Security

Recent Articles

  • Understanding the State of Endpoint Security

    Understanding the State of Endpoint Security What You Need to Know About the State of Endpoint SecurityBy Ericka Chickowski No Title The Ponemon Institute recently conducted a study on behalf of Lumension to take the pulse of decision makers from both IT security and IT operations groups about endpoint management and security. Unsurprisingly, Ponemon found…

  • Seven Tips for Scalable Security Training

    One of the biggest ways channel partners can add value to their IT security implementations is to complement technology and consulting with a mature portfolio of security training offerings. As the famous hacker Kevin Mitnick will attest, people are every organization’s weakest link when it comes to keeping systems and data locked down. But what…

  • AVG Finds Scareware that Downloads Porn

    Rogue software and Trojans have perfected the art of appearing like a legitimate antivirus applications and tricking users into paying for cleaning up there system. As computer users become more aware of this threat, the scareware purveyors are turning to a new trick: porn. Roger Thompson, the chief scientist at AVG, has found new scareware…

  • Tufin Expands from Security into Network Management

    Firewall management firm Tufin Technologies recently announced that it plans on expanding into the field of general network management through a clutch of 12 new plug-ins to expand its open extensible architecture. The Israel-based security company is pinning hopes for future success on this architecture, dubbed the Tufin Open Platform (TOP). Introduced last April, TOP…

  • 80% of Security Products Fail to Meet Expectations

    Bulletproof security is a practical impossibility. Anyone who claims to have perfected the art of security is either a fool or a liar, since no security product or schema is foolproof or invincible. What security promises is risk mitigation; assuming that security technology works as advertised. And that’s the unspoken problem that undermines security effectiveness,…

  • Symantec Urges Partners to Narrow Focus

    While having leadership positions in multiple technology segments would seem like a good thing, it creates a problem for Symantec in that it’s increasingly difficult to succinctly classify Symantec as a whole. Is it a security company? Is it a storage company? Is an information lifecycle company? Is it a business process management company? The…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.