dcsimg

Security Buying Guides - Article Archives - Page 1

8 Top CASB Vendors

July 10, 2019 |

A cloud access security broker (CASB) can help organizations get a handle on employee use of cloud services – both official and unsanctioned. We review 8 top CASB products.

READ MORE

How to Control API Security Risks

November 15, 2018 |

Plugging critical vulnerabilities and using API security products are the best ways to manage API security risks.

READ MORE

Top SIEM Products

November 06, 2018 |

We review and compare 12 top SIEM products that can help you manage your overall IT security from a single tool, plus 8 additional honorable mentions.

READ MORE

Is a UTM Appliance the Right Security Solution for Your Business?

July 12, 2018 |

A unified threat management device can make security much easier and cheaper for SMBs. But picking the right solution is a complicated task. We take you through all the considerations.

READ MORE

10 Top Patch Management Solutions

January 19, 2018 |

Patch management might be the single most important security tool. We review 10 of the top patch management solutions.

READ MORE

Data Loss Prevention (DLP): Keeping Sensitive Data Safe from Leaks

April 10, 2017 |

The cost of a data leak is getting so high that Data Loss Prevention technology is looking like a bargain. Here's everything you need to know about DLP technology and products.

READ MORE

Mobile Device Management (MDM): Controlling Network Access for Mobile Devices

April 05, 2017 |

Learn what Mobile Device Management (MDM) is all about and why it's being supplanted by Enterprise Mobility Management (EMM).

READ MORE

Managed Services: A Security Problem and Solution

April 03, 2017 |

Almost any IT function can be purchased as a service, even security. We look at security issues posed by managed services, and the shortcut to comprehensive IT security that managed security services providers offer.

READ MORE

Cyber Insurance: Insuring Your Data When Protecting It Fails

March 31, 2017 |

Cyber insurance could be the difference between staying in business or shutting down for good because of a data breach.

READ MORE

Web Application Firewalls: Protecting Web Applications from Attacks

March 29, 2017 |

Web application firewalls are a critical security layer between web traffic and your application server. Learn how WAF technology stops attacks and who the top vendors are.

READ MORE

CASB 101: How Cloud Access Security Brokers Can Make Your Data More Secure

March 28, 2017 |

More companies are moving sensitive data to the cloud, increasing the need to secure that data. One popular approach is called a cloud access security broker, or CASB. Find out more about CASB technology and products here.

READ MORE

Sophos Intercept X Brings an End to Ransomware

March 27, 2017 |

Intercept X from Sophos brings a bandolier of silver bullets to the ransomware fight, leaving cybercriminals scattering for cover.

READ MORE

TrackVia Combines Low-Code Apps with Security Best Practices

March 22, 2017 |

The drive to digital transformation encourages use of low-code application development platforms, but these tools often overlook security, leaving enterprises exposed to unknown threats. TrackVia injects security back into the application development equation using a low-code platform that speeds development yet institutes protection.

READ MORE

NetMotion Leverages Software-Defined Trend to Secure Mobile Devices

February 07, 2017 |

NetMotion Mobility combines provisioning, governance and security into a package any network admin could love.

READ MORE

Single Sign-On Buying Guide

December 21, 2016 |

Deploying a single sign-on system can improve productivity and lead to better password hygiene, but it also carries some risks.

READ MORE

3 Noteworthy Windows Server 2016 Security Features

November 02, 2016 |

Enhanced OS security is often little more than marketing hype, but Microsoft's new Windows Server 2016 features really move the security needle.

READ MORE

Guide to Getting the Right Single Sign-on Solution

September 29, 2016 |

Single sign-on solutions help users cope with password pressures by enabling a single authentication event to offer access to multiple applications.

READ MORE

Selecting a Threat Risk Model for Your Organization, Part Two

September 27, 2016 |

In the second of a two-part series on threat risk models, we look at Trike, MIL-STD-882E and OCTAVE.

READ MORE

7 Full Disk Encryption Solutions to Check out

May 17, 2016 |

Full disk encryption software offers valuable protection for data on laptops. These seven FDE solutions are worthy of consideration.

READ MORE

7 Hot Security Analytics Startups

April 07, 2016 |

Security analytics startups use Big Data, machine learning, predictive analytics and data lakes to improve cybersecurity.

READ MORE