dcsimg

Network Security - Article Archives - Page 1

Top Vulnerability Scanning Tools

July 30, 2019 |

Staying on top of vulnerabilities is a critical IT security practice. Here are a dozen vulnerability scanning tools that can help.

READ MORE

8 Top CASB Vendors

July 10, 2019 |

A cloud access security broker (CASB) can help organizations get a handle on employee use of cloud services – both official and unsanctioned. We review 8 top CASB products.

READ MORE

Gartner's Top IT Security Projects for 2019

June 21, 2019 |

Which IT security projects deliver the most value and protection from risk? Gartner analysts offer their views.

READ MORE

20 Top UEBA Vendors

June 04, 2019 |

User and entity behavior analytics uses machine learning to protect against insider threats and external attacks. We review the top UEBA products.

READ MORE

How to Comply with GDPR

May 10, 2019 |

In our comprehensive guide to GDPR compliance, we outline the technologies and strategies that can help you comply with the most significant data privacy law in years.

READ MORE

9 Top Network Access Control (NAC) Solutions

May 07, 2019 |

Network access control is critical for controlling the security of devices that attach to your network. Here are nine NAC solutions to consider.

READ MORE

FortiNAC: Network Access Product Overview and Insight

May 07, 2019 |

Fortinet's network access control (NAC) solution supports 30,000 ports per server and offers real-time automated threat response.

READ MORE

How to Conduct a Vulnerability Assessment: 5 Steps toward Better Cybersecurity

April 17, 2019 |

A vulnerability assessment is a core requirement for IT security. We outline the benefits and steps for keeping your network and data safe from cybercriminals.

READ MORE

How to Manage a Security Operations Center

April 10, 2019 |

We define security operations centers (SOCs), including how they should be designed, run and staffed, and the technologies needed to make them work.

READ MORE

Vulnerability Scanning: What It Is and How to Do It Right

April 05, 2019 |

Everything you need to know about vulnerability scanning: What it is, how it works, and how to use it as part of a vulnerability management program.

READ MORE

DevSecOps: How to Build Security into Apps

March 13, 2019 |

We define DevSecOps, how it relates to DevOps, and how security can be built into the development process with minimal disruption.

READ MORE

Top 10 Takeaways from RSA Conference 2019

March 11, 2019 |

After five days of sessions, events and demos, here are some key cybersecurity themes that emerged at RSA Conference 2019.

READ MORE

10 Vendors Making Product Announcements at RSA Conference 2019

March 06, 2019 |

Here are 10 vendors with interesting product announcements at the 2019 RSA Conference, spanning email security, container security, threat detection, SIEM, EDR and cloud security.

READ MORE

Top 10 Sessions to Catch at RSA Conference 2019

March 04, 2019 |

Here are our picks for the top RSA conference sessions that could help you improve cybersecurity within your own organization.

READ MORE

2019 RSA Conference Preview: An Insider's Guide to What's Hot

March 02, 2019 |

Wondering what to see at the 2019 RSA Conference? Our preview of the world's largest cybersecurity conference will point you in the right direction.

READ MORE

10 Vendors Set to Innovate at RSA Conference 2019

March 01, 2019 |

Hundreds of vendors exhibit at the annual cyber security gathering, but only 10 are finalists in the 2019 Innovation sandbox contest. Find out who they are.

READ MORE

What is a Secure Web Gateway - And What Can One Do for You?

February 13, 2019 |

We define secure web gateway, including how web gateways compare to other security tools such as firewalls and CASBs, and where this important IT security market is headed.

READ MORE

Cybersecurity Simulation Tools Don't Inspire Confidence: eSecurity Planet Survey

February 08, 2019 |

Organizations are most confident in network-level security tools, while newer technologies have been met with mixed acceptance.

READ MORE

Over Half of Companies Are Upping Spending on IT Security: eSecurity Planet Survey

February 06, 2019 |

Data breaches and new privacy regulations are prompting increased spending on IT security products and staff.

READ MORE

9 Top Web Application Firewall (WAF) Vendors

January 25, 2019 |

We review nine of the top web application firewall (WAF) products to help you protect web-facing applications.

READ MORE