Social Networking & Collaboration SaaS Collaboration & Project Management Buyer's Guide InformationWeek surveyed 322 business technology professionals who use or have used or evaluated security information and event management (SIEM) products in the past 12 months. We asked respondents to rate these products in two major categories: overall performance and SIEM-specific capabilities such as real-time alerts, search and log management. PLUS: Full vendor responses Professional Development & Salary Data 2012 End User Support/Help Desk Staffing Survey Thirty-one percent of our survey respondents said they anticipate end user support/help desk will be a top area of staffing decrease -- more than for any other category. However, 16% said this area is one of two that would see the biggest increase in staffing at their companies in the next year. BYOD, social media and the general consumerization of IT may be changing the nature of the internal support role at companies -- and in some cases creating new opportunities for support staffers. Business Continuity Expanding Role of Cloud in Business Continuity & Disaster Recovery - Sponsored by EVault Small and midsize businesses face the same escalated cyber attacks and increased frequency and scope of natural disasters as enterprises. Fortunately, new cloud offerings can help everyone work smarter.
Security Writing and Enforcing an Effective Employee Security Policy - Sponsored by Verdasys Security policy has been around for as long as we have had computing systems to secure. So why is policy so often ineffective? Dark Reading examines the persistent problems companies have faced and offers some recommendations for developing, communicating and following through with a security policy.
Security: Fill the Gaps with Network Monitoring - Sponsroed by Q1 Labs The use of network monitoring tools in a security context can help companies fill gaps in protection as well as identify potential problems. Used strategically, network monitoring tools may help enterprises to detect potential security problems that they might otherwise have missed -- while also helping security organizations justify additional investment. Zero-Day Malware: HowTO Detect & Limit Its Impact - Sponsored by FireEye Antivirus systems alone cannot fight a growing category of malware whose strength lies in the fact that we have never seen it before. Dark Reading examines the ways in which zero-day malware is being developed and spread, and the strategies and products enterprises can leverage to battle it.
HowTO: Picking Endpoint Protection - Sponsored by ESET When it comes to protecting PCs and laptops, IT puts too much emphasis on malware detection. You'll get better results by focusing on performance, management and — most importantly — how users and the security software interact. This report tells you how to evaluate endpoint security software based on what really matters.
Salvaging Digital Certificates One year ago, Gmail users in Iran woke up to a chilling prospect: Their sensitive and supposedly secure communications on Google's email program may have been tapped by unknown parties. A phony digital certificate in Google's name was used to impersonate the site and let the culprits mount a "man in the middle" attack to intercept and decrypt email sent to Google's servers before passing the messages along to the intended recipients.
InformationWeek Reports is brought to you by EVault, FireEye, NaviSite, NEC, Q1 Labs, Verdasys and UBM TechWeb. You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter. If you received this newsletter from a friend and want to join. Read about and join other InformationWeek Newsletters here. UBM TechWeb | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy
| |
No comments:
Post a Comment