H

Cowbell
-
Continuous Underwriting

 |
Cyber insurance, cybersecurity, and cyber threat landscapes
are changing rapidly. Just like cybersecurity vendors, cyber
insurance providers need to keep pace with ever-evolving
criminal tactics. Previously, cyber insurance applications
involved lengthy applications, ambiguous coverages, and no
customer contact until a breach actually occurred. That
approach has become obsolete, and underscores the importance
of continuous underwriting. Continuous underwriting has a
historical precedent in other lines of insurance that have a
relatively slow change in risk. But, cyber risk can change
daily. Cyber insurance needs to become more dynamic and
progressive to outpace cyber criminals. Continuous risk
assessment, or reassessing one’s risk profile on a
continuous basis is a required and foundational component of
continuous underwriting. Therefore, continuous underwriting
and continuous risk assessment go hand in hand. Outlook
Series' Michael Lippis interviews Caroline Thompson to gain
Cowbell's perspective on continuous underwriting.
Caroline is the Head of Underwriting at Cowbell.
16 Minutes
|
Heartland Secure

 |
When your payment data is vulnerable, it’s like leaving the
front door of your property unlocked. Thieves can come in,
take what they want, and leave you economically and
emotionally stressed. But unlike physical theft, cyber
thieves are not just stealing from you—they are stealing
from your customers, too. And this means your business's
reputation can be ruined overnight, especially if the data
theft incident makes the morning news. What’s more, due to
standards set by the PCI Security Standards Council to
prevent data theft, if cardholder data from your business is
compromised and you’re caught in noncompliance, not only do
you have to explain to your customers why you failed to
secure their sensitive information, but also deal with
sizable fines and penalties imposed by the card brands.
Outlook Series' Michael Lippis interviews Bob Carr to gain
Heartland Payment Systems' perspective on Credit/Debit Card
Data Security.
Bob Carr is the CEO at Heartland Payment Systems.
28 Minutes
|
IRI -
Test Data Management

 |
It is the goal of Test Data Management (TDM) to systematize
the generation — and improve the quality, safety, and
utility — of test data. TDM has become an IT imperative.
Table views, index orders, key relationships, and file and
report contents, must reflect reality to be useful in
testing. Generating realistic values and formats with safe
data in ideal ranges -- and populating large targets -- can
take a long time with other tools or programs. To gain a
competitive edge, look for a TDM solution which will help
you can generate multiple test data targets for test
database loads, flat-file structures, and custom report
formats from scratch -- all without access to real data.
Many firms are leveraging TDM to anonymize, subset, or
otherwise mask real data for production or on-demand or
virtualized testing scenarios. Having a viable,
well-reviewed TDM strategy is the best way to assure that
the most realistic test data will be on hand. Outlook
Series' Michael Lippis interviews David Friedland to gain
Innovative Routines International's perspective on Test Data
Management.
David is the VP of Business Development at IRI.
32 Minutes
|
Correlata
- DataCenter Cognitive Analytics

 |
The
data center industry is continuously challenged with staying
up-to-date with the ever-changing technological
advancements, as well as growing customer demands. It’s
getting more and more difficult for data center engineers
and IT managers to ensure higher uptimes, handle costs, and
deploy fast, all at the same time—but it’s not impossible
either. Experts have identified the top three challenges
that IT Managers, and Data Center Engineers face while
implementing and managing data centers. Namely, Real-time
Monitoring and Reporting, Uptime and Performance Maintenance
and Staff Productivity Management. With the developing
technology, applications, data, and devices, data centers
are subjected to continuously evolve with it. Michael Lippis
interviews Ofer Laksman to gain Correlata Solutions'
perspective on Data Center Automation and Efficiency.
Ofer is the CEO of Correlata Solutions.
26 Minutes
|
IRI - Data Masking

 |
We talk to David Friedland, the VP of Business Development
at IRI. Short for Innovative Routines International, IRI is
a data management ISV founded 40 years ago (in 1978) with
its headquarters in Melbourne, Florida and support offices
in more than 40 cities worldwide. IRI has been best known
for its CoSort big data manipulation software, but more
recently has been making its bones in the data protection
market with its data masking product FieldShield, as well as
a larger data lifecycle management platform that includes
FieldShield, called Voracity. For the last 10 years, IRI’s
ability to find and mask data in a fast, targeted way has
earned it mentions or awards from the The Privacy and Data
Security Law Journal and trade publications like CIO
Applications, CIO Review, Computerworld, Corporate Vision,
and DBTA Magazine, plus Research and Markets, Gartner, and
The Bloor Group.
37 Minutes
|
Application Fluent Unified Access

 |
A decade ago, mobility for enterprise networks was viewed as
a convenience, a way to provide those employees fortunate
enough to have laptops with some ability to move about their
workplace while remaining connected to the network. Today,
however, wireless local-area networks (WLANs) have become
mission-critical and enabling mobility has become vital to
the enterprise. And with good reason: studies have shown
that mobility-enabled workers are more productive, help to
increase profits and are happier employees. What’s more, the
definition of what constitutes a workplace has undergone a
shift in recent years, as working from home becomes more
common to both give employees more flexibility and to reduce
corporate space requirements and their associated expense.
The definition of enterprise mobility has also grown to
reflect its importance. Beyond creating campus-wide Wi-Fi
access, enabling a mobile enterprise means providing
ubiquitous connectivity and simple access: employees – or
any user in the network – are provided with quality access
to whatever applications they need, anywhere, anytime, on
any device. Outlook Series' Michael Lippis interviews Heitor
Faroni and Joseph Raccuglia to gain Alcatel-Lucent
Enterprise's perspective on Unified Access.
Heitor is a Director of Solutions
Marketing and Joseph is a Senior Director of Solutions
Marketing both are at the Network Division of Alcatel-Lucent
Enterprise.
28 Minutes
|
Junos Pulse Mobile Security

 |
For IT departments, mobile devices represent a new and
vulnerable endpoint for threats distributed via email, text
messaging, Bluetooth, Wi-Fi, and application downloads. Even
worse, business data is at risk every time a device is lost
or stolen. So, while smartphones help improve employees’
productivity, unprotected devices can mean loss or theft of
valuable, confidential data and cause noncompliance with
regulations such as the Health Insurance Portability and
Accountability Act (HIPAA) or Sarbanes-Oxley Act (SOX). To
meet the challenge, you need to leverage a Mobile Security
Suite that offers enterprises and consumers a wide range of
security features to protect various mobile devices. We
interview Rich Campagna to gain Juniper Networks'
perspective on the Junos Pulse Mobile Security Suite.
Rich
is a Director of Product Management in Juniper Networks
Access & Acceleration Business Unit.
27 Minutes
|
|
Click Here to Subscribe to The Outlook Series Newsletter
Terms
of Use | Copyright
© 2001 - 2023
CONSTITUENTWORKS
SM CORPORATION. All
rights reserved. |
Privacy Statement

|