|By Business Wire||
|August 5, 2014 11:00 AM EDT||
Utimaco, a worldwide leading manufacturer of hardware-based security solutions, today announced that Malte Pollmann, CEO of Utimaco, will be speaking at BSides 2014, a community-driven event built for and by information security community members. BSides 2014 coincides while thousands of IT leaders and information security professionals are in Las Vegas for Black Hat and DEF CON.
Who: Utimaco CEO Malte Pollmann
What: “Protecting Data – How Cultural-Political Heritage Shapes Security Approaches”
Where: BSides 2014, Tuscany Suites & Casino, 255 East Flamingo Rd. Las Vegas, NV
When: Tuesday, August 5, 2014, 4:00-5:00 p.m. PT
In Europe, security systems are built with the end goal to safe-keep the privacy of sensitive data. In the U.S., security systems are architected with the goal of securing sensitive infrastructures. Recent revelations about the NSA snooping and international backlash demonstrate the dramatic international differences in privacy vs. security values. Those differences also play out in how security systems are architected. Beginning with “what is the data being protected?” vs. “how do we keep the bad guys out?” will lead to two very different security solutions.
Malte Pollmann is CEO of Utimaco, a worldwide leading manufacturer of hardware-based security solutions, providing hardware security modules (HSM) to manage cryptographic keys and prevent third-party data breaches. At the core of industries seeking to deploy HSM technology lies the need to secure sensitive consumer, corporate and citizen data, as well as advanced IP-based networks in the face of connected devices and the Internet of Things.
Utimaco’s scalable and customizable HSM works as the cornerstone of trust within industries such as:
- Automotive – key security to enable connected and automated driving solutions
- Big Data – enabling compliance for protection of privacy
- Conditional Access Control – keeping content safe from unauthorized access
- Connected Devices – generating and assigning cryptographic signatures to connected devices, verifying the authenticity and integrity of the permit, before executing commands
- eID – offering secure border control, electric identification and other eGovernment functionalities
- Energy Market – providing regulatory compliance and auditability to highly regulated energy market
- Manufacturing – deployed in offshore production environments to provide device identity and protect against insider threat
- Mobile Telecom – offering tamper-proof subscriber authentication
- Payment Solutions – providing secure PIN code generation, card issuing, Point of Sale and ATM management
Utimaco is a leading manufacturer of hardware based security solutions that provide the root of trust to keep cryptographic keys safe, secure critical digital infrastructures and protects high value data assets. Only Utimaco delivers a general-purpose hardware security module (HSM) as a customizable platform to easily integrate into existing software solutions, embed business logic and build secure applications. Tens of thousands of enterprise and infrastructure companies rely on Utimaco to guard IP against internal and external threats and protect hundreds of millions of consumers globally. Visit Utimaco at: https://hsm.utimaco.com/
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
Nov. 27, 2015 01:00 PM EST Reads: 159
In recent years, at least 40% of companies using cloud applications have experienced data loss. One of the best prevention against cloud data loss is backing up your cloud data. In his General Session at 17th Cloud Expo, Sam McIntyre, Partner Enablement Specialist at eFolder, presented how organizations can use eFolder Cloudfinder to automate backups of cloud application data. He also demonstrated how easy it is to search and restore cloud application data using Cloudfinder.
Nov. 27, 2015 01:00 PM EST Reads: 137
Nov. 27, 2015 12:00 PM EST Reads: 460
Nov. 27, 2015 12:00 PM EST Reads: 538
Nov. 27, 2015 11:45 AM EST Reads: 535
Nov. 27, 2015 11:00 AM EST Reads: 309
Nov. 27, 2015 10:45 AM EST Reads: 383
Nov. 27, 2015 10:45 AM EST Reads: 396
Nov. 27, 2015 10:00 AM EST Reads: 305
Nov. 27, 2015 10:00 AM EST Reads: 490
Nov. 27, 2015 09:45 AM EST Reads: 216
Nov. 27, 2015 09:15 AM EST Reads: 287
Nov. 27, 2015 08:00 AM EST Reads: 376
Nov. 27, 2015 07:45 AM EST Reads: 422
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessi...
Nov. 27, 2015 07:30 AM EST Reads: 317