Buying Guides 

6 Criteria for Evaluating Secure File Transfer Apps

Secure file transfer applications are becoming the preferred mode for securely exchanging data. What should you consider when buying SFT apps?

Mobile Device Management: The Buying Basics

Mobile device management (MDM) can help enterprises minimize security risks associated with BYOD. Here is what you need to know if you plan to purchase an MDM system.

How to Minimize Enterprise File Sharing Risks

File sharing and sync (FSS) services like Dropbox can expose sensitive corporate data. Luckily, there are enterprise-grade FSS alternatives.

Are TrueCrypt Users Screwed?

When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives.

Identity and Access Management's Role in Secure Cloud Collaboration

As enterprises demand more secure cloud-based externalization, companies like Exostar are answering the call with IAM solutions.

Security Compliance Primer and Buying Guide

Security compliance is a complex and sometimes onerous task. Here we offer advice on best practices that can help, along with a guide to available tools.

Startup Spotlight: FortyCloud's Multi-layered Cloud Security

Israeli startup FortyCloud recently opened a U.S. office to grow its business, which focuses on helping companies secure data in the public cloud.

Microsoft Amps up Azure's Security Features

Among the newest security features for Microsoft's Azure is the ability to authenticate users to software-as-a-service apps via Azure Active Directory.

Managed Security Services' Role in Cloud Security

A managed security service provider (MSSP) is a good option for cloud security, say experts.

Review: Marble Security's Mobile Security Management

The admin capabilities of a mobile security management solution from Marble Security impressed reviewer Matt Sarrel.

Mobile Device Management ROI Calculator

Trying to make a case for purchasing a mobile device management solution? Our MDM ROI calculator can help.

How to Buy Static Analysis Tools

Static analysis tools can help software developers produce more secure applications. Here is what you need to know when evaluating such tools for your organization.

Review: Zscaler Secure Cloud Gateway

Reviewer Matt Sarrel appreciates the technical support resources available for the Zscaler Secure Cloud Gateway.

Packets' Place in Network Security

Enterprises have long relied on network monitoring tools to troubleshoot connectivity problems. The same tools have evolved into an important way to ensure networks are secure.

3 Tools for Enforcing Password Policies

User passwords are often a weak link in the corporate security chain. How can security pros make users adhere to strong password policies?

Review: KnowBe4 Compliance Manager

While KnowBe4 Compliance Manager does not makes tasks associated with regulatory compliance enjoyable, reviewer Matt Sarrel finds the software does make them less onerous.

Top Apps for Boosting Mobile Security

Carriers of both iOS and Android mobile devices can improve their mobile security with apps that offer help with password management, encryption and other security best practices.

SAML Promises to Boost Cloud Security

IT administrators are struggling to deal with the implications that cloud services have on security. SAML and related technologies such as single sign-on can help.

Zscaler Shifts to DNS to Protect Enterprises

Sometimes a full Web proxy is too much, and all you need is DNS re-direction to provide security.

Buying Guide: Big Data Apps for Security

A growing number of vendors are offering Big Data-driven security solutions that can help prevent data breaches before they happen. We look at four such solutions.

Review: GreenSQL Database Security

Business databases are the holy grail for hackers. Matt Sarrel reviews some products from GreenSQL that help protect databases.

Securing Apps Starts with Code: Sonatype

Sonatype's updated component lifecycle management solution takes aim at the risk of vulnerable open-source software components.

Virtual Appliances Boost Network Security

Unified security appliances help enterprises manage multiple security services, but keeping such devices up to date while incorporating scale is a challenge. Can virtualization help?

13 Hot Security Startups to Watch

There is always a batch of enterprise security startups with clever technologies poised to be purchased by Infosec giants. Here are 13 interesting security startups to keep an eye on.

Apple iOS7 Management vs. MDM

Though Apple has added MDM-like features to iOS7, many enterprises will find they still need third-party mobile device management solutions.