This SIEGE presentation covers Zero Trust basics for game developers and provides five practical suggestions to incorporate its concepts into application development
Watch28 Results Found - Page 1 of 4
Cloud Applications
Meet Machina Tools – SDK
Machina Software Development Kits (SDKs) allow developers to build custom applications that can control access to sensitive data with just a few lines of code. Watch a video of how it’s done.
DownloadA Practical Solution to Manage, Externalize, and Implement Cloud Trust
On-demand webinar between Ionic, Google, and Sidechain Security as they explore the cloud trust paradox and the compelling events that are exacerbating cloud adoption. Hear about the practical concerns and use cases that led to…
DownloadTraktionTalks Podcast: Healthcare as a Team Sport – How a Collective Approach to Data and Security can Improve the Healthcare Experience
Listen to this TraktionTalks podcast about the security of patient data, healthcare innovation, and healthcare consumerism
ListenSchrems II: Considerations from a Legal and Technology Perspective
Hear from Ionic, Alston & Bird, and TrustArc in this webinar that discussed cross border data transfers and what should be done from a technology and compliance perspective to address issues raised by the Schrems…
WatchYou are failing as a CISO if you ignore data privacy
Why should CISOs care about data privacy? A roundtable of CISOs discuss 5 insights about their expanding roles to ‘operationalize’ data privacy programs.
DownloadIonic Partnerships and Integrations
The portfolio of Ionic partnerships and integrations with technology partners, system integrators and consultants improve speed, security, and profitability
DownloadIonic Security Named in Forrester Wave™ Report on Zero Trust eXtended Ecosystem (ZTX) Providers
Download your copy of "The Forrester Wave™: Zero Trust eXtended Ecosystem (ZTX) Platform Providers, Q3 2020" report. Data is the central pillar of the ZTX framework, and Machina earned the highest marks possible in the…
DownloadPreparing to Implement and Maintain a Zero Trust Security Strategy
Preparing to implement and maintain a Zero Trust strategy requires careful consideration of the architecture involved. This webcast and demonstration follows the story of an organization who has decided to focus their Zero Trust efforts…
Watch