enterprisesecuritymag

virtualization

Big Data/Cloud & Cyber Security
Enterprisesecuritymag >> cxoinsights

Roland Cloutier, Staff VP and Chief Security Officer, ADP

As technologies and business platforms shift, the impact to cyber security and defensive programs are often felt long after decisions are made, technology is deployed and end users and consumers have adopted the technology change. The...

Protecting Legacy and Next-Gen Networks
Enterprisesecuritymag >> cxoinsights

Brad Boston, President & CEO, NetNumber

As the former CIO at Cisco, security was one of those concerns that kept me awake at night— specifically, protecting our infrastructure and intellectual property, and ensuring we protected the information of our employees, customers, and...

Denial of Service Attacks: From Bandwidth to APIs
Enterprisesecuritymag >> csoinsight

Edward G. Amoroso, SVP & CSO, AT&T

In the months leading up to the Millennium change, the Clinton White House was developing a comprehensive fusion center in Washington, DC to monitor the Y2K transition status of IT systems around the world. The idea was that domestic and...

Hacking Team, Ransomware, and Virtualization-Enhanced Security
Enterprisesecuritymag >> cxoinsights

Clinton Karr, Sr. Security Strategist, Bromium

The largest organizations in the world are facing thousands of attacks a day across multiple attack vectors with the target of breaching sensitive and valuable data. Many of these attacks begin on the endpoint, through phishing emails, watering...

Hacking Team, Ransomware, and Virtualization-Enhanced Security
Enterprisesecuritymag >> cxoinsights

Clinton Karr, Sr. Security Strategist, Bromium

The largest organizations in the world are facing thousands of attacks a day across multiple attack vectors with the target of breaching sensitive and valuable data. Many of these attacks begin on the endpoint, through phishing emails, watering...

The Dawn of Hybrid Web Application Firewall-Why it will define security for the foreseeable future
Enterprisesecuritymag >> cxoinsights

Carl Herberger, VP-Security Solutions, Radware

As the threat landscape transforms as quickly as advances in network protection, a sea of change is occurring in how organizations secure their networks. Dramatically different visions of how to effectively protect a network presents a...

Hacking Team, Ransomware, and Virtualization-Enhanced Security
Enterprisesecuritymag >> cxoinsights

Clinton Karr, Sr. Security Strategist, Bromium

The largest organizations in the world are facing thousands of attacks a day across multiple attack vectors with the target of breaching sensitive and valuable data. Many of these attacks begin on the endpoint, through phishing emails, watering...

What RSA 2015 can Tell CIOs about the Evolution of Security
Enterprisesecuritymag >> cxoinsights

Robert Clyde, CISM, International VP, ISACA

Have you ever noticed that it’s easier to spot changes when you only see some­one or something occa­sionally compared to when you see that same thing every day? For example, were you ever able to easily tell that an...

The Dawn of Hybrid Web Application Firewall-Why it will define security for the foreseeable future
Enterprisesecuritymag >> cxoinsights

Carl Herberger, VP-Security Solutions, Radware

As the threat landscape transforms as quickly as advances in network protection, a sea of change is occurring in how organizations secure their networks. Dramatically different visions of how to effectively protect a network presents a...

Balancing Security and Risk in a Cloud- Connected Enterprise
Enterprisesecuritymag >> cxoinsights

Anil Karmel, Founder and CEO, C2 Labs

Organizations are presented with a myriad of choices when determining how to procure, implement, migrate or scale applications to serve an increasingly mobile user base. Users are requesting the same level of agility, flexibility and transparency...

Secucloud: Democratizing Enterprise grade Native Cloud-Security
Enterprisesecuritymag >> vendor

Dennis Monner, CEO

Secucloud delivers a cloud-based security as a service platform that scales automatically and has the ability to support millions of connected devices. The distinctive system of the company, Elastic Cloud Security System (ECS2), empowers markets...

Probity: Revolutionizing Digital Forensics
Enterprisesecuritymag >> vendor

Dave Ryberg, Director of Truxton Forensics Sales

Probity Inc. offers digital forensics solutions with a highly customer-focused business. Probity is a certified 8(a) system engineering and software development business providing government and national defense-related companies with software...