Results for security

Okta's Identity-Driven API Access Management Securely Connects Apps & Services to Any API

Okta is bringing the power of identity management to securing APIs. Okta API Access Management is designed to help developers and IT secure APIs -- without slowing down API projects.

Full Story >

IBM Accelerates Mobile App Lifecycle with Cloud, Broad Updates to MobileFirst Foundation

This summer, IBM begins rolling out its solution for removing pesky bottlenecks that slow down mobile apps. IBM MobileFirst Foundation 8.0, fine-tuned for the cloud, also adds technologies to make it easier to develop, launch, secure and update apps. IDN takes a tour with IBM vice president Mike Gilfix.

Full Story >

ForgeRock Says IoT is Pushing Security To Become ‘Password-Less’ and More Friction-Free

ForgeRock says it’s finally time to push ‘password-less’ security.  The company is adding push authentication to its identity platform to enable password-less login and frictionless second factor authentication – for devices and human users.

Full Story >

Exabeam’s CEO Brings Speedy Analytics, Teamwork To Fight Against Ransomware

Exabeam is taking a two-fisted approach to the fight against ransomware. It is bringing together speedy analytics with a strong collation of willing security vendors.  IDN talks with Exabeam CEO Nir Polak.

Full Story >

Identity Gets Boost as ‘DNA’ for Digital Enterprise Security: Top Takeways from Ping’s Cloud Identity Summit

Could identity become the DNA for delivering agile, strong, and situational security solutions for the new-gen digital enterprise?   A growing number of security execs see the possibilities. IDN looks at the Cloud Identity Summit with execs from Ping Identity.

Full Story >

Push Technology Delivers Intelligent Data Streaming To Cut Costs for Mobile App Messaging, Data Flows

Real-time messages sent to mobile apps can quickly drain a user’s data plan. To help mobile developers improve the data efficiency of their apps, Push Technology is offering a new set of efficiency features with their Reappt real-time messaging solution.

Full Story >

Data Virtualization Powering Many Dimensions of Digital Transformation: Insights from Denodo

As architects pursue their digital enterprise projects, they are finding data virtualization is proving a valued ally for delivering reliable data integration and data sharing. IDN explores data virtualization use cases across analytics, APIs, cloud, mobile, IoT and more with Denodo execs.

Full Story >

RESTful API Design Essentials That All SOA Developers Should Know

APIs are the foundation of a Digital Business, but how to amass just the right APIs in critical mass?  Here are 11 bits of advice to help your company transform your IT staff’s SOA experts into API superstars.  Our thanks for this thoughtful list of API tips from Laura Heritage, director of API strategy at Akana.

Full Story >

PlantState Suite 8.0 Adds Operational Risk Analytics, Dashboard for Industrial Cybersecurity

Cybersecurity solution provider PAS is shipping an update to its PlantState Suite software to help workers tackle security in the era of Internet of Things. PlantState Suite 8.0 adds smart and easy-to-use features to monitor plant safety, visualize alarm systems and more.

Full Story >

Dell Security Tackles ‘Everywhere’ Secure Access for Mobile Workforce

Dell Security is shipping an update to its SonicWALL Secure Mobile Access (SMA) operating system to provide remote workers using smartphones, tablets or laptop. Notably, the solution works with managed or unmanaged devices.

Full Story >

SmartBear: Survey Finds APIs Adoption Exploding; Identifies Ways To Improve the ‘API Lifecycle’

A survey of 2300+ IT professionals finds APIs enjoying rapid growth and surging popularity.  The in-depth survey from SmartBear Software, also reveals data on how API adopters and vendors can better ensure performance, security and troubleshooting.  IDN looks at the survey with SmartBear’s Paul Bruce.

Full Story >

Centrify Focuses on Mobile Security; Ships ‘Derived Credentials’ and Partners with BlackBerry’s Good Mobility

Centrify has cracked the code on a vexing problem for mobile users that need ultra-tight security, especially those in the government or highly-regulated environments.  Thanks to Centrify's approach to ‘derived credentials,’ it offers smart card, 2-factor authentication.

Full Story >

<< Start < Previous 1 2 3 4 5 6 7 8 9 10 Next > End >>
Showing 1 - 12 of 222

Videos

Building a Secure Open Hybrid Cloud



  • Dave Egts - Principal Architect

  • Chris Wells - Senior Product Marketing Manager

Securing Mobile - Cloud and API Services



  • Robert Vila - WebSphere Connectivity & Integration Product Management

Agenda - CloudCon: Management & Security



  • [CA] Andy Kicklighter -  Sr. Principal Product Manager
  • [Ping Identity] Paul Madsen - Senior Technical Architect, Office of the CTO
  • [Oracle] Jyothi Swaroop - Product Director
  • [Red Hat] Dave Egts - Principal Architect
  • [Red Hat] Chris Wells - Senior Product Marketing Manager
  • [IBM]  Robert Vila - WebSphere Connectivity & Integration Product Management

Bullet-proof your Cloud



  • Jyothi Swaroop - Product Director

Ensuring Service Levels in the Clouds



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework for Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Ensuring Service Levels in the Cloud



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework 4 Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Bridging the Security Gap Between IT and Developers



  • Bradford Stephens
    Developer Evangelist Office of the CTO

CLOUD:CON: Security & Management Agenda



  • Name
    Title

Enterprise API Security Choices - One API - Total Security



  • Blake Dournaee
    Senior Product Manager Expressway Service Gateway

Overview of Symantec Resources



How To Leverage Cloud To Improve Your Compliance Status



  • Heather Hinton
    IBM Distinguished Engineer
    Cloud Security and Compliance Architecture

Cloud Considerations



  • Name
    Title

Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Oracle Mobile Security



  • Dave Smith
    Sr. Principal, for Identity Management and Security

Symantec Resource Center - Cloud Integration



Delivering Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

CyberSecurity Summit Agenda



Identity Management in a Digital Economy



  • Ricky Arora - Sr. Director, Product Management

Symantec Resource Center



Data-Centric Approach to Security from HPE Security



  • Albert Biketi - VP & GM, Data Security

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

Turning Machine Data into Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

Integrate Data Security with Your Big Data Platform



  • Praveen Jain - HPE Big Data Platform
  • Reiner Kappenberger - HPE Security

Symantec Resource Center - Enterprise Security



Agenda: Enterprise Security Summit



Deconstructing API Security



  • Ian Goldsmith - VP, Product Management