Results for Security

SOA Software Delivers Lifecycle Control, Agility to APIs for B2B, Mobile and Cloud Apps

SOA Software wants to help companies speed up the launch of secure and governable APIs, mobile apps and cloud projects. Updates to its Lifecycle Manager provide new features that will provide IT operations more control, without bogging down inventive devs. IDN speaks with SOA Software’s Brent Carlson.

Full Story >

Survey: Public Cloud Sharing Tools Such as Box, Dropbox, Google Docs Rate as ‘Primary’ Security Risk

Public cloud sharing tools present the main security risks to organizations, according to a survey of 621 IT professional conducted Axway and Ponemon Institute. Nearly 50% of the respondents said popular cloud-sharing services such as Box, DropBox and Google Docs are not suitable for business use.

Full Story >

WSO2 Rolls Out Open Source Enterprise Mobility Platform with MDM, MAM

WSO2 is rolling out its open source-based WSO2 Enterprise Mobility Manager to help IT cope with mobile device and app management. WSO2 EMM’s MAM and MDM support includes device-provisioning, configuration management, data security, policy enforcement and mobile appn management.

Full Story >

Tufin's 'Unified Security Policy' Approach Removes Key Bottlenecks To Rapid App Provisioning

Tufin Technologies is looking to make it easier to ensure apps and data always comply with changing security and policy requirements. The latest edition of Tufin’s Orchestration Suite, shipping in April, sports change automation, unified security policy features and collaboration capabilities to support teamwork among dev, opps and security stakeholders across legacy and cloud environments.

Full Story >

BYOD Alert: AdaptiveMobile Survey Finds 70% of Workers Unhappy with Employer Control Over Mobile Devices

In a wake-up call for BYOD managers, some 70% of employees say they would stop using their own mobile devices for work if they knew managers could remotely wipe or lock them. This highlights user concerns that employers could invade their mobile privacy. The survey was released by mobile security company AdaptiveMobile.

Full Story >

2014’s RSA Event Focuses on How To Secure & Govern Today’s ‘Extended Enterprise’

Last month’s RSA Conference reported the biggest crowds ever – topping 28,500. It’s the best evidence yet that today we’re in the era of the “Extended Enterprise.”  Projects that push the boundaries of on-premises IT, such as APIs, big data, cloud, mobile and SaaS apps, are all redefining enterprise architectures. IDN looks at 2014’s RSA for where security and compliance are heading.

Full Story >

Qualys, SANS Launch Free Cloud Service to Halt Top Cyberattacks

Qualys Inc. has teamed up with the SANS Institute and the Council on CyberSecurity on a free service to help enterprises implement the Top 4 Security Controls Cloud Service to ward off cyberattacks. The ‘Top 4’ cybersecurity service helps businesses identity top security threats from Windows PCs, and make sure controls are implemented.

Full Story >

Survey: Cloud Adoption Outpacing Network Security, Compliance

As security experts meet this week at the RSA annual conference, a survey finds that even as cloud use continues to rise, adoption of effective cloud security and compliance solutions need to catch up. 

Full Story >

Gazzang, OmniTI Team Up on Cloud-Based Solution To Secure Student Data

Security solutions provider Gazzang is teaming up with web scalability and performance provider OmniTI  to provide a data security and encryption solution for a non-profit organization that helps school systems develop student data portals.

Full Story >

Accenture Finds Uncle Sam is Still Struggling with ‘Cloud First’ Adoption

Three years after the Obama Administration mandated that federal agencies take a ‘Cloud First’ approach to launching apps, Uncle Sam is still facing hurdles, including staff challenges and long procurement timelines, according to a survey released by Accenture.

Full Story >

Bitglass Launches Cloud-Based Solution to Secure BYOD, Enterprise Mobility

To help enterprises alleviate BYOD security concerns, especially over data leakage of corporate data, Bitglass is offering a SaaS (software-as-a-service) solution to secure data in the cloud. The cloud-based Bitglass solution lets IT control corporate data from anywhere on any device at any time without any software installs.

Full Story >

Splunk Enhances Enterprise Security App with Threat Intelligent Framework, Visualizations

Splunk Inc. is shipping an update to its Splunk App for Enterprise Security, to help security professionals stalk cyberattackers. Splunk App for Enterprise Security 3.0 includes visualizations for better threat detection, a new threat intelligence framework, and support for new data types and data models.

Full Story >

Showing 97 - 108 of 250

Videos

Building a Secure Open Hybrid Cloud



  • Dave Egts - Principal Architect

  • Chris Wells - Senior Product Marketing Manager

Securing Mobile - Cloud and API Services



  • Robert Vila - WebSphere Connectivity & Integration Product Management

Agenda - CloudCon: Management & Security



  • [CA] Andy Kicklighter -  Sr. Principal Product Manager
  • [Ping Identity] Paul Madsen - Senior Technical Architect, Office of the CTO
  • [Oracle] Jyothi Swaroop - Product Director
  • [Red Hat] Dave Egts - Principal Architect
  • [Red Hat] Chris Wells - Senior Product Marketing Manager
  • [IBM]  Robert Vila - WebSphere Connectivity & Integration Product Management

Bullet-proof your Cloud



  • Jyothi Swaroop - Product Director

Ensuring Service Levels in the Clouds



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework for Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Ensuring Service Levels in the Cloud



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework 4 Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Bridging the Security Gap Between IT and Developers



  • Bradford Stephens
    Developer Evangelist Office of the CTO

CLOUD:CON: Security & Management Agenda



  • Name
    Title

Enterprise API Security Choices - One API - Total Security



  • Blake Dournaee
    Senior Product Manager Expressway Service Gateway

Overview of Symantec Resources



How To Leverage Cloud To Improve Your Compliance Status



  • Heather Hinton
    IBM Distinguished Engineer
    Cloud Security and Compliance Architecture

Cloud Considerations



  • Name
    Title

Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Oracle Mobile Security



  • Dave Smith
    Sr. Principal, for Identity Management and Security

Symantec Resource Center - Cloud Integration



Delivering Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

CyberSecurity Summit Agenda



Identity Management in a Digital Economy



  • Ricky Arora - Sr. Director, Product Management

Symantec Resource Center



Data-Centric Approach to Security from HPE Security



  • Albert Biketi - VP & GM, Data Security

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor - Security Strategist

Turning Machine Data into Operational Intelligence



  • Monzy Merza - Chief Security Evangelist

Integrate Data Security with Your Big Data Platform



  • Praveen Jain - HPE Big Data Platform
  • Reiner Kappenberger - HPE Security

Symantec Resource Center - Enterprise Security



Agenda: Enterprise Security Summit



Deconstructing API Security



  • Ian Goldsmith - VP, Product Management

Moving Data and Applications to the Cloud Securely - End-to-End Trusted Security



  • Trish Reilly - Global Product Marketing Manager - HPE Security - Data Security
  • Marcelo Delima - Global Product Marketing Manager - HPE SecureMail

Identity-Centric Security for the Modern Cloud Era



  • Akshay Bhargava - VP, Security Product Marketing

Enterprise Security Summit Agenda



  • Name - Title

Protect Your Most Valuable Assets – Your Data!



  • Reiner Kappenberger - Global Product Management, HPE Security - Data Security

A New Partnership to Mitigate Bots – Distil Networks and Verizon



  • Edward Roberts - Dir of Product Marketing
  • Tin Zaw - Dir of Security Solutions, Verizon

The New Enterprise Security Model



  • Eric Karlinsky - Group Technical Marketing Manager

REST API Security



  • Tom Donahoe - Director of Secure Software Engineering

Symantec Enterprise Security Resource Center



  • Name - Title

Mobile Data-Centric Security from HPE Security



  • Smrithi Konanur - Global Product Manager - HPE Security – Data Security

Enterprise Security Summit, Agenda



HPE Security and CyberEdge Disclose - 2017 Cyberthreat Defense Report Findings



  • Mark Bouchard - COO - CyberEdge Group
  • Sheryl Wharff - Global Product & Channel Marketing - HPE

The New Enterprise Security Model



  • Eric Karlinsky - Group Technical Marketing Manager

Managing the Cloud Security Unknowns - Regulating the Risk and Exposure of Cloud Services



  • Andy Smith - Sr Director Product Management

Securing End Users Across The Digital Enterprise



  • Patrick Sullivan - Global Director of Security Strategy

Enterprise Security Summit Agenda



API Security Best Practices



  • Ozair Sheikh - Sr. Offering Manager, API Connect & Gateway

Want Security in the Cloud? Look to Identity First



  • Mike Paiko - Director, Product Marketing, Identity
  • Krystal Wang - Sr. Product Marketing Manager, Security

API Security - When Success Looks Like Failure



  • Keith Casey - API Problem Solver