WELCOME TO The Information security REPORT
Newsletter | Member Login | Signup
Home > Companies > Whitaker IT
Feature market insights and perspectives from top C-Level executives, elite technology influencers and thought leaders from your company here. This signature initiative has garnered immense support...
Conference
DATA SECURITY
Orca Security | February 22, 2023
On February 21, 2023, Orca Security, a leader in agentless cloud security, announced the addition of ThreatOptix's agent-based runtime protection and enforcement to its Orca Cloud Security Platform. The new capability expands Orca's industry leadership by offering customers a choice in how they secure their cloud-native applications, including virtual machines, containers, and Kubernetes applications. While remaining committed to agentless security, Orca's latest offering stren...
ENTERPRISE SECURITY, PLATFORM SECURITY, SOFTWARE SECURITY
Finite State | February 14, 2023
On February 13, 2023, Finite State, a pioneer in enterprise software supply chain risk management, announced its next generation platform, which includes extended SBOM management as well as the capacity to ingest and aggregate 120+ external data sources. The new platform provides Application and Product Security teams with a consolidated and prioritized risk perspective and unmatched visibility across the software supply chain lifecycle in order to grow operations employing continuous, nex...
Cisco | June 10, 2020
Cisco has done some work on its own enterprise blockchain tools, the networking firm is also using blockchain internally. Cisco’s StealthWatch Cloud will be embedded in the enterprise blockchain platform offered by Lambda 256.
PLATFORM SECURITY
Deloitte | May 10, 2022
Deloitte has enhanced existing features to offer Cloud Security Management (CSM) by Deloitte to assist US executives worried about visibility into the security of their cloud workloads and apps. The platform of services and solutions involves cloud security policy orchestration (CSPO), cyber predictive analytics, attack surface management, and cyber cloud managed services (CCMS), all of which can be used independently or in multi-cloud environments on Google Cloud, Microsoft Azure, and other pub...
Whitepaper
DATA SECURITY, SOFTWARE SECURITY
Article
DATA SECURITY, ENTERPRISE IDENTITY
Video
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
Welcome back!
Put your news, events, company, and promotional content in front of thousands of your peers and potential customers.
Not a member yet? Not a problem, Sign Up
Sign up
Sign up to contribute and publish your news, events, brand, and content with the community for FREE