- August 06, 2009
Midmarket companies have little leverage in contractual negotiations with large managed security service providers, and should look toward smaller MSSPs for more flexibility in defining service level agreements.
- August 06, 2009
At Black Hat, a researcher unveils a tool that obfuscates fixes in Windows security patches, making them invisible to binary diffing suites and automated reverse engineering.
- July 21, 2009
Microsoft Essential Business Server solves major security and network management issues for midmarket companies that are outgrowing Microsoft Small Business Server 2003 and are too small for enterprise solutions.
- July 06, 2009
Providers may be required to be compliant with PCI, but that doesn't liberate merchants from liability in the event of a breach.
- July 01, 2009
Expensive source code reviews, or complex Web application firewalls, are required for PCI compliance, but many midmarket companies don't have the money or expertise to buy and run these tools.
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
Sponsored by DellEMC - Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More
Sponsored by DellEMC - If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More
- June 11, 2009
Data loss prevention can work for the midmarket if organizations have streamlined requirements and can easily identify and locate sensitive data.
- April 23, 2009
Experts at the 2009 RSA Conference say midmarket security managers must work with business leaders to define acceptable risk, and transfer risk prioritization to them when appropriate.
- April 14, 2009
Microsoft continues to meld security and identity management, with the Beta 2 release this week of Stirling, the next generation of its Forefront Security Suite.