perimeter

perimeter news search results

Developer news items we found relating to perimeter

25 results
AppSec-2023-predictions-from-Oxeye-Security

AppSec 2023 predictions from Oxeye Security


Wednesday, February 8, 2023 by

Oxeye, the provider of award-winning cloud-native application security, announced five predictions expected to shape enterprise security spending in 2023. The predictions follow industry-wide research which shows the industry is shifting away from legacy software infrastructure and standardizing on cloud-native applications resulting in the need for new and more ef...


Mobile-tower-defense-game-stats

Mobile tower defense game stats


Tuesday, October 11, 2022 by

One of the most popular genres in mobile gaming is tower defense games. The mobile tower defense games market is especially popular on smartphones and tablets, where gamers can easily take them with them wherever they go. In addition, tower defense games are great for keeping people occupied on long road trips or flights, as they require little to no interaction from th...


Software-defined-perimeter-market-is-set-to-grow

Software-defined perimeter market is set to grow


Friday, August 5, 2022 by

The software-defined perimeter market is expected to increase at a CAGR of 14.3% from USD 7.4 billion in 2022 to USD 28.2 billion through 2032. The increased need for policy-based security architecture to decrease network complexity and the growing demand for cloud-based applications are other factors expected to influence the software-defined perimeter market trends...


Mitigating-API-attacks-in-2022

Mitigating API attacks in 2022


Wednesday, January 5, 2022 by

Nathanael Coffing, co-founder and CSO of Cloudentity, is also a board member. Nathanael has over 20 years of management and architecture experience across identity, security, microservices, and IT domains. Prior to founding Cloudentity, he founded OrchIS.io and helped build numerous technology startups leveraging his experience at Sun, Oracle, Imperva, Washington Mutual...


5-mistakes-businesses-make-in-application-development

5 mistakes businesses make in application development


Friday, October 23, 2020 by

5 Mistakes Businesses Make While Prioritizing Speed Over Security in Application Development Earlier this year, the Democratic party in Iowa announced its plans to use a smartphone app to calculate and transmit their caucus results. One would think that by using technology to improve the speed of governance, what could possibly go wrong? A lot, apparently. The a...


Linux-Foundation-open-sources-Project-OWL

Linux Foundation open sources Project OWL


Tuesday, March 10, 2020 by

The Linux Foundation announced Project OWL’s IoT device firmware effort will be hosted at the Foundation and is inviting developers worldwide to build mesh network nodes for global emergency communications networks. Project OWL, the winner of Call for Code 2018, is a cloud-based analytics tool that helps facilitate organization, whereabouts, and logistics for disa...


5G-meets-IoT-with-Telit

5G meets IoT with Telit's New ME310G1 and ME910G1 modules


Monday, July 1, 2019 by

Telit announced the ME310G1 and ME910G1 modules, designed for mass-scale LTE-M and NB-IoT deployments that feature hundreds of thousands or millions of devices. Based on the new Qualcomm 9205 LTE modem and featuring optional 2G fallback, the modules also provide a future-proof foundation for IoT deployments that span legacy networks, 4G and 5G. The ME310G1 and M...


One-click-microsegmentation-platform-from-Edgewise

One click microsegmentation platform from Edgewise


Thursday, June 20, 2019 by

Edgewise Networks launched its new platform that radically simplifies the creation and management of zero trust environments with one-click microsegmentation. In seconds, companies can stop internal network attacks that have bypassed perimeter defenses. The benefits include a significantly reduced network attack surface, operational efficiency for policy creation and ma...


Edge-computing-research-reveals-key-nuances

Edge computing research reveals key nuances


Thursday, September 13, 2018 by

In early 2018, the AT&T Foundry launched an edge computing test zone in Palo Alto, CA to experiment with emerging applications upon this new network infrastructure paradigm. Edge computing is the act of moving storage and processing capabilities to the perimeter of the network - or geographically closer to the end-user. As next-gen applications require increasing pr...


The-Curbside-ARRIVE-SDK-for-developers

The Curbside ARRIVE SDK for developers


Thursday, November 16, 2017 by

Curbside, a Silicon Valley startup that connects stores and restaurants with mobile customers, recently announced a public SDK for ARRIVE, Curbside’s predictive arrival technology, which accurately determines when someone is approaching a physical store - all without draining the customer’s smartphone battery.This tool is available to developers to incorporate into any ...


Inmarsat-phone-apps:-Developers-and-satellite-technology

Inmarsat phone apps: Developers and satellite technology


Monday, October 30, 2017 by

Although you may not know it, we often use space satellites to communicate often in our daily lives. From GPS to weather predictions apps, without satellites the information that we have at our finger tips (or more specifically, our mobile phones) would be cut drastically. It follows that along with the constant innovation of mobile technology, satellite technology comp...


The-HBO-hack-reveals-how-vulnerable-data-is-to-black-hats

The HBO hack reveals how vulnerable data is to black hats


Thursday, August 31, 2017 by

The HBO hack is the latest in a string of high-profile hacks over the last two years (Dropbox, Yahoo!, UK Ministry of Health) where a handful of vulnerable servers were compromised and used to take down and steal information. Studies have shown the next year represent a turning point in the digitization of enterprise content. A recent Forrester study commissioned by Alf...


Why-runtime-application-selfprotection-is-critical-for-app-security

Why runtime application selfprotection is critical for app security


Tuesday, June 20, 2017 by

Today most of us go about implementing security from the outside in. The common practice is to start by defining a perimeter and trying to defend it with various security tools. Even though perimeters have been porous for more than a decade, we still can’t give up this notion that if we build a better wall we can keep our enterprises safer.Certainly that is where most e...


Alarm.com-plans-to-use-video-enabled-drones-for-security

Alarm.com plans to use video enabled drones for security


Thursday, January 5, 2017 by

Alarm.com has announced plans to develop autonomous, video-enabled drone applications to extend the capabilities of smart home and business security systems. Their multi-sensor awareness and property intelligence, together with the Qualcomm Snapdragon Flight drone platform, will deploy drones to investigate unexpected activity. The drones will be designed to autonomousl...


Built.io-adds-on-premises-deployment-and-DevOps-services

Built.io adds on premises deployment and DevOps services


Tuesday, December 20, 2016 by

Built.io has announced Built.io Flow On-Prem, a new deployment option and architecture for its integration Platform-as-a-Service (iPaaS) Built.io Flow.By default, Built.io Flow operates 100 percent in the cloud, nothing to install locally, nothing to maintain. For hybrid integration architectures, an Enterprise Gateway allows to securely connect cloud-based systems...


Intel-Security-Enhances-Unified-Defense-Architecture

Intel Security Enhances Unified Defense Architecture


Thursday, November 3, 2016 by

Intel Security has announced an enhanced unified defense architecture designed to empower organizations to more effectively protect a new digital economy of trust, time and money. No longer is our economy a physical one, but one of connected networks and systems where cybercriminals have put us on the defensive. This new second economy, has put us in a world where ...


MobFox-to-Start-Using-Pixalate-Blacklists-to-Help-Mobile-Advertisers-Against-Fraud

MobFox to Start Using Pixalate Blacklists to Help Mobile Advertisers Against Fraud


Thursday, August 11, 2016 by

MobFox has announced that it will start using Pixalate’s IP/User Agent Blacklists to measure fraud type and volume to optimize away from fraudulent traffic. The new IAB-approved Advertising Fraud Protection addition to the MobFox mobile advertising platform will help decrease the chances of ineffective ad spending for mobile and programmatic advertisers using the platfo...


Cloud-Security-Alliance-Forms-New-Software-Defined-Perimeter-for-Infrastructure-as-a-Service-Initiative

Cloud Security Alliance Forms New Software Defined Perimeter for Infrastructure as a Service Initiative


Friday, March 4, 2016 by

The Cloud Security Alliance (CSA) is forming a new Software Defined Perimeter (SDP) for Infrastructure as a Service (IaaS) initiative. With the new program, the Alliance plans to demonstrate how an SDP can better protect IaaS services for enterprise usage, and deliver protection of on-premises and IaaS resources. The alliance’s rationale is that through understandi...


New-Trustonic-Platform-Provides-Mobile-and-IoT-Developers-with-Device-Security

New Trustonic Platform Provides Mobile and IoT Developers with Device Security


Tuesday, February 9, 2016 by

Trustonic has released its "Trustonic Hybrid Protection" (THP) which offers built-in device security providing mobile and IoT developers with an adaptable security solution bringing together software and hardware secured solutions into one hybrid product. Trustonic combines advanced hardware enabled security solutions found in over 500 million devices with software...


Why-Privileged-Identity-Management-is-Critical-for-Secure-IT-Outsourcing

Why Privileged Identity Management is Critical for Secure IT Outsourcing


Thursday, January 21, 2016 by

We visited with  David McNeely, VP of Product Strategy at Centrify, to talk about why secure privileged identity management is critical as more of today’s businesses are outsourcing IT functions and relying on vendors to troubleshoot systems and applications. Centrify recently released a new privileged identity management solution supporting federated privileg...


Secure-Cloud-is-a-Reality

Secure Cloud is a Reality


Wednesday, October 14, 2015 by

The move to the cloud has become a quick first step when looking to improve application delivery, performance and costs, yet in the back of everyone’s mind is whether or not the cloud can be secure.  When it comes to the cloud these days however, security shouldn’t be a concern as long as you spend the time designing the right architecture for your application and ...


The-Hidden-Economics-of-the-Cloud

The Hidden Economics of the Cloud


Thursday, August 20, 2015 by

There are certainly clear economic benefits of moving to the cloud, whether public or private environments. These include scalability, pay for only what you use, high availability, shared resources, near instant scalability, and much more.However, when thinking whether or not to put an application in “the cloud”, with a managed cloud provider, there seem to be 2 initial...


A-Look-Ahead:-The-Top-Ten-Strategic-Technology-Trends-for-2015

A Look Ahead: The Top Ten Strategic Technology Trends for 2015


Wednesday, November 5, 2014 by

Its time for the prognosticators to get out their crystal balls and make predictions for 2015. And as it relates to the top 10 technology strategic trends, Gartner has done just that. Gartner defines a strategic technology trend as one with the potential for significant impact on an organization in the next three years. Factors that denote significant impact includ...


HP-Launches-Cloud-Managed-Application-Self-Protection-Service

HP Launches Cloud Managed Application Self Protection Service


Friday, September 12, 2014 by

HP has introduced HP Application Defender, a cloud-managed application self-protection service that provides immediate visibility and actively defends production applications against attacks.As HP said in the recent announcement, “As the number and complexity of enterprise applications grows, the attack surface for exploits increases exponentially, leaving enterpri...


Busy,-Busy,-Busy-App-Developers

Busy, Busy, Busy App Developers


Wednesday, June 26, 2013 by

The Summer of 2013 is in full swing now and with the closing of the WWDC, and the Google Developer Conference (I/O), and the starting of the Build Microsoft Conference - we app developers are finding it a bit difficult to keep up with all of the happenings around the globe. From changing API's to new OS's, all the way to enhanced hardware support and 3D game engines, it...