Security News & Reviews

More Security News

1088_ProductComparison

Splunk vs. LogRhythm: SIEM Head-to-Head

|
PRODUCT COMPARISON: Both LogRhythm and Splunk have a great deal to offer. Both have loyal support from customers and good-to-excellent reviews from industry analysts. But admins should look closely at the finer points each solution offers to see which is better-suited for your company.
eweek.logo.DataPoints-UPDATE

Seven Considerations for Doing Secure Cloud Migration

|
eWEEK DATA POINTS: Lior Cohen, Senior Director of Products and Solutions, Cloud Security, at Fortinet, offers seven steps every organization should consider when planning a cloud adoption or cloud migration strategy.
Cisco.Live.sign

How Cisco Systems Has Evolved into a True IT Provider

|
TREND ANALYSIS: The 2019 edition of Cisco Live underscored that the transformation of the company is indeed complete.
Product.Comparison.standing

Splunk vs. IBM QRadar: SIEM Head-to-Head

|
eWEEK PRODUCT COMPARISON: IBM and Splunk deliver two of the best SIEM solutions in the business, but each product offers distinct benefits to potential buyers.
IO-Tahoe

How Io-Tahoe Protects Privacy Using Real-Time Data Discovery

|
PRODUCT ANALYSIS: Data in motion is quickly becoming the target of cyber-criminals seeking to steal private data. Protecting those data streams takes discovery, analytics and intelligence.
storage vendors

Top Storage Companies

|
New-gen data storage, whether on premises or in the cloud, is all about systems providing the correct information for employees on demand while at the same time maintaining data privacy for users at all levels. These requirements are the same for any size enterprise.
1088_MobileDeviceMngSoftware

Top Mobile Device Management Companies

|
BYOD (bring your own device) to work is fast on the way out. There are too many security pitfalls and risks for an enterprise to endure. It's better to invest in a mobile device management system that can handle all devices a company hands out to its employees plus those random rebels who keep...
EU.GDPR.map

GDPR One-Year Anniversary: Data Privacy Still Needs Help

|
TREND ANALYSIS: One year out from the GDPR's enforcement date, research shows personal data privacy is still a hot-button issue, and distrust continues to run high.
CCPA.2020

Law Firm Releases New Data Privacy App for CCPA

|
NEWS ANALYSIS: SixFifty Privacy, provided by Palo Alto law firm Wilson Sonsini, is all about automating processes to comply directly with the new state regulation.
1088_RemoteAccessSoftware

Top Remote Access Software Vendors

|
In selecting a remote access software solution for an enterprise, managers need to study their use cases carefully, because there are a lot of excellent packages available from which to choose.
Consensus.2019

Blockchain, Cryptocurrency’s Future Debated at Consensus Conference

|
TREND ANALYSIS: There is a lot of development going on in blockchain, cryptocurrency, coins and security tokens and distributed ledgers, as vendors look to improve on basic plumbing of blockchain frameworks like Ethereum and Hyperledger or make their own.
Oracle.Screven.2

Security Takeaways from Oracle Media Day Event

|
TREND ANALYSIS: Businesses now realize that cloud vendors provide security functionality that can help defend them from attacks perpetuated by large hacking organizations.
Extreme Networks

Extreme Networks’ Approach to Autonomous Networking Is Elemental

|
PRODUCT ANALYSIS: Extreme lets customers mix and match to evolve to an autonomous network at their own pace.

Enterprise Tech Videos