Overview: SearchSecurity.com provides IT security professionals with the information they need to keep their corporate data and assets secure.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by SearchSecurity.com.
Research offered by SearchSecurity.com
Antimalware IT Checklist: Decision Time Part 3 by SearchSecurity.com. April 11, 2012 - This is the third piece in SearchSecurity.com's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Antimalware IT Checklist: From Business Problem to Technical Solution Part 1 by SearchSecurity.com. April 11, 2012 - In the first of SearchSecurity.com's three-part guide on selecting antimalware products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of antimalware solutions.
Antimalware IT Checklist: RFP Technology Decisions Part 2 by SearchSecurity.com. April 11, 2012 - Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs.
April Essential Guide to Data Protection by SearchSecurity.com. April 11, 2012 - In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.
August Technical Guide on Authentication by SearchSecurity.com. August 06, 2012 - This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Best Practices for Endpoint Security by SearchSecurity.com. November 30, 2012 - TBD
Compliance Frameworks Live Chat by SearchSecurity.com. May 01, 2013 - In this live Q&A, security expert Tony UcedaVelez will answer your questions on planning your enterprise compliance strategy.
Data Protection Virtual Seminar by SearchSecurity.com. November 17, 2009 - The combination of the ever-changing compliance landscape, Web 2.0 and technologies such as mobile devices have made it increasingly more difficult to track where your confidential data resides and put mechanisms in place to protect it.
DLP Deployment Challenges Technical Guide by SearchSecurity.com. March 13, 2013 - This whitepaper examines some of the challenges associated with deploying DLP, identifies common pitfalls, and explains how DLP can be used effectively. Learn from CSOs and other experts as they share what you need to know when it comes to DLP technologies.
E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime by SearchSecurity.com. August 31, 2009 - As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more.
E-Book: NERC Compliance by SearchSecurity.com. September 24, 2010 - SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
E-Book: Protecting Against Web Threats by SearchSecurity.com. December 10, 2009 - Some organizations have security controls in place for web threats, but few organizations have comprehensive web security programs. In this e-book, we give you best practices for securing Web 2.0, tips for reducing web application vulnerabilities, and strategies for developing, implementing, and enforcing tight Social Networking policies.
E-Book: Technical Guide on Combatting Emerging Web Threats by SearchSecurity.com. June 09, 2010 - Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.
E-Book: Technical Guide on PCI by SearchSecurity.com. October 10, 2011 - TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance.
E-Book: Technical Guide on Vulnerability Management by SearchSecurity.com. June 03, 2010 - SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.
E-Book: Technical Guide on Web Application Firewalls by SearchSecurity.com. November 04, 2010 - Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
eBook: Software as a Service: What You Should Consider When Moving to SaaS by SearchSecurity.com. November 2008 - Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies by SearchSecurity.com. December 2008 - Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.
Email Security Technical Guide by SearchSecurity.com. April 05, 2013 - Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.
Essential Guide to PCI DSS by SearchSecurity.com. September 14, 2009 - This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Essential Guide to Threat Management by SearchSecurity.com. March 15, 2011 - Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Expert E-Book: Data Security and the Cloud by SearchSecurity.com. February 07, 2011 - This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.
How to Evolve Your Compliance Program As Technologies and Mandates Change by SearchSecurity.com. October 28, 2009 - This collection of slides from the Information Security Decisions Conference gives an overview of the changes in security compliance regulations and the resulting changes in security technologies. Download the slides and learn about changes in regulations, the evolution of technology, keeping virtualization and cloud computing compliant, and more.
Information Security Magazine - April 2013 by SearchSecurity.com. April 03, 2013 - This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
Information Security Magazine - February 2013 by SearchSecurity.com. February 01, 2013 - In this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more.
Information Security Magazine - July/August 2012 by SearchSecurity.com. June 28, 2012 - In this month’s cover story, senior VP of research and CTO at IANS, David Shackleford, clarifies best practices for security pen testing as well as offers practical steps for building an internal testing program, how to measure success, what kinds of skills are needed, the tools to use, what the process should look like and more.
Information Security Magazine - June 2012 by SearchSecurity.com. May 30, 2012 - In this month’s issue, Global Vice President of the Information Security Forum, Steve Durbin, offers five actions you can take to prepare for today’s external threats, proven steps to counter internal threats, and practical advice on how to better prepare and respond to foreseen (and unforeseen) compliance regulations.
Information Security Magazine - March 2013 by SearchSecurity.com. March 01, 2013 - This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
Information Security Magazine - September 2012 by SearchSecurity.com. September 04, 2012 - Bring your own device is quickly becoming a popular practice and unfortunately, it's often misused. Access this informative white paper to learn more about protection your mobile management. Learn more about how mobility is changing the enterprise and what you can do to ensure you deploy adequate security.
Information Security Magazine – October 2012 by SearchSecurity.com. October 02, 2012 - View this informative white paper to learn about some of the threats that are going on in your network that you may not be seeing. Find out why it's time to upgrade to total security intelligence and a next-generation security information event management (SIEM) system.
ISM December 2012 by SearchSecurity.com. December 07, 2012 - In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.
July Technical Guide on Network Security by SearchSecurity.com. July 18, 2012 - Attackers moving from server to server on your network can be difficult to detect, especially if they develop code that evades detection. Network threat detection is more complex and important than ever with attackers stealing payment information or other valuable data. This informative white paper outlines how to better safeguard your network.
Log Management Best Practices: Six Tips for Success by SearchSecurity.com. August 01, 2011 - The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.
Managing Identities and Access Control by SearchSecurity.com. February 24, 2010 - SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.
May Technical Guide on PCI DSS Guidance by SearchSecurity.com. May 07, 2012 - This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.
Mobile Device Management Technical Guide by SearchSecurity.com. March 06, 2013 - In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Network Security Essential Guide February 2013 by SearchSecurity.com. February 06, 2013 - The increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy.
Network Security Technologies Technical Guide by SearchSecurity.com. December 31, 2012 - Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
PCI DSS: Next-Generation Data Security, Storage and Integrity by SearchSecurity.com. October 11, 2010 - SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.
Secure File Transfer Tech Guide by SearchSecurity.com. February 06, 2013 - Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
Security University: Antimalware Classroom by SearchSecurity.com. January 23, 2013 - Old school antimalware sat on host desktops but now there's antimalware in the cloud, at the perimeter, on servers, on hosts, on mobile devices. This Classroom will answer all your questions on the evolution of antimalware to meet the changing IT and threat landscape.
SIEM IT Decision Center- Checklist #1 by SearchSecurity.com. January 01, 2013 - If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.
SIEM IT Decision Center- Checklist #2 by SearchSecurity.com. February 11, 2013 - This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.
SIEM IT Decision Center- Checklist #3 by SearchSecurity.com. February 12, 2013 - Part three of SearchSecurity.com's guide to security information and event management (SIEM) systems outlines the final considerations you should make before committing to a SIEM vendor, including evaluating product benefits and tradeoffs. Read on to learn more.
SIM Technical Guide by SearchSecurity.com. March 08, 2013 - In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.
Technical Guide on Government Security by SearchSecurity.com. May 23, 2011 - Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.
Technical Guide on Mobile Security by SearchSecurity.com. November 01, 2011 - Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue.
Technical Guide on SIM by SearchSecurity.com. August 16, 2011 - Security information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance.
Technical Guide on Windows Security by SearchSecurity.com. November 04, 2011 - SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.
The Evolution of SIM by SearchSecurity.com. June 12, 2009 - Security expert Diana Kelley explains how enterprise SIM use has evolved and how companies might use SIMs differently in the future.
Threat Detection (Antivirus Intrusion Prevention) by SearchSecurity.com. May 03, 2013 - Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.