SearchSecurity.com Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
SearchSecurity.com

Overview: SearchSecurity.com provides IT security professionals with the information they need to keep their corporate data and assets secure.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by SearchSecurity.com.
Research offered by SearchSecurity.com

Antimalware IT Checklist: Decision Time Part 3 by SearchSecurity.com. April 11, 2012 - This is the third piece in SearchSecurity.com's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.

  View Antimalware IT Checklist: Decision Time Part 3 research abstract

Antimalware IT Checklist: From Business Problem to Technical Solution Part 1 by SearchSecurity.com. April 11, 2012 - In the first of SearchSecurity.com's three-part guide on selecting antimalware products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of antimalware solutions.

  View Antimalware IT Checklist: From Business Problem to Technical Solution Part 1 research abstract

Antimalware IT Checklist: RFP Technology Decisions Part 2 by SearchSecurity.com. April 11, 2012 - Part 2 of SearchSecurity.com's 3-part guide on antimalware products offers expert insight into gathering pertinent information into the technical information necessary to move forward in the RFI process. Get an overview of technical requirements, questions to ask potential vendors, and a list of products that may meet your needs.

  View Antimalware IT Checklist: RFP Technology Decisions Part 2 research abstract

Application Hardening: Evolving Techniques for Proactive Enterprise Application Security by SearchSecurity.com. October 21, 2013 - This expert guide from SearchSecurity.com provides crucial tips for creating an effective threat and vulnerability management program and examines how you can strengthen and streamline your application security.

  View Application Hardening: Evolving Techniques for Proactive Enterprise Application Security research abstract

April Essential Guide to Data Protection by SearchSecurity.com. April 11, 2012 - In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more.

  View April Essential Guide to Data Protection research abstract

August Technical Guide on Authentication by SearchSecurity.com. August 06, 2012 - This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.

  View August Technical Guide on Authentication research abstract

Data Protection Virtual Seminar by SearchSecurity.com. November 17, 2009 - The combination of the ever-changing compliance landscape, Web 2.0 and technologies such as mobile devices have made it increasingly more difficult to track where your confidential data resides and put mechanisms in place to protect it.

  View Data Protection Virtual Seminar research abstract

E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime by SearchSecurity.com. August 31, 2009 - As our economy struggles to regain its footing, online fraud is more prevalent than ever. In this E-Book, experts reveal a model for common fraud and present tips on easing fraud pains. Also, find out how financial fraud affects consumer bank behavior. Read on to learn more.

  View E-Book - Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime research abstract

E-Book: NERC Compliance by SearchSecurity.com. September 24, 2010 - SearchSecurity.com presents a comprehensive guide to NERC compliance. Our experts cover all the angles in order to help your efforts in meeting compliance with the information security standards established by the North American Electric Reliability Corporation.

  View E-Book: NERC Compliance research abstract

E-Book: Protecting Against Web Threats by SearchSecurity.com. December 10, 2009 - Some organizations have security controls in place for web threats, but few organizations have comprehensive web security programs. In this e-book, we give you best practices for securing Web 2.0, tips for reducing web application vulnerabilities, and strategies for developing, implementing, and enforcing tight Social Networking policies.

  View E-Book: Protecting Against Web Threats research abstract

E-Book: Technical Guide on Combatting Emerging Web Threats by SearchSecurity.com. June 09, 2010 - Attackers are almost exclusively targeting enterprises with hacks perpetrated over the Web. As most enterprises move operations and functionality online, Web-based applications become a tempting threat vector for cybercriminals. Read this e-book for a look at Web threats and vulnerabilities – and how to protect your organization against them.

  View E-Book: Technical Guide on Combatting Emerging Web Threats research abstract

E-Book: Technical Guide on PCI by SearchSecurity.com. October 10, 2011 - TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance.

  View E-Book: Technical Guide on PCI research abstract

E-Book: Technical Guide on Vulnerability Management by SearchSecurity.com. June 03, 2010 - SearchSecurity.com presents a comprehensive guide to vulnerability management. Our experts cover all the angles with authoritative technical advice on: application security testing methods; leveraging vulnerability assessment results; analysis and correlation of pen test results; Windows patch management; and how to best assess your security state.

  View E-Book: Technical Guide on Vulnerability Management research abstract

E-Book: Technical Guide on Web Application Firewalls by SearchSecurity.com. November 04, 2010 - Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.

  View E-Book: Technical Guide on Web Application Firewalls research abstract

eBook: Software as a Service: What You Should Consider When Moving to SaaS by SearchSecurity.com. November 2008 - Check out this expert eBook and learn about the current trends in the SaaS market and find out how these services can help your company thrive in today's difficult economy.

  View eBook: Software as a Service: What You Should Consider When Moving to SaaS research abstract

eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies by SearchSecurity.com. December 2008 - Check out this expert eBook to learn about the benefits of implementing a GRC program and get best practices for integrating these strategies into your company's infrastructure. This eBook is sponsored by Application Security, Inc, Beyond Trust, Lumension Security, MessageLabs, Thawte, Varonis and Websense.

  View eBook: Understanding GRC(Governance, Risk Management, and Compliance): Frameworks, Tools and Strategies research abstract

Email Security Technical Guide by SearchSecurity.com. April 05, 2013 - Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.

  View Email Security Technical Guide research abstract

Endpoint Security IT Decision Center Handbook 2 by SearchSecurity.com. November 25, 2013 - Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.

  View Endpoint Security IT Decision Center Handbook 2 research abstract

Endpoint Security IT Decision Center Handbook 3 by SearchSecurity.com. November 26, 2013 - Access this expert handbook for 6 questions to ask about your next endpoint security software solution and its ability integrate into your environment.

  View Endpoint Security IT Decision Center Handbook 3 research abstract

Endpoint Security Management (Antimalware Technologies) Technical Guide by SearchSecurity.com. September 11, 2013 - This expert TechGuide will help you develop your endpoint security management transition plan, with key factors to consider during the next 12 months.

  View Endpoint Security Management (Antimalware Technologies) Technical Guide research abstract

Essential Guide to PCI DSS by SearchSecurity.com. September 14, 2009 - This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.

  View Essential Guide to PCI DSS research abstract

Essential Guide to Threat Management by SearchSecurity.com. March 15, 2011 - Our Expert Essential Guide to Threat Management explores the best ways to defend against modern threats and targeted attacks. Malicious insiders have placed a bull’s eye on your organization’s back, waiting to strike at just the right time.

  View Essential Guide to Threat Management research abstract

Expert E-Book: Data Security and the Cloud by SearchSecurity.com. February 07, 2011 - This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.

  View Expert E-Book: Data Security and the Cloud research abstract

Global Security University: IAM Integration Classroom by SearchSecurity.com. July 31, 2013 - TBD

  View Global Security University: IAM Integration Classroom research abstract

Guide: Threat Detection Technologies by SearchSecurity.com. August 06, 2013 - This TechGuide will provide analysis of APTs and ways to determine whether your organization risks exposure to targeted attacks. The chapters explore detection technologies, how to monitor insider threats and how to effectively use threat intelligence to defend against a targeted attack before it happens.

  View Guide: Threat Detection Technologies research abstract

Handbook: Vulnerability Management by SearchSecurity.com. January 27, 2014 - This TechGuide will help you both identify and prioritize vulnerabilities based on sound risk-management principles, ensuring a vulnerability management program that is effective and aligned with broader risk-management goals.

  View Handbook: Vulnerability Management research abstract

How to Evolve Your Compliance Program As Technologies and Mandates Change by SearchSecurity.com. October 28, 2009 - This collection of slides from the Information Security Decisions Conference gives an overview of the changes in security compliance regulations and the resulting changes in security technologies. Download the slides and learn about changes in regulations, the evolution of technology, keeping virtualization and cloud computing compliant, and more.

  View How to Evolve Your Compliance Program As Technologies and Mandates Change research abstract

Information Security ANZ March 2014 by SearchSecurity.com. March 18, 2014 - This issue looks at the security challenges facing IT security professionals in the Australia/New Zealand region.

  View Information Security ANZ March 2014 research abstract

Information Security ASEAN March 2014 by SearchSecurity.com. March 18, 2014 - This ezine looks at the security challenges facing IT security professionals in the ASEAN region with a look at threats and industry trends.

  View Information Security ASEAN March 2014 research abstract

Information Security Magazine by SearchSecurity.com. February 03, 2014 - In our inaugural issue of 2014, we look at the top cyberthreats and attack techniques that security professionals are likely to face this year.

  View Information Security Magazine research abstract

Information Security Magazine - April 2013 by SearchSecurity.com. April 03, 2013 - This month's issue takes a comprehensive look at existing identity and access management (IAM) solutions and explores how establishing a centralized IAM system not only combats the challenges SaaS and mobile devices, but provides better overall operational consistency across your entire infrastructure.

  View Information Security Magazine - April 2013 research abstract

Information Security Magazine - February 2013 by SearchSecurity.com. February 01, 2013 - In this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more.

  View Information Security Magazine - February 2013 research abstract

Information Security Magazine - March 2013 by SearchSecurity.com. March 01, 2013 - This issue of Information Security magazine explores the outsourcing of security services and the managed security service provider (MSSP) landscape. Also explored are key tips for managing big data privacy concerns, how antivirus evasion techniques show the ease with which attackers bypass detection, and much more.

  View Information Security Magazine - March 2013 research abstract

Information Security Magazine – April 2014 by SearchSecurity.com. April 01, 2014 - In this issue, we help you assess your mobile security strategy in the face of emerging threats and attackers' use of mobile devices to carry out attacks.

  View Information Security Magazine – April 2014 research abstract

Information Security Magazine – July/August 2013 by SearchSecurity.com. August 06, 2013 - This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.

  View Information Security Magazine – July/August 2013 research abstract

Information Security Magazine – March 2014 by SearchSecurity.com. March 03, 2014 - In this issue, we look at the security debate shadowing cloud deployments, and explain how to assess the threats, vulnerabilities and consequences using a simple risk equation.

  View Information Security Magazine – March 2014 research abstract

Insider Edition: Antimalware Technologies and Techniques to the Rescue by SearchSecurity.com. March 05, 2014 - In this Insider Edition, we'll examine the recent advances in advanced malware detection and prevention as well as which ones are likely to bear fruit in your organization.

  View Insider Edition: Antimalware Technologies and Techniques to the Rescue research abstract

ISM December 2012 by SearchSecurity.com. December 07, 2012 - In this month's issue, Information Security magazine contributor and award-winning technology journalist, Robert Lemos, explores this rapidly expanding market and shows you exactly how to profit from Zero-day exploits.

  View ISM December 2012 research abstract

July Technical Guide on Network Security by SearchSecurity.com. July 18, 2012 - Attackers moving from server to server on your network can be difficult to detect, especially if they develop code that evades detection. Network threat detection is more complex and important than ever with attackers stealing payment information or other valuable data. This informative white paper outlines how to better safeguard your network.

  View July Technical Guide on Network Security research abstract

June Information Security Magazine by SearchSecurity.com. June 05, 2013 - Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. Our June cover story provides insight into adoption trends, cross-industry issues, and MDM solutions best fit to varying requirements. We also look at big data analytics and security and provide an update on FedRAMP.

  View June Information Security Magazine research abstract

Log Management Best Practices: Six Tips for Success by SearchSecurity.com. August 01, 2011 - The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.

  View Log Management Best Practices: Six Tips for Success research abstract

Managing Identities and Access Control by SearchSecurity.com. February 24, 2010 - SearchSecurity.com presents a comprehensive guide to managing user identities and access control within the enterprise. Our experts cover all the angles with technical advice on: centralized identity management; the importance of uniting IAM and data protection; developing policies for privileged users; and how to implement and maintain user roles.

  View Managing Identities and Access Control research abstract

May Information Security Magazine by SearchSecurity.com. April 29, 2013 - This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!

  View May Information Security Magazine research abstract

May Technical Guide on PCI DSS Guidance by SearchSecurity.com. May 07, 2012 - This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.

  View May Technical Guide on PCI DSS Guidance research abstract

Mobile Device Management Technical Guide by SearchSecurity.com. March 06, 2013 - In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.

  View Mobile Device Management Technical Guide research abstract

Mobile Security Insider's Edition by SearchSecurity.com. November 18, 2013 - This Insider Edition will lay out the basic strategies your organization should follow when dealing with mobile security, including data protection technologies, mobile device management and policies dealing with employees bringing personal consumer devices onto the network.

  View Mobile Security Insider's Edition research abstract

Network Security Essential Guide by SearchSecurity.com. February 06, 2013 - The increasing complexity of network attack methods has made it necessary to implement equally complex security tools and - more importantly - strategies. Read this Essential Guide on information security to learn more about key elements of a well-coordinated security strategy.

  View Network Security Essential Guide research abstract

Network Security Technologies Technical Guide by SearchSecurity.com. December 31, 2012 - Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.

  View Network Security Technologies Technical Guide research abstract

Network Security Visibility and Analysis Technical Guide by SearchSecurity.com. June 10, 2013 - This TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology.

  View Network Security Visibility and Analysis Technical Guide research abstract

November Information Security Magazine by SearchSecurity.com. October 31, 2013 - Companies have embraced virtualization and cloud computing but virtualization security, the subject of this issue's cover feature, is still bolted-on. Find out what needs to change.

  View November Information Security Magazine research abstract

PCI DSS 3.0: The Expert's Guide to the New Guidance by SearchSecurity.com. January 31, 2014 - This SearchSecurity.com Editorial TechGuide gives an overview of the major changes with PCI DSS 3.0, outlines where procedures and policies remain unclear, and closes with a practical list of the top five ways this new standard affects merchants.

  View PCI DSS 3.0: The Expert's Guide to the New Guidance research abstract

PCI DSS: Next-Generation Data Security, Storage and Integrity by SearchSecurity.com. October 11, 2010 - SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.

  View PCI DSS: Next-Generation Data Security, Storage and Integrity research abstract

Restore Balance with Next Generation Authentication Technical Guide by SearchSecurity.com. November 21, 2013 - Access this tech guide to gain expert advice from industry leaders to uncover emerging authentication technologies that address the need for higher security measures in the cloud and for mobility.

  View Restore Balance with Next Generation Authentication Technical Guide research abstract

Secure File Transfer Tech Guide by SearchSecurity.com. February 06, 2013 - Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.

  View Secure File Transfer Tech Guide research abstract

Secure File Transfer: Send it Fast, but Send it Safely by SearchSecurity.com. April 14, 2014 - FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity.

  View Secure File Transfer: Send it Fast, but Send it Safely research abstract

September Information Security Magazine by SearchSecurity.com. August 30, 2013 - Industry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come.

  View September Information Security Magazine research abstract

SIEM IT Decision Center- Checklist #1 by SearchSecurity.com. January 01, 2013 - If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.

  View SIEM IT Decision Center- Checklist #1 research abstract

SIEM IT Decision Center- Checklist #2 by SearchSecurity.com. February 11, 2013 - This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.

  View SIEM IT Decision Center- Checklist #2 research abstract

SIEM Technical Guide by SearchSecurity.com. February 19, 2014 - This TechGuide examines the policies and enhanced monitoring needed from a SIEM to make smarter decisions and respond faster to incidents.

  View SIEM Technical Guide research abstract

Technical Guide on Application Security by SearchSecurity.com. December 31, 2012 - This expert Tech Guide from SearchSecurity.com offers insight on today's application security threat environment, as well as key recommendations and challenges with implementing the latest defense tools.

  View Technical Guide on Application Security research abstract

Technical Guide on Government Security by SearchSecurity.com. May 23, 2011 - Information security practices of government organizations is at an all time high as attackers begin to focus on critical infrastructures and resources. This expert e-guide, presented by SearchSecurity.com, explores where government organizations need to direct their efforts in order to understand and properly mitigate critical threats.

  View Technical Guide on Government Security research abstract

Technical Guide on Mobile Security by SearchSecurity.com. November 01, 2011 - Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue.

  View Technical Guide on Mobile Security research abstract

Technical Guide on SIM by SearchSecurity.com. August 16, 2011 - Security information and event management solutions are an indispensible technology in IT security programs to help solidify data protection and compliance initiatives. In this comprehensive guide to SIM, our experts provide authoritative technical advice to help ensure effective SIM deployments and proper on-going maintenance.

  View Technical Guide on SIM research abstract

Technical Guide on Windows Security by SearchSecurity.com. November 04, 2011 - SearchSecurity.com presents a comprehensive guide to Windows security. Our experts help you discover all of the security enhancements made to Windows 7, including BitLocker, AppLocker, DirectAccess and the Win7 Firewall. You’ll learn how to use these tools to help your organization better manage your Windows security efforts.

  View Technical Guide on Windows Security research abstract

The changing SIEM landscape: What you should know to stay ahead by SearchSecurity.com. April 19, 2012 - While SIEM systems are often expensive and complex, they play a vital part in your risk and compliance strategy. This technical guide on SIM explores SIEM technologies today and offers exclusive tips and considerations for your deployment.

  View The changing SIEM landscape: What you should know to stay ahead research abstract

The Evolution of SIM by SearchSecurity.com. June 12, 2009 - Security expert Diana Kelley explains how enterprise SIM use has evolved and how companies might use SIMs differently in the future.

  View The Evolution of SIM research abstract

Threat Detection (Antivirus Intrusion Prevention) by SearchSecurity.com. May 03, 2013 - Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.

  View Threat Detection (Antivirus Intrusion Prevention) research abstract

Unified Threat Management: Decision Time by SearchSecurity.com. February 26, 2014 - Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.

  View Unified Threat Management: Decision Time research abstract

Unified Threat Management: From Business Problem to Technical Solution by SearchSecurity.com. February 25, 2014 - Learn how unified threat management (UTM) systems can help you achieve a layered security defense.

  View Unified Threat Management: From Business Problem to Technical Solution research abstract

Unified Threat Management: RFP Technology Decisions by SearchSecurity.com. February 26, 2014 - To properly evaluate unified threat management (UTM) products, you must understand what each vendor offers and how well it fits with your organization.

  View Unified Threat Management: RFP Technology Decisions research abstract

Web Application Security Insider's Edition by SearchSecurity.com. - This Insider Edition will help you understand threats against Web applications, how you can help developers with security tools and training and how to deploy technologies such as Web application firewalls to keep your organization's Web presence safe.

  View Web Application Security Insider's Edition research abstract

What’s the Best Focus for MDM Strategy Now? by SearchSecurity.com. March 12, 2014 - This guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters.

  View What’s the Best Focus for MDM Strategy Now? research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts