All Research Sponsored By:Information Security Magazine
-
Information Security Magazine, July 09: Controlling Privileged Accounts
This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
-
Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
-
eGuide: Essential Guide to Identity & Access Management
This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.
-
Information Security Magazine, May 2009: Automating Compliance
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
-
Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee
This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.
-
Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be?
This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.
-
Information Security Magazine: March 2009 - Sky-High Risk?
This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more.
-
Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession
Check out this eBook and get expert advice that can help your company successfully improve its threat management posture.
-
Essential Guide to Threat Management
Check out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.
-
eBook: Strategies for Securing Virtual Machines
Check out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines.
-
Expert eBook: Encryption: Properly Securing Your Valuable Data
Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
-
Readers' Choice Awards
Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.
-
Network Firewalls
Cisco has been in business for more than 20 years and is emerging as a security powerhouse to be reckoned with, especially as security merges more with network operations in the enterprise.
-
Moving on Up
How do you rise in the security ranks? Don't speak geek; use the language of business.
-
Products of the Year 2006
As spyware becomes increasingly prevalent, antispyware tools are becoming more a necessity than a luxury.