Analysis: Facing identity crisis, Symantec needs strategic focus

Security Industry Market Trends, Predictions and Forecasts

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Spotlight on top security trends of 2011 and Security 7 award winners

    2011 has been an overwhelming year for security; complete with security breaches, subsequent attacks and an abundance of negative attention. This month’s edition of Information Security Magazine, brought to you by SearchSecurity.com, is looking past ... 

  • 2011 Security 7 Award winners

    Information Security magazine announces the winners of the seventh annual Security 7 Awards. 

  • Advanced Cyber Security Center for IT security launches in Mass.

    Massachusetts’ Advanced Cyber Security Center (ACSC) was launched Tuesday to develop future cybersecurity technologies and strategies to protect the nation’s IT infrastructure. 

  • Best Messaging Security Products 2011

    Readers vote on the best antispam, antiphishing, email antivirus and antimalware filtering, software and appliance products, as well as hosted "in-the-cloud" email security services. 

  • Best Identity and Access Management Products 2011

    Readers vote on the best identity and access management products, including user identity access privilege and authorization management, single sign-on, user identity provisioning. 

  • Best Intrusion Detection/Prevention Products 2011

    Readers vote on the best intrusion prevention/detection products, including network-based intrusion detection and prevention appliances, using signature-, behavior-, anomaly- and rate-based detection. 

  • Best Authentication Products 2011

    Readers vote on the best digital identity verification products, services, and management systems, including PKI, hardware and software tokens, smart cards. 

  • Best Network Access Control Products 2011

    Readers vote for the best NAC products, including appliance, software and infrastructure user and device network access policy creation, compliance, enforcement and remediation. 

  • Best Mobile Data Security Products 2011

    Readers vote on the best mobile data security products, including hardware- and software-based file and full disk laptop encryption and removable storage device protection. 

  • Readers' Choice Awards 2011

    For the sixth consecutive year, Information Security readers voted to determine the best security products. More than 1,500 voters participated this year, rating products in 14 different categories.