enterprisesecuritymag

SIGN UP FOR NEWSLETTER
image for newsletter
A weekly summary of the news, trends, reviews, profiles and articles from Enterprise Security Mag
SUBSCRIBE
September 20, 2018

Enterprise Security Mag Weekly Brief

Newsletter for Enterprise Technology Decision Makers

Feature of the Week
As SMBs continue facing legacy challenges such as absence of in-house specialized assets, they reliably battle with underfunded IT security spending plans and lack of implementation.
The soaring popularity of the cloud has resulted in steady adoption rates, which can be primarily attributed to no more hardware costs, long software release cycles, or the hassles of managing multiple physical data centers.
Mobile payments, e-wallets, and contactless cards have already simplified the business-to-business and business-to-customer experiences.
Featured Vendors
Avatier's Identity Anywhere, based on the Docker Swarm orchestration is a portable, scalable and secure identity management solution.
The company’s open identity platform gives enterprises the ability to see govern and empower their workforce by levraging easy and scalable identity management.
The company aids enterprises, government, and financial organizations in developing, deploying, and managing identity and access management solutions.
CIO Viewpoint
Mark Thiele, CIO and CSO, Apcera & Chairman, IDCA Technical Committee
Digital transformation is the best opportunity for IT to take the leadership position in the effort to create a lasting and successful business that most of us will ever see in our careers.
Marcelo De Santis, Group Chief Information Officer, Pirelli
We must get data management right if we want to compete in a “data driven economy.
CXO Insights
By Anthony Hill, Executive Director Business & Enterprise Architecture, Kaiser Permanente
The onset of the digital era in business is driving sweeping change and adaptation in organizations in all sectors.
By Gehan Dabare, Director for Identity & Access, Bank of Tokyo-Mitsubishi
Managing who has access to resources is the foundation of any cybersecurity program.