Compliance Achieving Compliance In The Smart Grid - Sponsored by TraceSecurity In most industries, compliance mandates can feel like more of an annoyance than a necessity. In the energy business, strict compliance mandates could be all that stands between business as usual and a catastrophic, long-term power outage. Standards regulating the smart grid, are rightly stringent and often difficult to meet, but they can be modified and leveraged by organizations in all industries to lock down corporate and customer assets. Security IT Pro Ranking: Unified Threat Management Unified threat management appliances combine multiple security functions into a single device to provide a streamlined security infrastructure with a compelling operational cost model. IT pros who use or have used or evaluated UTM appliances assess five vendors -- Check Point Software, Cisco Systems, Dell SonicWall, HP and Juniper Networks -- on critical features such as malware detection, intrusion prevention and throughput.
Identity and Access Management 101 - Sponsored by Aveska An Identity access management(IAM) project can be a daunting proposition. But it doesn't have to be. With careful planning and a firm understanding of the goals for and challenges of IAM, it is possible to lay an IAM foundation that will meet your organization's unique identity and access management needs now and in the future. Read this report to get the an introduciton and understanding of IAM so you can start building your blueprints. NMaaS: Network Monitoring As a Security Tool - Sponsored by Q1-IBM The use of network monitoring tools in a security context can help companies fill gaps in protection as well as identify potential problems. Used strategically, network monitoring tools may help enterprises to detect potential security problems that they might otherwise have missed -- while also helping security organizations justify additional investment. Tips & Tricks: Insider Threat Protection - Sponsored by Verdasys Insider threat-borne attacks remain the minority of data breaches but tend to inflict the most damage - especially when it comes to intellectual property theft. In this retrospective of recent Dark Reading coverage, we look at the hot trends and tips on how to flip the equation on the insider threat.
Mobility & Wireless Why Apple Is IT's Arch Frenemy Our Apple Outlook Survey is decisive: More than 90% of the 331 IT decision-makers that we surveyed either already support iPhones and iPads or have plans to do so. Even more surprising is that more than 80% support or plan to support Mac laptops and desktops. The kind of sea change that represents can't be overstated -- not that long ago Apple's presence in the enterprise, outside of a few core markets, was negligible. But is IT really on board or just bowing to pressure from users enamored of their iDevices?
Feds Face Challenges in Mobility Mandate The goal of the White House's Digital Government Strategy, spelled out in minute detail in a 36-page document, can be summed up in a few words: Make federal information and services available to the public "anytime, anywhere, on any device."
InformationWeek Reports is brought to you by Aveska, TraceSecurity, Trusteer, Verdasys, Q1-IBM and UBM Tech. You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter. If you received this newsletter from a friend and want to join. Read about and join other InformationWeek Newsletters here. UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy
| |