Security News & Reviews

More Security News

Identity.security.perimeter

How IT, Security Teams Can Protect the New Perimeter

|
eWEEK DATA POINTS RESOURCE PAGE: Enterprises ought to take note: The security perimeter has changed, big time.
eweek.logo.DataPoints-UPDATE

Best Practices for Branch Office Edge Security

|
eWEEK RESOURCE PAGE: Advances in SD-WAN security are all well and good, but here’s the catch: SD-WAN solutions don’t address the changes that the branch office itself is undergoing. A new perspective must be undertaken.
eWEEK.IT.science.logo

IT Science Case Study: Upgrading Tech on a Working Farm

|
eWEEK IT SCIENCE: A profitable and well-run 65-acre working farm badly needed a complete IT makeover, and Ricoh was the provider that stepped up and did it.
Brinqa.Risk.Mgt

How Brinqa Brings Actionable Insights to Cyber-Risk Management

|
SECURITY PRODUCT REVIEW: Cybersecurity has become a complex endeavor, requiring advanced analytics and data science to bring relevance to the massive amounts of data collected. Brinqa slays the beast of data analytics with a platform approach that brings actionable insight to the data.
1088_ProductComparison

Splunk vs. LogRhythm: SIEM Head-to-Head

|
PRODUCT COMPARISON: Both LogRhythm and Splunk have a great deal to offer. Both have loyal support from customers and good-to-excellent reviews from industry analysts. But admins should look closely at the finer points each solution offers to see which is better-suited for your company.
eweek.logo.DataPoints-UPDATE

Seven Considerations for Doing Secure Cloud Migration

|
eWEEK DATA POINTS: Lior Cohen, Senior Director of Products and Solutions, Cloud Security, at Fortinet, offers seven steps every organization should consider when planning a cloud adoption or cloud migration strategy.
Cisco.Live.sign

How Cisco Systems Has Evolved into a True IT Provider

|
TREND ANALYSIS: The 2019 edition of Cisco Live underscored that the transformation of the company is indeed complete.
Product.Comparison.standing

Splunk vs. IBM QRadar: SIEM Head-to-Head

|
eWEEK PRODUCT COMPARISON: IBM and Splunk deliver two of the best SIEM solutions in the business, but each product offers distinct benefits to potential buyers.
IO-Tahoe

How Io-Tahoe Protects Privacy Using Real-Time Data Discovery

|
PRODUCT ANALYSIS: Data in motion is quickly becoming the target of cyber-criminals seeking to steal private data. Protecting those data streams takes discovery, analytics and intelligence.
storage vendors

Top Storage Companies

|
New-gen data storage, whether on premises or in the cloud, is all about systems providing the correct information for employees on demand while at the same time maintaining data privacy for users at all levels. These requirements are the same for any size enterprise.
1088_MobileDeviceMngSoftware

Top Mobile Device Management Companies

|
BYOD (bring your own device) to work is fast on the way out. There are too many security pitfalls and risks for an enterprise to endure. It's better to invest in a mobile device management system that can handle all devices a company hands out to its employees plus those random rebels who keep...
EU.GDPR.map

GDPR One-Year Anniversary: Data Privacy Still Needs Help

|
TREND ANALYSIS: One year out from the GDPR's enforcement date, research shows personal data privacy is still a hot-button issue, and distrust continues to run high.
CCPA.2020

Law Firm Releases New Data Privacy App for CCPA

|
NEWS ANALYSIS: SixFifty Privacy, provided by Palo Alto law firm Wilson Sonsini, is all about automating processes to comply directly with the new state regulation.

Enterprise Tech Videos