wells - Senior Product Marketing Manager

Securing Mobile - Cloud and API Services



  • Robert Vila - WebSphere Connectivity & Integration Product Management

Agenda - CloudCon: Management & Security



  • [CA] Andy Kicklighter -  Sr. Principal Product Manager
  • [Ping Identity] Paul Madsen - Senior Technical Architect, Office of the CTO
  • [Oracle] Jyothi Swaroop - Product Director
  • [Red Hat] Dave Egts - Principal Architect
  • [Red Hat] Chris Wells - Senior Product Marketing Manager
  • [IBM]  Robert Vila - WebSphere Connectivity & Integration Product Management

Bullet-proof your Cloud



  • Jyothi Swaroop - Product Director

Ensuring Service Levels in the Clouds



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework for Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Ensuring Service Levels in the Cloud



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework 4 Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Bridging the Security Gap Between IT and Developers



  • Bradford Stephens
    Developer Evangelist Office of the CTO

CLOUD:CON: Security & Management Agenda



  • Name
    Title

Enterprise API Security Choices - One API - Total Security



  • Blake Dournaee
    Senior Product Manager Expressway Service Gateway

Overview of Symantec Resources



How To Leverage Cloud To Improve Your Compliance Status



  • Heather Hinton
    IBM Distinguished Engineer
    Cloud Security and Compliance Architecture

Cloud Considerations



  • Name
    Title

Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Oracle Mobile Security



  • Dave Smith
    Sr. Principal, for Identity Management and Security

Symantec Resource Center - Cloud Integration



Delivering Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

CyberSecurity Summit Agenda



Identity Management in a Digital Economy



  • Ricky Arora - Sr. Director, Product Management

Symantec Resource Center



Data-Centric Approach to Security from HPE Security



  • Albert Biketi - VP & GM, Data Security

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

Turning Machine Data into Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

Integrate Data Security with Your Big Data Platform



  • Praveen Jain - HPE Big Data Platform
  • Reiner Kappenberger - HPE Security

Symantec Resource Center - Enterprise Security



Agenda: Enterprise Security Summit



Deconstructing API Security



  • Ian Goldsmith - VP, Product Management