The application development community features top thought leadership focusing on optimal practices in software development, SDLC methodology, mobile app development and application development platforms and tools. Join top software engineers and coders as they cover emerging trends in everything from enterprise app development to developing for mobile platforms such as Android and iOS.
The General Data Protection Regulation (GDPR) clock is ticking and the time to act is now. Organizations around the world are developing their GDPR plans. Non-compliance has significant costs…up to 4% of an organization’s annual revenue.
Join us to learn:
- What is GDPR
- Deep dive into relevant data security articles of the GDPR
- Review how different technology can address some of the GDPR data security requirements
CI/CD tools like Jenkins enable development teams to deliver software faster. To prevent containers with either high-risk vulnerabilities or compliance violations making it to production, it’s important to integrate automated compliance and vulnerability monitoring that can check, alert on and fail builds. By detecting and remediating security risks early, you reduce overall risk, minimize costly rework, and reduce the effort of downstream security checks.
Join Twistlock Solution Architect Matthew Barker to see how Twistlock integrates directly into Jenkins to improve your risk and compliance posture without slowing down development.
The European Union (EU) General Data Protection Regulation (GDPR) is designed to ensure the data privacy and protection of all EU citizens. It applies to any organisation – regardless of geographical location – that collects or processes personal data on EU residents, and institutes high penalties for non-compliance.
Join this interactive session to learn how you can improve your security to meet GDPR compliance by increasing your network traffic visibility. With the ability to monitor and send the right traffic to the right tools at the right time, the GigaSECURE® Security Delivery Platform can form the backbone of any GDPR compliance project.
In this presentation, you will learn how to bring pervasive visibility into network traffic that is needed to:
- Eliminate monitoring blind spots
- Vastly improve the accuracy and precision of data risk detection
- Help organisations meet the GDPR challenge
About the Presenter
Adrian is the Technical Director EMEA for Gigamon. He has had a keen interest in network security ever since, whilst working for Lucent Technologies, they introduced the Lucent Managed Firewall. Adrian also worked for leading web security firm CacheFlow, before joining NetScreen and, post-acquisition remaining with Juniper Networks where he held a number of senior sales engineering roles. Adrian joined Gigamon in 2016.
5G is on its way. It may be closer to 2019-2020 for some but for others, it may be 2023-2025 before it materializes. In all the countries that are frontrunners of 5G in Asia-Pacific, 5G is benefiting from local government support coupled with local demand or at least the potential for demand for 5G services. The demand may be incentive or market driven.
The market for 5G is expected to have reached $4.50 billion by 2022 with 280.4 million 5G subscriptions. The implementation timeline for MNOs will vary from country to country, albeit not as widely as it was with 3G or 4G. Frost and Sullivan expects that government support for 5G in populous countries such as China and India and new business models that will emerge out of the trials by MNOs at the upcoming Olympics will support high service revenue growth at CAGR of 315.1% from 2019 to 2022.
5G will trigger a quicker transition to distributed, cloud native networks that leverage on NFV, SDN, and MEC to reduce cost to serve and improve on efficiency and profitability for MNOs. Further, with 5G offering latency below 1ms and larger bandwidths, mobile networks can gain an edge over fibre networks and regain competitiveness.
If you have any client that has an interest in gaining an in depth understanding of 5G developments in Asia Pacific, this study will help address questions such as:
•How will 5G impact industry?
•What are the market challenges and opportunities?
•What are the key drivers for growth?
•How big will the market be for 5G by 2022?
Amplitude has tracked over 1 trillion events across 5000 applications on web, mobile web, iOS, and Android. We reviewed this data and found critical insights on user behavior, retention and revenue that will help you build better products for your users.
Join our co-founder and CEO, Spenser Skates, as he covers the drastic change in how products are built, and what we’ve learned by analyzing 1 trillion events. You’ll also get the chance to win an iPad Pro!
Join us to learn:
- The drastic change in how products are being built today
- User behavior insights we’ve discovered by tracking 1 trillion events
- How you have been calculating retention wrong
HPE Software EVP & GM Chris Hsu hosts: 6 Key Tech Disruptions and Our Point of View
As part of the planned Software spin-off and merger with Micro Focus, HPE’s Software organization is undergoing a major transformation to shape the combined company as uniquely positioned to help customers on challenges across a hybridized environment.
And hybrid is much more than a buzzword. In today’s reality, not only do businesses have to deal with the rapidly changing technologies and multiple deployment models, but they also have to deal with the pressure of reducing their run costs and to constantly innovate.
During this transformation, we have interviewed thousands of customers, conducting deep market research, allowing us to gain unprecedented market insights. Join this webcast and learn about the new waves of tech disruptors, and how, our combined, software pure-play company is going to shape the industry.
“When you prepare for a global merger of this scale, it gives each company an unprecedented opportunity to look at all of their processes and take steps to optimize. We have had the luxury of stepping back and asking how do we transform our IT platform to support our strategy for tomorrow? Few of us ever get this opportunity.”
Learn about the exciting new features in Sencha Test 2.2 early access release, including simplified test creation, defect management, and results storage. We have also addressed one of the biggest challenges that test automation engineers face at the time of product evaluation – how to build good tests using stable locators.
Attend this webinar to see a live demonstration and learn what’s new in Sencha Test 2.2 Early Access, including how to:
- Write application (end-to-end) tests for applications built using the ExtReact framework
- Select and use unique locators by using the DOM Tree directly from Sencha Studio
- Create and use Page Objects to build robust tests for web applications
- Visualize tests using a tree view and focus on the test under construction
Learn how to instantly clone and recover very large databases in the data center or in the cloud.
The digital economy is driving massive volumes of information into databases. Database Administrators (DBAs) are now struggling to balance operational needs such as performance and availability with the needs of their development teams who want more database copies and the current copies to be refreshed faster. These challenges also inhibit innovation and make it difficult for DBAs to consider new offerings such as self-service database provisioning, cloud integration and instant database recovery solutions. In this webinar learn how to instantly clone and recover very large databases in the data center or in the cloud.
his presentation will share key insights from a survey Quali conducted of 2045 professionals to gauge the state of DevOps and Cloud adoption. It reviews the top 10 barriers to DevOps adoption as well as best practices that can help overcome these barriers. This is an informative session for DevOps and Cloud architects, application owners, technologists as well as IT infrastructure professionals that are responsible for planning and deployment of DevOps tools and processes.
The Internet of Things (IoT) holds promise for both consumers and enterprises alike. To succeed, any IoT project must concern itself with how to ingest machine and sensor data, how to build actionable models, and how to react to the output of models in real-time.
Join Pivotal Data Scientist Chris Rawles, as he illustrates how to build and operationalize an IoT application running on Pivotal Cloud Foundry that scores and reacts to streaming data in real-time. In this webinar, you will learn how to:
- Collect streaming IoT data
- Build and train machine learning models in real-time
- Score streaming data in real-time in an application
App teams are excited about using microservices architectures and containers. Running a few containers in a development environment with a few open source tools is very different from running large clusters with thousands of containers supporting production applications. In this three-part tutorial, Avi Networks CTO, Ranga Rajagopalan explains step-by-step with examples, the services needed and practical considerations in deploying production-ready, container-based applications.
In this episode, Ranga will cover the concept of a Service Mesh for an OpenShift - Kubernetes cluster along with the following:
Need for an ingress controller and an intra-cluster traffic manager
How to deploy a service mesh in a kubernetes cluster
Real-life examples of a service mesh deployment
Best practices and lessons learned from production deployments
Register for the upcoming episodes in this tutorial series for on-demand access to the videos.
Episode 2: https://attendee.gotowebinar.com/register/7441307064554961155
Episode 3: https://attendee.gotowebinar.com/register/6587591261168317699
About Ranga Rajagopalan:
Over the last 15 years, prior to co-founding Avi Networks, Ranga has been an architect and developer of several high-performance distributed operating systems as well as networking and storage data center products. Before his current role as CTO, he was the Senior Director at Cisco’s Data Center business unit, responsible for platform software on the Nexus 7000 product line. Joining Cisco through the acquisition of Andiamo where he was one of the lead architects for the SAN-OS operating system, Ranga began his career at SGI as an IRIX kernel engineer for the Origin series of ccNUMA servers.
The India's Unique Identification numbers (UIDs), also named "Aadhaar numbers" contain Personally Identifiable Information (PII), the Unique Identification Authority of India (UIDAI) has mandated that the private cryptographic keys used to digitally sign and authenticate the UIDs must be stored in a Hardware Security Module (HSM).
In addition to HSMs, the UIDAI has also mandated the use of tokenization – replacing sensitive data with a token that can be securely stored, processed and transmitted as of August 2017.
Join this live webinar to know more about how to easily conform to the mandate:
•What is UIDAI's requirements?
•Why HSM and tokenization?
•How to ensure Aadhaar numbers are protected?
•What makes Gemalto's SafeNet Luna HSM and KeySecure unique?
•How to meet UIDAI's compliance mandates?
Providing platforms and services at Disney Studios and Pixar is both exciting and demanding. OpenShift offered a technology mix that assisted the technology teams to deliver an on demand, container platform that exposed developers to up-to-date content, pipeline automation, storage, and deployment patterns for microservices and tiered applications. During this talk we will hear from both the Disney and Pixar teams to find out how they are offering an automated experience for developers and IT services.
It's the Avanan Era of Security–most every security vendor has joined together on a single platform to solve the problem of security in the cloud. It is challenging every security assumption:
• Single-silo solutions that solve one problem or only protect one SaaS;
• Incompatible technology that makes it impossible to deploy true defense-in-depth;
• Disruptive deployment that reroutes traffic;
• Technology lock-in and vendor regret;
The Avanan disruption in the marketplace is actually an elimination of the chaos of incompatible products that do not work together or don't integrate with the current enterprise security architecture.
In this webinar, we will discuss how the Avanan platform changes the security equation for:
• SaaS/IaaS: that can now offer cloud-native security,
• Security Buyer: who can deploy and compare multiple solutions at once,
• The Security Architect: who can integrate the cloud into the enterprise security workflow,
• The CISO: who requires both security and compliance,
• The CEO: who will not tolerate business disruption,
• The User: who needs to just get work done.
Soon, the Avanan Platform is the way that all cloud security technology will be compared, purchased, deployed and managed.
This encore of Zane Lackey's Black Hat presentation covers the most effective application security techniques, helping you avoid development bottlenecks while staying secure.
The standard approach for web application security over the last decade and beyond has focused heavily on slow gatekeeping controls like static analysis and dynamic scanning. However, these controls was originally designed in a world of Waterfall development and their heavy weight nature often cause more problems than they solve in today's world of agile, DevOps, and CI/CD.
This talk will share practical lessons learned at Etsy on the most effective application security techniques in todays increasingly rapid world of application creation and delivery. Specifically, it will cover how to:
* Adapt traditionally heavyweight controls like static analysis and dynamic scanning to lightweight efforts that work in modern development and deployment practices
* Obtain visibility to enable, rather than hinder, development and DevOps teams ability to iterate quickly
* Measure maturity of your organizations security efforts in a non-theoretical way
Join this informative webinar to see how we achieve superior test acceleration using NTT DATA's ML/AI based Intelligent QA solution. Our Software Test Acceleration Toolkit forays into Intelligent Automation space with its in-house built analysis driven testing engine, helping organizations improve their testing quality by taking better decisions.
Kubernetes is a system used to manage compute and app workloads using clusters of nodes. Cluster are capable of handling various types of use cases, but there are certain resources which may be vital to your deployments that the system does not natively implement. In order to create custom deployments with Kubernetes, we must extend the cluster with new resources and processes, formally known as Operators.
Join Mike Metral in this webinar for an introduction to Operators, understand the migration changes from Third Party Resources to Custom Resource Definitions in Kubernetes, and walk through a demo on how to create a new Operator for your Kubernetes cluster.
The Center for Internet Security (CIS) recently published a Benchmark specification for securing Kubernetes host machines.
In this webinar we will take a closer look at the CIS Kubernetes Benchmark, and discuss how Kubernetes users can apply best practices from the Benchmark in their own deployments. We will cover aspects of secrets management, user authentication and authorization and the use of least privileges. We will end up with a demonstration of our very own kube-bench, an Open Source tool for testing benchmark compliance.
Join Michael Cherny, Head of Security Research and Liz Rice, Technology Evangelist, to learn about practical actions you can take to make your Kubernetes deployment more secure.
Open source, containers and microservices, and a myriad of DevOps tools reduce the time and friction to deploy code. Oftentimes, security becomes a limiting factor in bringing new innovations to market.
To build secure applications without slowing development cycles requires a new approach to security: Shift-Left Security. This means moving security to left in the development process and into the purview of developers by integrating it into existing workflows.
Join us for this to learn:
- 6 reasons development should own security
- Best practices to employing Shift-Left security
- How to deploy secure apps at DevOps speed
Creating a seamless connected environment that supports smart community citizen services, streamlines operations, supports economic development is already a challenge for community officials. There are many different needs and directions to begin the conversion to an “intelligent” environment. Communities are also planning and building not just for current needs, but also for future connectivity infrastructure that will be used by autonomous vehicles, smart buildings, connected homes, AR/VR, eRetail, eHealthcare, smartgrid and more.
This webcast will discuss such questions as:
> What issues are city officials prioritizing for resolution through smart community applications?
> How are communities planning for and deploying small cell infrastructure?
> Which departments are involved in communications infrastructure?
> How can suppliers navigate the multiple departments involved in decision making?
> What business models are cities negotiating with their technology product partners?
> What are some of the lessons learned from cities that you can translate into your own business offering?
Jascha Franklin-Hodge, CIO, Boston, MA
Kate Garman,Smart City Coordinator, Seattle, WA
Peter Marx, currently in the position of VP, GE Digital and former CTO, City of Los Angeles
If you haven’t already, we recommend you listen to the first webinar in this series, the 9-minute overview by our SVP and GM Raffi Margaliot as he introduces the three core disruptions facing application delivery teams today.
Software development teams are under pressure to release faster while maintaining the same level of quality—or ideally increasing it. This has significantly increased application lifecycle complexity to the point of chaos. Join us, as we discuss how application development teams can leverage HPE’s ALM Octane, an integrated lifecycle management solution, along with advanced analytics to mitigate the risks in application delivery and optimize their resource investments. Learn how to scale Agile and DevOps processes with data driven insights and prescriptive guidance.
Information security has not kept pace with the new reality of a software-driven world. Traditional defenses are proving inadequate in this environment. We’ll discuss how organizations should evolve their security strategies as users and applications become the risk focal point. Attend this session and learn about new approaches such as:
• Work with the way developers work.
• Cover not only the apps an organization develops internally, but also those it purchases or assembles from components.
• Move beyond the software development lifecycle to the full software lifecycle, covering apps from inception through production.
Software makes the world go round these days, and it’s also causing a lot of problems. The U.S. Department of Homeland Security recently found that 90 percent of security incidents result from exploits against defects in software. It sometimes seems like we’re just rolling out the red carpet for cyberattackers with our applications. Why is software so riddled with security defects? Are developers to blame? Is it just the nature of software?
We’ll discuss the four primary ways that vulnerabilities end up in your software. Attendees at this session will understand the main sources of vulnerabilities and how to prevent them -- a good first step in making apps less like a red carpet for cyberattackers, and more like a moat. We’ll get attendees up to speed on the following:
• Insecure coding
• A threat landscape that never quits
• Indiscriminate use of components
• Programming language choice
According to Akamai, attacks at the application layer are growing by more than 25% annually. But many organizations still struggle to understand how to get started with application security, or what good looks like.
To shed light on the application security process, this session will outline the steps most of Veracode's customers take to develop a mature application security program. Attend and hear about Colin’s experience developing and managing an application security program from the ground up and learn:
• The different AppSec phases most organizations are currently in
• The next steps to take when moving toward a more comprehensive AppSec program
• Lessons learned, best practices and pitfalls to avoid -- from someone who’s been there
• What a comprehensive, mature AppSec program entails
If you are moving between methodologies, you are probably looking for a roadmap or at least lessons from someone that’s been through it already. Over its 10+ years, Veracode has moved from monolith to microservice and from waterfall to DevOps. We have learned a lot along the way and I’m eager to share the story. In this session learn:
· A basic Understanding of Waterfall, Agile and DevOps from a people, process and technology point of view
· Considerations when transitioning between these methodologies
· An approach to leading the change in your own company
· How Security can best be integrated into DevOps
Securing a global enterprise requires security, development, vulnerability management, compliance and risk professionals to understand the engagement and inflection points in the software development lifecycle—and their roles to accelerate it.
Join Veracode for a two part session featuring "Securing the Enterprise in a DevOps World" with David Wayland, and an interactive panel discussion to continue the conversation on securing the enterprise in a DevOps World. This open round table discussion will be led by Veracode Co-Founder and CTO, Chris Wysopal. We will have time for Q&A so bring your questions!
The discussion will touch upon:
· Are you crawling, walking or running with your DevOps initiative?
· Pitfalls? Success?
· How are you connecting the dots for the business and the board on how your application security initiative is mitigating risk?
Panelists: David Wayland, Head of Enterprise Application Security—Fortune 500 Financial Firm, Pete Chestna, Director of Developer Engagement—Veracode, Joseph Feiman Chief Innovation Officer—Veracode.
The cloud promises to enable organisations to be more flexible, agile and responsive to the needs of their business and the demands of customer and partners. As physical infrastructure has become invisible to end-users, the role of service providers and channel partners has changed. Faced with public and private options, many firms are taking a XaaS approach, embracing the best of both private and public worlds - implementing hybrid architectures to deliver on-demand access to compute resources, capacity, and services, while also providing greater levels of control, security, and visibility of data and applications. In this webinar, Rory Duncan, Research Director with 451 Research will outline the opportunities for Service Providers and channel partners delivering cloud services, examining topics such as support, managed services, data protection and data sovereignty for facilitating cloud consumption.
The explosion of cloud-based applications in the enterprise is making IT and security professionals rethink their cloud identity management strategy. By default, every cloud user creates an average of 17 cloud identities. But catering to 17 different user stores per employee or partner is simply not scalable from an administration perspective. And as if IT’s time is not precious enough, password resets account for 20% of helpdesk tickets. This adds to the compliance and security risks associated with cloud-based applications, which by default require only weak static passwords and offer no central point of management across disparate cloud-based services.
Join Stephen Allen, Gemalto Product Manager for Authentication and Access Management, and learn how deploying an Identity Provider enables:
•Cloud Single Sign-On for easy access to cloud apps
•Regulatory compliance with standards such as PCI DSS
•Reduced identity lifecycle overheads
•Centralized management of cloud access policies
•Increased security with step-up authentication
Predictive analytics & artificial intelligence are transforming the way all companies connect with customers. The customer experience is on the verge of being completely redefined with A.I.
In this talk, you will learn what it takes for a business to deliver this new 21st-century customer conversation. Patrick will cover:
- Collecting & Managing CX data - What I learned analyzing 3 billion records at Amazon
- We have the data, now what? AI & the Future of Customer Experience
- How to use Predictive Analytics to find the right customer on the right channel
- 3 ways to drive ROI for your business by applying AI to improve the Customer Experience
Patrick is CEO of Lumidatum which helps CMOs apply artificial intelligence to the customer experience in order to grow revenue. He has been in the data and analytics space for over a decade including running a machine learning and advanced analytics team at Amazon.
CoreOS Tectonic is an enterprise-ready Kubernetes platform that provides automated operations, enables portability across private and public cloud providers, and is always upstream open source Kubernetes.
Looking for a consolidated solution to find, secure, and monitor all of your web applications?
Join this 20 minute webinar to see how Veracode can help you easily track and inventory all of your external web applications with the ability to scan and scale on thousands of sites in parallel to find critical vulnerabilities and prioritize your biggest risks.
Learn how to leverage technologies such as Veracode Web Application Scanning which enable teams to discover and address vulnerabilities during the production and pre-production phases of the software development lifecycle (SDLC). As one of the multiple scanning technologies Veracode offers on a single platform, your organization can systematically reduce risk while continuously monitoring your security posture.
Do your employees struggle to access and analyze information that sits across multiple systems? Do they delay completing tasks that require they login to yet another system? Employees are now pushing back against legacy systems – both on-premises and SaaS – and demanding more modern applications to complete their work. Unfortunately, you have spent millions of dollars on software and replacing them is not an option. The question: how do you meet employee expectations for more user-friendly tools without costly upgrades or throwing out your existing systems? Answer: a modern portal.
Sapho’s modern portal surfaces personalized and relevant tasks and data to employees using micro apps. Sapho micro apps are built by IT on top of your existing systems using a simple micro app builder and pre-built templates. These micro apps – available on any device, intranet, or messenger app – provide employees with proactive notifications about interesting system data, actions that need to be completed, and changes in business data that require attention. With Sapho, employees can complete work faster and make better decisions, improving their overall productivity and effectiveness.
In this webinar, we will show you how easy it is to build a modern portal that:
- Connects to your existing systems with pre-built connectors for systems such as SAP, Oracle, Concur, Salesforce, or ServiceNow
- Surfaces event-driven micro apps, that you can build in just 15 minutes to deliver simplified workflows and data access
- Is accessible by employees from any device, intranet, or messenger allowing them to complete actions and review information from anywhere
Test automation has become a must, especially in agile and DevOps projects with their goals of continuous integration and fast deployment. QA teams face many challenges today with testing including emerging technologies, digital maturity, and fast-paced delivery expectations.
In this session, attendees will learn about:
1.Key challenges in today’s testing landscape that impact automation testing
2.Ways to set expectations for automation that accelerate buy-in and support
3.Considerations for prioritizing types of testing and technologies for automation
4.Understanding who should be included in planning for automation
There has been a flood of publicity around big data, data processing, and the role of predictive analytics in businesses of the future.
As business operators how do we get access to these valuable business insights, even when there is not a data analyst around to walk us through their results?
- Should your software emulate a data scientist?
- Learn about the power of data visualizations.
- Learn about creating value from disperse data sets.
This event is presented as part of the Modernizing Application Architecture with Microservices and APIs Virtual Summit Series. Join the event and live chat here: https://ca.6connex.com/event/APIM/login?lang=en-us
Your API strategy is the backbone of how your application architecture comes to life. But with pressure to move fast often teams move on to coding and build a first working version to prove out the concept - incidentally investing too much time to be really willing to rethink the approach.
There is another way... There's a whole world of API prototyping possibilities out there that allows for quick design and more importantly - enables teams to fail fast and get to the best solution that supports the strategy before investing in expensive coding time.
Join this presentation to learn:
- What makes a great API strategy
- What's important for your API design and architecture
- About API prototyping tools and approaches to help you get started
Many organizations are good at making management plans and then executing against those plans. The problem is organizations are now spending more time trying to understand the future, while at the same time the future is becoming less knowable.Organizations must adapt to growing uncertainty with innovation, not retreat, using the right combination of cloud technologies and agile operations.
In this webinar, experts from Google and Red Hat discuss how to:
- Implement hybrid cloud solutions more effectively
- Launch new initiatives with less risk
- Collectively use open source to create a more agile environment.
Please join us, on August 24th, at 10:30 AM PT, for a Webinar on how to confidently secure Docker on AWS.
Docker adoption has surged, up 40% over the past year, taking the lead for DevOps tools on AWS. With this transformation, enterprises are looking for ways to confidently introduce Docker into their Cloud environment. Join us as Cavirin experts guide you through:
> Securing EC2 Container Services, as well as Docker images, brought in from different registries
> Integrating CloudTrail and CloudFormation
> Today's best Docker security practices on AWS
> The latest on Kubernetes
Attend the AWS Docker Webinar and a chance to win Snapchat Spectacles.
It is challenging enough for organizations to stay ahead of the DevOps movement. As part of this trend, application security testing is becoming an integral part of a developer’s job. No longer can Static analysis alone ensure the overall security of an organization’s application portfolio.
In this webinar, learn how CA Veracode is taking the lead on securing DevOps with specific emphasis on:
•Validation of the impact of DevOps in the market through Veracode data and API usage analysis
•Vercode’s product portfolio strategy including Greenlight and IDE integrations enabling customers to stay ahead of DevOps
•Use case scenarios for customers to consider – each from the Security, Development and Operations perspectives
With everything in the enterprise going all digital, bypassing traditional security mechanisms in favor of instanteneous, user-convenient transactions increases the risk to the business exponentially. Accessing confidential employee files electronically, e-signing contracts, or allowing your customers to transfer money via a mobile app without cumbersome verification steps makes you and your customer prone to cyber fraud.
So, what is a digital business to do? You can’t very well remove security completely from your strategy. And, as passwords become obsolete, users increasingly want solutions that are invisible as well as convenient.
Security Orchestration may be the answer to the growing security concerns of your digital enterprise. Join this webcast lead by VASCO Data Security and learn how to keep your digital enterprise secure without slowing down customers or their transactions.
Topics of discussion will include:
• What is security orchestration
• Using orchestration to improve user experience
• Best practices for behavioral authentication
• Step-up authentication for risky behavior including fingerprint scan or face recognition
• Using real-time monitoring to drive down fraud
• Critical elements of mobile app security
• Container security and its role in preventing fraud before it starts