Axway Blog

News, trends and insights on hybrid integration.

Home Hot topics Security

Security

Application Gateway

What is an Application Gateway?

An Application Gateway is the backdrop and protection factor that gives your network real security over network traffic. By screening and filtering out traffic...
video

Ping Identity and Axway: Fighting security breaches around the world

Ping Identity and Axway have a unified collaboration that brings complementary experience in the cybersecurity world. Unfortunately, cyber threats are now a daily occurrence....
video

Shadow IT: May the 4th be with you!

For this year’s May the 4th, we take a look at Star Wars under the lens of Shadow IT. Star Wars taught us that the...
API security challenges

Ping Identity and Axway webinar wrap-up: API security challenges and solutions

Ping Identity and Axway came together for an absorbing webinar to discuss API security challenges and solutions. The charge was led by Jason Bonds,...
Federal IT initiatives

Enhancing security for federal IT initiatives

The importance of security has never been more visible or crucial, given the increase and damage of security breaches in recent years. Detected security...
cisco-ready

Cisco-ready? Work, share and collaborate securely

Cybersecurity is a key topic in every industry and technology sector today. With this said, the number of cyber attacks increases each year, month...
digital business advantage

Blocking threats to digital business with API security

UPDATED 11/9/18 The journey to blocking threats and becoming a digital business, organizations today are making massive investments in social, mobile, cloud, big data and...
API SECURITY

API Management and API security, not so secure

Over the last few years, I’ve had credit cards replaced and received notifications from my insurance company and other entities that my data was...
EDI

Digital business initiatives with Managed File Transfer (MFT)

As more and more industries venture into the digital business initiatives, they begin to expose themselves to business risks including data loss, damage and...

Stay Connected

2,051FansLike
4,687FollowersFollow
1,110SubscribersSubscribe
Contact