Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions News
November 26, 2014
Information security managers say the challenges posed by vendors' onerous security product-licensing models often increase the risk of shadow IT and threaten enterprise security.
October 24, 2014
September 05, 2014
News roundup: The recent Goodwill security breach has been blamed on a third-party service provider, highlighting the need for due diligence. Plus: Mobile device theft; Android app vulnerabilities and a 12-year-long cyber-espionage network.
August 08, 2014
At Black Hat 2014, Yahoo CISO Alex Stamos decried enterprise security companies' inability to handle scale and system diversity, and called on vendors to seize the opportunity for innovation.
Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions Get Started
Bring yourself up to speed with our introductory content
EAL4 certification ensures integrity in security products, but is it a must when buying enterprise firewall products? Expert Brad Casey explains. Continue Reading
When IT professionals, such as you, have an IT project at their organization, there is a need to research multiple pieces of content from a variety of sources including vendors, third-parties and experts. This survey will allow TechTarget to ... Continue Reading
Readers vote on the best business-grade desktop and server antivirus and antispyware products. Continue Reading
Evaluate Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Uncover how domain security services can help enterprises monitor, lock and secure their domains to prevent cyberattacks. Continue Reading
The majority of breaches occur as the result of third parties. MacDonnell Ulsch advises companies to safeguard third-party management agreements. Continue Reading
At B-Sides San Francisco, Dan Kaminsky discussed how society inhibits its own security culture, and the need to look beyond status-quo technology. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Powered by IT Central Station
Cisco ASA has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports ...Continue Reading
Manage Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions
Learn to apply best practices and optimize your operations.
At the inaugural TrustyCon event, F-Secure's Mikko Hypponen decried the lack of trust in security vendors like RSA and warned of government malware. Continue Reading
Is network management outsourcing the future of network security or too great a risk? Matthew Pascucci discusses the risks and rewards. Continue Reading
Problem Solve Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
For enterprises that need to weigh security requirements versus vendors' claims, a vendor security checklist can help. Expert Joe Granneman advises. Continue Reading
Expert Joe Granneman weighs in on the value of market revenue rankings when it comes to choosing security software. Continue Reading
Mike Rothman offers 10 critical questions to ask antimalware vendors when seeking out the best antimalware products for enterprise use. Continue Reading