Security Buying Guides - Article Archives - Page 2

Everything You Need to Know about NGFW

March 23, 2016 |

Here is solid advice for evaluating a next-generation firewall (NGFW), from features to consider to questions to ask.

READ MORE

What Are Your Container Security Options?

February 03, 2016 |

As with any nascent technology, container security is a concern. Three initiatives can help organizations boost container security.

READ MORE

Are There Open Source Vulnerability Assessment Options?

January 26, 2016 |

Though some early open source vulnerability assessment tools went the proprietary route, you do still have open source options.

READ MORE

10 Open Source Vulnerability Assessment Tools

January 20, 2016 |

Open source vulnerability assessment tools are a great option for organizations that want to save money or customize tools to suit their needs.

READ MORE

Open Source Software's Role in Breach Prevention and Detection

December 29, 2015 |

While proprietary vendors dominate the intrusion prevention and detection market, open source software plays a key role.

READ MORE

5 Big Improvements in Wireshark

December 23, 2015 |

It's now even easier to use the open source Wireshark tool to analyze network traffic at the packet level, thanks to a recent upgrade.

READ MORE

10 Open Source Security Breach Prevention and Detection Tools

December 18, 2015 |

The breach prevention and detection market is dominated by names like Symantec, McAfee and Juniper, but open source tools are also popular.

READ MORE

5 Key New Features in Nmap Network Security Tool

December 15, 2015 |

The open source network security tool's latest version offers significant improvements.

READ MORE

Advanced Threat Detection Buying Guide

September 03, 2015 |

Advanced threat detection offers a more proactive approach to enterprise security than traditional perimeter defenses.

READ MORE

Apple vs. Android: Mobile Security Pros and Cons

August 31, 2015 |

Both Apple's iOS and Android have security strengths and weaknesses, experts say.

READ MORE

10 Free or Cheap WiFi Security Testing Tools

August 26, 2015 |

Do not kid yourselves, security professionals. You need more than one WiFi security testing tool. Here are 10 free or inexpensive options.

READ MORE

Catching Enterprise Mobility Management Wave

May 22, 2015 |

While mobile device management was once all the rage, enterprises are moving to enterprise mobility management as their mobile strategies become more essential to their business.

READ MORE

Hadoop Security Still Evolving

March 26, 2015 |

While organizations' use of Hadoop has become more sophisticated, associated security practices have not kept pace.

READ MORE

Network Virtualization Yields New Approaches to Security

October 29, 2014 |

Microsoft and VMware both have extensible network virtualization offerings that make it possible for third-party vendors to integrate their security tools.

READ MORE

Whitelisting: Why and How It Works

September 24, 2014 |

Bad guys continually tweak malware, making it tough for traditional antivirus products to keep up. Whitelisting can help, by allowing only pre-approved applications.

READ MORE

6 Criteria for Evaluating Secure File Transfer Apps

August 29, 2014 |

Secure file transfer applications are becoming the preferred mode for securely exchanging data. What should you consider when buying SFT apps?

READ MORE

How to Minimize Enterprise File Sharing Risks

July 31, 2014 |

File sharing and sync (FSS) services like Dropbox can expose sensitive corporate data. Luckily, there are enterprise-grade FSS alternatives.

READ MORE

Are TrueCrypt Users Screwed?

July 16, 2014 |

When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives.

READ MORE

Identity and Access Management's Role in Secure Cloud Collaboration

July 01, 2014 |

As enterprises demand more secure cloud-based externalization, companies like Exostar are answering the call with IAM solutions.

READ MORE

Security Compliance Primer and Buying Guide

June 27, 2014 |

Security compliance is a complex and sometimes onerous task. Here we offer advice on best practices that can help, along with a guide to available tools.

READ MORE