Blog
Device Authentication and Identity of Things (IDoT) for the Internet of Things (IoT)
by Anmol Singh
Security has seldom been the focus of device manufacturers who have historically taken their own approach for securing the devices in the IoT. Most devices in enterprise, consumer or industrial IoT continue to be developed and designed to perform specific functions and security is often a neglected theme in the majority of product development lifecycles. The proprietary protocols these devices operate on are primarily characterized by the purpose they are built to serve and offer very limited or no interoperability. With the increasing convergence of IT and OT towards IoT, lack of a common...
Blog
Data Security and Governance (DSG) for Big Data and BI
by Anmol Singh
Today, organizations are capturing trillions of bytes of data every day on their employees, consumers, services and operations through multiple sources and data streams. As organizations explore new ways to collect more data, the increased use of a variety of consumer devices and embedded sensors continue to fuel this exponential data growth. Large pools of data, often referred to as data lakes, are created as a result of this massive data aggregation, collection and storage – which remains the easiest of all processes in a Big Data and BI value chain. What’s concerning is...
Blog
Broadcom acquires CA Technologies in a ‘Broadest’ ever shift of acquisition strategy
by Anmol Singh
Broadcom, after having denied the acquisition of Qualcomm earlier this year by Trump administration based on national security concerns, has decided to acquire CA Technologies showing one of the greatest shifts in an acquisition strategy from a semiconductor business to  an  IT Software and Solutions business.   T he   proposed  Qualcomm acquisition  by  once  Singapore-based Broadcom  had   the   likelihood of several 5G patents passing beyond US control.   T he  CA Technologies...
Blog
BOMGAR acquires Avecto to expand its PAM portfolio
by Anmol Singh
BOMGAR , owned by PE firm Francisco Partners has recently announced that it has acquired Avecto , a UK based Endpoint Privilege Management (EPM) company. The move coming within 6 months of Lieberman Software’s acquisition by BOMGAR clearly depicts the quest to strengthen its position in the PAM market by offering a full-featured PAM suite. Originally a provider of ‘remote support’ solutions, BOMGAR offered remote session management capabilities in the market for a while until it acquired Argentina based Pitbull Software in late 2015 to enter the PAM market with...
Blog
CyberArk Acquires Vaultive to Strengthen Its Privilege Management Capabilities in Cloud
by Anmol Singh
CyberArk, an overall leader in privilege management according to KuppingerCole Leadership Compass on Privilege Management , announced yesterday that it has acquired certain assets in a privately held America-based Israeli cloud security provider, Vaultive. Data encryption has emerged as a key inhibitor for organizations seeking to adopt cloud services. Most cloud providers today offer own encryption to ensure that data in transit and at rest remains unreadable if a breach occurs. However, as organizations adopt multiple SaaS...