Results for Security

Fixmo Puts Mobile Security, Data Security and Privacy into the Hands of Users – Literally

Fixmo, a provider of mobile security and data protection solutions, is putting mobile security into the hands of users --  literally. Fixmo SafeWatch, now in beta testing, is a personal mobile security product to help consumers and business users protect their personal information and ensure privacy for their Android mobile devices.  

Full Story >

SOA Software’s OAuth Server Secures Sharing of Private Data with Cloud, Mobile Apps

SOA Software is shipping a comprehensive OAuth-based identity and access management solution to simplify security for the extended enterprise. OAuth Server lets IT allow users to use their current enterprise login credentials to access data from their partners’ mobile, cloud, API and desktop applications.

Full Story >

Eucalyptus 3.2 Sports Features, Best Practices To Improve Cloud Self-Service, Management

Eucalyptus Systems is speeding up enterprise-caliber cloud projects with new automation, orchestration, management and security features for its open source private and hybrid cloud technology. Eucalyptus 3.2 also helps IT implement a growing list of proven cloud best practices. IDN speaks with Eucalyptus vice president of products Andy Knosp. 

Full Story >

OASIS CloudAuthZ Aims To Authenticate User Access to Cloud Resources in Real-Time

The OASIS international open standards consortium has launched the Cloud Authorization (CloudAuthZ) Technical Committee, with the goal of developing improved models to manage authorizations and entitlements in SaaS, PaaS, and IaaS contexts.

Full Story >

Cloud Integration Sees Big Traction, as Dell-Boomi Hits One-Million Integrations Daily

Cloud integration at Dell Boomi has topped a milestone – one million cloud integrations per day.  The number reflects use of the company’s Atomsphere cloud-based platform to support application, data and process integrations. The news is good for the whole sector. IDN speaks with Dell Boomi’s founder and general manager Rick Nucci.

Full Story >

Attachmate Marries Enterprise Mobility with Mainframe, Legacy Assets

Attachmate Corp. is marrying mobile with the mainframe. The company’s MobileNow initiative, along with updates to Verastream, will help IT let smartphone and tablet users access valuable legacy and mainframe data, applications and more. IDN speaks with Attachmate execs about their MobileNow enterprise-class mobile solutions platform.

Full Story >

Red Hat: Cloud, Mobile, Will Fuel ‘Innovation-Ready’ Middleware in 2013

In 2013, cloud, mobile and big data will continue to drive the need for innovation – and right in the middle of these projects will be, well, middleware. So says, Craig Muzilla, vice president of Red Hat’s Middleware Business Unit. IDN speaks with Muzilla about what’s on his integration watch list for this year. 

Full Story >

Tangoe Adds Mobile Device Containerization to MDM Solution

Tangoe Inc. is shipping integrated mobile device containerization capabilities with its  mobile device management solution (MDM). The technology aims to deliver BYOD enterprise IT the security and management they need, and provide employees the flexibility and personal privacy they want. 

Full Story >

Aveksa Adds SSO to Its Cloud-Based Identity, Access Management SaaS Platform

Aveksa Inc is adding single sign-on capabilities to its MyAccessLive cloud-based identity and access management offering. The new SSO capabilities enriches  Aveksa’s cloud-based IAM to help IT more easily provision and manage secure connections to thousands of on-premise, cloud and mobile applications. 

Full Story >

Build.com Taps Cloud-Based Veracode To Improve Code Security Across SDLC

Build,com is looking to more quickly and easily detect and plug application bugs and vulnerabilities by automating key elements of its application testing. The company bringing Veracode’s cloud-based application security testing solution into its software development lifecycle. 

Full Story >

Studies Foresee Surge in BYOD Security Investment, Education in 2013

Two studies confirm the BYOD craze will enter a new phase in 2013, as attention and investment shifts from building apps and fancy UIs to addressing security and compliance issues. The studies of CIOs and security officers were conducted by Frost & Sullivan and IDC.

Full Story >

OneLogin Says Integration is Key to Success for Cloud-Based SSO, Identity and Access Management

OneLogin is using the cloud to deliver an enterprise-class solution to manage identities for users accessing on-premise, cloud, SaaS and mobile data or apps. IDN speaks with OneLogin’s CEO Thomas Pedersen about why integration will prove to be a key to success to how a cloud-based federated identity solution can secure apps and data anywhere. 

Full Story >

Showing 97 - 108 of 222

Videos

Building a Secure Open Hybrid Cloud



  • Dave Egts - Principal Architect

  • Chris Wells - Senior Product Marketing Manager

Securing Mobile - Cloud and API Services



  • Robert Vila - WebSphere Connectivity & Integration Product Management

Agenda - CloudCon: Management & Security



  • [CA] Andy Kicklighter -  Sr. Principal Product Manager
  • [Ping Identity] Paul Madsen - Senior Technical Architect, Office of the CTO
  • [Oracle] Jyothi Swaroop - Product Director
  • [Red Hat] Dave Egts - Principal Architect
  • [Red Hat] Chris Wells - Senior Product Marketing Manager
  • [IBM]  Robert Vila - WebSphere Connectivity & Integration Product Management

Bullet-proof your Cloud



  • Jyothi Swaroop - Product Director

Ensuring Service Levels in the Clouds



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework for Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Ensuring Service Levels in the Cloud



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework 4 Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Bridging the Security Gap Between IT and Developers



  • Bradford Stephens
    Developer Evangelist Office of the CTO

CLOUD:CON: Security & Management Agenda



  • Name
    Title

Enterprise API Security Choices - One API - Total Security



  • Blake Dournaee
    Senior Product Manager Expressway Service Gateway

Overview of Symantec Resources



How To Leverage Cloud To Improve Your Compliance Status



  • Heather Hinton
    IBM Distinguished Engineer
    Cloud Security and Compliance Architecture

Cloud Considerations



  • Name
    Title

Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Oracle Mobile Security



  • Dave Smith
    Sr. Principal, for Identity Management and Security

Symantec Resource Center - Cloud Integration



Delivering Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

CyberSecurity Summit Agenda



Identity Management in a Digital Economy



  • Ricky Arora - Sr. Director, Product Management

Symantec Resource Center



Data-Centric Approach to Security from HPE Security



  • Albert Biketi - VP & GM, Data Security

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

Turning Machine Data into Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

Integrate Data Security with Your Big Data Platform



  • Praveen Jain - HPE Big Data Platform
  • Reiner Kappenberger - HPE Security

Symantec Resource Center - Enterprise Security



Agenda: Enterprise Security Summit



Deconstructing API Security



  • Ian Goldsmith - VP, Product Management