Email Alerts
-
Building network security: Evolution and vendor consolidation
Through both vendor consolidation and evolution, security capabilities are increasingly being woven into the network fabric. In this lesson, Mike Rothman, president and principal analyst of Security Incite, will help attendees understand the network/... Identity and Access Manag
-
Become compliant without breaking the bank
Information Security maga
-
Merger madness: What to do when your infosec vendor gets acquired
When your favorite security vendor merges or is acquired, the only thing you can expect for certain is change. This article outlines the pros and cons of vendor mergers and acquisitions, and how customers can influence their future with the new compa... Information Security maga
-
RSA 2006: Product announcements
Conference Coverage
-
Market trends: The future of e-mail security
The e-mail security market is undergoing a change that is marked by commoditization and centralization. Joel Snyder analyzes these trends and offers a glimpse at the future of e-mail security products. Feature
-
Pitching patch: RFP bakeoff
Information Security magazine asked vendors to propose a patch system for a fictional enterprise. Their responses reveal more than just their product spec sheets. Information Security maga
-
Outsourcing Information Security
Our reviewer gives his opinion of the book Outsourcing Information Security. Books
-
Quality measures for outsourcing security
This tip is excerpted from Outsourcing Information Security, written by C. Warren Axelrod and published by Artech House Publishers. Book Chapter
-
Infosec professional profile: Ron Gula
Ron Gula rocked the IDS market with Dragon. Now he's trying to catch Lightning in a bottle. Feature
-
SRP evaluation criteria: Tools to enable security as a process
We evaluated three security resource planning (SRP) products based on this list of key criteria. Feature
Security Management Strategies for the CIO