Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions News
February 12, 2016
A new study found that IT managers feel pressured to purchase new cybersecurity products even if they don't have the skills to implement the technology properly.
October 21, 2015
Trend Micro agreed to purchase HP TippingPoint for $300 million in an effort to bolster network security, but experts disagree on the strategy of either company involved.
August 25, 2015
Video: Threat intelligence tools are a growing market and enterprises need to be able to see through the hype to get the best product for them.
July 30, 2015
Vendors, such as Intel and Cisco, are hoping to pave the way for a security ecosystem in which applications communicate threat intelligence amongst each other. Will it work?
Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions Get Started
Bring yourself up to speed with our introductory content
The vendor management process can be tricky, especially at the beginning when deciding what to buy and from whom. Expert Mike O. Villegas has some advice. Continue Reading
EAL4 certification ensures integrity in security products, but is it a must when buying enterprise firewall products? Expert Brad Casey explains. Continue Reading
When IT professionals, such as you, have an IT project at their organization, there is a need to research multiple pieces of content from a variety of sources including vendors, third-parties and experts. This survey will allow TechTarget to ... Continue Reading
Evaluate Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. Continue Reading
Network-attached storage devices can present a plethora of security issues to an enterprise. Expert Kevin Beaver explains how to detect and mitigate the risks. Continue Reading
Information security managers say the challenges posed by vendors' onerous security product-licensing models often increase the risk of shadow IT and threaten enterprise security. Continue Reading
Manage Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions
Learn to apply best practices and optimize your operations.
Trimming down a security portfolio and budget is a struggle for many security professionals. Here's how to trim security portfolios without affecting security. Continue Reading
Ending a security vendor relationship is a tricky process and should be handled with care. Expert Mike O. Villegas discusses how and when to end vendor contracts safely. Continue Reading
This Beyond the Page informs InfoSec pros of the security concerns related to third-party vendor access, and how an enterprise IAM strategy can help. Continue Reading
Problem Solve Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Industrial control systems should be securely managed by the enterprise, specifically when vendors need access to them. Here are some ways to handle industrial control systems security. Continue Reading
Uncover how domain security services can help enterprises monitor, lock and secure their domains to prevent cyberattacks. Continue Reading
For enterprises that need to weigh security requirements versus vendors' claims, a vendor security checklist can help. Expert Joe Granneman advises. Continue Reading