Reminders

Security

Photo of Naveen HegdeOffline

We recently completed the security appliance APEJ (Asia/Pacific excluding Japan) market sizing and forecast. Here are some key takeaways:


Photo of Naveen HegdeOffline

We released the 2013 IT Security report, IDC’s annual attempt to predict the course of security industry in this part of world in the coming year, in February. IDC expects security to continue to be a hot market in 2013. Major trends like Compliance, Threat Landscape, Cloud, Mobility, Social, and Big data/analytics will continue to shape IT security. The Asia/Pacific excluding Japan (APEJ) region has a very broad spectrum of capabilities, maturity and variations in its outlook and optimism.


Photo of Naveen HegdeOffline

Parallels, the hosting and cloud services enablement provider announced a major enhancement to the Application Packaging Standard (APS) including a number of new products at their annual Parallels Summit 2013, last month. Parallels has developed the open APS program, a technology standard, that gives ISVs a consistent way to package and syndicate their offerings for sale through the service provider channel. It can be applied to hundreds of commercial applications ranging from WordPress to Microsoft Office 365, Google Apps, and VMware Zimbra, which are already packaged and certified under the APS standard.


Photo of Sally HudsonOffline

Will FIDO Find Friends?

By Sally Hudson

The newly created FIDO (Fast IDentity Online) Alliance is promoting a standardized, global protocol and the necessary interfaces to allow organizations to support authentication solutions appropriate to the level of risk involved. The FIDO protocol will allow the interaction of technologies within a single infrastructure so security options can be tailored to the distinct needs of each user and organization. Users will be able to choose their own authentication form factor and not be reliant on passwords.


Photo of Naveen HegdeOffline

Security threats are evolving rapidly and the solutions that organizations implement to thwart such threats, play a major role in the success or failure of the organization's overall security strategy. The loss of data, threats to national security and protection for the same are receiving significant attention in Asia-Pacific (excluding Japan) (APEJ) countries.


Photo of Michael VersaceOffline

I've been going back and forth with my colleague Charles Kology on the issue of gTLDs and a recent proposal bankers to secure .bank and .insurance for exclusive industry use. This industry move is in part a response to ICANN's interest in expanding the number of TLDs in place today, and the interest in a higher degree of risk management and security for certain domains, particularly for internet properties used by the financial services community. Charles has provided some great perspectives on this, and I'd like to get your thoughts, too. Here's a quick backgrounder ------


Photo of Sally HudsonOffline

Let's Talk about the Privileged

By Sally Hudson

With all the political talk lately focusing on the privileged, I thought perhaps those of us involved with information technology should take a closer look at privileged status as well. In the IT world, these are traditionally systems admins, users with root privileges, business executives, etc. You know the definition, yet do you know how many privileged users are currently and accurately provisioned within your IT domain? If you don't, (and you're not alone), now is the time to get a handle on the situation.


Photo of Dinesh SrirangpatnaOffline

HP Intelligent Security Solutions: Breaks down Security Silo

By Dinesh Srirangpatna

Photo of Sally HudsonOffline

The IAM market is in a state of disruption as identity, protection, and trust are all intertwined at the core of any successful cloud strategy. Technologies in the SSO and strong authentication space are being evaluated in a new light as employees increasingly expect to be able to work anywhere on the device of their choice, managing/securing the corporate footprint of data on the device becomes essential. Given the popularity of the iPad, IDC expects to see more identity/security solutions offered towards the enterprise iPad user in the next 12 months.


Photo of Charles KolodgyOffline

Poker Explains Situational Awareness

By Charles Kolodgy

One of the more common analogies associated with cyber-security, is the chess analogy. The matching of chess and hacking/cybersecurity was prevalent in 2003's The Hacker's Handbook: the Strategy Behind Breaking Into and Defending Networks by Susan Young and Dave Aitel.



Viewed 543,796 times