integra-company-logo
Over the last 20 years, Integra™ has been a leader in providing communication and networking services to enterprise and medium business customers throughout the western United States. On August 4, 2016, Integra separated into two standalone businesses – Integra and Electric Lightwave and renamed the corporate entity which owns both businesses to Electric Lightwave.

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us

Events

Related News

SHIELDX INTEGRATES INTENTION ENGINE INTO ELASTIC SECURITY PLATFORM

eWeek | October 17, 2018

news image

ShieldX announced its new Elastic Security Platform on Oct. 17 providing organizations with Docker container-based data center security, that uses advanced machine learning to determine intent. At the core of the Elastic Security Platform is a technology that ShieldX calls the Adaptive Intention Engine that automatically determines the right policy and approach for security controls across multicloud environments. The intent-based security model can provide network micro segmentation, firewall a...

Read More

HOW TO INTEGRATE SECURITY INTO CORE BUSINESS PROCESSES

None | June 05, 2014

news image

According to the Information Security Forum’s Transitioning from Alignment to Integration report, which will be released to ISF Members this week, CISOs need to understand the information security context: where the function is currently in terms of skills, capabilities and capacity, and how it is perceived within the organization. This step is necessary as organizations must perceive the information security function to be a center of excellence if it is to integrate into the business&rsq...

Read More

CYBER SECURITY FIRM FINDS 'MULTIPLE VULNERABILITIES' IN TIK TOK SECURITY

abc6onyourside | January 15, 2020

news image

A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...

Read More

ACCENTURE TO BUY SYMANTEC'S CYBER SECURITY SERVICES BUSINESS

Technology Decision | January 13, 2020

news image

Accenture’s security arm is set to get a boost with the anticipated acquisition of Symantec’s Cyber Security Services business.The professional services firm has agreed to buy Symantec’s Cyber Security Services business from Broadcom in a bid to enhance its ability to help companies prepare for, detect and respond to cyber threats, Accenture said. Symantec’s portfolio of cybersecurity services includes global threat monitoring and analysis through a network of security op...

Read More
news image

SHIELDX INTEGRATES INTENTION ENGINE INTO ELASTIC SECURITY PLATFORM

eWeek | October 17, 2018

ShieldX announced its new Elastic Security Platform on Oct. 17 providing organizations with Docker container-based data center security, that uses advanced machine learning to determine intent. At the core of the Elastic Security Platform is a technology that ShieldX calls the Adaptive Intention Engine that automatically determines the right policy and approach for security controls across multicloud environments. The intent-based security model can provide network micro segmentation, firewall a...

Read More
news image

HOW TO INTEGRATE SECURITY INTO CORE BUSINESS PROCESSES

None | June 05, 2014

According to the Information Security Forum’s Transitioning from Alignment to Integration report, which will be released to ISF Members this week, CISOs need to understand the information security context: where the function is currently in terms of skills, capabilities and capacity, and how it is perceived within the organization. This step is necessary as organizations must perceive the information security function to be a center of excellence if it is to integrate into the business&rsq...

Read More
news image

CYBER SECURITY FIRM FINDS 'MULTIPLE VULNERABILITIES' IN TIK TOK SECURITY

abc6onyourside | January 15, 2020

A cybersecurity firm tested the security of Tik Tok and found "multiple vulnerabilities" in the app's code, allowing for security loopholes and hacking accounts. Check Point Research published their findings on the app, showing the security concerns. The firm's research shows they were able to manipulate code to mess with accounts' contents, delete and upload videos without the account owner's consent, make previously "hidden" videos public, and access persona...

Read More
news image

ACCENTURE TO BUY SYMANTEC'S CYBER SECURITY SERVICES BUSINESS

Technology Decision | January 13, 2020

Accenture’s security arm is set to get a boost with the anticipated acquisition of Symantec’s Cyber Security Services business.The professional services firm has agreed to buy Symantec’s Cyber Security Services business from Broadcom in a bid to enhance its ability to help companies prepare for, detect and respond to cyber threats, Accenture said. Symantec’s portfolio of cybersecurity services includes global threat monitoring and analysis through a network of security op...

Read More

Resources

Events

C-Suite On Deck

Responsive image

Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...

Contact Us