Applet

Security risk management News

View All News

Security risk management Get Started

Bring yourself up to speed with our introductory content

  • Will it last? The marriage between UBA tools and SIEM

    The failure to detect insider threats and a growing need to store and sort through massive amounts of data have drawn attention to user behavior analytics, sometimes called user and entity behavior analytics. According to Gartner, UBA tools deliver value for use cases such as compromised accounts, including stolen and phished credentials. They can also be used to find compromised systems and data exfiltration.

    Security platforms like data loss prevention, endpoint security and cloud access security brokers will increasingly layer or incorporate UBA features to help analyze alerts and make underlying technology more useful, according to analysts. SIEM and UBA are also converging, with SIEM vendors adding UBA tools and UBA vendors building SIEM systems.

    In this issue of Information Security magazine, we look at the dynamics around UBA and strategies for CISOs going forward. UBA vendors are releasing product suites targeted at security operations centers, today built around SIEM. What does the future hold for standalone UBA tools? We look at time to value and use cases, and help you sift through the noise.

     Continue Reading

  • How to prevent password attacks and other exploits

    Prevention is essential to protection against password attacks, unauthorized access and related threats. Expert Adam Gordon outlines how to proactively bolster your defenses. Continue Reading

  • The evolution of enterprise IoT and its security risks

    While the benefits of enterprise IoT applications are aplenty, the hidden threats of engaging in IoT innovation must be addressed before adoption. Continue Reading

View All Get Started

Evaluate Security risk management Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Evaluate enterprise mobile devices for your workforce

    IT buyers must decide among tablets, smartphones or both to enhance worker productivity, as well as the usability, management and security level of the options available. Continue Reading

  • Consumer expectations, GDPR complicate data privacy protection

    Xerox CISO Alissa Johnson says U.S. companies will be forced to reconsider their information protection strategies as consumers' data privacy protection expectations evolve. Continue Reading

  • Features disaster recovery-as-a-service providers must offer

    A cost-effective disaster recovery as a service lets organizations of all sizes implement a dependable disaster recovery plan. Disaster recovery-as-a-service providers replicate or back up customer data to cloud data centers and then -- should disaster strike -- host and run applications remotely. There's a lot of room for disaster recovery-as-a-service providers to develop features specific to their DRaaS products, which can make sorting through those offerings daunting. Learn about the four key capabilities to look for when comparing DRaaS vendors to ensure the one you choose can handle the full range of potential disasters.

    Data that goes into cold storage is often kept for compliance and, increasingly, for big data analysis. Such data is infrequently or never accessed. Typically cheaper and lower performing than primary or secondary storage, cold storage systems are designed for storing such data. Enterprises may need to make this data warm or hot at a moment's notice, though, complicating cold storage design and increasing costs. Initially based on automated tape libraries and optical jukeboxes, cold storage systems have evolved to encompass Linear Tape File System and object storage as the amount of unstructured data has grown in recent years. Software for managing unstructured data has changed the cold data landscape as well.

    Employees often access and synchronize corporate data from a variety of consumer-grade sync-and-share services, putting the organization at risk. Enterprise-grade file sync-and-share -- available via the cloud, on premises or in hybrid modes -- includes enhancements to ensure security and compliance. Such features vary among vendors, but there are certain ones you should always look for to maintain data integrity and security.

     Continue Reading

View All Evaluate

Manage Security risk management

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Security risk management Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve