Unisys: Full-Service Zero-Trust Security
An Intellyx Brain Candy Brief The storied history of Unisys dates to an adding machine company founded in 1884 and the UNIVAC digital computer from 1946 – but today, the company has transformed itself...
View ArticleCavirin: Cyberposture Intelligence for Hybrid Cloud
An Intellyx Brain Candy Brief Cavirin uses machine learning to analyze how secure and compliant an organization’s hybrid cloud environment is, and combines those two scores into what it calls a...
View ArticleNeuVector: Kubernetes Protection in Production
An Intellyx Brain Candy Brief Because of their inherently ephemeral, dynamic nature, containers require a new approach to cybersecurity. Manual policies, static IP addresses, and agents are not...
View ArticleCryptowerk: Tamperproof Data Lineage for Digital Assets
An Intellyx Brain Candy Brief To fight the problem of drug counterfeiting, regulations now require pharmaceutical companies to provide tamperproof packaging that enables everyone in the supply chain to...
View ArticleHYPR: Passwordless Employee Access with Mobile-Initiated Biometrics
An Intellyx Brain Candy Brief HYPR complements traditional biometric multifactor authentication (MFA) on mobile devices with public key cryptography (PKI) by storing keys and credentials on the device...
View ArticleCequence Security: Protection Against Bot-Led Business Logic Attacks
An Intellyx Brain Candy Brief Unlike malware-based attacks, a business logic attack seeks to subvert the normal behavior of a web site or mobile app. For example, bots with stolen credentials might...
View ArticleMeta Networks: Zero-Trust Software-Defined Perimeter
An Intellyx Brain Candy Brief Everybody hates virtual private networks (VPNs). They’re difficult to use, flaky, and they provide limited, binary access to internal network resources. Meta Networks...
View ArticleCode Dx: Application Security Vulnerability Management for DevSecOps
An Intellyx Brain Candy Update Traditional application security (appsec) depends in large part on static code analysis, where the appsec tool evaluates source code for vulnerabilities. However, people...
View ArticleBasil Security: Zero-Trust Operations
An Intellyx Brain Candy Brief Most insider threats are the result of carelessness, as employees take shortcuts that violate corporate policies. However, sometimes these threats are malicious. Many...
View ArticleBehavioSec: Continuous Authentication with Behavioral Biometrics
An Intellyx Brain Candy Brief BehavioSec provides continuous and dynamic user authentication via a wide range of behavioral biometrics. For example, BehavioSec tracks finger pressure and timing as...
View ArticleFly away, IoT: Will enterprise-class drones wear out their welcome?
Surely you’ve caught some of the excitement about drones for enterprise use. Packages and communications delivered to the world by these ultimately mobile IoT fliers. Heavy VC investment in commercial...
View ArticleWebinar: Reimagine Legacy Applications for the Hyper-connected Era
Webinar with Imaginea Thursday March 28 10:00 PDT / 1:00 EDT While the IT leaders aspire to innovate fast and evolve with the market to stay ahead in the technology curve – data shows that 70% of...
View ArticleRSA Conference changes the face of cybersecurity
Tens of thousands of security professionals and many hundreds of vendors came together at the massive RSA Conference in San Francisco last week for the largest enterprise cybersecurity confab in the...
View ArticleSkillsoft: Transforming Itself to Help Organizations Transform
An Intellyx Brain Candy Brief The transition into the digital era has blurred the lines that were once clearly marked between “business training” and “technical training.” There were typically...
View ArticleSymphony SummitAI: A Conversational AI Platform to Streamline IT Management
An Intellyx Brain Candy Brief For much of its existence, IT has been like the proverbial cobbler’s children delivering cutting edge technology to the organization but rarely using that same technology...
View ArticleImport.io: Making Web Data Accessible and Actionable
An Intellyx Brain Candy Brief Data is now one of the primary drivers of not only competitive value, but also competitive intelligence, market insights, and other critical business operations. But...
View ArticleMirantis: OpenStack and Kubernetes Delivered On Premises as-a-Service
An Intellyx Brain Candy Brief While OpenStack and Kubernetes are open source, downloading, installing, and configuring them is no easy task. Furthermore, operationalizing either package – or heaven...
View Article9 disruptive security plays from RSAC 2019
Bad actors have always had the edge in cybersecurity. After all, the good guys have to secure everything, while the bad guys need find only one vulnerability. Given the appalling number of breaches...
View ArticleTIBCO: Teaming with customers to ease enterprise transformation
An Intellyx Brain Candy Brief After more than two decades of R&D and acquisitions, TIBCO is the stalwart integration vendor who could realistically claim their ‘sweet spot’ is in just about any...
View ArticleKoverse: Helping Organizations Turn Data into a Strategic Asset
An Intellyx Brain Candy Brief Data is the new oil. Data is the new currency. Data is the, well you can fill in the blank. There’s no shortage of people telling organizational leaders that the key to...
View Article