article thumbnail

Boeing Black Smartphone: Security, modularity and productivity

CTOvision

Despite the continuous innovation in commercial mobile technology, current devices are not designed from inception with the security and flexibility needed to match their evolving mission and enterprise environment. Disk Encryption : Encrypted storage for sensitive data. Hardware Root of Trust : Ensures software authenticity.

Security 268
article thumbnail

Optimizing PCI compliance in financial institutions

CIO Business Intelligence

The CCA allows overarching enterprise functions and IT shared services to be assessed separately from the business unit’s products/applications that require PCI security compliance. Having segmentation between infrastructure providing data processing and data storage is an example of a broad IT security architectural pattern.

Financial 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology News and Hot Topics

CTOvision

Enterprise security company, Palo Alto Networks has announced the latest release of its virtual firewall series (VM-Series). Upgrades of enterprise Hadoop-based distributions from two of the top three vendors — Cloudera Inc. DataDirect Networks combines IBM GPFS, Storage Fusion for HPC. and Hortonworks Inc.

Dell 258
article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

Eddie Garcia is chief security architect at Cloudera , a leader in enterprise analytic data management. Eddie helps Cloudera enterprise customers reduce security and compliance risks associated with sensitive data sets stored and accessed in Apache Hadoop environments. This creates the most secure Hadoop distribution on the market.

Big Data 150
article thumbnail

Don’t fall behind when it comes to migrating to the cloud

CTOvision

Cloud computing and cloud storage at one time was once viewed as a risky proposition for businesses; why trust an unknown virtual platform to handle business needs when everything could be safely handled onsite? Security is also a strong benefit of cloud storage. Bob Gourley. Why Cloud, Why Now. Assessing the Impact.

Cloud 150
article thumbnail

Why CIOs back API governance to avoid tech sprawl

CIO Business Intelligence

But APIs do more than support next-generation technologies — they already serve a foundational purpose within most enterprises. API sprawl brings new management overhead Enterprises are now composed of a diverse API portfolio, ranging from internal services to partner integrations and third-party SaaS providers.

article thumbnail

Potential Fix for Kerberos, SSH, LDAP, and Active Directory Issue

Scott Lowe

I had a reader contact me with a question on using Kerberos and LDAP for authentication into Active Directory, based on Active Directory integration work I did many years ago. The issue was that he was experiencing a problem using native Kerberos authentication against Active Directory with SSH. Thanks Tomas!