Category: Security, Privacy and Identity Access Management
Dell Software – White Papers and Blog Posts
The Dell Software portfolio security products for Windows infrastructure. As part of its lead-generation effort, Dell Software engaged venTAJA to write white papers and blog posts on Shellshock, insider threats and other security topics.
Shellshock and Future Vulnerabilities – Buying Precious Time • Managing the Insider Threat with Active Directory Security
Salesforce.com – Blog Post
When Salesforce Identity was rated an overall leader in the Consumer Identity and Access Management (CIAM) by KuppingerCole, Salesforce engaged venTAJA to work on a blog post that announced the news and concisely explained the difference between IAM and CIAM.
Salesforce Rated Overall Leader in Consumer Identity and Access Management (CIAM) by KuppingerCole
AimPoint Group — Blog Posts and Articles
AimPoint Group is an agency providing content marketing for cybersecurity companies. The agency engaged venTAJA to work on security-focused blog posts and articles for its clients on topics ranging from penetration testing to zero trust.
Cobalt.io: Beginner’s Guide to Compliance-Driven Pentesting • NAGRA Kudelski: NexGuard Forensic Watermarking • Recorded Future: Third-Party Risk Management • Source Defense: Detect-and-Alert in Client-Side Web Attacks
SonicWALL — White Paper and Admin Guide
For its next-generation firewall, SonicWALL engaged venTAJA to write a white paper on insider threats and an administrator guide on deploying, securing and maintaining wireless access points.
The Distributed Enterprise — Building a Coordinated Security Perimeter • Best Practices for Wireless Networks
Tarari – Technology Overview
With IBM, Tarari developed an appliance for its Encoder Accelerator card and IBM’s blade servers and workstations to perform high-speed XML security and deep packet inspection. Tarari then engaged venTAJA to synthesize multiple information sources into a technical overview of the offering, including problems solved, component descriptions and benefits to the user.
Tarari – Product Briefs and Datasheets
Tarari’s marketing team prided itself on rapidly delivering product information for use by account managers, journalists, Web marketing and analysts. The team relied on venTAJA’s ability to translate technical advantages into user benefits and entrusted venTAJA with writing the content for a series of product briefs and datasheets on several lines of acceleration products.
Dell Software Group – Email and Landing Pages
Dell Software promotes all of its content marketing assets – webcasts, case studies, white papers, eBooks – through email messages linked to landing pages. The company engaged venTAJA to write email and landing pages for several of its enterprise software products.
NetMotion Wireless – Partner Solution Brief
In ramping up its partner program, NetMotion Wireless created a series of solution briefs around its enterprise mobility management (EMM) offering. The company engaged venTAJA to write a connectivity-security solution brief aimed at compliance with the Criminal Justice Information System (CJIS) Security Policy.
Tarari – White Papers
Tarari applied its acceleration technology to security at the enterprise network gateway, where it could offload deep packet inspection of large files from the CPU to specialized hardware. Through partnerships with vendors of intrusion prevention, anti-spam and anti-virus products, Tarari marketed an accelerated unified threat management (UTM) platform, and engaged venTAJA for a business-benefit white paper on the product, as well as a technical benefits white paper on the use of XML in the intelligent network.
“Accelerating Unified Threat Management” • “Mainstream Networking Embraces XML”
ForgeRock – White Paper, Blog Posts and Case Study
ForgeRock took its identity access management (IAM) technology into several prominent vertical markets. The company engaged venTAJA to turn a white paper on access management in 5G into a series of blog posts and for IAM-related technology marketing content.
The 5G Trust Equation: Network + Identity = Opportunity • How to Secure User Login With Access Management • Making Municipal Services Available Securely in British Columbia