infrastructure management

Business Goals for Implementing a Vulnerability Management Solution
Enterprisesecuritymag >> cioviewpoint

By Dr. Rebecca Wynn, CISSP, CRISC, CASP, CCISO; Head of Information Security (CISO) and Data Protection Officer (DPO); Matrix Medical Network and Former VP Enterprise Security & Privacy; Privacy Officer, LearnVest

Ultimately, the goal is to avoid a breach and keep our company off the news headlines. That’s a given for every CISO. But we also have business availability goals that are typically defined by service-level agreements (SLAs). "A tool...

Software-Defined Security: The Missing Piece in Your SDDC Strategy
Enterprisesecuritymag >> cxoinsights

Shishir Singh, VP, Network Security, Intel Security

It seems the stars are finally aligning to bring the much-promised benefits of the software-defined datacenter within reach of enterprise users. You know the promises: When our data centers are software-defined, we'll deliver new services...

Managing IT Environments with Agility and Speed in an Increasingly Digital World
Enterprisesecuritymag >> cxoinsights

Laura Sanders, General Manager, IBM Global Technology Services Systems Services

In today’s digital economy, we can compare prices in real time and access pay-as-you-go services. We can provide and receive immediate feedback throughout every transaction. We can identify difficult business challenges, such as a security...

Intrust IT: Ushering an Era of Cost-effective Cybersecurity Solutions
Enterprisesecuritymag >> vendor

Tim Rettig, President & CEO

Intrust IT works to find affordable solutions to optimize IT management investment of the companies, lowering the IT expenses for computer network maintenance. It is a managed security services company for small and medium-sized organizations. The...

Conjur: Trust Management in the Cloud and Container Era
Enterprisesecuritymag >> vendor

Elizabeth Lawler, CEO & Co-Founder

Conjur is a cloud security solution provider whose trust management platform helps organizations to stay safe by neutralizing risks as they move to and scale within the cloud. It defines, enforces, and audits identity and access for today’s...