Nakina to Enhance its Cybersecurity Portfolio
OTTAWA, ONTAIRO: In a major announcement made, Nakina publicized new enhancements to its cybersecurity solution, NI-DEFENDER. The award winning cybersecurity solution combines configuration management, analytics, and identity access methodologies which allow service providers to neutralize threats associated to network security.
Nakina is a leader in identity access and configuration management solutions and will be showcasing NI-DEFENDER at the Mobile World Congress 2016 in Barcelona, Hall 7, 7J11, in a multi-technology demonstration. “NI-DEFENDER is a new class of security solution for physical, virtual and software defined networks. Insiders are behind 70% or more of all security breaches and 65% of all cyberattacks exploit network vulnerabilities from incorrect or outdated configurations. Complexity arising from IoT, small cells, NFV, and SDN will strain security and network operations teams. Security policy orchestration and advanced analytics proactively protect these complex and dynamic networks,” explained Patrick Rhude, CTO, Nakina.
The cybersecurity solution will be demonstrated in a multi-technology featuring Check Point virtual firewalls running on the Wind River® Titanium Server™ NFV infrastructure platform. “Orchestrated identity access and configuration management will be key to accelerate new services including virtual firewall security services. Check Point’s industry-leading next generation threat prevention solutions combined with Nakina’s platform help service providers overcome many of the operational challenges in managing and deploying virtualized, software-defined networks,” said Alon Kantor, VP of Business Development, Check Point.
Physical and virtual security policy orchestration, multi-vendor and multi-technology networks, enhanced analytics, trending and reporting are the new enhancements that would be included in NI-DEFENDER. Network security will be improved and compromised network assets will be pin-pointed by these new enhancements ad identity access and configuration management will be automated. Proactive audits will also be supported by these enhancements which will allow CISOs and network security operations teams to visualize, and assure the security integrity of network resources.
By Michael Cockrill, CIO, State of Washington
By Brett Shockley, SVP & CIO, Avaya
By Sven Gerjets, SVP-IT, DIRECTV
By Steve Moyer, VP of Storage Software Engineering, Micron...
By Michelle R. McKenna-Doyle, SVP and CIO, National Football...
By Patrick Hale, CIO, VITAS Healthcare
By Roman Trakhtenberg, CEO, Luxoft
By Julia Davis, SVP, CIO, Aflac
By Chris Westlake, VP & GM of Service,RK
By Pauly Comtois, VP DevOps, Hearst Business Media
By Yanni Charalambous, VP & CIO, Occidental Petroleum...
By Bob Brown, VP-Production & Operations, ONE World Sports
By Arthur Hu, SVP & CIO, Lenovo
By Ron Guerrier, CIO, Farmers Insurance Group, Inc.
By Scott Cardenas, CIO, City and County of Denver
By Kevin McCarron, Vice President Collaboration, Carousel...
By Marc Kermisch, VP & CIO, Red Wing Shoe Co.
By Christopher Frenz, AVP of Information Security,...
By Brian Drozdowicz, VP, Digital Services, Siemens...
By Les Ottolenghi, EVP and CIO, Caesars Entertainment