Security Buying Guides - Article Archives - Page 5

SAML Promises to Boost Cloud Security

March 10, 2014 |

IT administrators are struggling to deal with the implications that cloud services have on security. SAML and related technologies such as single sign-on can help.

READ MORE

Zscaler Shifts to DNS to Protect Enterprises

February 21, 2014 |

Sometimes a full Web proxy is too much, and all you need is DNS re-direction to provide security.

READ MORE

Buying Guide: Big Data Apps for Security

February 03, 2014 |

A growing number of vendors are offering Big Data-driven security solutions that can help prevent data breaches before they happen. We look at four such solutions.

READ MORE

Review: GreenSQL Database Security

January 30, 2014 |

Business databases are the holy grail for hackers. Matt Sarrel reviews some products from GreenSQL that help protect databases.

READ MORE

Securing Apps Starts with Code: Sonatype

January 28, 2014 |

Sonatype's updated component lifecycle management solution takes aim at the risk of vulnerable open-source software components.

READ MORE

Virtual Appliances Boost Network Security

December 26, 2013 |

Unified security appliances help enterprises manage multiple security services, but keeping such devices up to date while incorporating scale is a challenge. Can virtualization help?

READ MORE

13 Hot Security Startups to Watch

November 13, 2013 |

There is always a batch of enterprise security startups with clever technologies poised to be purchased by Infosec giants. Here are 13 interesting security startups to keep an eye on.

READ MORE

Apple iOS7 Management vs. MDM

October 29, 2013 |

Though Apple has added MDM-like features to iOS7, many enterprises will find they still need third-party mobile device management solutions.

READ MORE

Review: HyTrust Appliance 3.5

October 15, 2013 |

Reviewer Matt Sarrel finds HyTrust Appliance 3.5 an easy-to-use, hardware-based solution for mitigating security risks associated with virtualization.

READ MORE

Review: Avira Free Android Security

September 17, 2013 |

Reviewer Matt Sarrel says Avira Free Android Security shows that simple device security does not require an expensive product only enterprises can afford.

READ MORE

How Big Data Analytics Can Boost Network Security

August 26, 2013 |

While Big Data analytics will probably never replace existing network security measures like IPS and firewalls, it can help reveal breaches that might otherwise have gone undetected.

READ MORE

BYOD Fuels NAC Comeback

April 11, 2013 |

The BYOD boom is leading to a revival of network access control (NAC) technology, as more companies employ NAC to secure their networks.

READ MORE

Review: Malwarebytes Enterprise Edition

October 24, 2012 |

Malwarebytes Enterprise Edition detects and removes malware, removing all traces after a system has been infected, a capability that is likely to be especially important to small businesses.

READ MORE

Review: Microsoft System Center 2012 Endpoint Protection

September 25, 2012 |

While Microsoft System Center 2012 Endpoint Protection offers deployment and management convenience, its anti-malware engine is weak in comparison to competitors.

READ MORE

Review: McAfee Deep Defender

August 23, 2012 |

Rootkits are in the crosshairs of this innovative anti-malware technology that runs directly on the processor, underneath the operating system.

READ MORE

Biometric Authentication: How It Works

August 18, 2012 |

Passwords are potentially the weakest link in your organization's information security systems. Biometric authentication technologies promise a more secure alternative.

READ MORE

Review: Total Defense Anti-Virus r12

August 13, 2012 |

CA Technologies spinoff Total Defense offers robust management capabilities in its AV-only product. But the software lags a bit behind the competition in anti-malware sophistication.

READ MORE

Review: Avast Endpoint Protection Suite

August 09, 2012 |

Multiple levels of anti-malware protection combined with a community-based threat detection network and a centralized management server make Avast a compelling alternative for business-level virus protection.

READ MORE

Top 20 Android Security Apps

June 28, 2012 |

Protect your Android device against malicious apps, mobile malware, and theft with these essential security solutions.

READ MORE

Top 3 Insecure Password Management Practices

June 22, 2012 |

Even good admins sometimes do bad things with passwords. Spotting these risky IT practices in your organization is a first step to a more secure password management strategy.

READ MORE