Arxan unveils its Internet of Things security strategy

Size: px
Start display at page:

Download "Arxan unveils its Internet of Things security strategy"

Transcription

1 Arxan unveils its Internet of Things security strategy Analyst: Wendy Nather 17 Apr, 2015 As we've discussed before, one of the biggest disruptors to security is the application's removal from the enterprise datacenter. All the assumptions about a dedicated execution environment, standardized client, perimeter firewalls, centralized identity and access management, monitoring and operations go out the window. In their place is a disconnected, hostile environment with erratic users, tinkerers, hackers, pirates and corporate espionage agents who want to attack at the application layer. Of course, vendors of consumer and embedded system software have known this for years, but now that everyone has entered the field with a mobile app, they're having to learn the hard way that it's a wild world. This rude awakening is only going to get bigger with the Internet of Things (IoT). Auto and medical device manufacturers are discovering just how vulnerable their products are: the 'smarter' they get, the more exposed they are. Arxan has spent the last few years taking advantage of the mobile-security market. It just announced (in time for the RSA Conference in San Francisco) its expanded capabilities for IoT as well. The 451 Take We saw this coming: Arxan's ability to secure code in the Wild West of the Internet naturally lends itself to the IoT. From this perspective, the possibilities are huge one might even say 'moby' (if one were versed in arcane hackerspeak). From defending IP against reverse engineering and piracy to protecting mobile banking and payment apps against fraud to securing, say, automotive systems and the apps they talk to Arxan could build an early lead in the market. We see only two obstacles: manufacturers' reluctance to spend as much on security as the bank, software vendor and entertainment industries do, and the marketing flood that has already started in IoT security that will surely muddy the waters. Copyright The 451 Group 1

2 Context Founded in 2001, Bethesda, Maryland-based Arxan announced in September 2013 that TA Associates had acquired a majority stake in the company for an undisclosed amount. The deal provided an exit for previous investors Trident Capital, Paladin Capital Group, Solstice Capital, EDF Ventures, Legend Ventures and TDF. Arxan's last funding around, a minor C extension, was in 2009, and its total funding was approximately $28m. The company has additional offices in North America (San Francisco and West Lafayette, Indiana), Europe (the UK, Germany, France and Sweden) and Asia (Tokyo). In June 2014, Arxan announced a major reseller relationship with IBM, in which its GuardIT and EnsureIT products would be featured as Arxan Application Protection for IBM Solutions. Since then, IBM has begun reselling Arxan's cryptographic key protection as well, which is seen as critical for the host-card emulation wave in the mobile-payments space. Technology Because Arxan's offerings involve application and cryptographic key protection, and had already been in use for years to defend against reverse engineering and software piracy, the company is used to dealing with software running in a hostile environment, whether that's a gaming console or an embedded system being sold to a nation-state that regards copyright as more of a guideline than an actual rule. The technology has been expanded to mobile use cases since 2011, but now goes several steps further. One new example touted by Arxan is that of an auto's infotainment system. These systems work with multiple third-party applications on the driver's phone, and act as the primary communications interface to the rest of the vehicle modules. Imagine that a user downloads a compromised app from an app store, and uses it to access the infotainment system more than causing possible data loss, this could threaten the driver's own safety. Numerous automotive partners have their own software to access and update different system modules; these also need to be protected from modification or unauthorized access. Without needing to change the source code, Arxan applies interdependent protection routines, called Guards, directly into a software program, and then obfuscates or scrambles the result. The Guards are available for a large number of platforms, including Windows, from the enterprise edition of 8.1 all the way through Windows Embedded POSReady 2009 and back as far as Windows Copyright The 451 Group 2

3 NT 4.0. Other operating systems supported include Red Hat Enterprise Linux, Android, Mac OS X, ios, BlackBerry and PowerPC. From an IoT standpoint, Arxan has positioned itself to offer protection to mobile applications that are used to control an IoT device (think home automation, insulin pumps, etc.), IoT device firmware and embedded applications, and applications running on an open IoT platform (such as Android Wear or Apple Watch). Competition Within the IoT crowd, Arxan is going to run across any number of competitors that offer very different kinds of security, and, as often as not, will simply be IoT-washing their existing products this early in the game. We expect to see vendors with network-level, IP-based security as well as monitoring (because those are easier than getting up close and personal with the software). Companies running up the IoT-security flag include large firms such as Oracle and Cisco, as well as ARM Holdings and Intel (both of which recently acquired IoT-related security companies). We see established companies such as Infineon and SecureRF joining the conga line, as well as newer ones like Bastille, M2M Cyber Security, Tempered Networks, Xipiter and Mformation. There is no shortage of security vendors that are willing to poke holes in IoT as a service (IOActive is noted for this, others include Accuvant, BorderHawk, Attify and Laconicly). We will be covering IoT security in more depth in future reports. Arxan will need to wade through all of these crowds to establish its focus on the software itself. If it can do that successfully, we think it will find a large market, but it will have to address one potential problem: its price. While some gaming, entertainment and semiconductor companies are ready and willing to drop up to six figures for security, manufacturers that have not worried about it until now will be harder to convince. Even within the IBM sales sphere, we hear reports of Arxan being seen as expensive, and that's saying a lot. Arxan says it is exploring alternate price points and business models for new IoT markets, in the same manner that it adjusted its pricing for addressing the mobile marketplace. However, if competitors in IoT security can sell customers on the idea that monitoring is cheaper than protection, the company could find itself bogging down. SWOT Analysis Strengths Weaknesses Copyright The 451 Group 3

4 Arxan has years of experience protecting software in hostile environments, and it has expanded its coverage to a wide variety of platforms. In addition, its products don't require source code changes. Opportunities Threats How many Things are there? The Internet's the limit. If Arxan can make this security affordable, it can clean up. The company is used to dealing with customers that have deep pockets and appreciate the need for this type of security. That may change as Arxan expands into markets where manufacturers have never had to deal with security before, and may balk at the price. We see the main threats as being the imminent confusion of the 'Security of Things': vendors jumping into the pool with numerous terms and security techniques that will muddy the waters, and possibly obscure Arxan's positioning. Copyright The 451 Group 4

5 Reproduced by permission of The 451 Group; This report was originally published within 451 Research's Market Insight Service. For additional information on 451 Research or to apply for trial access, go to: Copyright The 451 Group 5

Critical Watch aims to reduce countermeasure deployment pain by doing it all for you

Critical Watch aims to reduce countermeasure deployment pain by doing it all for you Critical Watch aims to reduce countermeasure deployment pain by doing it all for you Analyst: Javvad Malik 6 Sep, 2012 Critical Watch offers Active Countermeasure Intelligence, a combination of risk intelligence

More information

The top five enterprise mobility management vendors: product focus and financials

The top five enterprise mobility management vendors: product focus and financials The top five enterprise mobility management vendors: product focus and financials Analyst: Chris Hazelton 21 Apr, 2015 Enterprise mobility management (EMM) is becoming a big business, but who are the biggest

More information

HP officially launches Cloud Services key to its vision of hybrid IT service delivery

HP officially launches Cloud Services key to its vision of hybrid IT service delivery HP officially launches Cloud Services key to its vision of hybrid IT service delivery Analyst: Carl Brooks William Fellows 13 Jun, 2012 Hewlett-Packard has taken the wraps off Cloud Services its portfolio

More information

What is Really Needed to Secure the Internet of Things?

What is Really Needed to Secure the Internet of Things? What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices

More information

Integrated and federated: TDB Fusion aims to bring seamless management to datacenters

Integrated and federated: TDB Fusion aims to bring seamless management to datacenters Integrated and federated: TDB Fusion aims to bring seamless management to datacenters Analyst: Andy Lawrence 5 Aug, 2015 TDB Fusion started out as a systems integrator specializing in enterprise integration;

More information

With $8.7m series A funding in the bag, Cirro looks to shore up its federation business

With $8.7m series A funding in the bag, Cirro looks to shore up its federation business With $8.7m series A funding in the bag, Cirro looks to shore up its federation business Analyst: Krishna Roy 11 Jun, 2014 Cirro is building a business in the integration sector, where it provides a federated

More information

Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure

Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure Analyst: Chris Hazelton 24 Aug, 2015 The fact that mobile computing is now displacing a share of 'traditional computing'

More information

Gazzang is going gangbusters with key management for MySQL and the cloud

Gazzang is going gangbusters with key management for MySQL and the cloud Gazzang is going gangbusters with key management for MySQL and the cloud Analyst: Rachel Chalmers Wendy Nather 7 Feb, 2011 Gazzang's first product is 'set and forget' encryption for MySQL databases, but

More information

Great Now We Have to Secure an Internet of Things. John Pescatore SANS Director, Emerging Security Trends @John_Pescatore

Great Now We Have to Secure an Internet of Things. John Pescatore SANS Director, Emerging Security Trends @John_Pescatore Great Now We Have to Secure an Internet of Things John Pescatore SANS Director, Emerging Security Trends @John_Pescatore 1 What the Heck is That?? 2 Different Views of the Internet of Things 3 Different

More information

I ve been breached! Now what?

I ve been breached! Now what? I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have

More information

Flying under the radar, Moogsoft looks to shake up the ITSM space

Flying under the radar, Moogsoft looks to shake up the ITSM space Flying under the radar, Moogsoft looks to shake up the ITSM space Analyst: Dennis Callaghan 15 Feb, 2013 Veteran software entrepreneurs Phil Tee and Mike Silvey are back with Moogsoft, their first startup

More information

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations

More information

SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio

SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio SWOT Assessment: BeyondTrust Privileged Identity Management Portfolio Analyzing the strengths, weaknesses, opportunities, and threats Publication Date: 11 Jun 2015 Product code: IT0022-000387 Andrew Kellett

More information

With Cloud Defender, Alert Logic combines products to deliver outcome-based security

With Cloud Defender, Alert Logic combines products to deliver outcome-based security With Cloud Defender, Alert Logic combines products to deliver outcome-based security Analyst: Javvad Malik 13 Nov, 2014 Security has typically been a technology-driven area. If a company puts up a website,

More information

Azul's Zulu JVM could prove an awkward challenge to Oracle's Java ambitions

Azul's Zulu JVM could prove an awkward challenge to Oracle's Java ambitions Azul's Zulu JVM could prove an awkward challenge to Oracle's Java ambitions Analyst: John Abbott 26 Feb, 2014 Azul Systems, best known for its Zing scalable Java runtime, has been introducing a new product

More information

AUTOMATED MOBILE TESTING REQUIRES BOTH REAL DEVICES AND EMULATORS

AUTOMATED MOBILE TESTING REQUIRES BOTH REAL DEVICES AND EMULATORS WHITE PAPER AUTOMATED MOBILE TESTING REQUIRES BOTH REAL DEVICES AND EMULATORS SEPTEMBER 2015 Today, businesses compete in an increasingly mobile-centric marketplace. Mobile QA can no longer take a backseat

More information

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number

More information

DNS Server Security Survey

DNS Server Security Survey EXECUTIVE BRIEF DNS Server Security Survey Sponsored by: EfficientIP Romain Fouchereau June 2014 INTRODUCTION With most organizations having some business linked to and more importantly relying on an online

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

Mobile Labs tackles key challenges in QA testing for enterprise mobile apps

Mobile Labs tackles key challenges in QA testing for enterprise mobile apps Mobile Labs tackles key challenges in QA testing for enterprise mobile apps Analyst: Raúl Castañón-Martínez 26 May, 2015 Testing is a critical element in the app development life cycle, but its relevance

More information

KEYW uses acquired Sensage technology to form Hexis Cyber Solutions

KEYW uses acquired Sensage technology to form Hexis Cyber Solutions KEYW uses acquired Sensage technology to form Hexis Cyber Solutions Analyst: Javvad Malik 13 Nov, 2013 In the virtual arms race, attack tools and techniques get shared among a wide range of actors with

More information

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program Mobile Application Security Helping Organizations Develop a Secure and Effective Mobile Application Security Program by James Fox fox_james@bah.com Shahzad Zafar zafar_shahzad@bah.com Mobile applications

More information

Login Consultants touts lightweight automation tools for desktop and server deployments

Login Consultants touts lightweight automation tools for desktop and server deployments Login Consultants touts lightweight automation tools for desktop and server deployments Analyst: John Abbott 13 Jan, 2015 Login Consultants has been building new product businesses out of its custom development

More information

FNT enters US, Asia with broad DCIM suite

FNT enters US, Asia with broad DCIM suite FNT enters US, Asia with broad DCIM suite Analyst: Katie Broderick Andy Lawrence 28 Jan, 2014 FNT, a German datacenter services and software company, is aiming to expand into the crowded US market with

More information

Closing the Vulnerability Gap of Third- Party Patching

Closing the Vulnerability Gap of Third- Party Patching SOLUTION BRIEF: THIRD-PARTY PATCH MANAGEMENT........................................ Closing the Vulnerability Gap of Third- Party Patching Who should read this paper IT Managers who are trying to manage

More information

Firewalls for small business

Firewalls for small business By James Thomas DTEC 6823 Summer 2004 What is a firewall? Firewalls for small business A firewall is either hardware, software or a combination of both that is used to prevent, block or should I say try

More information

'Run any app on any cloud' is CliQr's bold claim

'Run any app on any cloud' is CliQr's bold claim 'Run any app on any cloud' is CliQr's bold claim Analyst: William Fellows 28 Jan, 2013 CliQr Technologies' claim is a bold one: the Sunnyvale, California-based vendor says that its CloudCenter orchestration

More information

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

Automated Mobile Testing Requires Both Real Devices and Emulators

Automated Mobile Testing Requires Both Real Devices and Emulators WHITE PAPER Automated Mobile Testing Requires Both Real Devices and Emulators September 2015 Today, businesses compete in an increasingly mobile-centric marketplace. Mobile QA can no longer take a backseat

More information

IBM chooses AppZero as application virtualization partner for SmartCloud

IBM chooses AppZero as application virtualization partner for SmartCloud IBM chooses AppZero as application virtualization partner for SmartCloud Analyst: Rachel Chalmers 30 Apr, 2012 Since September 2011, IBM Distinguished Engineer Mac Devine has served as the Director and

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

OWASP Mobile Top Ten 2014 Meet the New Addition

OWASP Mobile Top Ten 2014 Meet the New Addition OWASP Mobile Top Ten 2014 Meet the New Addition Agenda OWASP Mobile Top Ten 2014 Lack of Binary Protections added Why is Binary Protection important? What Risks Need to be Mitigated? Where to Go For Further

More information

EnterpriseWeb grows business with its enterprise- and cloud-friendly application layer

EnterpriseWeb grows business with its enterprise- and cloud-friendly application layer EnterpriseWeb grows business with its enterprise- and cloud-friendly application layer Analyst: Michael Coté 26 Jun, 2014 EnterpriseWeb sells a platform built from scratch over the past five years to address

More information

Arista shakes up data access management with DANZ

Arista shakes up data access management with DANZ Analyst: Peter Christy 26 Feb, 2013 Arista shakes up data access management with DANZ When Andy Bechtolsheim founded high-speed switch vendor Arista Networks, the hardware design represented a new direction

More information

White Paper. Information Security -- Network Assessment

White Paper. Information Security -- Network Assessment Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements A Forrester Consulting Thought Leadership Paper Commissioned By Oracle Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

More information

Trustwave blocks Web-borne malware - guaranteed, or your money back

Trustwave blocks Web-borne malware - guaranteed, or your money back Trustwave blocks Web-borne malware - guaranteed, or your money back Analyst: Adrian Sanabria 16 Jul, 2014 Today, Trustwave makes a bold announcement a zero malware guarantee. The anti-malware market has

More information

Private OpenStack on demand: Mirantis puts a cloud in SoftLayer's cloud

Private OpenStack on demand: Mirantis puts a cloud in SoftLayer's cloud Private OpenStack on demand: Mirantis puts a cloud in SoftLayer's cloud Analyst: Carl Brooks 26 Jun, 2014 Mirantis is an established systems integrator and development house that specializes in OpenStack,

More information

GridGain gets open source in-memory accelerator out of the blocks

GridGain gets open source in-memory accelerator out of the blocks GridGain gets open source in-memory accelerator out of the blocks Analyst: Jason Stamper 24 Mar, 2015 GridGain is building a business around an open source in-memory data fabric, which it entered into

More information

Floodgate Security Framework

Floodgate Security Framework Floodgate Security Framework Security Framework for Embedded Devices As cybercriminals are now targeting non -conventional electronic appliances such as battery chargers, mobile phones, smart meters and

More information

White Paper. Data Security. The Top Threat Facing Enterprises Today

White Paper. Data Security. The Top Threat Facing Enterprises Today White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is

More information

Cloud Security In Your Contingency Plans

Cloud Security In Your Contingency Plans Cloud Security In Your Contingency Plans Jerry Lock Security Sales Lead, Greater China Contingency Plans Avoid data theft and downtime by extending the security perimeter outside the data-center and protect

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

Tesora updates OpenStack Trove-based DBaaS platform, adding Oracle support

Tesora updates OpenStack Trove-based DBaaS platform, adding Oracle support Tesora updates OpenStack Trove-based DBaaS platform, adding Oracle support Analyst: Matt Aslett 8 Apr, 2015 Tesora recently updated its database-as-a-service (DBaaS) platform, based on the OpenStack Trove

More information

ORGANIZADOR: APOIANTE PRINCIPAL:

ORGANIZADOR: APOIANTE PRINCIPAL: ORGANIZADOR: APOIANTE PRINCIPAL: Miguel Gomes 912412885 luismiguel_gomes@symantec.com Alliances Portugal, Africa, Brasil Coverage One of the biggest CSP worlwide Tec. Inovator Strong Cloud Bet and investment

More information

Continuum courts MSPs with its backup and disaster-recovery service

Continuum courts MSPs with its backup and disaster-recovery service Continuum courts MSPs with its backup and disaster-recovery service Analyst: Dave Simpson 8 Apr, 2015 Continuum recently launched a backup and disaster-recovery service aimed at its traditional customer

More information

Eco4Cloud: Consolidate virtual machines to accumulate datacenter savings

Eco4Cloud: Consolidate virtual machines to accumulate datacenter savings Eco4Cloud: Consolidate virtual machines to accumulate datacenter savings Analyst: Andrew Donoghue 9 Jan, 2014 Startup Eco4Cloud (E4C) is a spinoff from the Institute for High Performance Computing and

More information

Enhancing Your Network Security

Enhancing Your Network Security Enhancing Your Network Security Rainer Singer SE Manager Central Europe October 2013 Infoblox Overview & Business Update Founded in 1999 Headquartered in Santa Clara, CA with global operations in 25 countries

More information

IPLocks Vulnerability Assessment: A Database Assessment Solution

IPLocks Vulnerability Assessment: A Database Assessment Solution IPLOCKS WHITE PAPER February 2006 IPLocks Vulnerability Assessment: A Database Assessment Solution 2665 North First Street, Suite 110 San Jose, CA 95134 Telephone: 408.383.7500 www.iplocks.com TABLE OF

More information

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem Security & SMEs An Introduction by Jan Gessin Introduction to the problem SMEs convinced it will never happen to them. In many ways SMEs are more of a target than big business. Harsh realities of the online

More information

Skyhigh looks down to see competition heating up in cloud-app control market

Skyhigh looks down to see competition heating up in cloud-app control market Skyhigh looks down to see competition heating up in cloud-app control market Analyst: Adrian Sanabria 10 Dec, 2013 The market for cloud-application control is poised to explode. Skyhigh Networks was once

More information

Table of Contents 7 8

Table of Contents 7 8 Three Key Components of Secure Mobile Solutions To have a secure mobile solution, you need to have a secure device, a secure network, and a secure application. If any one of these is compromised, the solution

More information

DivvyCloud spreads its bets from cloud management platform to DevOps Analyst: Jay Lyman 2 Apr, 2015 DivvyCloud, a cloud management and DevOps startup based in McLean, Virginia, supports on-premises multi-

More information

Accenture Cloud Platform at v3 - the Airbnb or Uber of cloud?

Accenture Cloud Platform at v3 - the Airbnb or Uber of cloud? Accenture Cloud Platform at v3 - the Airbnb or Uber of cloud? Analyst: William Fellows 21 Jan, 2015 The Accenture Cloud Platform (ACP) is now at a v3 release. The first two iterations were mostly consumed

More information

Appcara hones its cloud application deployment and management claim with App360

Appcara hones its cloud application deployment and management claim with App360 Appcara hones its cloud application deployment and management claim with App360 Analyst: William Fellows 12 May, 2015 Appcara has renamed its AppStack cloud application deployment and management tools

More information

Creating Value through Innovative IT Auditing

Creating Value through Innovative IT Auditing Redefine Cybersecurity, Explore Innovative Strategies and Develop Trust Creating Value through Innovative IT Auditing Ronnie Koh Head of IT Audit, DBS Bank How do we create value? By Increasing both Breadth

More information

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends

More information

The Move Is On To Open Source Integration Software

The Move Is On To Open Source Integration Software A Custom Technology Adoption Profile Commissioned By Red Hat Forrester Surveys Show Adoption Of Open Source Integration On The Upswing The current economic environment has prompted firms to seek out low-cost

More information

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT

More information

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM

More information

THE CYBERSECURITY LANDSCAPE IN LATIN AMERICA

THE CYBERSECURITY LANDSCAPE IN LATIN AMERICA THE CYBERSECURITY LANDSCAPE IN LATIN AMERICA Montevideo Uruguay 27 August 2013 Aaron Boyd Chief Strategy Officer v.1b boyd@abiresearch.com Introduction to ABI Research > Corporate Background Founded in

More information

The Internet of Things Risks and Challenges

The Internet of Things Risks and Challenges The Internet of Things Risks and Challenges Providing the insight that enables our customers to make informed business decisions. Antony Price 03rd March 2015 Contents Internet of Things - The next threat

More information

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data

More information

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit Page 1 of 10 Events Partners Careers Contact Facebook Twitter LinkedIn Pike Research Search search... Home About Research Consulting Blog Newsroom Media My Pike Logout Overview Smart Energy Clean Transportation

More information

INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015

INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015 INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015 CHERYL HARRIS, PH.D. DECISIVE ANALYTICS LLC 575 MADISON AVENUE, 10 TH FL NEW YORK, NY 10022 917.628.6167 14. January 2015

More information

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Sponsored by Oracle Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Introduction About Survey Respondents The Internet of Things (IoT) and the rise of

More information

Managed service provider Bell Techlogix shines its BEAM to differentiate

Managed service provider Bell Techlogix shines its BEAM to differentiate Analyst: Katy Ring 1 Nov, 2013 Managed service provider Bell Techlogix shines its BEAM to differentiate Bell Techlogix is a midsized US managed service provider (MSP) that is ahead of the curve in getting

More information

Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin

Common Criteria. Introduction 2014-02-24. Magnus Ahlbin. Emilie Barse 2014-02-25. Emilie Barse Magnus Ahlbin Common Criteria Introduction 2014-02-24 Emilie Barse Magnus Ahlbin 1 Magnus Ahlbin Head of EC/ITSEF Information and Security Combitech AB SE-351 80 Växjö Sweden magnus.ahlbin@combitech.se www.combitech.se

More information

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious

More information

White. Paper. Rethinking Endpoint Security. February 2015

White. Paper. Rethinking Endpoint Security. February 2015 White Paper Rethinking Endpoint Security By Jon OItsik, Senior Principal Analyst With Kyle Prigmore, Associate Analyst February 2015 This ESG White Paper was commissioned by RSA Security and is distributed

More information

EasyVista emerges as a mid-enterprise ITSM contender

EasyVista emerges as a mid-enterprise ITSM contender EasyVista emerges as a mid-enterprise ITSM contender Analyst: Dennis Callaghan 16 Jun, 2014 SaaS and North America are driving new growth for ITSM stalwart EasyVista. With an updated product and a talent

More information

Bitdefender GravityZone Sales Presentation

Bitdefender GravityZone Sales Presentation 6 March 2014 Page 1 Bitdefender GravityZone Sales Presentation 1 Page 2 Bitdefender at a Glance The #1 Anti-Malware Security Technology in the world First security software vendor to receive top recommendations

More information

Splunk expands operational intelligence to mobile apps with MINT

Splunk expands operational intelligence to mobile apps with MINT Splunk expands operational intelligence to mobile apps with MINT Analyst: Raúl Castañón-Martínez 17 Mar, 2015 Splunk has announced a significant update to its mobile intelligence offering, Splunk MINT,

More information

Introduction. Purpose. Background. Details

Introduction. Purpose. Background. Details Introduction Recent media reports confirm that Secure Socket Layer (SSL) 3.0 is obsolete and insecure. This report provides guidance on how to ensure your communications use the more secure Transport Layer

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

Mission Possible: securing the open source software supply chain with Sonatype

Mission Possible: securing the open source software supply chain with Sonatype Mission Possible: securing the open source software supply chain with Sonatype Analyst: Wendy Nather 24 Apr, 2013 Everyone's a critic. In the world of application security, this is particularly so, with

More information

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

A Crowd of Many. Identifying the right open source OS for your embedded system. M2M Embedded Software & Tools

A Crowd of Many. Identifying the right open source OS for your embedded system. M2M Embedded Software & Tools February 2014 M2M Embedded Software & Tools Strategic Insights: M2M Embedded Software & Tools A Crowd of Many Identifying the right open source OS for your embedded system by Dan Mandell, Analyst, with

More information

Cybercrime Security Risks and Challenges Facing Business

Cybercrime Security Risks and Challenges Facing Business Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact

More information

Flexiant named key partner for Parallels Automation suite

Flexiant named key partner for Parallels Automation suite Flexiant named key partner for Parallels Automation suite Analyst: Carl Brooks William Fellows 4 Mar, 2014 EMEA-based cloud platform software maker Flexiant is turning to a tried and true method to grow

More information

Pivot Point Research Group Global Developer Community Engagement & Sentiment Survey Insights May 2012 to October 2012 Executive Summary

Pivot Point Research Group Global Developer Community Engagement & Sentiment Survey Insights May 2012 to October 2012 Executive Summary Global Developer Community Engagement & Sentiment Survey Insights May 2012 to October 2012 Executive Summary Background Pivot Point Research Group has been retained by Research in Motion Ltd to conduct

More information

IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 MIKE.ZUSMAN@CARVESYSTEMS.COM

IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 MIKE.ZUSMAN@CARVESYSTEMS.COM IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 SECURITY IS A PROCESS, NOT A STATE CARVE SYSTEMS LLC MIKE.ZUSMAN@CARVESYSTEMS.COM Carve s Roots (tl;dr)

More information

FEELING VULNERABLE? YOU SHOULD BE.

FEELING VULNERABLE? YOU SHOULD BE. VULNERABILITY ASSESSMENT FEELING VULNERABLE? YOU SHOULD BE. CONTENTS Feeling Vulnerable? You should be 3-4 Summary of Research 5 Did you remember to lock the door? 6 Filling the information vacuum 7 Quantifying

More information

Smart Carbon Control sets out to make datacenter data meaningful

Smart Carbon Control sets out to make datacenter data meaningful Smart Carbon Control sets out to make datacenter data meaningful Analyst: Andy Lawrence 31 Mar, 2015 The small UK company Smart Carbon Control (SCC) has spent several years working on its integration and

More information

Using mobile apps to build your business

Using mobile apps to build your business Using mobile apps to build your business Most of us know by now what an app is; but just to clarify mobile applications (apps) are software programs for hand-held communication devices such as mobile phones,

More information

Five Questions to Ask Your Mobile Ad Platform Provider. Whitepaper

Five Questions to Ask Your Mobile Ad Platform Provider. Whitepaper June 2014 Whitepaper Five Questions to Ask Your Mobile Ad Platform Provider Use this easy, fool-proof method to evaluate whether your mobile ad platform provider s targeting and measurement are capable

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Marble & MobileIron Mobile App Risk Mitigation

Marble & MobileIron Mobile App Risk Mitigation Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their

More information

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd

Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Product Roadmap Symantec Endpoint Protection Suzanne Konvicka & Paul Murgatroyd Symantec Endpoint Protection Product Roadmap 1 Safe Harbor Disclaimer Any information regarding pre-release Symantec offerings,

More information

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.

More information

IBM Endpoint Manager for Mobile Devices

IBM Endpoint Manager for Mobile Devices IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity

More information

IBM QRadar as a Service

IBM QRadar as a Service Government Efficiency through Innovative Reform IBM QRadar as a Service Service Definition Copyright IBM Corporation 2014 Table of Contents IBM Cloud Overview... 2 IBM/Sentinel PaaS... 2 QRadar... 2 Major

More information