Results for security

Akana Launches QuickStart, a SaaS-based End-to-End API Management Platform, To Lower Cost & Complexity

Akana has launched a SaaS-based end-to-end API management solution to help companies more easily accomplish all the time-consuming or complex tasks associated with APIs. IDN speak with an exec about Akana QuickStart vision and features.

Full Story >

FireEye Extends Security, Intelligence to Cloud, Hybrid Environments

FireEye is rolling out a set of technologies that aim to deliver enhanced security and intelligence to detect threats to the cloud and hybrid environments. IDN takes a look at the FireEye Cloud Security Solution and other cloud-centric offerings.

Full Story >

PingCentral Makes Self-Service IAM a Reality with Simple Templates, Workflows

Ping Identity is enabling a ‘self-service’ approach to help overstretched IT and security admin teams meet security and access management requirements.

Full Story >

To Battle Account Takeover Attacks, Imperva ATO Enlists Automation, Machine Learning

Cybersecurity firm Imperva’s new account takeover protection leverages machine learning to better detect and stop account hijacking IDN explores Imperva Account Takeover (ATO) Protection with Imperva VP George McGregor.

Full Story >

Frontier Cloud Managed Solutions Supports Fully Managed, End-to-End Cloud IT Ops

Frontier Communications is offering a new solution to help enterprises manage their IT environment on any cloud or platform in a secure, managed, and affordable way. IDN looks at Frontier Cloud Managed Solutions.

Full Story >

Survey: Cloud-Centered Digital Transformation Efforts Can Boost Risk of Identity-Related Attacks

An eye-opening survey of enterprise IT professionals reveals that some digital transformation efforts may increase the risk of hacks and identity-driven attacks. IDN looks at the study from CyberArk that suggests the pursuit of agility and automation can compromise well-established security.

Full Story >

Gravitational Updates Its Open Source Management To Deliver IoT-Centric Security

Gravitational is delivering  IoT capability in the latest update to its popular open source access management solution, Teleport.  Teleport 4.0 delivers IoT-centric security using modern privileged access management by letting developers leverage existing SSH-based toolchains.

Full Story >

Axiomatics Latest Updates Improve Delivery of Dynamic Authorization for Hybrid, Cloud Environments

Axiomatics is improving the delivery of dynamic authorization for multiple assets across hybrid, cloud and on-prem environments.   IDN looks at the latest Axiomatics Policy Server and other updates with company execs.

Full Story >

Dell Boomi Extends iPaaS To Boost Security, Usability and Blockchain Support

In 2019, Dell Boomi sees the use cases and market needs for iPaaS cloud integration continue to expand.  IDN looks at the company’s latest upgrades for security, usability and even blockchain with Boomi’s Div Manickam. IDN also takes a look at the latest cooperation between the Dell Boomi and Google Cloud.

Full Story >

Orkus Uses AI To Help Enterprises Protect Against Unauthorized Access To Cloud Resources, Infrastructure

Start-up firm Orkus is bringing AI to the task of protecting against unauthorized access to cloud resources and core infrastructure. The Orkus Access Governance Platform provides automated and continuous access governance for cloud across infrastructure, data and privileged identities.

Full Story >

Accenture Study Suggests the Internet May Need a Refresh, as Innovation & Security are Harder To Deliver

In an eye-opening report, Accenture suggests that the rate of innovation has become so profound that the time many have come for an “Internet refresh” – from the bottom up.  Among the stats: Only 30% of companies are “very confident” in their internet security protection. IDN reviews the highlights. 

Full Story >

Amazon Web Services Launches New Services to Build and Deploy Faster, Manage Data Easier

Amazon Web Services is offering three new services to respond to increasing interest from AWS developers and enterprise IT users who want better ways to easily build, deploy and manage their data in the cloud. IDN looks at AWS Control Tower, AWS Security Hub, and AWS Lake Formation.

Full Story >

<< Start < Previous 1 2 3 Next > End >>
Showing 1 - 12 of 35

Videos

Ensuring Service Levels in the Cloud



  • Andy Kicklighter - Sr. Principal Product Manager

A Standards-Based Framework 4 Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Cloud Considerations



  • Name
    Title

Low-Code Architecture Essentials for Modern Employee & Consumer Apps



  • Carlos Carvajal CMO
  • Matt Terry SVP Products

No Passwords, No Problem: Using WebAuthn To Stop Account Takeover for Browsers



  • Swaroop Sham - Sr. Product Marketing Manager Customer Identity

Agenda - CloudCon: Management & Security



  • [CA] Andy Kicklighter -  Sr. Principal Product Manager
  • [Ping Identity] Paul Madsen - Senior Technical Architect, Office of the CTO
  • [Oracle] Jyothi Swaroop - Product Director
  • [Red Hat] Dave Egts - Principal Architect
  • [Red Hat] Chris Wells - Senior Product Marketing Manager
  • [IBM]  Robert Vila - WebSphere Connectivity & Integration Product Management

Building a Secure Open Hybrid Cloud



  • Dave Egts - Principal Architect

  • Chris Wells - Senior Product Marketing Manager

Securing Mobile - Cloud and API Services



  • Robert Vila - WebSphere Connectivity & Integration Product Management

Bullet-proof your Cloud



  • Jyothi Swaroop - Product Director

Applying a Data-centric Security Strategy to the Cloud



  • Troy Kitch
    Sr. Principal Director, Security Software

Ensuring Service Levels in the Clouds



  • Andy Kicklighter - Sr. Principal Product Manager

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist

A Standards-Based Framework for Cloud Identity



  • Paul Madsen - Senior Technical Architect, Office of the CTO

Practical Steps to Secure your APIs for Mobile



  • Mark O’Neill
    VP Innovation, Axway

Cloudy with a Chance of Identity



  • Daniel Raskin
    VP of Strategy & Marketing

CyberSecurity Summit Agenda



Technologies for a Data-Centric Security Approach



  • Sudeep Venkatesh
    VP, Solutions Architecture

Symantec Resource Center



Oracle Mobile Security



  • Dave Smith
    Sr. Principal, for Identity Management and Security

Bridging the Security Gap Between IT and Developers



  • Bradford Stephens
    Developer Evangelist Office of the CTO

CLOUD:CON: Security & Management Agenda



  • Name
    Title

Enterprise API Security Choices - One API - Total Security



  • Blake Dournaee
    Senior Product Manager Expressway Service Gateway

Overview of Symantec Resources



How To Leverage Cloud To Improve Your Compliance Status



  • Heather Hinton
    IBM Distinguished Engineer
    Cloud Security and Compliance Architecture