RSS feed Get our RSS feed

News by Topic

container security

Results 1 - 25 of 42Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
     IBM
By: Tenable     Published Date: Feb 05, 2018
Ready, set, collaborate, automate – a mindset change for strengthening security. Industry research suggests there is significant interest in making DevOps more secure. In fact, Gartner reports "by 2021, DevSecOps practices will be embedded in 80% of rapid development teams, up from 15% in 2017." To help you effectively integrate security into your organization’s DevOps practice, Tenable encourages you to read the Gartner report, “10 Things to Get Right for Successful DevSecOps.” Loaded with specific detailed recommendations, the report covers topics including: - Integrating security and compliance testing seamlessly into DevOps processes - Scanning for known vulnerabilities and miscongurations in all open-source and third-party components - Scaling infosec into DevOps by using a security champion model
Tags : secure devops, gartner, analyst report, container security
     Tenable
By: Tenable     Published Date: Apr 30, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : devops, dev sec ops, infosec, container security, idg, digital transformation
     Tenable
By: Tenable     Published Date: Aug 07, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : devops, dev sec ops, infosec, container security, idg, digital transformation
     Tenable
By: Tenable     Published Date: Nov 06, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : devops, dev sec ops, infosec, container security, idg, digital transformation
     Tenable
By: Tenable     Published Date: Mar 07, 2018
"Learn how you can accelerate development and strengthen security – without disrupting your operations. Organizations that effectively meld DevOps and InfoSec can shift security from an afterthought to an integrated, automated, and proactive practice. By reading this paper from IDG, you’ll learn three reasons why DevOps is a game-changer for security and steps you can take foster a more collaborative and proactive approach to securing your enterprise. Topics covered include: - Adapting security testing tools and processes to the developer - Automating security into the CI/CD toolchain - The impact of secure DevOps on your bottom line - Increasing security awareness and commitment across teams This paper provides high-level guidance for DevOps and InfoSec professionals seeking collaborative, efficient approaches for strengthening application and information security."
Tags : secure devops, container security, docker, infosec
     Tenable
By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : ransomware, security, risk reduction, containerization, data security
     Citrix ShareFile
By: Intralinks     Published Date: Jun 18, 2013
Intralinks a New York based company, has announced the general availability of its new Intralinks VIA service, and unveiled new brand containers for existing core services in extra-corporate document-based collaboration. Intralinks VIA, in development for nearly two years, is initially positioned to serve "the rest" of the employee population inside customers, which already use Intralinks. Download this white paper to learn more about the role of Intralinks in the broader business collaboration market, with more robust security, controls, and other necessary features for enterprise use.
Tags : enterprise, file sharing, collaboration, technology, market, security, new news
     Intralinks
By: Avi Networks     Published Date: Mar 06, 2019
OpenShift-Kubernetes offers an excellent automated application deployment framework for container-based workloads. Services such as traffic management (load balancing within a cluster and across clusters/regions), service discovery, monitoring/analytics, and security are a critical component of an application deployment framework. Enterprises require a scalable, battle-tested, and robust services fabric to deploy business-critical workloads in production environments. This whitepaper provides an overview of the requirements for such application services and explains how Avi Networks provides a proven services fabric to deploy container based workloads in production environments using OpenShift- Kubernetes clusters.
Tags : 
     Avi Networks
By: VMware AirWatch     Published Date: Oct 02, 2015
Nemmeno un anno fa, le previsioni degli analisti inducevano gli entusiasti della mobility a ritenere che il destino del settore del Mobile Device Management (MDM) fosse ormai segnato.
Tags : mdm, containerization, security, enterprise mobility
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
Nemmeno un anno fa, le previsioni degli analisti inducevano gli entusiasti della mobility a ritenere che il destino del settore del Mobile Device Management (MDM) fosse ormai segnato. In occasione di una convention di analisti svoltasi nel 2013, un gruppo di esperti aveva espresso la convinzione che il fenomeno del BYOD (Bring Your Own Device) avrebbe portato a una forte riduzione dei prezzi, a un crollo delle vendite e alla fine di un intero settore. Così si rivolgeva l'analista di Gartner John Girard alla platea dei partecipanti (fonte: CRN.com): "Il mercato del Mobile Device Management è in pieno marasma e a mio parere ha i giorni contati". Girard prevedeva che il trend del BYOD e la refrattarietà dei dipendenti alla gestione dei dispositivi personali avrebbero reso necessaria la transizione verso un modello di gestione a livello di applicazione.
Tags : mdm, containerization, security, enterprise mobility
     VMware AirWatch
By: VMware AirWatch     Published Date: Oct 02, 2015
Es ist noch nicht einmal ein Jahr her, dass analytische Prognosen für den Bereich Mobile Device Management (MDM) nichts Gutes verhießen.
Tags : mdm, containerization, security, enterprise mobility
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
Es ist noch nicht einmal ein Jahr her, dass analytische Prognosen für den Bereich Mobile Device Management (MDM) nichts Gutes verhießen. Auf einer Veranstaltung im Jahr 2013 verkündete ein Ausschuss von Analysten, dass das BYOD-Phänomen (Bring Your Own Device) zu stark herabgesetzten Preisen führen würde, was wiederum Umsatzeinbußen und schlussendlich den Untergang der gesamten Branche zur Folge haben könnte. "Die Mobile Device Management-Branche befindet sich in einem chaotischen Zustand und ich denke, dieser Markt wird untergehen“, teilte Gartner-Analyst John Girard (laut Bericht von CRN.com) dem Publikum mit. Girard prognostizierte einen Trend zum Management auf Anwendungsebene, verursacht durch das BYOD-Phänomen und die ablehnende Haltung von Mitarbeitern gegenüber dem Management ihrer persönlichen Geräte.
Tags : mdm, containerization, security, enterprise mobility
     VMware AirWatch
By: Tenable     Published Date: Jun 19, 2018
CISO Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers
Tags : cyber exposure, mighty guides, cloud security, it security, security management, security mitigation, was (web application security, container security
     Tenable
By: Tenable     Published Date: Aug 07, 2018
"Digital transformation is putting tremendous pressure on IT security. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, understanding and reducing cyber risk across your entire attack surface is tough. Get the CISO POV in this on-demand webcast and learn how to: • Minimize the attack surface • Expand visibility of assets beyond the perimeter • Enhance security practices to accommodate more dynamic IT environments"
Tags : cyber exposure, mighty guides, cloud security, it security, security management, security mitigation, was (web application security, container security
     Tenable
By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
     Tenable
By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how displaying McAfee SECURE™  trustmark showed positive results for Container & Packaging Supply, Inc. Learn more today!
Tags : container, packaging, mcafee, secure, service, roi, conversions, trustmark
     McAfee, Inc.
By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security
     Tenable
By: Tenable     Published Date: Nov 06, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security
     Tenable
By: Tenable     Published Date: Aug 07, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security
     Tenable
By: CheckMarx     Published Date: Nov 02, 2018
In today’s era of digital transformation, time-to-market is the new name of the game, and DevOps is changing the way software is built. As developers have taken on a much larger role in the software development lifecycle, including developing secure code, building containers and ensuring quality, security cannot be separated from DevOps and engineering. Unfortunately, traditional software security testing tools have operated in isolation and have forced developers to change the way they work. Checkmarx, however, has developed a more agile and responsive solution: Checkmarx’ Software Exposure Platform. Taking a holistic, platform-centric approach, the platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper Delivering Secure Software at the Speed of DevOps to learn how Checkmarx provides the combinatio
Tags : 
     CheckMarx
By: VMware AirWatch     Published Date: Nov 13, 2015
Enterprise Mobility Best Practices: MDM, Containerization or Both? (This article is in Japanese).
Tags : mdm, containerization, security, enterprise mobility
     VMware AirWatch
By: Tenable     Published Date: Mar 07, 2018
"Answers to five questions that are top-of-mind for infosec leaders today. The challenge of secure DevOps is top of mind for many infosec and IT leaders. To help you understand the latest trends, Tenable reached out to Christina Richmond, Program Director for IDC’s Security Services Research Group, for her answers to the following five questions: 1. How do organizations ensure that the security team adapts seamlessly to development processes and tools to create a cohesive program? 2. What are some common mistakes you see companies make when attempting to integrate their DevOps and security processes? 3. How can security leaders assist organizations with making the transition to secure DevOps? 4. In the world of agile methodologies and DevOps, how do security teams need to evolve to be more effective in managing cyber risk? 5. What are some examples of secure DevOps principles among cloud native technologies? Written for infosec leaders responsible for integrating security int
Tags : secure devops, idc, analyst report, container security
     Tenable
By: Tenable     Published Date: Mar 07, 2018
Includes 5 tips for bridging the DevOps InfoSec gap. Across industries, in the public and private sector alike, the benefits of DevOps are undeniable: speed to market, improved service delivery and cost savings. At the same time, DevOps can create security blind spots that impact an entire enterprise. To understand why this happens and learn how you can bridge the gap between security and development, read: Information Security in the DevOps Age: Aligning Conflicting Imperatives. Topics covered include: - Rethinking the role of security - Shifting security left by focusing on code quality and prevention - Blind spots in containers and open source components - 5 tips for bridging the DevOps infosec gap Written by CyberScoop, this paper offers practical advice for DevOps and InfoSec professionals who want to realize the benefits of accelerated software development without jeopardizing enterprise security.
Tags : secure devops, container security, docker, infosec
     Tenable
By: VMware AirWatch     Published Date: Oct 02, 2015
John Girard avait prévu une nouvelle orientation dans la gestion de niveau application qui était liée à l’utilisation de terminaux personnels et à la résistance que montraient les employés devant la gestion par l’entreprise de leurs terminaux personnels.
Tags : mdm, containerization, security, enterprise mobility
     VMware AirWatch
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics