This month, Information Security recognizes the best security technology with its Readers' Choice awards.
Security products in 16 categories, including emerging technologies, were voted on by Information Security readers and the results are in. Once you've read what products your peers think are best and what their pain points are in each category, click through to SearchSecurity.com's links on working with security vendors.
These additional resources help you compose
an RFP, manage
when your vendor is acquired, and describe what channel
issues organizations struggle with.
ALSO THIS MONTH:
Managing today, planning tomorrow
Also in April, the SANS Institute's WhatWorks program drills down with security professionals on some of the investments in new and existing technologies that organizations are planning in the coming year. SearchSecurity.com keeps ahead of market trends and pools its coverage providing an excellent resource for security professionals.
>> Get more security industry market trends, predictions and forecasts.
PING with Shelley Barnes
In this exclusive interview with Information Security magazine, Shelley Barnes, vice president of technology and process at Arizona Tile, says she does not have a CSO to rely on. For that reason, Barnes has to make the most of the SMB's resources to handle security.
>> Read the interview with Shelley Barnes
|March 2007||February 2007||January 2007||December 2006||November 2006||October 2006|
|September 2006||August 2006||July 2006||June 2006||May 2006||April 2006|
|March 2006||February 2006||January 2006||December 2005||November 2005||October 2005|
This was first published in April 2007