This SIEGE presentation covers Zero Trust basics for game developers and provides five practical suggestions to incorporate its concepts into application development
Watch12 Results Found - Page 1 of 2
Meet Machina Tools – SDK
Machina Software Development Kits (SDKs) allow developers to build custom applications that can control access to sensitive data with just a few lines of code. Watch a video of how it’s done.
DownloadA Practical Solution to Manage, Externalize, and Implement Cloud Trust
On-demand webinar between Ionic, Google, and Sidechain Security as they explore the cloud trust paradox and the compelling events that are exacerbating cloud adoption. Hear about the practical concerns and use cases that led to…
DownloadSchrems II: Considerations from a Legal and Technology Perspective
Hear from Ionic, Alston & Bird, and TrustArc in this webinar that discussed cross border data transfers and what should be done from a technology and compliance perspective to address issues raised by the Schrems…
WatchPreparing to Implement and Maintain a Zero Trust Security Strategy
Preparing to implement and maintain a Zero Trust strategy requires careful consideration of the architecture involved. This webcast and demonstration follows the story of an organization who has decided to focus their Zero Trust efforts…
WatchZero Trust Security in a Multi-Cloud Environment
Watch a presentation and demo on architecting Zero Trust security in a multi-cloud environment as presented to the Dallas Cloud Security Meetup Group.
WatchAWS Startup Stories presents Ionic Security
AWS startup story, Bill Leblanc, CTO of Ionic, discusses how Machina provides you consistent policy control over how your AWS S3 data is accessed & handled with just a few lines of code.
WatchOperationalizing Privacy Policy From Discovery to Enforcement
Hear from BigID and Ionic in this on-demand webinar to learn how you can automate the identification and mitigation of risk to personal data demanded by CCPA and GDPR.
WatchFive Steps to a Zero Trust Security Strategy
Learn about Forrester’s Zero Trust (ZT) model for information security, which abolishes the idea of a trusted network inside a defined corporate perimeter. In addition to hearing from Forrester, Ionic will discuss why enterprises are…
Watch