HPE has identified the five key capabilities necessary for securing a hybrid cloud environment: Data-centric security: Protecting data is the core of security and compliance controls. Data needs to be secured at rest, in motion and while in use. It should maintain an index with a searchable data format after it is protected and the encryption should be multi-layered. Dynamic infrastructure hardening: Just like on-premises machines, the cloud infrastructure needs to be updated and hardened […]
security infrastructure
2 posts
Teradici and Red Seal, developers of secure desktop virtualization technology and continuous security infrastructure monitoring, respectively, have formed investment and development agreements with In-Q-Tel, the CIA-based investment firm. The Central Intelligence Agency has made new investments in companies that provide desktop virtualization and continuous monitoring technology to support the work of the U.S. intelligence community. In-Q-Tel, the CIA-based investment firm that identifies technology for use by the CIA and other intelligence agencies, has formed investment […]