SOURCE: Vidder

Vidder

August 15, 2016 10:27 ET

Vidder to Lead Roundtable Discussion on New Approaches for Securing Third-Party Access at Gartner Catalyst Conference This Week

Latest Version of Vidder PrecisionAccess Also to Be Demonstrated Highlighting Elimination of Credential Theft and Compromised Device Threats Presently Associated With Users of Highest Risk

CAMPBELL, CA--(Marketwired - Aug 15, 2016) -  Vidder, Inc., the pioneer of Trusted Connectivity, today announced it has been selected to discuss critical risks associated with third-party access -- stolen credentials, compromised devices, and excessive access -- and a new architecture approach that significantly reduces these risks at the Gartner Catalyst Conference this week. The conference will be held at the Manchester Grand Hyatt in San Diego, Calif. In addition, in booth number 605, the company will demonstrate the latest edition of Vidder PrecisionAccess™ for trusted third-party access.

The Gartner Catalyst roundtable discussion, titled Six Rules Every Organization Should Follow to Secure Third-Party Access, will take place on Aug. 16 at 10:05 am PDT in the Regatta C conference room, fourth level. In a national survey of more than 400 enterprise participants, nearly all said applications accessed by third parties are behind corporate firewalls. Enterprises today are extremely vulnerable to breaches that start with stolen credentials and are often initiated with third parties such as vendors, contractors, and supply chain partners. The roundtable session of security experts, led by Junaid Islam, Vidder founder and CTO, will examine the rules for trusted third-party access, and a new architecture approach that significantly reduces cyberattacks.

During the event this week, in Vidder's booth number 605, the company's security team will demonstrate the key benefits of PrecisionAccess:

  • Eliminate credential theft through the use of multifactor authentication to first verify the trust of the user and device, then enable trusted users on trusted devices to connect to the authorized server(s);
  • Stop malware propagation by limiting application access from compromised devices;
  • Restrict access to only authorized apps, not the entire network, using application-layer tunnels over existing network infrastructure.

Beyond the conference, Vidder hosts a weekly live online demo. Reserve a seat.

About Gartner Catalyst Conference
The Catalyst Conference is geared toward technical professionals who develop and execute on a strategy to leverage mobile, cloud, and big data to drive operational effectiveness and competitive advantage in their organizations. At Catalyst, attendees get the technical advice they need to build the right architecture and infrastructure to advance CIO priorities and elevate the organizations' digital capabilities. Technically focused and committed to pragmatic, how-to content, Gartner Catalyst Conference is designed to leave attendees with a blueprint for project planning and execution. Additional information is available at http://www.gartner.com/events/na/catalyst.

About Vidder
Vidder reinvents connectivity with PrecisionAccess™, the industry's first application-specific, context-aware access control solution that gives individual users -- from internal employees to third-parties who bear the highest risk -- visibility and access to applications only after the trust of these users and their devices is verified. PrecisionAccess' context-aware access, based on user, device, and software attributes, combined with built-in multifactor authentication and end-to-end encryption, defeats credential theft, server exploitation, connection hijacking, and attacks from compromised devices. PrecisionAccess is the most widely deployed solution based on the Software-Defined Perimeter (SDP) protocol promoted by the Cloud Security Alliance (CSA). The company's headquarters are in Campbell, Calif. For more information, visit www.vidder.com.

Vidder is a registered trademark of Vidder in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.

Contact Information