Cover StoryEvery day there are new reports of highly organized cyber-attacks. A staggering number of organizations revealed breaches of their networks last year. Hackers are continuously evolving their recon, mapping and exploitation efforts to gain access to back end servers that applications connect to while bypassing the traditional security perimeter of firewalls, intrusion detection and intrusion prevention systems.
Suresh Batchu, Co-Founder, CTO & SVP Technology and Engineering, MobileIron
Mark Nunnikhoven, Vice President of Cloud & Emerging technologies, Trend Micro
Tackling Enterprise Security Through a Continuous Approach
Jayshree Ullal, President & CEO, Arista Networks, Inc.
Hemal Patel, MD & CEO, Cyberoam Technologies
Sowmya Das, CMO, Identiv Inc
Umesh Kumar Gupta, Head of Antivirus Research, Comodo Group
Rekha Shenoy, VP- Business and Corporate Development, Tripwire
Manish Gupta, Senior Vice President of Products, FireEye
Sam Harris, Director- Cyber Security and Enterprise Risk Management, Teradata Corporation
Alan Kessler, CEO, Vormetric