- August 06, 2009
Midmarket companies have little leverage in contractual negotiations with large managed security service providers, and should look toward smaller MSSPs for more flexibility in defining service level agreements.
- August 06, 2009
At Black Hat, a researcher unveils a tool that obfuscates fixes in Windows security patches, making them invisible to binary diffing suites and automated reverse engineering.
- July 21, 2009
Microsoft Essential Business Server solves major security and network management issues for midmarket companies that are outgrowing Microsoft Small Business Server 2003 and are too small for enterprise solutions.
- July 06, 2009
Providers may be required to be compliant with PCI, but that doesn't liberate merchants from liability in the event of a breach.
- July 01, 2009
Expensive source code reviews, or complex Web application firewalls, are required for PCI compliance, but many midmarket companies don't have the money or expertise to buy and run these tools.
Sponsored by IBM - What you don’t know about your apps can hurt you—costing you time, money and productivity. With the right UEM solution, you can use AI to gain actionable insight into app usage, performance and security to quickly and easily get your apps in gear. See More
Sponsored by IBM - May 25, 2018 has passed, but that doesn’t mean your GDPR work is done. Compliance demands constant vigilance, particularly for endpoints and mobile devices. Learn why UEM is the modern approach to meeting ongoing compliance requirements. See More
Sponsored by IBM - Imagine a way to configure and enforce policies for all endpoints, guided by AI, real-time analytics and best practices from your industry and peer usage. Imagine no longer. With the right UEM solution, you can do all of that—and much more. See More
Sponsored by IBM - Ruggedized devices have unique characteristics, but they still need to be managed, secured, tracked and updated—same as other endpoints. With UEM you can simply and securely manage all devices using the same platform. Here’s what to look for. See More
- June 11, 2009
Data loss prevention can work for the midmarket if organizations have streamlined requirements and can easily identify and locate sensitive data.
- April 23, 2009
Experts at the 2009 RSA Conference say midmarket security managers must work with business leaders to define acceptable risk, and transfer risk prioritization to them when appropriate.
- April 14, 2009
Microsoft continues to meld security and identity management, with the Beta 2 release this week of Stirling, the next generation of its Forefront Security Suite.