Tag Archives: Service Gateway

Big Data, IoT, API …….Newer technologies protected by older security.

Now-a-days every single CIO, CTO, or business executive that I speak to is captivated by these three new technologies: Big Data, API management and IoTs (Internet of Things). Every single organizational executive that I speak with confirms that they either … Read more >

Intel Expressway Service Gateway and RSA DPM

Intel Expressway Service Gateway and RSA DPM: Security without pain Top security threats for 2013 include “hacktivism” attacks, botnet malware, distributed denial of service attacks, and identity theft. The problems are well known and yet there is still resistance to … Read more >

The “Intel” on Intel is… We do software! by Andy Thurai

Are you surprised? I start off most of my presentations/conferences with the following question: How many of you know that Intel ‘does’ Software? Very few hands usually go up, and that is exactly the challenge I have today in getting the … Read more >

Intel Expressway outpaces IBM DataPower by 6x to 10x in a direct “apples to apples” comparison

Prior to the release of Intel’s XEON processor E5-2600, Intel Expressway Service Gateway (also available as McAfee Services Gateway under the McAfee Cloud Security Platform Suite) was already providing superior performance and value. However, with the record breaking E5-2600 – … Read more >

Security Expert Gunnar Peterson – “Don’t Hit the Snooze Button on DigiNotar Alarm Bells”

The DigiNotar breach is being called the worst breach so far (http://blogs.bankinfosecurity.com/posts.php?postID=1068). Breaches come in all shapes and sizes, but when they occur on the very systems that are supposed to protect us, the impact is more widespread. Certainly this … Read more >

Achieving unified control, visibility, and compliance for SaaS applications

Technical Information Security Policy The first step to delivering the right control and visibility architecture for SaaS is to formalize the enterprise’s goal in a Technical Security Policy. The security policy lifecycle begins with policy creation and development. The Security … Read more >