Evolving and Strengthening Organizational Security
Enterprisesecuritymag >> cxoinsights

Sylvia Acevedo, CEO, Girl Scouts of the USA

In our ever-more data-driven world, information security is everyone’s problem-from individuals navigating the web who need to understand how to protect their personal information online, to businesses-large and small - protecting their...

Need for Multi-Factor Authentication
Enterprisesecuritymag >> cxoinsights

A few years back, every organization had only one point of access for their data, applications and other resources—the organization’s database. However, today, from LAN, WAN, and VPN to cloud applications, every organization has...

The Cloud- First Approach
Enterprisesecuritymag >> cioviewpoint

Arjun Chopra, Partner, Floodgate

Could you give me an overview of the types of opportunities you pursue as a Partner at Floodgate? I believe that the public cloud represents a generational platform shift that has delivered not only the fastest growing enterprise software...

The Age of Cyber-Cloud Networking
Enterprisesecuritymag >> cioviewpoint

Sandy Jacolow, CIO, Silverstein Properties

The Cloud, Internet of Things (IoT), Everything as a Service and implications of Cyber Security are transforming today’s network at a frenetic pace beyond the boundaries of Moore’s Law. Brian Solis best described this shift as Digital...

Providing Tools to Implement Security in the Cloud
Enterprisesecuritymag >> cxoinsights

Sam Schoelen, CIO, Continental Resources

I have spent a great deal of time investigating cloud and many cloud technologies. Many have been around for years now and have matured greatly. What I would like to know now is "Why not?" People have been using Salesforce for many years...

Security of Cloud Computing
Enterprisesecuritymag >> vendor

Anthony Scarola, CISSP, Director of Technical Information Security, TowneBank

Ugh, “cloud”. The term and how it has been applied to hosted computing services is disappointing. Hosting providers have repurposed the cloud placeholder— typically used by network engineers to depict complex, yet understood...

Forsta: Augmenting Cross-Enterprise Collaboration with Encryption
Enterprisesecuritymag >> vendor

Pat Sewall, CEO

Forsta is a team of people working with smart business to provide cutting-edge technology for companies that need encryption solution and data protection. The company helps companies embed, expand, and customize secure cooperation into their...

Evolve IP: One Cloud. One Identity. Unlimited Applications.
Enterprisesecuritymag >> vendor

Neill Reidy, Director, Cloud Computing

Evolve IP delivers customized strategies and integrated services for both communications and cloud computing; the company offers solutions that are programmed to work together and with applications and tools which are already in use by a company,...

Delta Risk: Provisioning Security with People, Processes, and Technology
Enterprisesecuritymag >>

Scott Kaine, CEO

Provider of managed security solution protecting endpoints, securing devices, and data both on and off company networks