Digital Edition

SYS-CON.TV
Lucid Security Prevents Unwanted Intruders
Protection of IP a Key Focus to Company Efforts

Lucid Security, creator of ipANGEL, which the company says is the world's only auto-tuning intrusion prevention solution with onboard asset/vulnerability scanning, announced its CTO Vik Phatak will team with Information Security expert Tom Bowers to deliver a presentation on Asset-Centric Security as part of the Perimeter Question track at the Computer Security Institute's (CSI) 15th annual NetSec conference, Monday, June 13, at the Phoenician Resort in Scottsdale, AZ.

Phatak and Bowers will share real-world insights and perspectives on how to effectively blend existing and new technologies to integrate and protect intellectual property within the enterprise.

"Many enterprise security programs are missing the primary objective when building a secure infrastructure. Too often the focus is to secure desktops, routers, firewalls, servers and databases, rather the information contained in those devices," said Tom Bowers, an Information Security industry expert, technical editor for Information Security Magazine and head of Net4NZIX, an information security consultancy.

As opposed to Layered and Defense-in-Depth strategies, which work from the perimeter inward, asset-centric security sits on the information itself and builds outward. Phatak and Bowers cite the following examples of asset-centric security: anti-virus software, disk/folder/file encryption, digital rights management, desktop firewalls and access control devices.

Phatak and Bowers will compare and contrast these security technologies and strategies, share challenges in identifying information assets, and discuss the types of asset-centric security strategies and technologies being deployed.

"The notion of a secure perimeter has dissolved rapidly," said Lucid Security CTO Vik Phatak. "Taking an asset-centric approach enables organizations to protect critical information without modifying the way people do business. An asset-centric model is a more scalable and sustainable approach to security. We look forward to sharing this practice as a blueprint for effective security management."

About Security News Desk
SYS-CON's Security News desk trawls the world of security for news of software, hardware, products, and services that seems likely to be of interest to infosec professionals and summarizes them for easy assimilation by busy IT managers and staff.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1



ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

With the rise of Docker, Kubernetes, and other container technologies, the growth of microservices h...
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, m...
As you know, enterprise IT conversation over the past year have often centered upon the open-source ...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple ho...
DevOps is under attack because developers don’t want to mess with infrastructure. They will happily ...
Technology has changed tremendously in the last 20 years. From onion architectures to APIs to micros...
Kubernetes is an open source system for automating deployment, scaling, and management of containeri...
IT professionals are also embracing the reality of Serverless architectures, which are critical to d...
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, will ...
"There is a huge interest in Kubernetes. People are now starting to use Kubernetes and implement it,...
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every ...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with exp...
Today most companies are adopting or evaluating container technology - Docker in particular - to spe...
Skeuomorphism usually means retaining existing design cues in something new that doesn’t actually ne...
Using serverless computing has a number of obvious benefits over traditional application infrastruct...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with exp...
When a company wants to develop an application, it must worry about many aspects: selecting the infr...
At its core DevOps is all about collaboration. The lines of communication must be opened and it take...
Modern software design has fundamentally changed how we manage applications, causing many to turn to...
In an age of borderless networks, security for the cloud and security for the corporate network can ...