Get Our Newsletter
Intellyx – The Digital Transformation Experts – Analysts
  • OUR CONTENT
    • Cortex Columns
    • BrainBlog Posts
    • Brain Candy Briefs
    • Brain Dump Articles
    • News Mentions
    • Webinars & Events
    • Whitepapers
    • Thought Leadership Finder
  • Our Services
    • Advisory Offerings
    • Content Marketing Services
    • For Technology Vendors
    • For Business Execs
  • About Us
    • Analyst Team
    • Current Subscribers
    • Media Kit
    • Testimonials
  • CONTACT
    • Request an Inquiry
    • Download the Poster

Tags archive: Crypto-Segmentation

IBM Data Privacy Hyper Protect image BrainBlog

The Advent of Data Hyper-Protection

April 7, 2021 0

Opening up new capabilities for protecting private data at rest and in motion on the IBM Z series mainframe and beyond Critical system-of-record data must…

BrainBlog

SecDevOps and the Software-Defined Enterprise

May 19, 2016 0

Among all the changes that fall under the digital transformation umbrella, perhaps one of the most fundamental is the shift to the software-defined enterprise. The…

White Paper

Breach Containment: Shifting the Tide of Cybersecurity

March 9, 2016 0

What do Anthem, British Airways, CareFirst, Experian, Home Depot, the IRS, Japan Airlines, JP Morgan Chase, NASDAQ, Sony Pictures, Staples, and the US Office of…

Webinars & Events

Save the Date for Webinar on Breach Containment: Shifting the Tide of Cybersecurity

February 18, 2016 0

SAVE THE DATE! MARCH 16th 8:30 a.m. PDT | 11:30 a.m. EDT | 3:30 p.m. GMT Security is increasingly difficult, hacking is easier and easier…

News

Automatic Protection of Sensitive Applications Over any Network

September 10, 2015 0

With Crypto-Segmentation, CryptoFlows automatically contain and constrain hackers exploiting compromised user credentials by blocking lateral movement from application to application. CryptoFlow solutions stop the top…

News

Certes Frictionless Crypto-Segmentation Security Solution Blocks #1 Hacking Attack Vector

September 3, 2015 0

Certes CryptoFlows are the industry’s first software-defined security solution for safeguarding enterprise applications over any network for any user on any device. They enable “frictionless…

Blog Post Mention

Arrested? My Hands Were Already Tied

September 2, 2015 0

By Satyam Tyagi Snake Oil and FUD The best question is asked by Jason Bloomberg in his latest Forbes posting on the Wyndham court case,…

BrainBlog

Certes Networks: Business-Driven Cybersecurity via Crypto-Segmentation

August 14, 2015 1

There are two kinds of enterprises in today’s world: the ones that know they’ve been hacked, and the ones that don’t know they’ve been hacked.…

Webinars & Events

Webinar: Securing the Frictionless Enterprise

August 3, 2015 0

  Click here to register for this Webinar. Date and time: Thursday, September 24, 2015 8:00 am Pacific Daylight Time (San Francisco, GMT-07:00) Thursday, September…

RSAC 2026 Conference

Start date: March 23, 2026
End date: March 26, 2026
All-day event
RSAC 2026 March 23-26

KubeCon | CloudNativeCon Europe 2026

Start date: March 23, 2026
End date: March 26, 2026
All-day event
kubecon image

TMForum DTW Ignite

Start date: June 23, 2026
End date: June 25, 2026
All-day event
ignite

RAISE Summit

Start date: July 8, 2026
End date: July 9, 2026
All-day event
raise image
Subscribe to our Cortex & Brain Candy Newsletters!
Download the Poster
JOIN OUR LINKEDIN GROUP!

Categories

  • Article 153
  • Blog Post Mention 1,365
  • Brain Candy 1,841
  • Brain Dump 10
  • BrainBlog 538
  • CIO Article 53
  • CISO Magazine Article 2
  • Cortex Newsletter 246
  • DailyIcoNews Article 22
  • DZone Article 12
  • Featured 770
  • Forbes Article 292
  • Infographic 12
  • News 573
  • Past Events 36
  • Podcast 72
  • SD Times Article 22
  • SiliconANGLE Article 98
  • TechBeacon Article 9
  • Techstrong Article 1
  • The New Stack Article 31
  • Translation 23
  • Uncategorized 285
  • Video 91
  • Webinars & Events 188
  • White Paper 208

Follow Us:

Contact Us:

  agility@intellyx.com
 +1-617-517-4999

The Fine Print

  • Code of Ethics
  • Terms & Conditions
  • Cookies, Privacy, & Security

Upcoming Events

RSAC 2026 Conference

Start date: March 23, 2026
End date: March 26, 2026
All-day event
RSAC 2026 March 23-26

KubeCon | CloudNativeCon Europe 2026

Start date: March 23, 2026
End date: March 26, 2026
All-day event
kubecon image

TMForum DTW Ignite

Start date: June 23, 2026
End date: June 25, 2026
All-day event
ignite

RAISE Summit

Start date: July 8, 2026
End date: July 9, 2026
All-day event
raise image

Tag Cloud

2021 Awards Agile AI AIOps Analyst Award Analytics Artificial Intelligence Automation award Awards award winner Big Data Bitcoin Blockchain BPM Cloud cloud native Compuware Crypto Cryptocurrency Cybersecurity DevOps DigitalInnovator Digital Transformation Enterprise Architecture genAI Generative AI Hybrid IT Innovation Integration Intellyx award Internet of Things IoT IT Operations Kubernetes Low-Code Machine Learning Mainframe Modernization No Code observability RPA SD-WAN Security vendor award

Categories

  • Article 644
    • Brain Dump 10
    • CIO Article 53
    • CISO Magazine Article 2
    • DailyIcoNews Article 22
    • DZone Article 12
    • Forbes Article 292
    • SD Times Article 22
    • SiliconANGLE Article 98
    • TechBeacon Article 9
    • Techstrong Article 1
    • The New Stack Article 31
  • Blog Post Mention 1,365
  • Brain Candy 1,841
  • BrainBlog 538
  • Cortex Newsletter 246
  • Featured 770
  • Infographic 12
  • News 573
  • Past Events 36
  • Podcast 72
  • Translation 23
  • Uncategorized 285
  • Video 91
  • Webinars & Events 188
  • White Paper 208
© Intellyx BV. All rights reserved.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Subscribe to Our Newsletter!

We will send you a weekly digest of our latest thought leadership and articles on disruptive vendors and technology.

  Thank you for Signing Up

Please correct the marked field(s) below.

1,true,6,Contact Email,2 1,false,1,First Name,2 1,false,1,Last Name,2

Read Our Recent Cortex and BrainCandy Newsletters