![]() |
|
This month, Information Security recognizes the best security technology with
its Readers' Choice awards.
Security products in 16 categories, including emerging technologies, were voted on by Information
Security readers and the results are in. Once you've read what products your peers think are best
and what their pain points are in each category, click through to SearchSecurity.com's links on
working with security vendors.
|
||||
These additional resources help you compose
an RFP, manage
when your vendor is acquired, and describe what channel
issues organizations struggle with.
ALSO THIS MONTH:
Managing today, planning tomorrow
Also in April, the SANS Institute's WhatWorks program drills down with security professionals on
some of the investments in new and existing technologies that organizations are planning in the
coming year. SearchSecurity.com keeps ahead of market trends and pools its coverage providing an
excellent resource for security professionals.
>> Get more security industry market trends,
predictions and forecasts.
PING with Shelley Barnes
In this exclusive interview with Information Security magazine, Shelley Barnes, vice
president of technology and process at Arizona Tile, says she does not have a CSO to rely on. For
that reason, Barnes has to make the most of the SMB's resources to handle security.
>> Read the interview with Shelley
Barnes
|
||||||
This was first published in April 2007
Security Management Strategies for the CIO



















Join the conversationComment
Share
Comments
Results
Contribute to the conversation