Results for security

Centrify Focuses on Mobile Security; Ships ‘Derived Credentials’ and Partners with BlackBerry’s Good Mobility

Centrify has cracked the code on a vexing problem for mobile users that need ultra-tight security, especially those in the government or highly-regulated environments.  Thanks to Centrify's approach to ‘derived credentials,’ it offers smart card, 2-factor authentication.

Full Story >

SailPoint Updates IdentityIQ To Enable Open 'Identity-Awareness' for Enterprise Security, IT Operations

Long-time identity and access management provider SailPoint is taking a bold step to make it easy for organizations to bring IAM into the fight against hackers and data breaches. SailPoint’s IdentityIQ 7.0 IAM platform is now designed to be more easily integrated with other elements of an organization operational and IT security infrastructure.

Full Story >

Bigstep Launches Easy-to-Use ‘Data Lake as a Service’ Optimized for Big Data

Big data as a service provider Bigstep just launched a ‘data lake as a service’ offering, the Full Metal Data Lake.  It looks to remove much of the cost, hassle and complexity of big data and data management at such explosive scale.

Full Story >

Survey: Developers Rank Top ‘Must Haves’ for Enterprise Mobile Apps in 2016

A survey of enterprise mobile app developers ranks their top considerations for success in 2016.  Alpha Software found mobile app professionals says backend integration, security, offline functionality will be ‘must haves’ – and critical to success. Low-code tools to speed up app launches will gain more attention.

Full Story >

Survey: IT Gains Confidence, Benefits in Using Cloud for Systems of Record; But Work Remains

A survey of IT execs finds that cloud confidence is rising to the point that many organizations are considering using the cloud for their critical systems of record  IDN looks at the latest survey from Cloud Security Alliance, titled The Cloud Balancing Act for IT: Between Promise and Peril.

Full Story >

Deloitte: For CyberSecurity – Offense Can Be the Best Defense

As 2016 begins, organizations are going on the offense to combat cyber threats, according to a report this month by Deloitte LLP.  Companies and government agencies are no longer satisfied with simply "locking the doors" where cybersecurity is concerned, said the 2016 Deloitte Analytics Trends report.

Full Story >

Exabeam’s Extensible UBA Supercharges Enterprise Security via Integration, Partners

As 2016 kicks off, User Behavior Analytics (UBA) will be a hot area for security investments, according to Gartner analysts. The reason: UBA can deliver big security results, especially when integrated with other security solutions. IDN looks at Exabeam UBA, and the company’s program to forge wide-ranging partnerships with Exabeam’s Rick Caccia.

Full Story >

Survey: Finance Execs Asked To Play Bigger Role in Defending Against Cyber Threats

CFOs and other top finance execs are being asked to play a bigger role in defending their firms against growing cyber threats, according to a recent a survey. As a result, IT may expect in 2016 to get more help in fighting cybercrime from the business side. 

Full Story >

Aeromexico Uses APIs To Drive ‘Digital Business’ with Partners Using Akana’s API Management Platform

Aeromexico, Mexico’s flagship air carrier, plans to use Akana’s API management platform to expose its multiple backend systems and data sources to make it easier to connect – even in real-time - with hotel chains, cruise ship lines and other partner firms.

Full Story >

Survey: Ping Identity Finds Employee Behaviors Can Be Big Contributors To Security Risks

A recent survey of 1,000 employees at large U.S. enterprise organizations finds that employee inattentiveness, laziness and possible malicious intent add up to constitute a real cyber security concerns.  The research was commissioned by security vendor Ping Identity.

Full Story >

Guidance Teams with Splunk & Lastline For Faster, Smarter Incident Response

Guidance Software is fortifying its endpoint detection and response with a new release of EnCase Endpoint Security, as well as new partnerships and deep integration with Splunk and Lastline. The goal is to cut time and complexity for threat detection and prevention.

Full Story >

OpenPeak Offers Rich In-App Security; Blocks Suspicious Data Movement – Down to the Root

Mobile security solutions company OpenPeak is offerings an in-app hypervisor, in part to cut off hacker access to mobile users’ personal info and other data.

Full Story >

Showing 13 - 24 of 223

Videos

Building a Secure Open Hybrid Cloud



  • Dave Egts - Principal Architect

  • Chris Wells - Senior Product Marketing Manager

Securing Mobile - Cloud and API Services



  • Robert Vila - WebSphere Connectivity & Integration Product Management

Agenda - CloudCon: Management & Security



  • [CA] Andy Kicklighter -  Sr. Principal Product Manager
  • [Ping Identity] Paul Madsen - Senior Technical Architect, Office of the CTO
  • [Oracle] Jyothi Swaroop - Product Director
  • [Red Hat] Dave Egts - Principal Architect
  • [Red Hat] Chris Wells - Senior Product Marketing Manager
  • [IBM]  Robert Vila - WebSphere Connectivity & Integration Product Management

Bullet-proof your Cloud



  • Jyothi Swaroop - Product Director

Ensuring Service Levels in the Clouds



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework for Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Ensuring Service Levels in the Cloud



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework 4 Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Bridging the Security Gap Between IT and Developers



  • Bradford Stephens
    Developer Evangelist Office of the CTO

CLOUD:CON: Security & Management Agenda



  • Name
    Title

Enterprise API Security Choices - One API - Total Security



  • Blake Dournaee
    Senior Product Manager Expressway Service Gateway

Overview of Symantec Resources



How To Leverage Cloud To Improve Your Compliance Status



  • Heather Hinton
    IBM Distinguished Engineer
    Cloud Security and Compliance Architecture

Cloud Considerations



  • Name
    Title

Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Oracle Mobile Security



  • Dave Smith
    Sr. Principal, for Identity Management and Security

Symantec Resource Center - Cloud Integration



Delivering Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

CyberSecurity Summit Agenda



Identity Management in a Digital Economy



  • Ricky Arora - Sr. Director, Product Management

Symantec Resource Center



Data-Centric Approach to Security from HPE Security



  • Albert Biketi - VP & GM, Data Security

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

Turning Machine Data into Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

Integrate Data Security with Your Big Data Platform



  • Praveen Jain - HPE Big Data Platform
  • Reiner Kappenberger - HPE Security

Symantec Resource Center - Enterprise Security



Agenda: Enterprise Security Summit



Deconstructing API Security



  • Ian Goldsmith - VP, Product Management