container security

Results 1 - 25 of 37Sort Results By: Published Date | Title | Company Name
By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
     Preempt
By: Tenable     Published Date: Aug 07, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
     Tenable
By: Tenable     Published Date: Aug 07, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
     Tenable
By: Tenable     Published Date: Aug 07, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : devops, dev sec ops, infosec, container security, idg, digital transformation
     Tenable
By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
     Tenable
By: Oracle IaaS     Published Date: Feb 01, 2018
Nicht zuletzt gab es durch den Megatrend Cloud Computing einen rasanten Fortschritt für die moderne Applikationsentwicklung. Das Zusammenspiel von Microservices und Containern ermöglicht es, Entwickler-Software schneller zu erstellen und freizugeben. Mehr in unserem ePaper von Oracle und Intel®: so können Sie Time-to-Market von neuen Projekten durch Cloud-native Application Development verkürzen, Operations und Data Security effizienter managen sowie den ROI in der IT verbessern.
Tags : entwickeln, schneller, kosteneffizienter, cloud, native, application, development
     Oracle IaaS
By: Citrix ShareFile     Published Date: Jul 11, 2017
In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat, including: Evaluating web browser configuration and virtualization options Protecting mobile devices against attack through containerization Reducing the risks of collaboration through secure EFSS solutions
Tags : ransomware, security, risk reduction, containerization, data security
     Citrix ShareFile
By: CheckMarx     Published Date: Nov 02, 2018
In today’s era of digital transformation, time-to-market is the new name of the game, and DevOps is changing the way software is built. As developers have taken on a much larger role in the software development lifecycle, including developing secure code, building containers and ensuring quality, security cannot be separated from DevOps and engineering. Unfortunately, traditional software security testing tools have operated in isolation and have forced developers to change the way they work. Checkmarx, however, has developed a more agile and responsive solution: Checkmarx’ Software Exposure Platform. Taking a holistic, platform-centric approach, the platform builds security in from the beginning, supporting all stages of the software development lifecycle, allowing enterprises to deliver secure software at the speed of DevOps while mitigating their business risk. Download the white paper Delivering Secure Software at the Speed of DevOps to learn how Checkmarx provides the combinatio
Tags : 
     CheckMarx
By: Black Duck Software     Published Date: Feb 17, 2016
Container technologies like Docker promise to transform the way enterprises develop, deploy, and manage critical applications. However, containers are no panacea. The same challenges around deploying and managing applications in native environments and virtual machines also affect container deployments.
Tags : blackduck, docker, container deployments, docker containers, application management, container security
     Black Duck Software
By: VMware AirWatch     Published Date: Nov 13, 2015
Enterprise Mobility Best Practices: MDM, Containerization or Both? (This article is in Japanese).
Tags : mdm, containerization, security, enterprise mobility
     VMware AirWatch
By: Intralinks     Published Date: Jun 18, 2013
Intralinks a New York based company, has announced the general availability of its new Intralinks VIA service, and unveiled new brand containers for existing core services in extra-corporate document-based collaboration. Intralinks VIA, in development for nearly two years, is initially positioned to serve "the rest" of the employee population inside customers, which already use Intralinks. Download this white paper to learn more about the role of Intralinks in the broader business collaboration market, with more robust security, controls, and other necessary features for enterprise use.
Tags : enterprise, file sharing, collaboration, technology, market, security, new news
     Intralinks
By: Tenable     Published Date: Feb 07, 2018
"Securing the modern attack surface is a critical challenge you must effectively address to reduce cyber exposure and protect your enterprise. By reading this ebook you’ll learn what’s working – and what’s not – from 29 global infosec leaders, representing a diverse array of industries and perspectives. Download your copy today for insights and lessons learned about: - Securing a dynamic IT environment - Rethinking security for cloud environments - Moving security to the application layer - Focusing on data security - Automating security testing and controls"
Tags : secure devops, web application security, attack surface, cloud, container security, ciso, cyber, experts, ebook
     Tenable
By: Tenable     Published Date: Nov 06, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
     Tenable
By: Tenable     Published Date: Nov 06, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
     Tenable
By: Tenable     Published Date: Nov 06, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : devops, dev sec ops, infosec, container security, idg, digital transformation
     Tenable
By: Tenable     Published Date: Jun 19, 2018
CISO Panel Webinar: Reducing the Cyber Exposure Gap from Cloud to Containers
Tags : cyber exposure, mighty guides, cloud security, it security, security management, security mitigation, was (web application security, container security
     Tenable
By: Tenable     Published Date: Apr 30, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
     Tenable
By: Tenable     Published Date: Apr 30, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
     Tenable
By: Tenable     Published Date: Apr 30, 2018
The DevOps model drives digital transformation and the rapid delivery of new software products and services. However, this process largely takes place outside the purview of information security (InfoSec), often without their involvement. As a result, security teams struggle to keep pace. This whitepaper explores the intersection of DevOps and InfoSec, offering three reasons why security organizations will benefit by combining these two practices.
Tags : devops, dev sec ops, infosec, container security, idg, digital transformation
     Tenable
By: VMware AirWatch     Published Date: Nov 12, 2015
Il y a moins d’un an, les prévisions des analystes avaient laissé croire aux fervents défenseurs de la mobilité qu’une catastrophe allait toucher de plein fouet le secteur de la gestion des terminaux mobiles. Lors d’un événement réservé aux analystes qui s’est tenu en 2013, un panel de spécialistes indiquait que l’utilisation des terminaux personnels allait aboutir à une réduction des prix et faire chuter les ventes. Ils annonçaient la mort de cette industrie. « La gestion des terminaux mobiles est actuellement totalement chaotique et je pense que ce marché est en train de mourir, » déclarait l’analyste Gartner John Girard (CRN.com). John Girard avait prédit une nouvelle orientation dans la gestion de terminaux personnels qui consiste à gérer uniquement les applications pour répondre à la résistance que montraient les employés devant la gestion par l’entreprise de leurs terminaux personnels.
Tags : mdm, containerization, security, enterprise mobility
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
Nemmeno un anno fa, le previsioni degli analisti inducevano gli entusiasti della mobility a ritenere che il destino del settore del Mobile Device Management (MDM) fosse ormai segnato. In occasione di una convention di analisti svoltasi nel 2013, un gruppo di esperti aveva espresso la convinzione che il fenomeno del BYOD (Bring Your Own Device) avrebbe portato a una forte riduzione dei prezzi, a un crollo delle vendite e alla fine di un intero settore. Così si rivolgeva l'analista di Gartner John Girard alla platea dei partecipanti (fonte: CRN.com): "Il mercato del Mobile Device Management è in pieno marasma e a mio parere ha i giorni contati". Girard prevedeva che il trend del BYOD e la refrattarietà dei dipendenti alla gestione dei dispositivi personali avrebbero reso necessaria la transizione verso un modello di gestione a livello di applicazione.
Tags : mdm, containerization, security, enterprise mobility
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
Es ist noch nicht einmal ein Jahr her, dass analytische Prognosen für den Bereich Mobile Device Management (MDM) nichts Gutes verhießen. Auf einer Veranstaltung im Jahr 2013 verkündete ein Ausschuss von Analysten, dass das BYOD-Phänomen (Bring Your Own Device) zu stark herabgesetzten Preisen führen würde, was wiederum Umsatzeinbußen und schlussendlich den Untergang der gesamten Branche zur Folge haben könnte. "Die Mobile Device Management-Branche befindet sich in einem chaotischen Zustand und ich denke, dieser Markt wird untergehen“, teilte Gartner-Analyst John Girard (laut Bericht von CRN.com) dem Publikum mit. Girard prognostizierte einen Trend zum Management auf Anwendungsebene, verursacht durch das BYOD-Phänomen und die ablehnende Haltung von Mitarbeitern gegenüber dem Management ihrer persönlichen Geräte.
Tags : mdm, containerization, security, enterprise mobility
     VMware AirWatch
By: McAfee, Inc.     Published Date: Jun 08, 2009
Learn how displaying McAfee SECURE™  trustmark showed positive results for Container & Packaging Supply, Inc. Learn more today!
Tags : container, packaging, mcafee, secure, service, roi, conversions, trustmark, website security, seo, certification, sales, online, online marketing
     McAfee, Inc.
By: VMware AirWatch     Published Date: Sep 16, 2015
In this whitepaper, we discuss common enterprise use cases and define the advantages of MDM, containerization and the layered approach to security that both can provide.
Tags : mdm, containerization, security, enterprise mobility
     VMware AirWatch
By: VMware AirWatch     Published Date: Oct 02, 2015
John Girard avait prévu une nouvelle orientation dans la gestion de niveau application qui était liée à l’utilisation de terminaux personnels et à la résistance que montraient les employés devant la gestion par l’entreprise de leurs terminaux personnels.
Tags : mdm, containerization, security, enterprise mobility
     VMware AirWatch
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com