Seven New Security Technologies Coming Out at RSA

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Seven New Security Technologies Coming Out at RSA-8 Next

Company: Appthority 

Product: Appthority Mobile App Risk Management Service

Appthority is offering new customizable workflow features for its fully automated app risk management service. The Appthority SaaS-based service now allows IT administrators the flexibility to create and manage mobile app policies by company department, by geography or even by device type - whether company or employee owned. This includes approving and enforcing custom, acceptable use polices at scale, or supporting the creation and implementation of multiple group and role-based policies simultaneously.  

Increased use of mobile devices, along with the growth of the bring-your-own-app (BYOA) economy, has introduced new threats to the enterprise. The average employee has over 100 mobile apps on their smartphone or tablet, with many of those apps capable of accessing and exposing critical and sensitive corporate and personal data. Appthority’s new workflow enhancements provide enterprise IT with another means to leverage mobility and provide security to prevent data breaches. 

With the recent wave of high-profile data breaches, including the Target hack, which exposed the credit card data of millions of people, the threat landscape for enterprises and consumers appears gloomy. Whether it is nation-state attacks, cyber criminals or hacktivists, enterprises and consumers remain a constant target, especially with the growth of mobile devices, which bring even more points of entry for cyber crime.

However, help is on the way. This week, the RSA Conference, the IT security industry's largest event, will take place with leading security companies from around the world discussing new strategies and unveiling new technologies designed to help reduce cyber threats and protect against devastating attacks that can cripple a company or wipe out a consumer’s bank account.

Some of the new products and technology being released at RSA are featured in the following slides.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.