Blog Posts Tagged with "Gartner"
July 23, 2012 Added by:Ben Rothke
If up and to the right is the desired Magic Quadrant location, how does one get there? For many tech firms, they often are clueless. In this book, Stiennon provides clear direction. For those looking to make the expedition to the land of Gartner, this book is a veritable Berlitz Guide on how to make the journey...
January 02, 2012 Added by:Bill Gerneglia
"Instead of requesting that a third-party security vendor conduct testing on the enterprise's behalf, the enterprise will be satisfied by a cloud provider's certificate stating that a reputable third-party security vendor has already tested its applications."
June 21, 2011 Added by:Headlines
“We can have networks that can cause... existential damage without a nation-state involved. With the confluence of globalization and technology, these groups now have the ability to cause the kind of damage that used to involve national effort. We got a taste of this on 9/11..."
June 14, 2011 Added by:Lawrence Pingree
Increases in the complexity and volume of targeted attacks coupled with the necessity for companies to address compliance issues continues to support healthy security market growth. We will be examining the key security issues at the upcoming Gartner Security and Risk Management Summit...
May 29, 2011 Added by:Anton Chuvakin
I think the concept of Magic Quadrant is brilliant. However, many wrong SIEM purchase decisions I’ve seen made usually stem from the decision maker’s own ignorance and not from whatever document or market visualization he has in his possession. Keep this in mind…
May 04, 2011 Added by:Headlines
Qualys can deliver security and compliance in an integrated solution that easily interfaces with existing security solutions without the significant cost and complexity associated with deploying and maintaining traditional enterprise software...
January 02, 2011 Added by:Heather Howland
This research will help project managers, who are responsible for selecting a security information and event management (SIEM) solution, evaluate products from 12 of the major vendors in the segment...
November 17, 2010 Added by:Eli Talmor
Gartner continues to recommend fraud detection that monitors user behavior. This method captures and analyzes the user’s Web traffic, including login, navigation and transactions, and can spot abnormal access patterns that indicate an automated program is accessing the application..
Student Pleads Guilty to Counterfeiting Coup... on 06-18-2013
Starting to Clean Up the Mess from PCAnywher... Peggy Patterson on 06-18-2013