Much of the road to diversity still stretches out in front of Silicon Valley firms where women are very clearly still in the passenger seat, ...
These 10 women were selected for their longstanding contributions to the IT security space.
Women take a stand against revenge porn and implore the security community to help protect the public. Danielle Walker reports.
Veteran female executives, as well as women new to IT security, are looking to blaze their own trail, reports Karen Epper Hoffman.
Welcome to the second annual Women in IT Security issue.
We enlisted a team of moderators to ask a number of prominent IT security professionals about the challenges they faced as a woman entering the ...
Profiles of five women who are advancing the IT security field through their advocacy, legal expertise, engineering acumen and entrepreneurial efforts.
Group Test 1
Centralizes and de-duplicates security tools, such as anti-malware, in a virtual environment.
Automatically and continuously discovers all assets in the virtual infrastructure, allows the grouping of these assets into logical Catbird Trust Zones.
Virtual system security, specifically for Hyper-V environments.
Cloud security automation through encryption.
Behavior-based machine learning and predictive analytics.
Virtualizes existing management tools using proprietary container technology to encapsulate them in their entirety, and enables them to be centrally managed and automated via a ...
A suite of protection functions for VMware, Citrix and Microsoft virtualized environments.
Prevents impact of malware by isolating all user activity and cleaning any malicious files before presenting to the user.
Secure file sharing and collaboration in the cloud.
Group Test 2
This cloud access security broker supports a huge number of cloud applications and is simple to deploy and seamless to users.
This suite of tools from Alert Logic protects data in multiple locations, including on-premises.
The heart of Bitglass Enterprise Edition (BEE) is digital rights management (DRM).
CloudSOC is a new security stack defined for the cloud, residing in the cloud and provisioned from the cloud.
FireLayers Secure Cloud Gateway (SCG) is another approach to securing applications in the cloud.
Stops the spread of attacks with security that enforces precise inbound and outbound communications on every workload based on natural language policies for application interactions.
Integrated security management tool deployed in the cloud.
Provides situational awareness of network architecture, segmentation and cybersecurity, supporting decision-making impacting security and compliance relating to cloud or virtual environments.
Combines security configuration management, threat detection, predictive analytics and automated incident response for cloud assets from branded applications, such as Microsoft Office 365, to infrastructure, ...
Addresses compliance, security and privacy issues for cloud-based applications.