Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions News
June 27, 2016
New reports suggest Intel may be looking into selling off its security business, and experts are unclear whether it means Intel's McAfee acquisition has gone sour.
February 18, 2016
The Internet of Things once again dominates the agenda at RSA Conference 2016, but experts say there will be other hot topics, including the growing debate between IT and the government over encryption backdoors.
February 12, 2016
A new study found that IT managers feel pressured to purchase new cybersecurity products even if they don't have the skills to implement the technology properly.
October 21, 2015
Trend Micro agreed to purchase HP TippingPoint for $300 million in an effort to bolster network security, but experts disagree on the strategy of either company involved.
Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions Get Started
Bring yourself up to speed with our introductory content
In this excerpt of Integrated Security Systems Design, author Thomas L. Norman explains the tools of security system design, the place of electronics in the process, how to establish electronic security program objectives and the types of design ... Continue Reading
The security vendor management process can be tricky, especially at the beginning when deciding what to buy and from whom. Expert Mike O. Villegas has some advice. Continue Reading
Video: Threat intelligence tools are a growing market and enterprises need to be able to see through the hype to get the best product for them. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. Continue Reading
Network-attached storage devices can present a plethora of security issues to an enterprise. Expert Kevin Beaver explains how to detect and mitigate the risks. Continue Reading
Information security managers say the challenges posed by vendors' onerous security product-licensing models often increase the risk of shadow IT and threaten enterprise security. Continue Reading
Manage Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions
Learn to apply best practices and optimize your operations.
Organizations dealing with the complicated merger and acquisition process can't forget about security. Unfortunately, security presents a whole new set of obstacles. Continue Reading
Trimming down a security portfolio and budget is a struggle for many security professionals. Here's how to trim security portfolios without affecting security. Continue Reading
Ending a security vendor relationship is a tricky process and should be handled with care. Expert Mike O. Villegas discusses how and when to end vendor contracts safely. Continue Reading
Problem Solve Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Industrial control systems should be securely managed by the enterprise, specifically when vendors need access to them. Here are some ways to handle industrial control systems security. Continue Reading
Uncover how domain security services can help enterprises monitor, lock and secure their domains to prevent cyberattacks. Continue Reading
EAL4 certification ensures integrity in security products, but is it a must when buying enterprise firewall products? Expert Brad Casey explains. Continue Reading