enterprisesecuritymag

hadoop

Why Should One Prefer SOCKs5 Proxy to Other Proxies?
Enterprisesecuritymag >> cxoinsights

A SOCKs5 proxy is a useful tool to easily change IP to bypass restrictions that enable accessing geo-blocked content without encrypting traffic. FREMONT, CA: In computer networks, a proxy or proxy server is a computer or a software system in a...

Best Practices for an Effective Cloud workload security
Enterprisesecuritymag >> cxoinsights

Securing workloads on a cloud platform is a shared responsibility between cloud service providers and the users especially if the user is working with Infrastructure-as-a-service (IaaS) model. Cloud workload security is the process of...

The New Rise of Time Series Databases
Enterprisesecuritymag >> cxoinsights

Michael Risse, VP, Seeq Corporation

Time series data storage and management has long been an interesting but quiet market category. It’s been a multibillion-dollar business for years and a main stay in process manufacturing plants since the 1980s. But recently, the category...

New Alliances Will Drive FinTech Innovation
Enterprisesecuritymag >> cxoinsights

Sheri Rhodes, Chief Technology Officer, Western Union

Q. What are your top priorities for 2018 and how is technology transforming a legendary brand like estern Union? My top priorities might surprise people who don’t think of Western Union as a profoundly digital financial technology...

The Future of Streaming Analytics in Financial Services
Enterprisesecuritymag >> cxoinsights

Mark Palmer, SVP-Engineering & General Manager, TIBCO Software

  Why? The proliferation of data in motion has led to a complete transformation of operating procedure in many industries, but especially in financial services. Streaming analytics technology has made it easier to understand the risk...

Overcoming Security Challenges Associated with Big Data
Enterprisesecuritymag >> vendor

John Armstrong, CMO, Zettaset Inc

The amount of digital data in the universe is growing at an exponential rate, doubling in size every two years. By 2020 the digital universe, the data we create and replicate annually, is estimated to reach 44 zeta bytes, or 44 trillion gigabytes....

Overcoming Security Challenges Associated with Big Data
Enterprisesecuritymag >> vendor

John Armstrong, CMO, Zettaset Inc

The amount of digital data in the universe is growing at an exponential rate, doubling in size every two years. By 2020 the digital universe, the data we create and replicate annually, is estimated to reach 44 zeta bytes, or 44 trillion gigabytes....

QBRICS, Inc.: Enterprise Blockchain Platform
Enterprisesecuritymag >>

Brennan Bennett, Co-Founder & COO

QBRICS, Inc envisions creating a blockchain adoption platform and becoming a blockchain solution provider with unique features like quantum safe encryption, artificial intelligence-enabled smart contracts, interoperability between different type...

Axiom Cyber Solutions: The First Line of Defense and Last
Enterprisesecuritymag >>

Shannon Wilkinson, President and Troy Wilkinson, CEO

Specializes in advanced threat intelligence and defense platform