The Path to Drive Success with MSSP
Enterprisesecuritymag >> cxoinsights

David Stern, CISO, BGC Partners

Managed Security Services Providers (MSSP) have been a very common route for organizations to fill critical gaps in managing and monitoring their security program. An interested shopper can chose from a wide range of providers and capabilities. A...

The Impact of the Cloud on Information Security
Enterprisesecuritymag >> cioviewpoint

Vennard Wright, Chief Information Officer, WSSC (Washington Suburban Sanitary Commission)

As a CIO for the Wash­ington Suburban Sanitary Commission (WSSC), which is a 100-year-old public wa­ter utility serving 1.8 million customers in Maryland, across 475,000 accounts, I’ve realized the challenge of balancing evolving...

Enterprise Security on Cloud: A Futuristic Assessment
Enterprisesecuritymag >> cxoinsights

Security analytics is completely transforming the way companies do their business. Various changes and new trends in technologies have resulted in changing the way work is done in organizations. As a result of these drastic changes, companies have...

Improving Security with SIEM Reports and Alerts
Enterprisesecuritymag >> csoinsight

Coordination is of foremost importance with regard to managing a data center efficiently. In addition to monitoring performance trends, system access, and power consumption on a daily basis, security information and event management (SIEM)...

Redefining Cybersecurity with SIEM Practices
Enterprisesecuritymag >> cxoinsights

A famous adage says, “the best defense is the good offense”. With the increasing number of attacks in the cyber landscape, organizations should not only focus on their outside barrier but also form an effective inside barrier. This can...

Battlefield Principles for Cybersecurity Leaders
Enterprisesecuritymag >> cioviewpoint

Jake Margolis, CISO, Metropolitan Water District of Southern California

Prior to becoming a CISO, I served in the California National Guard and U.S. Army as an Information Assurance professional and Brigade Signal Officer. The lessons and experiences that shaped my career were not learned through technical training or...

Role of Data Analytics in Security
Enterprisesecuritymag >> cxoinsights

Security tools for network monitoring, event management and security information, and forensics is greatly influenced by big data, which is playing a key role in transition. However, security researchers should continue to explore new and...

Moving toward Successful SSH Key Management for Greater Network Security
Enterprisesecuritymag >> csoinsight

Matthew McKenna, CSO, SSH Communications Security

When organizations realize that their poor to non-existent SSH user key management has created a significant hole in their network security, denial is often their first response. But when it comes to security, denial is dangerous. SSH user keys...

Today's Threat Landscape Requires Adaptive Security
Enterprisesecuritymag >> vendor

Dan Joe Barry, VP Positioning and Chief Evangelist, Napatech

The FBI estimated that cyber criminals grossed $1 billion last year from ransomware. They stand to gross considerably more as new ransomware variants emerge that enable the malware to spread more quickly and without any help from humans....

Conquering Endpoint Security Challenges
Enterprisesecuritymag >> vendor

Brian Thomas, CIO, Swope Health Services

1) What do you see as a big challenge in technology to meet the challenges of your industry? If you were to write down a wish list, what solutions do you look forward to and your expectations from technology providers for the enterprise? The...

Getting In Front: Thinking Differently about Threat Intelligence
Enterprisesecuritymag >> vendor

Tim Callahan, SVP, Global Security, & Global CSO, Aflac

Many information security professionals will remember when we relied primarily on a defensive posture to protect our organizations from cyber threats. We spoke about the layers of defense and took comfort if we could architect in three or four...

Is Outsourcing a Security Operations Center a Good Idea?
Enterprisesecuritymag >> vendor

Fred Newberry, CISO, BDP International

Threats have become so significant and sophisticated in recent years, that technology and human resources are struggling to keep up, much less get ahead of them. Gone are the days when anti-virus and a strongly configured firewall could keep out...

SwiftSafe: Beating the Hackers in Their Own Game
Enterprisesecuritymag >> vendor

Akhil Rapelli, Information Technology Security Analyst & CTO

Evaluates existing IT infrastructure to develop customized cyber security strategies depending on clients’ data security needs

Splunk: A Disruptive Security Vision
Enterprisesecuritymag >> vendor

Doug Merritt, President and CEO

Offers market-leading SIEM solutions with machine learning to solve the toughest IT, Internet of Things and security challenges

TEHTRIS: Holistic Cybersecurity with Enhanced Endpoint Protection
Enterprisesecuritymag >> vendor

Laurent Oudot, Co-CEO and CTO

Provides IT security technology to customers

akquinet AG: The International SAP Security Specialist
Enterprisesecuritymag >> vendor

Ralf Kempf, Technical Managing Director

Perfect and experienced partner offering the full range of solutions for SAP customers in the areas of security as well as in governance, risk and compliance

Elysium Security: Combining Offensive and Defensive Skills for Enhanced Security
Enterprisesecuritymag >>

Sébastien Dartigalongue, CEO & Co-Founder

Offers innovative services and solutions with the required business knowledge of current and future needs to safeguard organizational data and prevent threats

ReliaQuest: The Leading Edge of Cybersecurity
Enterprisesecuritymag >>

Brian Murphy, CEO & Founder

A next-gen security solutions provider that supports clients with cutting-edge tools to deliver consistency and security evolution

CloudAccess: Enabling a Holistic View of Security
Enterprisesecuritymag >>

Kevin Nikkhoo, CEO & Founder

Provider of comprehensive security-as-a-service from the cloud to deliver an enterprise view of security

GlassHouse: Systems Enhancing Security Posture with SIEM
Enterprisesecuritymag >>

Amit Gil, Security Practice Lead

An infrastructure, security, and managed services solutions provider, developing, designing and deploying solutions for leading enterprises