enterprisesecuritymag

saas

The Security Vulnerability You Can Prevent As IoT grows quickly, so should your skepticism of data security
Enterprisesecuritymag >> cxoinsights

Jon Gelsey, CEO, Auth0

Auth0 simplifies identity implementation and management, making it easy for developers to implement even the most complex identity solutions for their web, mobile and internal applications, APIs and IoT devices. "The majority of IoT...

The Security Vulnerability You Can Prevent As IoT grows quickly, so should your skepticism of data security
Enterprisesecuritymag >> cxoinsights

Jon Gelsey, CEO, Auth0

Auth0 simplifies identity implementation and management, making it easy for developers to implement even the most complex identity solutions for their web, mobile and internal applications, APIs and IoT devices. "The majority of IoT...

Countering Cyber Vulnerabilities & Threats
Enterprisesecuritymag >> csoinsight

Roota Almeida, CISO, Delta Dental of New Jersey

Cyber Insurance and the Threat Landscape In the recent years, the threat landscape has significantly changed and will continue to do so. In the near future, healthcare and health insurance industry will continue to be a prime target for...

Security Exposure through Unavoidable Cyber Threats
Enterprisesecuritymag >> cioviewpoint

Tony Velleca, CIO, UST Global

In this day and age, it would seem that security breaches are no longer possibilities, but inevitabilities. 2014 saw several large companies become targets of major security breaches, and six months later, the security breach at Sony Pictures...

The Hidden Disadvantage Of Strong Encryption
Enterprisesecuritymag >> cioviewpoint

Andrea Di Fabio, Interim CIO, Norfolk State University

The widespread availability of strong encryption, together with the Snowden effect, has propelled an arms race to aggressively and pervasively adopt strong encryption. Software developers and information security companies are riding this new wave...

Providing Tools to Implement Security in the Cloud
Enterprisesecuritymag >> cioviewpoint

Sam Schoelen, CIO, Continental Resources

I have spent a great deal of time investigating cloud and many cloud technologies. Many have been around for years now and have matured greatly. What I would like to know now is "Why not?" People have been using Salesforce for many years...

Cloud Security Grows Up
Enterprisesecuritymag >> cioviewpoint

Kevin Winter, VP & CIO and Brian Javonillo, Senior Associate, Booz Allen Hamilton

Many companies today have established minimum levels of security requirements for their IT environments. CIOs are realizing, though, that those security models don’t translate when IT capabilities move to the Cloud. "Compliance...

Marrying Technology and Education Science to Evolve Security Awareness and Training
Enterprisesecuritymag >> cxoinsights

Joe Ferrara, President and CEO, Wombat Security

At Wombat Security, cyber awareness and training initiatives are central to our mission of changing employee behaviors and reducing risk to organizations. Education is one of the foundational elements of our unique methodology, and our approach is...

Higher Education Challenges: Big Data; Cloud Computing; Information Security
Enterprisesecuritymag >> cioviewpoint

Elias G. Eldayrie, VP & CIO, University of Florida

Big Data Integral to University Missions While universities mine data to tailor student advising and educational experiences, there are other vitally important higher education issues involved. As big data becomes increasingly important in the...

Security of Cloud Computing
Enterprisesecuritymag >> cxoinsights

Anthony Scarola, CISSP, Director of Technical Information Security, TowneBank

Ugh, “cloud”. The term and how it has been applied to hosted computing services is disappointing. Hosting providers have repurposed the cloud placeholder— typically used by network engineers to depict complex, yet understood...

Adapting to the Cloud Without Compromising Security
Enterprisesecuritymag >> cxoinsights

Michael Bouchet, VP-Global Infrastructure Services, RELX Group

Public cloud means many things to different people. Enterprise usage of cloud today ranges across the spectrum-from no cloud movement at all to outsourcing everything to public cloud providers, and every flavor in between. Some enterprises have...

Cloud Adoption Rate Hike Spurs Demand for Security Professionals
Enterprisesecuritymag >> cxoinsights

Julie Peeler, Foundation Director, (ISC)²

For many organizations, cloud adoption is no longer a question of if, but how much. Several factors are contributing to rapid growth and change in the cloud computing market. The cloud provides multiple business and consumer benefits, many of...

GeoSpark Analytics: A New Paradigm in Threat Assessment
Enterprisesecuritymag >> vendor

Omar Balkissoon, CEO and John Goolgasian, COO

GeoSpark Analytics is a provider of exclusive risk management and threat assessment platform which has AI driven actionable insights and also has automated reporting. They help their clients to make quicker and better decisions by analyzing and...

One,Inc.: Liberating Organizations from the Chains of Legacy System
Enterprisesecuritymag >> vendor

Christopher Ewing, CEO

One, Inc. provides a single platform for processing premiums and claims payments that are designed to integrate with insurance core systems. To reduce the security risks and minimize the payment processing costs. The company has created a digital...

Barracuda: The next level in enterprise security
Enterprisesecuritymag >> vendor

BJ Jenkins, President & CEO

Barracuda is a leading managed security service provider which has been offering security products for data storage and disaster recovery, content security, and networking and applications for more than fifteen years. Initiated with an aim to...

SailPoint: Redefining Identity Governance
Enterprisesecuritymag >> vendor

Mark McClain, Co-Founder & CEO

SailPoint is an identity and access management company which has developed an open platform giving enterprises the ability to govern and empower their workforce with ease and scalable identity management. They are a leader in enterprise identity...

Evolve IP: One Cloud. One Identity. Unlimited Applications.
Enterprisesecuritymag >> vendor

Neill Reidy, Director, Cloud Computing

Evolve IP delivers customized strategies and integrated services for both communications and cloud computing; the company offers solutions that are programmed to work together and with applications and tools which are already in use by a company,...

Avatier Identity Anywhere: Redefining Identity Management with Docker
Enterprisesecuritymag >> vendor

Nelson Cicchitto, Chairman & CEO

Avatier Identity Anywhere is one of the leading developers of identity and access management tools. IdM costs skyrocket because of the custom workflow and programming. Avatier offers customizable solutions through configuration rather than opting...

CyberSaint: A Breakthrough Product and Approach to Cybersecurity
Enterprisesecuritymag >> vendor

George Wrenn, Founder & CEO

CyberSaint is a SaaS solutions provider and an enterprise security startup, which enable continuous improvement of an organization’s cybersecurity posture and manage an effective cyber strategy. The CyberStrong platform manages risk in...

DataMotion: Encryption for Digital Business Compliance
Enterprisesecuritymag >> vendor

Bob Janacek, Co-founder and CEO

DataMotion is premiere encryption solution provider that offers secure data solutions such as email encryption. By using DataMotion, companies can exchange email, files and other information easily and securely with partners and their cloud...