Security News & Reviews - Page 2

More Security News

OOW2019

Oracle Bolsters Cloud Services, Automates Security

|
eWEEK NEW-PRODUCT ANALYSIS: At its annual OpenWorld conference, the company introduced Autonomous Linux, additions to its partner ecosystem and cloud region accessibility, more options for tighter security, improvements to virtual infrastructure and numerous ways to infuse intelligence into...
DR.Push

Disaster Recovery: Steps SMBs, Enterprises Must Take

|
eWEEK DATA POINTS RESOURCE PAGE: Disaster strikes: Your critical data is gone. How long can your business survive?
Cloud.security

How to Secure Authorization in the Cloud

|
eWEEK DATA POINTS RESOURCE PAGE: In the cloud environment, it is all the more important to define strong privileges. Each entity, machine or storage space should have its own specific purpose, and communication between services should be according to need and use.
AWS.Vs.Azure

At a High Level in the Cloud: AWS vs. Azure

|
eWEEK RESOURCE PAGE: The two largest cloud computing vendors are similar in many ways, yet there are clear differentiators that make a difference to most potential customers. Find out which characteristics work--or don't work--for your company.
Kemp.logo.loadmaster

How Kemp Brings Full Visibility to Multi-Cloud Load Balancing

|
PRODUCT ANALYSIS: Kemp offers relief to the pains of multi-cloud environments with innovative application delivery control and load balancing tools that keep administrators in the know.
Synerygy_CIS Q219

At a High Level: AWS vs. Azure vs. Google Cloud

|
eWEEK RESOURCE PAGE: The three largest cloud computing vendors each have their own strengths and weaknesses that make them ideal for different workloads. Which one is best for your use case?
Identity.security.perimeter

How IT, Security Teams Can Protect the New Perimeter

|
eWEEK DATA POINTS RESOURCE PAGE: Enterprises ought to take note: The security perimeter has changed, big time.
eweek.logo.DataPoints-UPDATE

Best Practices for Branch Office Edge Security

|
eWEEK RESOURCE PAGE: Advances in SD-WAN security are all well and good, but here’s the catch: SD-WAN solutions don’t address the changes that the branch office itself is undergoing. A new perspective must be undertaken.
eWEEK.IT.science.logo

IT Science Case Study: Upgrading Tech on a Working Farm

|
eWEEK IT SCIENCE: A profitable and well-run 65-acre working farm badly needed a complete IT makeover, and Ricoh was the provider that stepped up and did it.
Brinqa.Risk.Mgt

How Brinqa Brings Actionable Insights to Cyber-Risk Management

|
SECURITY PRODUCT REVIEW: Cybersecurity has become a complex endeavor, requiring advanced analytics and data science to bring relevance to the massive amounts of data collected. Brinqa slays the beast of data analytics with a platform approach that brings actionable insight to the data.
1088_ProductComparison

Splunk vs. LogRhythm: SIEM Head-to-Head

|
PRODUCT COMPARISON: Both LogRhythm and Splunk have a great deal to offer. Both have loyal support from customers and good-to-excellent reviews from industry analysts. But admins should look closely at the finer points each solution offers to see which is better-suited for your company.
eweek.logo.DataPoints-UPDATE

Seven Considerations for Doing Secure Cloud Migration

|
eWEEK DATA POINTS: Lior Cohen, Senior Director of Products and Solutions, Cloud Security, at Fortinet, offers seven steps every organization should consider when planning a cloud adoption or cloud migration strategy.

Enterprise Tech Videos