article thumbnail

Why you need a strong authentication platform

Network World

According to Symantec ’s annual Internet Security Threat Report , up to 80 percent of breaches could be eliminated with strong authentication. With data breaches and information theft on the rise, it’s becoming even more crucial to protect your data from unwanted third parties.

article thumbnail

9-vendor authentication roundup: The good, the bad and the ugly

Network World

Due to numerous exploits that have defeated two-factor authentication, either by social engineering, remote access Trojans or various HTML injection techniques, many IT departments now want more than a second factor to protect their most sensitive logins and assets. To read this article in full or to leave a comment, please click here

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Broadcom CEO pitches on-prem private clouds

Network World

We didn’t have single-sign-on authentication across our products. Paul Turner, vice president of products, VMware Cloud Foundation division, admitted that the problem of silos existed within VMware as well as with its customers. “We We built products that were focused on each of the silos,” he said. “We We needed to do better.

Cloud 397
article thumbnail

The Importance of Connecting with Our Customers

CIO Business Intelligence

By Rob Greer, Vice President and General Manager, Symantec Enterprise Division. As the GM of Symantec , I had the good fortune of being able to attend both the Gartner Security & Risk Management Summit and the 2022 RSA Conference the week of June 6. About the Author: Broadcom Software. IT Leadership, Security

Symantec 246
article thumbnail

Fed Tech Roundup August 27

CTOvision

Symantec takes on the Internet of unsecured things - GCN.com. Prioritizing authentication, GitHub attacked, Carter back to Silicon Valley. North Dakota: Armed police drones and high-altitude, nighttime tests - GCN.com. DARPA wants to take the sting out of DDoS attacks - GCN.com. FCW.com.

Symantec 150
article thumbnail

Broadcom’s Approach Towards Delivering Customer Value

CIO Business Intelligence

Customers can also operate with confidence as a result of our actions in software, such as our migration of Symantec Web Security Service and Cloud Access Security Broker onto Google Cloud.

Vmware 244
article thumbnail

Understanding the Security Risks of New Cloud Software

CTOvision

In addition, all data should be encrypted before you send it , then authenticated at endpoints by the latest standards, such as IPsec or PAP. Security companies like Blue Coat and Symantec have focused their efforts on advanced threat protection that integrates both local and cloud services into the same comprehensive security policy.

Cloud 150