Digital Edition

SYS-CON.TV
Lucid Security Prevents Unwanted Intruders
Protection of IP a Key Focus to Company Efforts

Lucid Security, creator of ipANGEL, which the company says is the world's only auto-tuning intrusion prevention solution with onboard asset/vulnerability scanning, announced its CTO Vik Phatak will team with Information Security expert Tom Bowers to deliver a presentation on Asset-Centric Security as part of the Perimeter Question track at the Computer Security Institute's (CSI) 15th annual NetSec conference, Monday, June 13, at the Phoenician Resort in Scottsdale, AZ.

Phatak and Bowers will share real-world insights and perspectives on how to effectively blend existing and new technologies to integrate and protect intellectual property within the enterprise.

"Many enterprise security programs are missing the primary objective when building a secure infrastructure. Too often the focus is to secure desktops, routers, firewalls, servers and databases, rather the information contained in those devices," said Tom Bowers, an Information Security industry expert, technical editor for Information Security Magazine and head of Net4NZIX, an information security consultancy.

As opposed to Layered and Defense-in-Depth strategies, which work from the perimeter inward, asset-centric security sits on the information itself and builds outward. Phatak and Bowers cite the following examples of asset-centric security: anti-virus software, disk/folder/file encryption, digital rights management, desktop firewalls and access control devices.

Phatak and Bowers will compare and contrast these security technologies and strategies, share challenges in identifying information assets, and discuss the types of asset-centric security strategies and technologies being deployed.

"The notion of a secure perimeter has dissolved rapidly," said Lucid Security CTO Vik Phatak. "Taking an asset-centric approach enables organizations to protect critical information without modifying the way people do business. An asset-centric model is a more scalable and sustainable approach to security. We look forward to sharing this practice as a blueprint for effective security management."

About Security News Desk
SYS-CON's Security News desk trawls the world of security for news of software, hardware, products, and services that seems likely to be of interest to infosec professionals and summarizes them for easy assimilation by busy IT managers and staff.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1



ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

CloudEXPO New York 2018, colocated with DXWorldEXPO New York 2018 will be held November 11-13, 2018,...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news an...
@DevOpsSummit at Cloud Expo, taking place November 12-13 in New York City, NY, is co-located with 22...
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held Novemb...
Organizations planning enterprise data center consolidation and modernization projects are faced wit...
A traditional way of software development efforts reimbursing is pay by the hour, which in case of r...
Adding public cloud resources to an existing application can be a daunting process. The tools that y...
CI/CD is conceptually straightforward, yet often technically intricate to implement since it require...
Fact: storage performance problems have only gotten more complicated, as applications not only have ...
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ag...
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems ...
Containers, microservices and DevOps are all the rage lately. You can read about how great they are ...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can ...
When building large, cloud-based applications that operate at a high scale, it’s important to mainta...
While some developers care passionately about how data centers and clouds are architected, for most,...
"Peak 10 is a hybrid infrastructure provider across the nation. We are in the thick of things when i...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use ...
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and ap...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO an...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple ...