Browse Business Software Categories

Close  

Netflix Adopts OneLogin for Identity Management – Case Study

OneLogin was the only vendor that had the strong authentication features Kail was looking for, as well as the only vendor with an iPad App for enterprise single sign-on.

Pandora Switches from Okta to OneLogin for Identity Management – Case Study

Deploying OneLogin has helped Pandora eliminate the security risks of unauthorized access while enabling a seamless single sign-on experience for employees. New employees can get up and running quickly with all the business apps they need to be productive, regardless of their location, and without a lengthy software provisioning process.

– XO Compute

XO Compute is a cloud hosting solution that, through the cloud, streamlines operations and secures company infrastructures through backup and security processes. The solution provides a variety of cloud services, including infrastructure as a service (IaaS), automated data backup, file storage, web hosting, data center backup and more. XO Compute is highly scalable, contorting to the needs of fast-growing businesses. The solution is robust and ensures that IT services always run smoothly.

How Do I Protect Myself in the Internet of Things?

“The Internet of Things” is a formal term referring to distinctly identifiable objects (cars, kitchen appliances, smartphones) and their cyber-representations on the Internet. By 2020, it’s projected by at least one expert that there will be over 30 billion “things” represented virtually. In this blog post security expert Robert Siciliano provides a list of tips on how to stay protected in this new paradigm.

First Look: Adallom’s Behavior-Tracking Cloud Security

There’s no such thing as perfect data security, be it on premise or in the cloud. There will always be a risk of being compromised by both external and internal attacks. What makes Menlo Park-based cloud security provider Adallom so intriguing is that its flagship product takes a markedly different approach to security on cloud-based enterprise apps, one that makes no discrepancies whether a potential attack is external or internal.

Merchants, Do You Know Where Your Card Data Is?

Card fraud affects merchants, not just shoppers. Guest blogger Robert Siciliano explains the importance of knowing where your customers’ card data is.

– Adallom

Adallom is a cloud security solution that works across all your SaaS platforms to prevent any unauthorized activities and enforce compliance. The program starts by monitoring your users and tracking each of their actions in an audit log.

Cisco CloudLock

CloudLock is a cloud security solution that protects all of the user’s online data and works across Google Apps, Salesforce and other 3rd party apps. Users can use the program by initiating a compliance scan, which notifies them of sensitive data locations and enforces rules and standards that users set.

How Cloud Payroll Is Safer Than Flying

For every benefit associated with the cloud there’s also a perceived risk–mostly about security and losing control of one’s data. In this piece Gareth Cartman dispels some of the phobias associated with something as sensitive as cloud payroll.

5 Ways to Protect Your Mobile Devices From Prying Eyes

Do you know how to keep your phone from the prying eyes of exes, strangers, cops, other officials and even your own spouse? Here are tips to keep your mobile safe and secure.