Security factors to consider before buying Chinese IT

Vendor Management: Negotiations, Budgeting, Mergers and Acquisitions

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Mergers and acquisitions: Building up security after an M&A

    Mergers and acquisitions are common headlines in today's information security world, and that's great news for malicious hackers and data thieves. When companies join forces, they often leave themselves open to attack. In this tip, contributor Ed Sko... 

  • Ensuring Web application security during a company merger

    When companies merge, so must their Web application infrastructures. Securing and integrating applications, however, can be a struggle without cooperation from all sides. In this tip, Michael Cobb explains how a merged organization can avoid turf bat... 

  • Best practices for compliance during a merger

    Company mergers involve more than just aligning two different security infrastructures. When one vendor acquires another, it's the handling of compliance issues that can be an IT security staff's toughest task. In this tip, security expert Joel Dubin... 

  • 2006 Products of the Year: Antispyware

    Information Security and SearchSecurity readers selected the best desktop and gateway enterprise antispyware products of 2006. 

  • Patch testing on a budget

    While it is best to test patches prior to production, testing environments can be costly. This tip explains how to reduce these costs. 

  • Secure Sphere 2.0

    In this review, Information Security magazine contributor Peter Giannacopoulos evaluates the strengths and weaknesses of Imperva's SecureSphere 2.0. 

  • Symantec's Symantec Mail Security 8200 series

    Information Security magazine reviews the strengths and weaknesses of Symantec's Mail Security 8200 series. 

  • How to write an RFP

    The principles of Six Sigma can be applied to the process of writing a request for proposal. 

  • Salespeople are sharks and other truths of negotiation

    Learn what you should do to ensure your next technology is a success. 

  • Demand good proposals: Tips for writing an RFP

    Learn five guidelines that will improve prospects for proposals that actually respond directly to your requirements.