Information Security Magazine Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
Information Security Magazine

Overview: Information Security is the enterprise security and risk managers' leading source of critical, objective information on strategic and practical security issues.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by Information Security Magazine.
Research offered by Information Security Magazine

April Issue of Information Security Magazine: Cloud Migration: Look before you leap by Information Security Magazine. April 05, 2011 - This month’s Information Security Magazine Online cover story explores the need for careful planning when migrating to the cloud. The benefits of cloud computing are real; a lower IT profile, faster provisioning, and the global availability of new services hold incredible value for most organizations.

  View April Issue of Information Security Magazine: Cloud Migration: Look before you leap research abstract

August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders by Information Security Magazine. August 08, 2011 - This month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market.

  View August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders research abstract

E-Guide: Information Security Essential Guide to Compliance by Information Security Magazine. July 06, 2010 - Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities.

  View E-Guide: Information Security Essential Guide to Compliance research abstract

eBook: Strategies for Securing Virtual Machines by Information Security Magazine. December 2008 - Check out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines.

  View eBook: Strategies for Securing Virtual Machines research abstract

eGuide: Essential Guide to Identity & Access Management by Information Security Magazine. May 29, 2009 - This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.

  View eGuide: Essential Guide to Identity & Access Management research abstract

Essential Guide to PCI DSS by Information Security Magazine. September 14, 2009 - This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.

  View Essential Guide to PCI DSS research abstract

Essential Guide to SIMs Strategy by Information Security Magazine. October 26, 2010 - Take an incremental approach to security information and event management. Start slow, narrow your goals and be patient with these expensive and complex tools, otherwise data overload will bring you down. Read this guide to find out so much more.

  View Essential Guide to SIMs Strategy research abstract

Essential Guide to Threat Management by Information Security Magazine. March 19, 2009 - Check out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.

  View Essential Guide to Threat Management research abstract

Expert eBook: Encryption: Properly Securing Your Valuable Data by Information Security Magazine. October 2008 - Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.

  View Expert eBook: Encryption: Properly Securing Your Valuable Data research abstract

February Issue of Information Security magazine: “Safety Check: Enforcing endpoint security requires careful planning and deployment” by Information Security Magazine. January 31, 2011 - This month’s Information Security Magazine Online cover story explores the current state of endpoint security enforcement and the challenges enterprises face during implementation.

  View February Issue of Information Security magazine: “Safety Check: Enforcing endpoint security requires careful planning and deployment” research abstract

Information Security Magazine - April 2010: Endpoints on the Loose by Information Security Magazine. April 07, 2010 - This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.

  View Information Security Magazine - April 2010: Endpoints on the Loose research abstract

Information Security Magazine - December 2009 / January 2010: Basic Database Security by Information Security Magazine. December 14, 2009 - This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more.

  View Information Security Magazine - December 2009 / January 2010: Basic Database Security research abstract

Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession by Information Security Magazine. February 01, 2009 - Check out this eBook and get expert advice that can help your company successfully improve its threat management posture.

  View Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession research abstract

Information Security Magazine - February 2010: Under Control by Information Security Magazine. February 03, 2010 - Feature articles this month cover bringing data loss prevention coverage to mobile endpoints, readers’ security priorities and top investments for 2010, and new compliance mandates in Massachusetts and Nevada that signal a new generation of data protection laws. Read on for these great articles and more.

  View Information Security Magazine - February 2010: Under Control research abstract

Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’ by Information Security Magazine. March 09, 2010 - This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.

  View Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’ research abstract

Information Security Magazine - October 2009: Security 7 Awards by Information Security Magazine. October 13, 2009 - The big news in this month's issue is the announcement of the winners of the fifth annual Security 7 Award. Other featured articles present tips for preventing future incidents and also explain how SOX compliance is hitting smaller public companies harder than the big guys. Read on for these great articles and more.

  View Information Security Magazine - October 2009: Security 7 Awards research abstract

Information Security Magazine - September 2009: Readers’ Choice Awards by Information Security Magazine. September 15, 2009 - This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.

  View Information Security Magazine - September 2009: Readers’ Choice Awards research abstract

Information Security Magazine November 2009: Stay in Control by Information Security Magazine. November 16, 2009 - Unmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it. Read this magazine and find out how a consistent change management process puts you in charge.

  View Information Security Magazine November 2009: Stay in Control research abstract

Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity by Information Security Magazine. July 21, 2010 - The industry has preached the need for software security and secure coding for several years now. After all, if software is designed securely from the start, it means fewer problems down the road. Read this paper now to learn more.

  View Information Security Magazine Online July/August Issue – Demystifying APT: Get the facts about this targeted threat activity research abstract

Information Security Magazine September 2011—Reader’s Choice Awards by Information Security Magazine. September 01, 2011 - Brought to you by SearchSecurity.com, this month’s Information Security Magazine cover story unveils the 2011 Information Security Reader’s Choice Awards. Learn which products your peers voted as the best in the market spanning 14 different categories including; antimalware, mobile data security, vulnerability management and remote access.

  View Information Security Magazine September 2011—Reader’s Choice Awards research abstract

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine. December 09, 2010 - This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.

  View Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act research abstract

Information Security Magazine – June 2010: Laptop Lockdown by Information Security Magazine. June 16, 2010 - This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.

  View Information Security Magazine – June 2010: Laptop Lockdown research abstract

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor by Information Security Magazine. October 07, 2010 - This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.

  View Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor research abstract

Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee by Information Security Magazine. January 01, 2009 - This special issue of Information Security Magazine explains the ins and outs of security steering committees. Learn who needs to be there, why they need to be there, what they need to be doing, and how to help them do it.

  View Information Security Magazine, January 2009: Look Who's Coming to Dinner--the Security Steering Committee research abstract

Information Security Magazine, July 09: Controlling Privileged Accounts by Information Security Magazine. July 13, 2009 - This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.

  View Information Security Magazine, July 09: Controlling Privileged Accounts research abstract

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs by Information Security Magazine. June 10, 2009 - This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.

  View Information Security Magazine, June 2009 - SIMs: More than just a pile of logs research abstract

Information Security Magazine, May 2009: Automating Compliance by Information Security Magazine. May 01, 2009 - This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.

  View Information Security Magazine, May 2009: Automating Compliance research abstract

Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be? by Information Security Magazine. April 20, 2009 - This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.

  View Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be? research abstract

Information Security Magazine: March 2009 - Sky-High Risk? by Information Security Magazine. March 20, 2009 - This month's issue of Information Security focuses on risk management. We'll cover many important topics, such as: Cloud Computing - cost savings vs. security concerns; Web 2.0 - ways monitor and manage Web 2.0 usage within your company; Web Application Firewalls - How to choose and implement the right WAF for your company; and much more.

  View Information Security Magazine: March 2009 - Sky-High Risk? research abstract

Information Security Magazine: May 2010 - Data: Do you know where it’s going? by Information Security Magazine. May 03, 2010 - This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more.

  View Information Security Magazine: May 2010 - Data: Do you know where it’s going? research abstract

Information Security Magazine: “Health Care Data Protection” by Information Security Magazine. March 15, 2011 - This month’s Information Security Magazine Online cover story dissects the recent HIPAA revisions made by the HITECH Act.

  View Information Security Magazine: “Health Care Data Protection” research abstract

June Issue of Information Security magazine: Mobile Security: A New Game Plan by Information Security Magazine. June 02, 2011 - This month's Information Security Magazine Online cover story highlights the importance for an updated security game plan due to the influx of personal smartphones and other computing devices making their way into the enterprise. Also, learn how to focus your SIM solution to avoid information overload and explore FISMA challenges.

  View June Issue of Information Security magazine: Mobile Security: A New Game Plan research abstract

March Issue of Information Security magazine: “Virtual Certainty: VMs introduce a new security dynamic” by Information Security Magazine. March 04, 2011 - This month’s Information Security Magazine Online cover story explores the need for sound security and risk management strategies around virtualization technology.

  View March Issue of Information Security magazine: “Virtual Certainty: VMs introduce a new security dynamic” research abstract

May Issue of Information Security Magazine: Data Protection: Going the Distance by Information Security Magazine. May 05, 2011 - This month’s Information Security cover story explores the practical ways you can avoid mishaps by building on the technical specifications of compliance requirements like PCI DSS. Learn to focus your efforts on not only satisfying these compliance mandates, but also create a robust, comprehensive information security program at the same time.

  View May Issue of Information Security Magazine: Data Protection: Going the Distance research abstract

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management by Information Security Magazine. November 10, 2010 - November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more!

  View November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management research abstract

Readers' Choice Awards by Information Security Magazine. April 2008 - Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.

  View Readers' Choice Awards research abstract

Your September Issue of Information Security Magazine– Readers’ Choice Awards by Information Security Magazine. September 10, 2010 - In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.

  View Your September Issue of Information Security Magazine– Readers’ Choice Awards research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts