Buying Guides 

Catching Enterprise Mobility Management Wave

While mobile device management was once all the rage, enterprises are moving to enterprise mobility management as their mobile strategies become more essential to their business.

Hadoop Security Still Evolving

While organizations' use of Hadoop has become more sophisticated, associated security practices have not kept pace.

Network Virtualization Yields New Approaches to Security

Microsoft and VMware both have extensible network virtualization offerings that make it possible for third-party vendors to integrate their security tools.

Mobile Device Management Not Just for Big Companies

While mobile device management is often found at companies with big workforces, it can also help small companies with their mobile initiatives.

Whitelisting: Why and How It Works

Bad guys continually tweak malware, making it tough for traditional antivirus products to keep up. Whitelisting can help, by allowing only pre-approved applications.

For Bank, Mobile Device Management Offers Benefits – Some Unexpected

Massachusetts' Needham Bank enjoys a bevy of benefits thanks to its mobile device management system.

6 Criteria for Evaluating Secure File Transfer Apps

Secure file transfer applications are becoming the preferred mode for securely exchanging data. What should you consider when buying SFT apps?

Mobile Device Management: The Buying Basics

Mobile device management (MDM) can help enterprises minimize security risks associated with BYOD. Here is what you need to know if you plan to purchase an MDM system.

How to Minimize Enterprise File Sharing Risks

File sharing and sync (FSS) services like Dropbox can expose sensitive corporate data. Luckily, there are enterprise-grade FSS alternatives.

Are TrueCrypt Users Screwed?

When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives.

Identity and Access Management's Role in Secure Cloud Collaboration

As enterprises demand more secure cloud-based externalization, companies like Exostar are answering the call with IAM solutions.

Security Compliance Primer and Buying Guide

Security compliance is a complex and sometimes onerous task. Here we offer advice on best practices that can help, along with a guide to available tools.

Startup Spotlight: FortyCloud's Multi-layered Cloud Security

Israeli startup FortyCloud recently opened a U.S. office to grow its business, which focuses on helping companies secure data in the public cloud.

Microsoft Amps up Azure's Security Features

Among the newest security features for Microsoft's Azure is the ability to authenticate users to software-as-a-service apps via Azure Active Directory.