Results for security

‘Full Life Cycle’ API Management Can Drive Competitive Advantage

As APIs become a popular part of digital transformation, adopters are finding API management across the ‘full lifecycle,’ adds to business impact and ROI.  IDN looks at the study from CA Technologies and Coleman Parkes Research.

Full Story >

Integration is The Next Step to ROI on Big Data Analytics

Organizations looking for more value from big data investments are finding integration developers  – rather than new big data specialists – may hold the key. Progress’   Sumit Sarkar reveals why integration skills can quickly spread big data ROI to more business apps and users.

Full Story >

Centrify Analytics Service Uses Machine Learning and User Behavior To Stop Breaches in Real Time

A Forrester Research study, commissioned by security firm Centrify, estimates 1 billion identities were compromised in 2016.  The firm is also launching Centrify Analytics Service to shore up access protection with real-time analytics and machine learning.

Full Story >

Splunk Continues To Expand Its Adaptive Response Initiative To Detect, Battle CyberThreats Faster

As cyber threats become more sophisticated, headline-grabbing security point solutions just can’t handle the speed and complexity of diagnosing and fighting off the attacks.  In response, Splunk continues to recruit vendor partners and domain experts to its Adaptive Response Initiative. IDN looks at the latest additions.

Full Story >

HPE Mobile Center 2.0 Drives Mobile App Success with ‘Always On’ Testing -- Combines Lab Tests, Live Monitoring, Analytics

Launching a successful mobile app can feel like a Black Art. HPE Mobile Center 2.0 unifies testing, live monitoring and analytics to help apps pass the ‘mobile moment’ – that 30-second window when a user decides to use -- or drop -- your app. IDN speaks with HPE's Alon Inditzky. 

Full Story >

Alpha Software Accelerates Mobile, Web App Delivery with New ‘Coding Optional’ Features, New Offline Capabilities

Alpha Software’s latest upgrade to its Alpha Anywhere platform aims to accelerate how developers build and deploy apps – without sacrificing rich functionality that’s needed to make such apps a success.

Full Story >

Tibco’s ‘Hybrid Gateway’ for APIs Delivers New-Gen Platform for Digital Business

Tibco Software is unifying API Management, ‘hybrid gateways’ and support for containers with its just-released Tibco Mashery Local 4.0. The product aims to provide a more flexible, secure and reliable end-to-end infrastructure for the digital enterprise -- whether using cloud, on-prem or both. IDN speaks with Tibco’s Ed Julson.

Full Story >

2017 Survey: Security Professionals Say Their Enterprises Score ‘Below Average’ in Ability To Assess Cyber Risks

A survey from Tenable Network Security finds infosec professionals rank their enterprise’s ability to assess cyber risks as C-Minus, or below average.  IDN looks at 2017 Global Cybersecurity Assurance Report Card, and why rapid adoption of containers, cloud, mobile and IoT are causing some of the lack of confidence.  

Full Story >

DreamFactory: Next Chapter in ‘Cool APIs’ May Come with API Automation for App Building

A new dimension of ‘Cool APIs’ in 2017 may be driven by app-centric API automation.  IDN spoke with DreamFactory CEO Bill Appleton about the company’s API automation platform that lets developers assemble apps from a ‘palette’ of reliable, reusable and secure APIs. 

Full Story >

Datapipe’s Trebuchet Platform Aims to Simplify Rapid and Continuous Deployment & Monitoring for Cloud Apps

Managed cloud service provider Datapipe is looking to speed up cloud deployment of enterprise apps with Trebuchet, a new platform to promote easy continuous deployment, monitoring, and security.

Full Story >

Cool APIs: Top Tips To Secure Valuable APIs Against Growing Security Threats

IDN continues its ‘Cool APIs’ series with a focus on API Security. As APIs become more and more popular, they are also the target of a growing number of cyberthreats. Experts from Axway, Built.io, CA, MuleSoft, Red Hat, SmartBear, discuss top API threats, how to fight them, effective API Security technologies -- and what’s next.

Full Story >

CA World: In 2017, APIs Will Be Doorways to DevOps, Digital Transformation

At last month’s CA World, CA Technologies showcased its vision for how an end-to-end approach to APIs has the power to transform IT and business. CA execs share how APIs will be the ‘nervous system’ for digital transformation, and a ‘gateway to DevOps.’

Full Story >

<< Start < Previous 1 2 3 4 5 6 7 8 9 10 Next > End >>
Showing 1 - 12 of 237

Videos

Building a Secure Open Hybrid Cloud



  • Dave Egts - Principal Architect

  • Chris Wells - Senior Product Marketing Manager

Securing Mobile - Cloud and API Services



  • Robert Vila - WebSphere Connectivity & Integration Product Management

Agenda - CloudCon: Management & Security



  • [CA] Andy Kicklighter -  Sr. Principal Product Manager
  • [Ping Identity] Paul Madsen - Senior Technical Architect, Office of the CTO
  • [Oracle] Jyothi Swaroop - Product Director
  • [Red Hat] Dave Egts - Principal Architect
  • [Red Hat] Chris Wells - Senior Product Marketing Manager
  • [IBM]  Robert Vila - WebSphere Connectivity & Integration Product Management

Bullet-proof your Cloud



  • Jyothi Swaroop - Product Director

Ensuring Service Levels in the Clouds



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework for Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Ensuring Service Levels in the Cloud



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework 4 Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Bridging the Security Gap Between IT and Developers



  • Bradford Stephens
    Developer Evangelist Office of the CTO

CLOUD:CON: Security & Management Agenda



  • Name
    Title

Enterprise API Security Choices - One API - Total Security



  • Blake Dournaee
    Senior Product Manager Expressway Service Gateway

Overview of Symantec Resources



How To Leverage Cloud To Improve Your Compliance Status



  • Heather Hinton
    IBM Distinguished Engineer
    Cloud Security and Compliance Architecture

Cloud Considerations



  • Name
    Title

Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Oracle Mobile Security



  • Dave Smith
    Sr. Principal, for Identity Management and Security

Symantec Resource Center - Cloud Integration



Delivering Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

CyberSecurity Summit Agenda



Identity Management in a Digital Economy



  • Ricky Arora - Sr. Director, Product Management

Symantec Resource Center



Data-Centric Approach to Security from HPE Security



  • Albert Biketi - VP & GM, Data Security

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

Turning Machine Data into Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

Integrate Data Security with Your Big Data Platform



  • Praveen Jain - HPE Big Data Platform
  • Reiner Kappenberger - HPE Security

Symantec Resource Center - Enterprise Security



Agenda: Enterprise Security Summit



Deconstructing API Security



  • Ian Goldsmith - VP, Product Management

Moving Data and Applications to the Cloud Securely - End-to-End Trusted Security



  • Trish Reilly - Global Product Marketing Manager - HPE Security - Data Security
  • Marcelo Delima - Global Product Marketing Manager - HPE SecureMail

Identity-Centric Security for the Modern Cloud Era



  • Akshay Bhargava - VP, Security Product Marketing

Enterprise Security Summit Agenda



  • Name - Title

Protect Your Most Valuable Assets – Your Data!



  • Reiner Kappenberger - Global Product Management, HPE Security - Data Security

A New Partnership to Mitigate Bots – Distil Networks and Verizon



  • Edward Roberts - Dir of Product Marketing
  • Tin Zaw - Dir of Security Solutions, Verizon

The New Enterprise Security Model



  • Eric Karlinsky - Group Technical Marketing Manager

REST API Security



  • Tom Donahoe - Director of Secure Software Engineering

Symantec Enterprise Security Resource Center



  • Name - Title