Hi [[ session.user.profile.firstName ]]

Information Security

  • Date
  • Rating
  • Views
  • The first rule of data analytics for fast-growing companies? Measure all things. When putting in place a robust data analytics strategy to go from measurement to insight, you’ve got lots of options for tools -- from databases and data warehouse options to new “big data” tools such as Hadoop, Spark, and their related components. But tools are nothing if you don’t know how to put them to use.

    We’re going to get some real talk from practitioners in the trenches and learn how people are bringing together new big data technologies in the cloud to deliver a truly world class data analytics solution. One such practitioner is Celtra, a fast-growing provider of creative technology for data-driven digital display advertising. We’re going to sit down with the Director of Engineering, Analytics at Celtra to learn how they built a high-performance data processing pipeline using Spark + a cloud data warehouse, enabling them to process over 2 billion analytics events per day in support of dashboards, applications, and ad hoc analytics.

    In this webinar you’ll:

    * Build a simpler, faster solution to support your data analytics
    * Support diverse reporting and ad hoc analytics in one system
    * Take advantage of the cloud for flexibility, scaling, and simplicity


    * Evan Schuman, Moderator, VentureBeat
    * Grega Kešpret, Director of Engineering, Analytics, Celtra
    * Jon Bock, VP of Marketing and Products, Snowflake

    Register today and learn how the top SaaS strategies can streamline your business.

    Sponsored by Snowflake
  • Secure clouds don't exist in a vacuum. The very nature of a secure cloud relies on effective standardized, interoperable, and scalable Internet security. As the cloud metaphor displaces the concept of proprietary point-to-point networked servers, the key to its value can be found in the interoperability of service protocols. Securing these connections requires understanding and deploying standards such as TLS HSTS, CT, CSP, DMARC, and FIDO. Each protocol addresses specific security concerns encountered when you extend your security perimeter to include external cloud services. Developing and deploying technologies like these requires a holistic view of the security landscape, and working within a robust Internet security ecosystem.

    Key Talking Points:

    - Cloud security relies on standardized Internet security protocols.

    - Developing Internet security protocols requires multistakeholder involvement.

    - Key areas of focus include securing: transport, content, communication, and authentication.

    - Case studies presented in developing CT, CSP, DMARC, FIDO, and TLS 1.3

    - Internet security is constantly evolving; adapt or perish.
  • Together, Windows 10 and Intel deliver the productivity, security and manageability you need to advance your business.

    Intel and Microsoft have been collaborating for more than 30 years, creating technology that has changed the way we do business.

    With Windows 10, we’ve taken this partnership to a whole new level, with new hardware lighting up key Windows features that help you stay ahead of security threats, while making it easy for you to manage devices across your business.

    The new devices on Windows 10 and the new Intel 6th generation processor (Skylake) deliver:
    •Better Productivity: Do more and be more productive with improved multi-tasking, less waiting, familiar interface and app compatibility
    •Better Security: Helps protect identity, data and devices against modern security threats
    •Better Manageability: Stay current with less effort, manage devices more effectively, remotely provision and deploy applications

    Watch this webcast to:
    •Discover Windows 10 productivity, security and manageability features that new hardware lights up
    •Learn more about the Intel 6th generation processor (Skylake) and how it helps give time and money back to your company
    •Get additional resources to evaluate when it might be time for new devices and what devices are right for you
  • According to the 2016 Top Threats report from CSA, the ramifications of poor cloud computing decisions is no longer an IT issue but rather a boardroom issue. Executives at the highest levels are under scrutiny about security posture, and their response to a breach, from stakeholders, regulators and consumers.

    The growth of cloud and mobile technologies in the workplace has forced IT and security professionals to re-think their security strategy. A traditional network perimeter built on firewalls, VPNs, IDS, and DLP does not address the new threat landscape of phishing, social engineering, and data breaches.

    Join CSA CEO, Jim Reavis and Okta CISO, David Baker, for a discussion on the top threats organizations face, how the landscape is changing and best practices for improving the security of your organization.

    You’ll take away:
    -Highlights from the CSA 2016 Top Threats report
    -How to build a new security perimeter based on user identity, capable of detecting and stopping attacks in real time
    -How to improve visibility into user behavior and implement controls without sacrificing productivity
  • Regulatory compliance and security breach protection, is complex in today’s organizations, and this job is not getting easier.

    One of the major challenges that many organizations and managed security services routinely face is that the sources, numbers and types of attacks being generated are increasing exponentially. When you add the growing unknowns associated with the Internet of Things (IoT) it becomes exceedingly difficult to separate the truly lethal threats from the merely mundane. This results in greater complexity and higher costs in terms of not only the number of security incidents that need to be investigated, it is driving organizations to hire the security expertise needed to maintain these services.

    Join us for this webcast to see where state-of-the-art SIEM tools are being used to create a modern managed security service that not only scales to meet the potential threats for organizations, but also allows Managed Service Providers to deliver higher quality managed security services.
  • Cloud security remains one of the top barriers to the adoption of cloud computing (Gartner top 3) and drives a need for new and broader security measures that go beyond traditional enterprise IT security tools and practices.

    Join security experts from IBM, SoftLayer and Intel® for a comprehensive webinar about the cutting-edge products and services that deliver unparalleled control and data security in the cloud. In this webinar, you will receive:

    Practical and technical advice can be applied immediately to help secure your organization's IT environment using SoftLayer's security-rich environment for deploying and running customer workloads.
    A full overview of the chip-level Intel®TXT security available first in the cloud at SoftLayer. Lastly learn more about IBM Cloud Data Encryption Services™ about Data protection, resiliency, security and storage.
  • As organizations transition from on-premise data storage and device-centric security to the cloud, the need for a data-centric solution becomes critical. Organizations need the ability to protect data in the cloud, at access, on the network, and across all devices. While cloud app vendors now offer robust functionality, they lack the level of granular control and deep visibility many organizations need, either for compliance purposes or simply to enable an increasingly mobile workforce.

    In this webinar, we'll discuss how CASBs leverage APIs and proxies to control data on both managed and unmanaged devices, enabling secure SaaS and BYOD. Join us to learn how Cloud Access Security Brokers can help protect data in the cloud by providing comprehensive security and real-time data protection.
  • Throwing a safety net over mobile cloud app usage leaves the enterprise having to balance manageability and security against the user experience. This session covers how you can gain visibility into mobile cloud app usage, defend against malware and threats, and enforce corporate policies for mobile—all while enabling BYOD and protecting the user experience.
  • Cyberattacks are a threat to businesses worldwide, and they are getting larger and more sophisticated. The industry’s approach to protecting against these threats must change fundamentally to stay ahead of this growing threat. For too long, the problem has been tackled piecemeal, using isolated devices or services, but protecting against advanced cyberattacks requires communication and coordination among many components – from networking equipment, to specialized appliances, cloud-based services, as well as actionable threat intelligence.

    A shift in security architecture is needed, to an open platform where devices and services from different vendors can share, and act, on threat intelligence information, all in concert and in the proper context. It must be a hybrid platform; allowing on-premises security appliances to detect and mitigate attacks, locally, while automating alerts, and switchover, to cloud-based services should an attack threaten to swamp the business’ network connection.

    Join Michael Kaczmarek, Sr. Director of Product Management, and learn how to assist with designing a resilient security ecosystem by maximizing an API-centric approach. In this session, Mike will discuss how to:

    · Evaluate the Threat Landscape

    · Design for Both Security and Flexibility

    · Prepare for Incidents – Orchestrate Responses

    · Expand to a Hybrid Premise and Cloud Security Architecture
  • The Cloud Standards Customer Council will define hybrid cloud computing, explain why this deployment model is essential for addressing business requirements, and outline the key considerations that customers must take into account as they start their transition. The presentation will include strategic and tactical activities for decision makers implementing hybrid cloud solutions. It will cover all the essential technical considerations for hybrid cloud deployment including integration, connectivity, governance, management, security and privacy.

Embed in website or blog