Remove security
article thumbnail

Partnering with Dropzone: Automating Security Operations with AI

Tom Tunguz

Enterprises spend more on security but aren’t benefitting from the extra spend. Palo Alto Networks’ customers who buy security across 3 platforms spend more than 40x those that secure just one. ” - Nikesh Arora, CEO of Palo Alto Networks The average enterprise uses upwards of 70 security products.

AI 133
article thumbnail

The First $100m ARR AI Security Company

Tom Tunguz

Palo Alto Networks, the largest security software company in the world, worth roughly $82b, announced earnings this week. They have developed a $100m ARR security line in a few quarters : In Q2, our AI offerings, which include XSIAM, Autonomous Digital Experience Management, or ADEM and AI ops crossed $100 million in ARR milestone.

AI 205
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SIP Registration Isn’t Mandatory, But It’s Far More Secure

The Daily Egg

Session Initiation Protocol (SIP) registration is a means of identifying and authenticating a specific device for secure use on an internet-based Private. The post SIP Registration Isn’t Mandatory, But It’s Far More Secure appeared first on The Daily Egg.

268
268
article thumbnail

Rubrik S-1 - Burning the Boats in Data Security

Tom Tunguz

Rubrik, a Palo Alto-based data security company, filed their S-1 yesterday. As a result of differing revenue recognition treatment between CDM and RSC (Rubrik Security Cloud), this business transition will cause fluctuations to our total revenue growth and limit the comparability of our revenue with past performance.

Data 209
article thumbnail

How Investors & Strategic Buyers Evaluate Integrated Payment Strategies

The article guides SaaS executives in developing strong payment strategies, focusing on the right platform selection, user experience, and ensuring security and compliance. Investors and strategic buyers assess these integrated payment strategies as a measure of a company's growth potential and sustainability.

article thumbnail

The Complete Guide to Ecommerce Security

The Daily Egg

As each day brings another story about cybersecurity threats like DDoS attacks and phishing, ecommerce security is getting more important than ever. The post The Complete Guide to Ecommerce Security appeared first on The Daily Egg.

article thumbnail

How To Make VoIP Security and Encryption Issues Disappear

The Daily Egg

The post How To Make VoIP Security and Encryption Issues Disappear appeared first on The Daily Egg. Hackers love to take over VoIP phone systems to blast out calls, and it can cost companies thousands of dollars before they.

258
258
article thumbnail

7 Questions Every App Team Should Ask

You’ll learn: The seven requirements to include in your analytics evaluation How enhancing your analytics can boost user satisfaction and revenue What sophisticated capabilities to consider, including predictive analytics, adaptive security and integrated workflows Download the white paper to learn about the seven questions every application team should (..)

article thumbnail

The Essential Guide to Analytic Applications

We interviewed 16 experts across business intelligence, UI/UX, security and more to find out what it takes to build an application with analytics at its core. Embedding dashboards, reports and analytics in your application presents unique opportunities and poses unique challenges.

article thumbnail

Monetizing Analytics Features: Why Data Visualizations Will Never Be Enough

Think your customers will pay more for data visualizations in your application? Five years ago they may have. But today, dashboards and visualizations have become table stakes. Discover which features will differentiate your application and maximize the ROI of your embedded analytics. Brought to you by Logi Analytics.

article thumbnail

MLOps 101: The Foundation for Your AI Strategy

How can MLOps tools deliver trusted, scalable, and secure infrastructure for machine learning projects? Download this comprehensive guide to learn: What is MLOps? Why do AI-driven organizations need it? What are the core elements of an MLOps infrastructure?

article thumbnail

Your Team's Pragmatic Guide to Security

Speaker: Naresh Soni, CTO, Tsunami XR

The pandemic has led to new data vulnerabilities, and therefore new cyber security threats. As technology leaders, it's time to rethink some of your product security strategy. Whether you need to rework your security architecture, improve performance, and/or deal with new threats, this webinar has you covered.

article thumbnail

Upgrading Data Security in a Crisis

Speaker: M.K. Palmore, VP Field CSO (Americas), Palo Alto Networks

In this webinar, you will learn: The future of data security. Preparing for crises that lead to security threats. How to update existing tech stacks to optimize data security. And much more! Thursday September 10th, 2020 at 11AM PDT, 2PM EST, 6PM GMT.

article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

And despite your SaaS adoption offering many positives, there is now an exponential increase in IT, security, and business complexity. By focusing on SaaS security posture management, your team can finally accomplish the following: Discover both known and unknown SaaS apps.

article thumbnail

Connected Commerce & Payments Trends: Everything You Need to Know

Speaker: Diana Mehochko

We also cover how we can balance the need to deliver connected, seamless solutions that meet consumer demand with the need to protect consumers and maintain a secure payments system.