Results for Security

Study: MetaIntell: Finds Data Leakage in 92% of Top 500 Android Mobile Apps

After testing the most downloaded Android apps, MetaIntell found 460 of 500 of the most popular apps create a security or privacy risk when they’re downloaded to Android devices.  The assessment tests were conducted using MetaIntell’s AppInterrogator service, which can detect mobile app vulnerabilities such as pirated code, data leakage and security risks.

Full Story >

MapR Boosts Hadoop’s ‘Out-of-the-Box’ Security with Native Authentication, Authorization

MapR Technologies’ latest effort to enrich Hadoop with out-of-the-box enterprise features focuses on security. To make securing big data easier and more reliable MapR has natively integrated authentication and authorization into the beta of its MapR Distribution for Apache Hadoop. IDN speaks with MapR’s Jack Norris.

Full Story >

Gartner Report Predicts Cloud Security Market Will Rise 30% by 2015

The cloud-based security services market is set to top $3 billion in the next two years, according to Gartner Inc.   The top three cloud services customers will be looking toward will be mail security, web security services and identity and access management (IAM), according to Gartner

Full Story >

Verizon Revamps IaaS, Cloud Storage To Better Manage, Secure & Meet App SLAs

Verizon is revamping its public cloud-based infrastructure and storage service to better manage, secure and meet SLAs for business-critical apps companies would like to move to the cloud. IDN speaks with Verizon Terremark CTO John Considine about this fall’s public beta of Verizon Cloud IaaS and cloud-based object storage service.

Full Story >

Axis DMsuite Data Masking Helps Molina Healthcare Automate Data Security

Data masking is growing in popularity, as companies look for more granular ways to balance conflicting needs between clean data, data integration across silos and access security. Molina Healthcare is using Axis Technology’s DMsuite data masking solution to automate the security of over 73,000 sensitive customer records.

Full Story >

AirWatch, Symplified Team Up On Mobile Enterprise Identity Solution

Enterprise mobility management (EMM) provider AirWatch, and cloud identity company Symplified are teaming up to make it easier for businesses to manage BYOD mobile apps, as well as access to data  across mobile, cloud and on-premises.

Full Story >

Survey: CA’s Layer 7 Finds 85% of Enterprises To Adopt APIs by 2016; Partner Connectivity, Mobile, Cloud Are Top Drivers

An eye-popping survey is the latest sign that enterprise IT continues to embrace APIs for business-critical integration projects. Layer 7 Technologies, a CA Technologies company, released results from research that found an astounding 85% of enterprises will have an API program within three years. IDN talks with CA’s senior vice president Dimitri Sirota. 

Full Story >

Bromium Rolls Out Enhanced vSentry for Endpoint Security

Enterprise security company Bromium Inc. is shipping an update to its vSentry endpoint security solution. vSentry 2.0 automatically protects against malware and other attacks, allowing users to access and edit email, documents, applications or other content without having to trust it. 

Full Story >

Intel, Amazon Deliver Enhanced EC2 Security, Mobile Enablement for Enterprise Apps in the Cloud

This month, Intel made its Expressway API Manager available on Amazon’s EC2 cloud service. The move could expand how IT thinks about APIs, using them as a powerful way to deliver enhanced EC2 security and control over how mobile workers connect to sensitive company data and apps, use cloud storage and even support customers. IDN speaks with Intel senior product manager Blake Dournaee.

Full Story >

Study: BYOx Next Big Headache for CIOs, Security Officers

Even as BYOD is keeping CIOs and CISOs up at night, there’s a new BYO making its presence that’s sure to cause even more headaches for IT  -- BYOx, where ‘x’ is anything from the latest mobile device to personal apps, web services, cloud storage and more. Research from Wisegate looks at how BYOx is affecting CIOs and IT security professionals. 

Full Story >

Agiliance Launches Mobile Trust Service To Guard Against BYOD Risks

Agiliance Inc., a provider of integrated risk management solutions for governance and security programs is offering a solution to help ensure BYOD solutions meet security requirements. The Agiliance Mobile Trust Service lets IT identify and prevent BYOD risks and vulnerabilities in real time.

Full Story >

WSO2 API Manager 1.4 Adds Multi-Tenancy, Federated Access To Deliver an Open Source-Based API Lifecycle

WSO2 is shipping an upgrade to its API Manager to deliver a full API lifecycle
solution that combines simplified and managed API access with full API governance
and analysis. API Manager 1.4 also sports an API store where devs can easily access,
consume and subscribe to APIs.  IDN speaks with WSO2’s Chris Haddad.

Full Story >

Showing 109 - 120 of 250

Videos

Building a Secure Open Hybrid Cloud



  • Dave Egts - Principal Architect

  • Chris Wells - Senior Product Marketing Manager

Securing Mobile - Cloud and API Services



  • Robert Vila - WebSphere Connectivity & Integration Product Management

Agenda - CloudCon: Management & Security



  • [CA] Andy Kicklighter -  Sr. Principal Product Manager
  • [Ping Identity] Paul Madsen - Senior Technical Architect, Office of the CTO
  • [Oracle] Jyothi Swaroop - Product Director
  • [Red Hat] Dave Egts - Principal Architect
  • [Red Hat] Chris Wells - Senior Product Marketing Manager
  • [IBM]  Robert Vila - WebSphere Connectivity & Integration Product Management

Bullet-proof your Cloud



  • Jyothi Swaroop - Product Director

Ensuring Service Levels in the Clouds



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework for Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Ensuring Service Levels in the Cloud



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework 4 Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Bridging the Security Gap Between IT and Developers



  • Bradford Stephens
    Developer Evangelist Office of the CTO

CLOUD:CON: Security & Management Agenda



  • Name
    Title

Enterprise API Security Choices - One API - Total Security



  • Blake Dournaee
    Senior Product Manager Expressway Service Gateway

Overview of Symantec Resources



How To Leverage Cloud To Improve Your Compliance Status



  • Heather Hinton
    IBM Distinguished Engineer
    Cloud Security and Compliance Architecture

Cloud Considerations



  • Name
    Title

Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Oracle Mobile Security



  • Dave Smith
    Sr. Principal, for Identity Management and Security

Symantec Resource Center - Cloud Integration



Delivering Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

CyberSecurity Summit Agenda



Identity Management in a Digital Economy



  • Ricky Arora - Sr. Director, Product Management

Symantec Resource Center



Data-Centric Approach to Security from HPE Security



  • Albert Biketi - VP & GM, Data Security

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

Turning Machine Data into Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

Integrate Data Security with Your Big Data Platform



  • Praveen Jain - HPE Big Data Platform
  • Reiner Kappenberger - HPE Security

Symantec Resource Center - Enterprise Security



Agenda: Enterprise Security Summit



Deconstructing API Security



  • Ian Goldsmith - VP, Product Management

Moving Data and Applications to the Cloud Securely - End-to-End Trusted Security



  • Trish Reilly - Global Product Marketing Manager - HPE Security - Data Security
  • Marcelo Delima - Global Product Marketing Manager - HPE SecureMail

Identity-Centric Security for the Modern Cloud Era



  • Akshay Bhargava - VP, Security Product Marketing

Enterprise Security Summit Agenda



  • Name - Title

Protect Your Most Valuable Assets – Your Data!



  • Reiner Kappenberger - Global Product Management, HPE Security - Data Security

A New Partnership to Mitigate Bots – Distil Networks and Verizon



  • Edward Roberts - Dir of Product Marketing
  • Tin Zaw - Dir of Security Solutions, Verizon

The New Enterprise Security Model



  • Eric Karlinsky - Group Technical Marketing Manager

REST API Security



  • Tom Donahoe - Director of Secure Software Engineering

Symantec Enterprise Security Resource Center



  • Name - Title

Mobile Data-Centric Security from HPE Security



  • Smrithi Konanur - Global Product Manager - HPE Security – Data Security

Enterprise Security Summit, Agenda



HPE Security and CyberEdge Disclose - 2017 Cyberthreat Defense Report Findings



  • Mark Bouchard - COO - CyberEdge Group
  • Sheryl Wharff - Global Product & Channel Marketing - HPE

The New Enterprise Security Model



  • Eric Karlinsky - Group Technical Marketing Manager

Managing the Cloud Security Unknowns - Regulating the Risk and Exposure of Cloud Services



  • Andy Smith - Sr Director Product Management

Securing End Users Across The Digital Enterprise



  • Patrick Sullivan - Global Director of Security Strategy

Enterprise Security Summit Agenda



API Security Best Practices



  • Ozair Sheikh - Sr. Offering Manager, API Connect & Gateway

Want Security in the Cloud? Look to Identity First



  • Mike Paiko - Director, Product Marketing, Identity
  • Krystal Wang - Sr. Product Marketing Manager, Security

API Security - When Success Looks Like Failure



  • Keith Casey - API Problem Solver