Security

Recent Articles

  • Security Audits Do Customers Listen

    Security Audits Do Customers Listen Of the survey participants, 76% have employed third-party experts to audit network security practices. However, only 35% conduct these audits every year. About 27% hire a third party to audit every two years and 14% do so every three years or more. No Title The key driver for bringing in…

  • Symantec, Websense and RSA Top DLP Field

    Only three security vendors—Symantec, Websense and RSA (the security division of EMC)—landed in the upper-right square of Gartner’s data loss prevention magic quadrant. But that really doesn’t matter if you listen to what Gartner’s own analyst say about the DLP technologies and strategies. More than a dozen software and cloud services vendors offer DLP solutions,…

  • Data Security Vendor Dataguise Hires VP of Sales

    Specializing in data security within testing and QA environments, Fremont, Calif.-based Dataguise is amping up its efforts to appeal to compliance-minded business users with a new sales executive appointment that may also heat up its efforts to engage the channel. The company named Martyn Baker as vice president of sales earlier this month. With more…

  • Microsoft Releases Free Antivirus Software

    With a flick of the switch today, Microsoft will make available its free security suite, Microsoft Security Essentials. The suite, developed under the code name Morro, is the culmination of years of product development and acquired technology integration to transform Microsoft from a platform of security products to a provider of security protection. MSE is…

  • M86 Security Takes on Bigger Vendors

    Just a few weeks after a name change and a little under 11 months after a merger between Marshal and 8e6 Technologies, M86 Security has high aspirations to take on major security players such as Websense and McAfee in the secure Web gateway market with the help of a new slate of products and a…

  • Password, ID Stealing Malware Volume Jumps 400%

    Clampi, the Trojan that Secure Channel wrote about yesterday, is a fine example of why we’ll never see another Code Red, Nimda or LoveLetter virus again. The intent of malware is no longer to cause mass service disruptions, but rather to steal as much information as possible without getting detected. Trojans, worms, viruses and rootkits…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.