Overview: SearchSecurity.com provides IT security professionals with the information they need to keep their corporate data and assets secure.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by SearchSecurity.com.
Research offered by SearchSecurity.com
Antimalware IT Checklist: Decision Time Part 3 by SearchSecurity.com. April 11, 2012 - This is the third piece in SearchSecurity.com's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Antimalware IT Checklist: From Business Problem to Technical Solution Part 1 by SearchSecurity.com. April 11, 2012 - In the first of SearchSecurity.com's three-part guide on selecting antimalware products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of antimalware solutions.
Antimalware IT Checklist: RFP Technology Decisions Part 2 by SearchSecurity.com. April 11, 2012 - Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs.
Application Hardening: Evolving Techniques for Proactive Enterprise Application Security by SearchSecurity.com. October 21, 2013 - This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security.
April Essential Guide to Data Protection by SearchSecurity.com. April 11, 2012 - In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.
August Technical Guide on Authentication by SearchSecurity.com. August 06, 2012 - This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Data Protection Virtual Seminar by SearchSecurity.com. November 17, 2009 - The combination of the ever-changing compliance landscape, Web 2.0 and technologies such as mobile devices have made it increasingly more difficult to track where your confidential data resides and put mechanisms in place to protect it.
E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime by SearchSecurity.com. August 31, 2009 - As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more.
E-Book: NERC Compliance by SearchSecurity.com. September 24, 2010 - SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
E-Book: Protecting Against Web Threats by SearchSecurity.com. December 10, 2009 - Some organizations have security controls in place for web threats, but few organizations have comprehensive web security programs. In this e-book, we give you best practices for securing Web 2.0, tips for reducing web application vulnerabilities, and strategies for developing, implementing, and enforcing tight Social Networking policies.
E-Book: Technical Guide on Combatting Emerging Web Threats by SearchSecurity.com. June 09, 2010 - Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.
E-Book: Technical Guide on PCI by SearchSecurity.com. October 10, 2011 - TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance.
E-Book: Technical Guide on Vulnerability Management by SearchSecurity.com. June 03, 2010 - SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.
E-Book: Technical Guide on Web Application Firewalls by SearchSecurity.com. November 04, 2010 - Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
eBook: Software as a Service: What You Should Consider When Moving to SaaS by SearchSecurity.com. November 2008 - Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies by SearchSecurity.com. December 2008 - Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.
Email Security Technical Guide by SearchSecurity.com. April 05, 2013 - Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.
Endpoint Security IT Decision Center Handbook 2 by SearchSecurity.com. November 25, 2013 - Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
Endpoint Security IT Decision Center Handbook 3 by SearchSecurity.com. November 26, 2013 - Access this expert handbook for 6 questions to ask about your next endpoint security software solution and its ability integrate into your environment.
Endpoint Security Management (Antimalware Technologies) Technical Guide by SearchSecurity.com. September 11, 2013 - This expert TechGuide will help you develop your endpoint security management transition plan, with key factors to consider during the next 12 months.
Essential Guide to PCI DSS by SearchSecurity.com. September 14, 2009 - This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Essential Guide to Threat Management by SearchSecurity.com. March 15, 2011 - Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Expert E-Book: Data Security and the Cloud by SearchSecurity.com. February 07, 2011 - This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.
Global Security University: IAM Integration Classroom by SearchSecurity.com. July 31, 2013 - TBD
Guide: Threat Detection Technologies by SearchSecurity.com. August 06, 2013 - This TechGuide will provide analysis of APTs and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Handbook: Vulnerability Management by SearchSecurity.com. January 27, 2014 - This TechGuide will help you both identify and prioritize vulnerabilities based on sound risk-management principles, ensuring a vulnerability management program that is effective and aligned with broader risk-management goals.
How to Evolve Your Compliance Program As Technologies and Mandates Change by SearchSecurity.com. October 28, 2009 - This collection of slides from the Information Security Decisions Conference gives an overview of the changes in security compliance regulations and the resulting changes in security technologies. Download the slides and learn about changes in regulations, the evolution of technology, keeping virtualization and cloud computing compliant, and more.
Information Security ANZ March 2014 by SearchSecurity.com. March 18, 2014 - This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.
Information Security ASEAN March 2014 by SearchSecurity.com. March 18, 2014 - This ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.
Information Security Magazine by SearchSecurity.com. February 03, 2014 - In our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year.
Information Security Magazine - April 2013 by SearchSecurity.com. April 03, 2013 - This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
Information Security Magazine - February 2013 by SearchSecurity.com. February 01, 2013 - In this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more.
Information Security Magazine - March 2013 by SearchSecurity.com. March 01, 2013 - This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
Information Security Magazine – April 2014 by SearchSecurity.com. April 01, 2014 - In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks.
Information Security Magazine – July/August 2013 by SearchSecurity.com. August 06, 2013 - This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.
Information Security Magazine – March 2014 by SearchSecurity.com. March 03, 2014 - In this issue, we look at the security debate shadowing cloud deployments, and explain how to assess the threats, vulnerabilities and consequences using a simple risk equation.
Insider Edition: Antimalware Technologies and Techniques to the Rescue by SearchSecurity.com. March 05, 2014 - In this Insider Edition, we'll examine the recent advances in advanced malware detection and prevention as well as which ones are likely to bear fruit in your organization.
ISM December 2012 by SearchSecurity.com. December 07, 2012 - In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.
July Technical Guide on Network Security by SearchSecurity.com. July 18, 2012 - Attackers moving from server to server on your network can be difficult to detect, especially if they develop code that evades detection. Network threat detection is more complex and important than ever with attackers stealing payment information or other valuable data. This informative white paper outlines how to better safeguard your network.
June Information Security Magazine by SearchSecurity.com. June 05, 2013 - Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. Our June cover story provides insight into adoption trends, cross-industry issues, and MDM solutions best fit to varying requirements. We also look at big data analytics and security and provide an update on FedRAMP.
Log Management Best Practices: Six Tips for Success by SearchSecurity.com. August 01, 2011 - The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.
Managing Identities and Access Control by SearchSecurity.com. February 24, 2010 - SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.
May Information Security Magazine by SearchSecurity.com. April 29, 2013 - This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
May Technical Guide on PCI DSS Guidance by SearchSecurity.com. May 07, 2012 - This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.
Mobile Device Management Technical Guide by SearchSecurity.com. March 06, 2013 - In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Mobile Security Insider's Edition by SearchSecurity.com. November 18, 2013 - This Insider Edition will lay out the basic strategies your organization should follow when dealing with mobile security, including data protection technologies, mobile device management and policies dealing with employees bringing personal consumer devices onto the network.
Network Security Essential Guide by SearchSecurity.com. February 06, 2013 - The increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy.
Network Security Technologies Technical Guide by SearchSecurity.com. December 31, 2012 - Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
Network Security Visibility and Analysis Technical Guide by SearchSecurity.com. June 10, 2013 - This TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology.
November Information Security Magazine by SearchSecurity.com. October 31, 2013 - Companies have embraced virtualization and cloud computing but virtualization security, the subject of this issue's cover feature, is still bolted-on. Find out what needs to change.
PCI DSS 3.0: The Expert's Guide to the New Guidance by SearchSecurity.com. January 31, 2014 - This SearchSecurity.com Editorial TechGuide gives an overview of the major changes with PCI DSS 3.0, outlines where procedures and policies remain unclear, and closes with a practical list of the top five ways this new standard affects merchants.
PCI DSS: Next-Generation Data Security, Storage and Integrity by SearchSecurity.com. October 11, 2010 - SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.
Restore Balance with Next Generation Authentication Technical Guide by SearchSecurity.com. November 21, 2013 - Access this tech guide to gain expert advice from industry leaders to uncover emerging authentication technologies that address the need for higher security measures in the cloud and for mobility.
Secure File Transfer Tech Guide by SearchSecurity.com. February 06, 2013 - Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
Secure File Transfer: Send it Fast, but Send it Safely by SearchSecurity.com. April 14, 2014 - FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity.
September Information Security Magazine by SearchSecurity.com. August 30, 2013 - Industry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come.
SIEM IT Decision Center- Checklist #1 by SearchSecurity.com. January 01, 2013 - If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.
SIEM IT Decision Center- Checklist #2 by SearchSecurity.com. February 11, 2013 - This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.
SIEM Technical Guide by SearchSecurity.com. February 19, 2014 - This TechGuide examines the policies and enhanced monitoring needed from a SIEM to make smarter decisions and respond faster to incidents.
Technical Guide on Application Security by SearchSecurity.com. December 31, 2012 - This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.
Technical Guide on Government Security by SearchSecurity.com. May 23, 2011 - Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.
Technical Guide on Mobile Security by SearchSecurity.com. November 01, 2011 - Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue.
Technical Guide on SIM by SearchSecurity.com. August 16, 2011 - Security information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance.
Technical Guide on Windows Security by SearchSecurity.com. November 04, 2011 - SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.
The changing SIEM landscape: What you should know to stay ahead by SearchSecurity.com. April 19, 2012 - While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.
The Evolution of SIM by SearchSecurity.com. June 12, 2009 - Security expert Diana Kelley explains how enterprise SIM use has evolved and how companies might use SIMs differently in the future.
Threat Detection (Antivirus Intrusion Prevention) by SearchSecurity.com. May 03, 2013 - Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Unified Threat Management: Decision Time by SearchSecurity.com. February 26, 2014 - Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.
Unified Threat Management: From Business Problem to Technical Solution by SearchSecurity.com. February 25, 2014 - Learn how unified threat management (UTM) systems can help you achieve a layered security defense.
Unified Threat Management: RFP Technology Decisions by SearchSecurity.com. February 26, 2014 - To properly evaluate unified threat management (UTM) products, you must understand what each vendor offers and how well it fits with your organization.
Web Application Security Insider's Edition by SearchSecurity.com. - This Insider Edition will help you understand threats against Web applications, how you can help developers with security tools and training and how to deploy technologies such as Web application firewalls to keep your organization's Web presence safe.
What’s the Best Focus for MDM Strategy Now? by SearchSecurity.com. March 12, 2014 - This guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters.