siliconindia | | February 20166 Editor-in-Chief Harvi Sachar Managing Editor Christo Jacob Editorial Staff Anamika Sahu Dylan D'Souza Mewanshwa Kharshiing Rachita Sharma Sandeep Sen Sagaya Christuraj Sudhakar Singh Vignesh Anantharaj Sr.Visualiser Ashok kumar Circulation Manager Magendran Perumal Mailing AddressSiliconIndia Inc44790 S. Grimmer Blvd Suite 202, Fremont, CA 94538T:510.440.8249, F:510.440.8276 siliconindiaNovember 2013, volume 16-11 (ISSN 1091-9503) Published monthly by siliconindia, Inc. To subscribe to siliconindiaVisit www.siliconindia.com or send email to subscription@siliconindia.com siliconindiaCopyright © 2013 siliconindia, Inc. All rights reserved. Reproduction in whole or part of any text, photography or illustrations without written permission from the publisher is prohibited. The publisher assumes no responsibility for unsolicited manuscripts, photographs or illustrations. Views and opinions expressed in this publication are not necessarily those of the magazine and accordingly, no liability is assumed by the publisher thereof.siliconindia's circulation is audited and certified by BPA International. siliconindia is available through mainstream retail outlets such as Barnes & Noble, Borders, and Tower Records. It is also available at ethnic Asian Indian stores in major Indian hot spots across the U.S. The magazine is also distributed at major trade shows and conferences, including Comdex, Internet World and PC Expo.Visualisers Ranjith C Editor-in-Chief Harvi Sachar Managing Editor Sagaya Christuraj Editorial Staff Sr.Visualiser Ashok kumar Circulation Manager Magendran Perumal Mailing AddressSiliconIndia Inc44790 S. Grimmer Blvd Suite 202, Fremont, CA 94538T:510.440.8249, F:510.894.8405 siliconindiaFebruary 2016, volume 19-02 (ISSN 1091-9503)Published monthly by siliconindia, Inc. To subscribe to siliconindiaVisit www.siliconindia.com or send email to subscription@siliconindia.com siliconindiaCopyright © 2016 siliconindia, Inc. All rights reserved. Reproduction in whole or part of any text, photography or illustrations without written permission from the publisher is prohibited. The publisher assumes no responsibility for unsolicited manuscripts, photographs or illustrations. Views and opinions expressed in this publication are not necessarily those of the magazine and accordingly, no liability is assumed by the publisher thereof.Visualiser Arpita GhoshEditorialSagaya ChristurajManaging Editoreditor@siliconindia.comToday, given the rapidly changing IT environment with BYOD, Internet of Things and cloud, enterprises need to be prepared to make rapid changes to protect the enterprise. An enterprise's security touch points--Passwords, firewalls and antivirus software--must be made adaptable to new threats and risks. However, many security programs today have not evolved from the core security controls, or learned how to incorporate the changing risk environment into their programs. The obstacles around adapting a flexible enterprise security program is not new, but it has come under scrutiny as more resources are devoted to security and the managements in various enterprises have gotten involved. Enterprises are slowly incorporating these resources into their security programs by keeping up with new vulnerabilities and detecting threats via multiple mechanisms including a threat intelligence service. Many of them are using sector-specific information sharing on malware, vulnerabilities, or attack techniques--to identify the highest priority items to address. Using this data in their information security risk management programs help evaluate the risks, determine the level of risk, and formulate appropriate mitigation steps. By engaging with stakeholders early and being transparent about the potential changes, the stakeholders can help drive those necessary changes. These changes might be unconventional, but may offer the best option for protecting the enterprise.The security sector continues to disrupt the constantly evolving U.S. technology landscape. Counted among the most vibrant upcoming industries, the domain enjoys appreciable government-aid fuelling its rapid growth. The Silicon Valley has been playing a big part with multiple startups in the security sector making big strides with innovative solutions. In this edition, we have compiled a list of `The 20 Most Promising Enterprise Security Solution Providers-2016'. These companies have showed an exceptional capability to outperform their competitors in the field of innovation. We hope you enjoy it as much as we enjoyed putting the magazine together. Fortifying Security in Collaboration with the Silicon ValleyArun KantJeevan GeorgeEileen SinghSamden SherpaSubasita Borkakoty
<
Page 5 |
Page 7 >