Nakina to Enhance its Cybersecurity Portfolio
OTTAWA, ONTAIRO: In a major announcement made, Nakina publicized new enhancements to its cybersecurity solution, NI-DEFENDER. The award winning cybersecurity solution combines configuration management, analytics, and identity access methodologies which allow service providers to neutralize threats associated to network security.
Nakina is a leader in identity access and configuration management solutions and will be showcasing NI-DEFENDER at the Mobile World Congress 2016 in Barcelona, Hall 7, 7J11, in a multi-technology demonstration. “NI-DEFENDER is a new class of security solution for physical, virtual and software defined networks. Insiders are behind 70% or more of all security breaches and 65% of all cyberattacks exploit network vulnerabilities from incorrect or outdated configurations. Complexity arising from IoT, small cells, NFV, and SDN will strain security and network operations teams. Security policy orchestration and advanced analytics proactively protect these complex and dynamic networks,” explained Patrick Rhude, CTO, Nakina.
The cybersecurity solution will be demonstrated in a multi-technology featuring Check Point virtual firewalls running on the Wind River® Titanium Server™ NFV infrastructure platform. “Orchestrated identity access and configuration management will be key to accelerate new services including virtual firewall security services. Check Point’s industry-leading next generation threat prevention solutions combined with Nakina’s platform help service providers overcome many of the operational challenges in managing and deploying virtualized, software-defined networks,” said Alon Kantor, VP of Business Development, Check Point.
Physical and virtual security policy orchestration, multi-vendor and multi-technology networks, enhanced analytics, trending and reporting are the new enhancements that would be included in NI-DEFENDER. Network security will be improved and compromised network assets will be pin-pointed by these new enhancements ad identity access and configuration management will be automated. Proactive audits will also be supported by these enhancements which will allow CISOs and network security operations teams to visualize, and assure the security integrity of network resources.
By Tom Farrah, CIO & SVP, Dr Pepper Snapple Group
By George Evans, CIO, Singing River Health System
By John Kamin, EVP and CIO, Old National Bancorp
By Phil Jordan, CIO, Telefonica
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Dennis Hodges, CIO, Inteva Products
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
By Sven Gerjets, SVP-IT, DIRECTV
By Marie Blake, EVP & CCO, BankUnited
By Lowell Gilvin, Chief Process Officer, Jabil
By Walter Carvalho, VP & Corporate CIO, Carnival Corporation
By Mary Alice Annecharico, SVP & CIO, Henry Ford Health System
By Bernd Schlotter, President of Services, Unify
By Bob Fecteau, CIO, SAIC
By Jason Alan Snyder, CTO, Momentum Worldwide
By Jim Whitehurst, CEO, Red Hat
By Marc Jones, Distinguished Engineer, IBM Cloud Infrastructure