Results for Security

BYOD Alert: AdaptiveMobile Survey Finds 70% of Workers Unhappy with Employer Control Over Mobile Devices

In a wake-up call for BYOD managers, some 70% of employees say they would stop using their own mobile devices for work if they knew managers could remotely wipe or lock them. This highlights user concerns that employers could invade their mobile privacy. The survey was released by mobile security company AdaptiveMobile.

Full Story >

2014’s RSA Event Focuses on How To Secure & Govern Today’s ‘Extended Enterprise’

Last month’s RSA Conference reported the biggest crowds ever – topping 28,500. It’s the best evidence yet that today we’re in the era of the “Extended Enterprise.”  Projects that push the boundaries of on-premises IT, such as APIs, big data, cloud, mobile and SaaS apps, are all redefining enterprise architectures. IDN looks at 2014’s RSA for where security and compliance are heading.

Full Story >

Qualys, SANS Launch Free Cloud Service to Halt Top Cyberattacks

Qualys Inc. has teamed up with the SANS Institute and the Council on CyberSecurity on a free service to help enterprises implement the Top 4 Security Controls Cloud Service to ward off cyberattacks. The ‘Top 4’ cybersecurity service helps businesses identity top security threats from Windows PCs, and make sure controls are implemented.

Full Story >

Survey: Cloud Adoption Outpacing Network Security, Compliance

As security experts meet this week at the RSA annual conference, a survey finds that even as cloud use continues to rise, adoption of effective cloud security and compliance solutions need to catch up. 

Full Story >

Gazzang, OmniTI Team Up on Cloud-Based Solution To Secure Student Data

Security solutions provider Gazzang is teaming up with web scalability and performance provider OmniTI  to provide a data security and encryption solution for a non-profit organization that helps school systems develop student data portals.

Full Story >

Accenture Finds Uncle Sam is Still Struggling with ‘Cloud First’ Adoption

Three years after the Obama Administration mandated that federal agencies take a ‘Cloud First’ approach to launching apps, Uncle Sam is still facing hurdles, including staff challenges and long procurement timelines, according to a survey released by Accenture.

Full Story >

Bitglass Launches Cloud-Based Solution to Secure BYOD, Enterprise Mobility

To help enterprises alleviate BYOD security concerns, especially over data leakage of corporate data, Bitglass is offering a SaaS (software-as-a-service) solution to secure data in the cloud. The cloud-based Bitglass solution lets IT control corporate data from anywhere on any device at any time without any software installs.

Full Story >

Splunk Enhances Enterprise Security App with Threat Intelligent Framework, Visualizations

Splunk Inc. is shipping an update to its Splunk App for Enterprise Security, to help security professionals stalk cyberattackers. Splunk App for Enterprise Security 3.0 includes visualizations for better threat detection, a new threat intelligence framework, and support for new data types and data models.

Full Story >

Study: MetaIntell: Finds Data Leakage in 92% of Top 500 Android Mobile Apps

After testing the most downloaded Android apps, MetaIntell found 460 of 500 of the most popular apps create a security or privacy risk when they’re downloaded to Android devices.  The assessment tests were conducted using MetaIntell’s AppInterrogator service, which can detect mobile app vulnerabilities such as pirated code, data leakage and security risks.

Full Story >

MapR Boosts Hadoop’s ‘Out-of-the-Box’ Security with Native Authentication, Authorization

MapR Technologies’ latest effort to enrich Hadoop with out-of-the-box enterprise features focuses on security. To make securing big data easier and more reliable MapR has natively integrated authentication and authorization into the beta of its MapR Distribution for Apache Hadoop. IDN speaks with MapR’s Jack Norris.

Full Story >

Gartner Report Predicts Cloud Security Market Will Rise 30% by 2015

The cloud-based security services market is set to top $3 billion in the next two years, according to Gartner Inc.   The top three cloud services customers will be looking toward will be mail security, web security services and identity and access management (IAM), according to Gartner

Full Story >

Verizon Revamps IaaS, Cloud Storage To Better Manage, Secure & Meet App SLAs

Verizon is revamping its public cloud-based infrastructure and storage service to better manage, secure and meet SLAs for business-critical apps companies would like to move to the cloud. IDN speaks with Verizon Terremark CTO John Considine about this fall’s public beta of Verizon Cloud IaaS and cloud-based object storage service.

Full Story >

Showing 73 - 84 of 222

Videos

Building a Secure Open Hybrid Cloud



  • Dave Egts - Principal Architect

  • Chris Wells - Senior Product Marketing Manager

Securing Mobile - Cloud and API Services



  • Robert Vila - WebSphere Connectivity & Integration Product Management

Agenda - CloudCon: Management & Security



  • [CA] Andy Kicklighter -  Sr. Principal Product Manager
  • [Ping Identity] Paul Madsen - Senior Technical Architect, Office of the CTO
  • [Oracle] Jyothi Swaroop - Product Director
  • [Red Hat] Dave Egts - Principal Architect
  • [Red Hat] Chris Wells - Senior Product Marketing Manager
  • [IBM]  Robert Vila - WebSphere Connectivity & Integration Product Management

Bullet-proof your Cloud



  • Jyothi Swaroop - Product Director

Ensuring Service Levels in the Clouds



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework for Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Ensuring Service Levels in the Cloud



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework 4 Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Bridging the Security Gap Between IT and Developers



  • Bradford Stephens
    Developer Evangelist Office of the CTO

CLOUD:CON: Security & Management Agenda



  • Name
    Title

Enterprise API Security Choices - One API - Total Security



  • Blake Dournaee
    Senior Product Manager Expressway Service Gateway

Overview of Symantec Resources



How To Leverage Cloud To Improve Your Compliance Status



  • Heather Hinton
    IBM Distinguished Engineer
    Cloud Security and Compliance Architecture

Cloud Considerations



  • Name
    Title

Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Oracle Mobile Security



  • Dave Smith
    Sr. Principal, for Identity Management and Security

Symantec Resource Center - Cloud Integration



Delivering Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

CyberSecurity Summit Agenda



Identity Management in a Digital Economy



  • Ricky Arora - Sr. Director, Product Management

Symantec Resource Center



Data-Centric Approach to Security from HPE Security



  • Albert Biketi - VP & GM, Data Security

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

Turning Machine Data into Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

Integrate Data Security with Your Big Data Platform



  • Praveen Jain - HPE Big Data Platform
  • Reiner Kappenberger - HPE Security

Symantec Resource Center - Enterprise Security



Agenda: Enterprise Security Summit



Deconstructing API Security



  • Ian Goldsmith - VP, Product Management