Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions News
August 25, 2015
Video: Threat intelligence tools are a growing market and enterprises need to be able to see through the hype to get the best product for them.
July 30, 2015
Vendors, such as Intel and Cisco, are hoping to pave the way for a security ecosystem in which applications communicate threat intelligence amongst each other. Will it work?
May 19, 2015
Network security vendor Fortinet and DHS signed an agreement on security information sharing for better cyber protection in the public and private sectors.
April 23, 2015
At a roundtable discussion at RSA Conference 2015, security admins pondered what to do about bloated security portfolios.
Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions Get Started
Bring yourself up to speed with our introductory content
EAL4 certification ensures integrity in security products, but is it a must when buying enterprise firewall products? Expert Brad Casey explains. Continue Reading
When IT professionals, such as you, have an IT project at their organization, there is a need to research multiple pieces of content from a variety of sources including vendors, third-parties and experts. This survey will allow TechTarget to ... Continue Reading
Financial institutions face numerous regulatory requirements for managing vendor risk. Learn what financial firms need to include in their vendor contracts in order to conform with regulatory guidance and industry best practices for vendor risk ... Continue Reading
Evaluate Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
If you know where the risk points are, you can request additional safeguards to protect the system and data access of trusted business partners. Continue Reading
Network-attached storage devices can present a plethora of security issues to an enterprise. Expert Kevin Beaver explains how to detect and mitigate the risks. Continue Reading
Information security managers say the challenges posed by vendors' onerous security product-licensing models often increase the risk of shadow IT and threaten enterprise security. Continue Reading
Product ReviewsPowered by IT Central Station
Provides a target response time of one minute for both hardware and software issues— and immediate escalation to level-two advanced support for high-severity issues.Powered by IT Central Station
After the release of our first product we had a lot more exposure with the public and we knew we would attract some unwanted attention. We started...Continue Reading
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
Powered by IT Central Station
Valuable Features: Firewall mode AnyConnect gateway Client-less SSL VPN • Improvements to My Organization: The versatility of the...Continue Reading
Manage Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions
Learn to apply best practices and optimize your operations.
This Beyond the Page informs InfoSec pros of the security concerns related to third-party vendor access, and how an enterprise IAM strategy can help. Continue Reading
John Dickson, principal at Denim Group, talks to SearchSecurity at RSA Conference 2015 about tried and true ways security admins have been able to attain security dollars despite tight resources. Continue Reading
At the inaugural TrustyCon event, F-Secure's Mikko Hypponen decried the lack of trust in security vendors like RSA and warned of government malware. Continue Reading
Problem Solve Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Uncover how domain security services can help enterprises monitor, lock and secure their domains to prevent cyberattacks. Continue Reading
For enterprises that need to weigh security requirements versus vendors' claims, a vendor security checklist can help. Expert Joe Granneman advises. Continue Reading
Expert Joe Granneman weighs in on the value of market revenue rankings when it comes to choosing security software. Continue Reading