Security factors to consider before buying Chinese IT

Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Sclavos's VeriSign departure leaves many questions unanswered

    Some industry observers say disagreements fueled his resignation, but others say Sclavos's abrupt departure revolved around his role in VeriSign's options accounting practices. 

  • Google dives into security market

    Search engine giant Google has acquired security startup GreenBorder Technologies, making it a bigger player in the wider information security market. 

  • Podcast: Security360 -- Industry Consolidation

    Companies that thrive in the face of industry consolidation have an effective security strategy and a buying approach based on topics rather than vendor relationships. 

  • HP touts security, trust as it pursues smaller businesses

    Hewlett-Packard Co. (HP) realigned its storage group in January, creating a new business unit in its Enterprise Storage and Server (ESS) group that is focusing on HP's Storage Essentials and Server Essentials software. The company also began pushing ... 

  • Verizon to acquire Cybertrust

    Analysts say Verizon's acquisition of Cybertrust could boost the telecom company's credibility among enterprise customers who are increasingly bothered by security challenges. 

  • Microsoft users sticking with third-party security vendors

    IT pros are pleased with Microsoft's security advances, including those found in Forefront. But don't expect them to drop their third-party security vendors. 

  • Websense to acquire SurfControl

    Websense says its planned $400 million acquisition of SurfControl will allow it to better compete in the global security market. 

  • Savvy hackers take the hardware approach

    Sophisticated hackers are finding ways to break into systems by exploiting security flaws in a computer's device drivers, physical memory and PCI cards. As SearchSecurity.com Executive Editor Dennis Fisher explains, while enterprise software vendors ... 

  • Cisco to acquire Reactivity for $135 million

    One analyst says Cisco will benefit from Reactivity's policy and threat management capabilities. 

  • When security firms merge, some users are losers

    Some users see their services improve when IT security vendors merge with other companies or get acquired. Others say they've been left out in the cold.