Security Buying Guides - Article Archives - Page 3

10 Free or Cheap WiFi Security Testing Tools

August 26, 2015 |

Do not kid yourselves, security professionals. You need more than one WiFi security testing tool. Here are 10 free or inexpensive options.

READ MORE

Catching Enterprise Mobility Management Wave

May 22, 2015 |

While mobile device management was once all the rage, enterprises are moving to enterprise mobility management as their mobile strategies become more essential to their business.

READ MORE

Hadoop Security Still Evolving

March 26, 2015 |

While organizations' use of Hadoop has become more sophisticated, associated security practices have not kept pace.

READ MORE

Network Virtualization Yields New Approaches to Security

October 29, 2014 |

Microsoft and VMware both have extensible network virtualization offerings that make it possible for third-party vendors to integrate their security tools.

READ MORE

Whitelisting: Why and How It Works

September 24, 2014 |

Bad guys continually tweak malware, making it tough for traditional antivirus products to keep up. Whitelisting can help, by allowing only pre-approved applications.

READ MORE

6 Criteria for Evaluating Secure File Transfer Apps

August 29, 2014 |

Secure file transfer applications are becoming the preferred mode for securely exchanging data. What should you consider when buying SFT apps?

READ MORE

How to Minimize Enterprise File Sharing Risks

July 31, 2014 |

File sharing and sync (FSS) services like Dropbox can expose sensitive corporate data. Luckily, there are enterprise-grade FSS alternatives.

READ MORE

Are TrueCrypt Users Screwed?

July 16, 2014 |

When developers of the TrueCrypt disk encryption program warned the open source project was insecure, it left users hanging. Fortunately, there are TrueCrypt alternatives.

READ MORE

Identity and Access Management's Role in Secure Cloud Collaboration

July 01, 2014 |

As enterprises demand more secure cloud-based externalization, companies like Exostar are answering the call with IAM solutions.

READ MORE

Security Compliance Primer and Buying Guide

June 27, 2014 |

Security compliance is a complex and sometimes onerous task. Here we offer advice on best practices that can help, along with a guide to available tools.

READ MORE

Startup Spotlight: FortyCloud's Multi-layered Cloud Security

June 24, 2014 |

Israeli startup FortyCloud recently opened a U.S. office to grow its business, which focuses on helping companies secure data in the public cloud.

READ MORE

Microsoft Amps up Azure's Security Features

June 17, 2014 |

Among the newest security features for Microsoft's Azure is the ability to authenticate users to software-as-a-service apps via Azure Active Directory.

READ MORE

Review: Marble Security's Mobile Security Management

May 20, 2014 |

The admin capabilities of a mobile security management solution from Marble Security impressed reviewer Matt Sarrel.

READ MORE

Mobile Device Management ROI Calculator

May 06, 2014 |

Trying to make a case for purchasing a mobile device management solution? Our MDM ROI calculator can help.

READ MORE

How to Buy Static Analysis Tools

May 02, 2014 |

Static analysis tools can help software developers produce more secure applications. Here is what you need to know when evaluating such tools for your organization.

READ MORE

Review: Zscaler Secure Cloud Gateway

April 21, 2014 |

Reviewer Matt Sarrel appreciates the technical support resources available for the Zscaler Secure Cloud Gateway.

READ MORE

Packets' Place in Network Security

April 16, 2014 |

Enterprises have long relied on network monitoring tools to troubleshoot connectivity problems. The same tools have evolved into an important way to ensure networks are secure.

READ MORE

3 Tools for Enforcing Password Policies

March 27, 2014 |

User passwords are often a weak link in the corporate security chain. How can security pros make users adhere to strong password policies?

READ MORE

Review: KnowBe4 Compliance Manager

March 19, 2014 |

While KnowBe4 Compliance Manager does not makes tasks associated with regulatory compliance enjoyable, reviewer Matt Sarrel finds the software does make them less onerous.

READ MORE

Top Apps for Boosting Mobile Security

March 17, 2014 |

Carriers of both iOS and Android mobile devices can improve their mobile security with apps that offer help with password management, encryption and other security best practices.

READ MORE