Results for Security

Dell Boomi Extends iPaaS To Boost Security, Usability and Blockchain Support

In 2019, Dell Boomi sees the use cases and market needs for iPaaS cloud integration continue to expand.  IDN looks at the company’s latest upgrades for security, usability and even blockchain with Boomi’s Div Manickam. IDN also takes a look at the latest cooperation between the Dell Boomi and Google Cloud.

Full Story >

Orkus Uses AI To Help Enterprises Protect Against Unauthorized Access To Cloud Resources, Infrastructure

Start-up firm Orkus is bringing AI to the task of protecting against unauthorized access to cloud resources and core infrastructure. The Orkus Access Governance Platform provides automated and continuous access governance for cloud across infrastructure, data and privileged identities.

Full Story >

Accenture Study Suggests the Internet May Need a Refresh, as Innovation & Security are Harder To Deliver

In an eye-opening report, Accenture suggests that the rate of innovation has become so profound that the time many have come for an “Internet refresh” – from the bottom up.  Among the stats: Only 30% of companies are “very confident” in their internet security protection. IDN reviews the highlights. 

Full Story >

Amazon Web Services Launches New Services to Build and Deploy Faster, Manage Data Easier

Amazon Web Services is offering three new services to respond to increasing interest from AWS developers and enterprise IT users who want better ways to easily build, deploy and manage their data in the cloud. IDN looks at AWS Control Tower, AWS Security Hub, and AWS Lake Formation.

Full Story >

Evans Data Finds Vast Majority of IoT Developers Optimize Projects for Security

In 2018, a vast majority of developers are paying much more attention to security issues, according to a recent survey. Evans Data Corp’s latest IoT and Mobile Development Survey found 80% of developers working on IoT projects – especially that also involve mobility -- optimize for security. IDN speaks with Evans Data’s Director of Research, Michael Rasalan.

Full Story >

MuleSoft’s ‘Titan’ Upgrade Bolsters API Security, Monitoring; Sets Stage for Flexible Multi-Cloud Deployments

MuleSoft Titan, the company’s latest upgrade to its Anypoint API-driven application network platform, adds real-time API security, API monitoring and support for novel multi-cloud apps. The update is the first since MuleSoft’s acquisition by Salesforce.com. IDN discusses how Titan sets the stage for the next wave of API innovations with MuleSoft’s Aaron Landgraf. 

Full Story >

Appdome Can Add Security, Identity and EMM Services to Mobile Apps with a Few Mouse Clicks – and No Coding

Integration is proving a key to speed up mobile app rollouts. Appdome’s mobile integration platform can add security, identity and management to any mobile-ready app in under 30 seconds –  with mouseclicks, no coding. IDN talks with Appdome CEO Tom Tovar.

Full Story >

Okta’s Identity Cloud Updates Aim To Better Secure Against Credential Theft, Account Takeover

Okta is updating the Adaptive Multi-Factor Authentication capabilities of its Okta Identity Cloud.  The updates aim to help ensure only the proper people get access to the right resources – and at only the appropriate time.

Full Story >

Growing CyberSecurity Skills Gap Worries Security Professionals; Highlights Challenges for Staffing

A recent survey on security staff confirms what we all know – IT is growing even more worried that these professionals are so hard to find, hire and keep.  But the survey, commissioned by Tripwire, also found the shortage is prompting companies to their methods for how to protect against cyberattacks. 

Full Story >

Four Ways To Adapt Your Security for Digital Transformation – And Keep Pace with the Speed of Business

News of the Verizon data breach is just the latest reminder of how tough it is for CIOs and CISOs to balance ‘security’ vs ‘innovation’ in the age of digital transformation and hybrid (borderless) architectures.  One Identity’s Todd Peterson shares 4 proven strategies for how security professionals can be responsive to business initiatives -- without compromising on security needs. 

Full Story >

Akamai Delivers Cloud-Based Security, Powered by Smart Algorithms, To Thwart DNS, Malware Attacks

Akamai Technologies, well known for high-performance content delivery over the Internet, is leveraging that knowledge to deliver a high-impact security service from the cloud.  IDN talks with Akamai’s Frank Childs to learn how its Enterprise Threat Protector thwarts DNS, malware and bot attacks.

Full Story >

BlackBerry Optimizes Mobile Security Platform for IoT

BlackBerry is shipping updated security and productivity for its BlackBerry Enterprise Mobility Suite (BEMS). The upgrade comes to meet an expected flood of IoT devices – with estimates hitting 20 billion in three years.

Full Story >

<< Start < Previous 1 2 3 Next > End >>
Showing 1 - 12 of 27

Videos

Ensuring Service Levels in the Cloud



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework 4 Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Cloud Considerations



  • Name
    Title

Low-Code Architecture Essentials for Modern Employee & Consumer Apps



  • Carlos Carvajal CMO
  • Matt Terry SVP Products

No Passwords, No Problem: Using WebAuthn To Stop Account Takeover for Browsers



  • Swaroop Sham - Sr. Product Marketing Manager Customer Identity

Agenda - CloudCon: Management & Security



  • [CA] Andy Kicklighter -  Sr. Principal Product Manager
  • [Ping Identity] Paul Madsen - Senior Technical Architect, Office of the CTO
  • [Oracle] Jyothi Swaroop - Product Director
  • [Red Hat] Dave Egts - Principal Architect
  • [Red Hat] Chris Wells - Senior Product Marketing Manager
  • [IBM]  Robert Vila - WebSphere Connectivity & Integration Product Management

Building a Secure Open Hybrid Cloud



  • Dave Egts - Principal Architect

  • Chris Wells - Senior Product Marketing Manager

Securing Mobile - Cloud and API Services



  • Robert Vila - WebSphere Connectivity & Integration Product Management

Bullet-proof your Cloud



  • Jyothi Swaroop - Product Director

Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Ensuring Service Levels in the Clouds



  • Andy Kicklighter - Sr. Principal Product Manager

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

A Standards-Based Framework for Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Oracle Mobile Security



  • Dave Smith
    Sr. Principal, for Identity Management and Security

Bridging the Security Gap Between IT and Developers



  • Bradford Stephens
    Developer Evangelist Office of the CTO

CLOUD:CON: Security & Management Agenda



  • Name
    Title

Enterprise API Security Choices - One API - Total Security



  • Blake Dournaee
    Senior Product Manager Expressway Service Gateway

Overview of Symantec Resources



How To Leverage Cloud To Improve Your Compliance Status



  • Heather Hinton
    IBM Distinguished Engineer
    Cloud Security and Compliance Architecture