Overview: SearchSecurity.com provides IT security professionals with the information they need to keep their corporate data and assets secure.
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by SearchSecurity.com.
Research offered by SearchSecurity.com
Antimalware IT Checklist: Decision Time Part 3 by SearchSecurity.com. April 11, 2012 - This is the third piece in SearchSecurity.com's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Antimalware IT Checklist: From Business Problem to Technical Solution Part 1 by SearchSecurity.com. April 11, 2012 - In the first of SearchSecurity.com's three-part guide on selecting antimalware products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of antimalware solutions.
Antimalware IT Checklist: RFP Technology Decisions Part 2 by SearchSecurity.com. April 11, 2012 - Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs.
Appliaction Hardening Technical Guide by SearchSecurity.com. October 21, 2013 - This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security.
April Essential Guide to Data Protection by SearchSecurity.com. April 11, 2012 - In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.
August Technical Guide on Authentication by SearchSecurity.com. August 06, 2012 - This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Best Practices for Endpoint Security by SearchSecurity.com. November 30, 2012 - TBD
Data Protection Virtual Seminar by SearchSecurity.com. November 17, 2009 - The combination of the ever-changing compliance landscape, Web 2.0 and technologies such as mobile devices have made it increasingly more difficult to track where your confidential data resides and put mechanisms in place to protect it.
E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime by SearchSecurity.com. August 31, 2009 - As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more.
E-Book: NERC Compliance by SearchSecurity.com. September 24, 2010 - SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.
E-Book: Protecting Against Web Threats by SearchSecurity.com. December 10, 2009 - Some organizations have security controls in place for web threats, but few organizations have comprehensive web security programs. In this e-book, we give you best practices for securing Web 2.0, tips for reducing web application vulnerabilities, and strategies for developing, implementing, and enforcing tight Social Networking policies.
E-Book: Technical Guide on Combatting Emerging Web Threats by SearchSecurity.com. June 09, 2010 - Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.
E-Book: Technical Guide on PCI by SearchSecurity.com. October 10, 2011 - TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance.
E-Book: Technical Guide on Vulnerability Management by SearchSecurity.com. June 03, 2010 - SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.
E-Book: Technical Guide on Web Application Firewalls by SearchSecurity.com. November 04, 2010 - Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
eBook: Software as a Service: What You Should Consider When Moving to SaaS by SearchSecurity.com. November 2008 - Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.
eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies by SearchSecurity.com. December 2008 - Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.
Email Security Technical Guide by SearchSecurity.com. April 05, 2013 - Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.
Endpoint Security IT Decision Center Handbook 1 by SearchSecurity.com. November 22, 2013 - Access this expert handbook to explore why organizations need strong endpoint security today more than ever, and discover how software can balance blocking malicious network threats while also granting users access to sensitive data.
Endpoint Security IT Decision Center Handbook 2 by SearchSecurity.com. November 25, 2013 - Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
Endpoint Security IT Decision Center Handbook 3 by SearchSecurity.com. November 26, 2013 - Access this expert handbook for 6 questions to ask about your next endpoint security software solution and its ability integrate into your environment.
Endpoint Security Management (Antimalware Technologies) Technical Guide by SearchSecurity.com. September 11, 2013 - This expert TechGuide will help you develop your endpoint security management transition plan, with key factors to consider during the next 12 months.
Essential Guide to PCI DSS by SearchSecurity.com. September 14, 2009 - This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Essential Guide to Threat Management by SearchSecurity.com. March 15, 2011 - Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.
Expert E-Book: Data Security and the Cloud by SearchSecurity.com. February 07, 2011 - This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.
Global Security University- State of Security: Getting a Clear View by SearchSecurity.com. July 31, 2013 - In this classroom, learn how to gain the clearest visibility into the state of your company's information security efforts, including how to make the most of your SIM, log management, network monitoring, GRC and penetration testing tools and services.
Global Security University: IAM Integration Classroom by SearchSecurity.com. July 31, 2013 - TBD
How to Evolve Your Compliance Program As Technologies and Mandates Change by SearchSecurity.com. October 28, 2009 - This collection of slides from the Information Security Decisions Conference gives an overview of the changes in security compliance regulations and the resulting changes in security technologies. Download the slides and learn about changes in regulations, the evolution of technology, keeping virtualization and cloud computing compliant, and more.
Information Security Magazine - April 2013 by SearchSecurity.com. April 03, 2013 - This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.
Information Security Magazine - February 2013 by SearchSecurity.com. February 01, 2013 - In this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more.
Information Security Magazine - March 2013 by SearchSecurity.com. March 01, 2013 - This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.
Information Security Magazine - October 2013 by SearchSecurity.com. October 01, 2013 - For the 8th consecutive year, Information Security readers voted to determine the best security products. More than 1,000 voters participated in our Readers' Choice Awards 2013.
Information Security Magazine – July/August 2013 by SearchSecurity.com. August 06, 2013 - This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.
ISM December 2012 by SearchSecurity.com. December 07, 2012 - In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.
July Technical Guide on Network Security by SearchSecurity.com. July 18, 2012 - Attackers moving from server to server on your network can be difficult to detect, especially if they develop code that evades detection. Network threat detection is more complex and important than ever with attackers stealing payment information or other valuable data. This informative white paper outlines how to better safeguard your network.
June Information Security Magazine by SearchSecurity.com. June 05, 2013 - Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. Our June cover story provides insight into adoption trends, cross-industry issues, and MDM solutions best fit to varying requirements. We also look at big data analytics and security and provide an update on FedRAMP.
Log Management Best Practices: Six Tips for Success by SearchSecurity.com. August 01, 2011 - The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.
Managing Identities and Access Control by SearchSecurity.com. February 24, 2010 - SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.
May Information Security Magazine by SearchSecurity.com. April 29, 2013 - This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
May Technical Guide on PCI DSS Guidance by SearchSecurity.com. May 07, 2012 - This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.
Mobile Device Management Technical Guide by SearchSecurity.com. March 06, 2013 - In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Mobile Security Insider's Edition by SearchSecurity.com. November 18, 2013 - This Insider Edition will lay out the basic strategies your organization should follow when dealing with mobile security, including data protection technologies, mobile device management and policies dealing with employees bringing personal consumer devices onto the network.
Network Security Essential Guide by SearchSecurity.com. February 06, 2013 - The increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy.
Network Security Technologies Technical Guide by SearchSecurity.com. December 31, 2012 - Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
Network Security Visibility and Analysis Technical Guide by SearchSecurity.com. June 10, 2013 - This TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology.
November Information Security Magazine by SearchSecurity.com. October 31, 2013 - Companies have embraced virtualization and cloud computing but virtualization security, the subject of this issue's cover feature, is still bolted-on. Find out what needs to change.
PCI DSS: Next-Generation Data Security, Storage and Integrity by SearchSecurity.com. October 11, 2010 - SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.
Restore Balance with Next Generation Authentication Technical Guide by SearchSecurity.com. November 21, 2013 - Access this tech guide to gain expert advice from industry leaders to uncover emerging authentication technologies that address the need for higher security measures in the cloud and for mobility.
Secure File Transfer Tech Guide by SearchSecurity.com. February 06, 2013 - Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
Security University: Antimalware Classroom by SearchSecurity.com. January 23, 2013 - Old school antimalware sat on host desktops but now there's antimalware in the cloud, at the perimeter, on servers, on hosts, on mobile devices. This Classroom will answer all your questions on the evolution of antimalware to meet the changing IT and threat landscape.
September Information Security Magazine by SearchSecurity.com. August 30, 2013 - Industry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come.
SIEM IT Decision Center- Checklist #1 by SearchSecurity.com. January 01, 2013 - If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.
SIEM IT Decision Center- Checklist #2 by SearchSecurity.com. February 11, 2013 - This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.
Technical Guide on Government Security by SearchSecurity.com. May 23, 2011 - Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.
Technical Guide on Mobile Security by SearchSecurity.com. November 01, 2011 - Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue.
Technical Guide on SIM by SearchSecurity.com. August 16, 2011 - Security information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance.
Technical Guide on Windows Security by SearchSecurity.com. November 04, 2011 - SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.
The Evolution of SIM by SearchSecurity.com. June 12, 2009 - Security expert Diana Kelley explains how enterprise SIM use has evolved and how companies might use SIMs differently in the future.
Threat Detection (Antivirus Intrusion Prevention) by SearchSecurity.com. May 03, 2013 - Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Threat Detection Technologies Technical Guide by SearchSecurity.com. August 06, 2013 - This TechGuide will provide analysis of APTs and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.
Web Application Security Insider's Edition by SearchSecurity.com. - This Insider Edition will help you understand threats against Web applications, how you can help developers with security tools and training and how to deploy technologies such as Web application firewalls to keep your organization's Web presence safe.