Secure APIs, Apps, Data & Users for the Digital Enterprise
Title: |
Enterprise Security Summit |
Speakers: |
HPE Security, Oracle, Okta, Akamai |
Date / Time: |
ARCHIVES AVAILABLE
|
VIEW & DOWNLOAD: Presentations, Free Trials, Research Papers, Slides & White Papers
Expert Speakers & Presentations |
![Andy Smith, Oracle](/images/photos/Oracle_AndySmith_100_75.png)
|
Managing the Cloud Security Unknowns Regulating the Risk and Exposure of Cloud Services
Andy Smith
Sr Director Product Management
|
![](/images/logos/oralogo_100_12.png) |
![Patrick Sullivan, Akamai](/images/photos/Akamai_PSullivan_100_75.jpg)
|
Securing End Users Across The Digital Enterprise Patrick Sullivan Global Director of Security Strategy
|
![](/images/logos/Akamai-Logo-RGB_100_45.jpg) |
![Eric Karlinsky, Okta](/images/photos/Okta_EricKarlinsky_100_75.jpg)
|
The New Enterprise Security Model Eric Karlinsky Group Technical Marketing Manager
|
![](/images/logos/Okta_200.jpg) |
![Sheryl Wharff, HPE Security](/images/photos/HPE_SherylWharff_100_75.jpg)
![Mark Bouchard, CyberEdge Group](/images/photos/HPE_CyberEdge_Mark_Bouchard_100_75.jpg)
|
HPE Security and CyberEdge Disclose - 2017 Cyberthreat Defense Report Findings Sheryl Wharff Global Product & Channel Marketing - HPE Security - Data Security Mark Bouchard, CISSP Chief Operating Officer - CyberEdge Group
|
![](/images/logos/hpe_newlogo_100_42.png) |
Download White Papers |
![](/images/logos/oralogo_100_12.png) |
How CASB & UBA Unmasks Insider Threats in the Cloud
Oracle CASB Cloud Service
How To Quantify the Value of a CASB
Making Sense of the Shared Responsibility Model
The Importance of User Behavior Analytics for Cloud Service Security
|
![HPE](/images/logos/hpe_newlogo_100_42.png) |
2017 Cyberthreat Defense Report (Summary)
CyberEdge Group - 2017 Cyberthreat Defense Report
Streamlining Information Protection Through a Data-centric Security Approach
HPE SecureData End-to-end Data-centric Security for the New Data-driven Economy
|
![](/images/logos/Akamai-Logo-RGB_100_45.jpg) |
Cybercrime by the Numbers
Targeted Threat Protection in the Cloud
Akamai Enterprise Threat Protector
|
![](/images/logos/Okta_200.jpg) |
Okta Security -- Technical Review
A Modern Cloud Service for Secure Digital Experiences
Best Practices for Building Secure Multi-Factor Authentication
Secure Cloud and Mobile Data with Okta
|
|