Security Spending Research
-
E-Book: Technical Guide on Network Security Monitoring
Sponsored by: TechTarget SecuritySearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit.
-
Protecting the Dynamic Datacenter
Sponsored by: Trend MicroTrend Micro server and application protection addresses the challenging operational security and compliance needs of today’s dynamic datacenter. We provide comprehensive protection, greater operational efficiency, superior platform support, and tighter integration with existing investments. Read this paper to learn more!
-
Information Security Magazine - February 2010: Under Control
Sponsored by: Information Security MagazineFeature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more.
-
CORE IMPACT Pro V10
Sponsored by: Core Security TechnologiesPlease join Core Security for a live demonstration of CORE IMPACT Pro, the most comprehensive product for performing security assurance testing on an organization’s network systems, endpoint systems, end users and web applications.
-
Buyer’s Guide to Antimalware
Sponsored by: AVG Technologies USA, Inc.Companies face complicated buying decisions when it comes to buying host-based antimalware. Should you purchase a protection suite? What should you include in that all-in-one package? Read this guide for helpful information about purchasing antimalware products.
-
Practical Advantages of Fireware® XTM for Hands-On IT Administrators
Sponsored by: WatchGuard Technologies, Inc.Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.
-
NERC: What You Need to Know
Sponsored by: TechTarget SecurityThe North American Electric Reliability Corporation's regulations aim to protect the nation's vulnerable critical infrastructure. Read this E-Book to find out what responsible entities need to do to comply with the NERC.
-
Information Security Magazine - October 2009: Security 7 Awards
Sponsored by: Information Security MagazineThe big news in this month's issue is the announcement of the winners of the fifth annual Security 7 Award. Other featured articles present tips for preventing future incidents and also explain how SOX compliance is hitting smaller public companies harder than the big guys. Read on for these great articles and more.
-
Presentation Transcript: Beyond the PCI "Check list" -- A Path to Achieve Higher Levels of IT Security and Compliance
Sponsored by: Skybox SecurityPCI DSS is an opportunity for security professionals to leverage compliance initiatives to improve security and risk management. This presentation transcript illustrates how organizations must go beyond “checklist” compliance to improve security and IT efficiency -- through automation, prioritization, and focused attention on the critical issues.
-
The New Face of Intrusion Prevention
Sponsored by: Check Point Software Technologies Ltd.Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price. For more details, check out this paper, which highlights the numerous benefits of Check Point intrusion prevention protection solutions.
-
Information Security Magazine - September 2009: Readers’ Choice Awards
Sponsored by: Information Security MagazineThis issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
-
The Critical Security Controls – Moving Beyond the Checklist Mentality
Sponsored by: LumensionThe "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization.
-
Endpoint Security Value Calculator
Sponsored by: LumensionThis flexible, easy to use tool enables you to rapidly evaluate a wide range of scenarios and gather compelling proof of the dramatic impact that Lumension Security’s effective application and device whitelisting can have on your bottom line.
-
Lowering Risk by Applying Consistent Security Across All of Your Locations
Sponsored by: Juniper Networks, Inc.Security in today's IT infrastructure presents challenges to all sorts of organizations, but especially to distributed enterprises. Branch offices and remote locations are often less secure than the headquarters or main data center location. Watch this webcast to learn how and why you should ensure that every location is properly secured.
-
Information Security Magazine, July 09: Controlling Privileged Accounts
Sponsored by: Information Security MagazineThis month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.
-
Presentation Transcript: The Economics of Endpoint Security
Sponsored by: Sophos UKCheck out this presentation transcript to learn about a great endpoint security solution while balancing budgetary requirements.
-
Presentation Transcript: Endpoint security fundamentals
Sponsored by: SophosThis presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.
-
Understanding the Total Cost of Ownership for Endpoint Security Solutions
Sponsored by: SophosWhen moving to an endpoint security solution, should you stick with your current vendor or shop around? To shed some light on this issue, Sophos commissioned an independent research study to quantify all of the cost areas involved in migrating to an endpoint security product and managing that solution afterward to create a TCO comparison.
-
Information Security Magazine, May 2009: Automating Compliance
Sponsored by: Information Security MagazineThis month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
-
Governance, Risk, Compliance: Policy Management - Methods and tools
Sponsored by: TechTarget SecurityThis E-Book from SearchSecurity.com and SearchCompliance.com delves into issues surrounding governance, risk, and compliance from a policy management standpoint. It can help you navigate choppy compliance waters and find the right fit for your business.
-
Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee
Sponsored by: Information Security MagazineThis special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.
-
Information Security Magazine: March 2009 - Sky-High Risk?
Sponsored by: Information Security MagazineThis month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more.
-
E-Book: Log Management for Compliance
Sponsored by: TechTarget SecurityLog management has become an increasingly important part of managing information technology across the enterprise. This E-Book will look at how compliance has changed IT's requirements for log management tools in general, and how the tools continue to evolve to meet security needs as well.
-
Laws, regulations and compliance: Top tips for keeping your data under your Control
Sponsored by: Sophos UKThe challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
-
3 Key Components of a Risk-Based Security Plan
Sponsored by: Foundstone, Inc.This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.