January 30, 2018
Comodo CA's new chairman Bill Conner and CEO Bill Holtz talk with SearchSecurity about competition in the certificate market and how the internet of things will fuel growth.
November 08, 2017
In this week's Risk & Repeat podcast, SearchSecurity editors discuss the sale of Symantec Website Security to DigiCert and what it means for Symantec's troubled certificate business.
November 03, 2017
This week, bloggers look into advances in endpoint security systems, achieving greater functionality with AirCheck G2 and the continued role of the command-line interface in an API era.
June 14, 2017
The battle over Symantec CA operations continues as the antivirus vendor pushes back against a consensus remediation proposal from the web browser community.
Symantec Get Started
Bring yourself up to speed with our introductory content
Expert Ed Tittel offers an overview of Symantec DeepSight Intelligence, which provides organizations with information and alerts on today's IT threats. Continue Reading
IT admins have more endpoints to manage than ever before, but they also have more choices when it comes to endpoint management tools. Five robust options stand out. Continue Reading
Email encryption is a critical component of enterprise security. In this buyer's guide, expert Karen Scarfone breaks down what you need to know to find the best email encryption software for your organization. Continue Reading
Evaluate Symantec Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
With so many different vendors in the market, it isn't easy to pick the right patch management tool. Read this product comparison to see which is best for your company. Continue Reading
Expert Ed Tittel examines the top threat intelligence services to understand how they differ from one another and address various enterprise security needs. Continue Reading
In this Risk & Repeat podcast, SearchSecurity editors discuss the latest Symantec vulnerabilities reported by Google Project Zero and the Shadow Brokers' Cisco exploit. Continue Reading
Learn to apply best practices and optimize your operations.
Although PCs and mobile devices perform many of the same tasks, IT administrators often manage them separately, and they use very different tools and approaches. Traditional PC-only management tools are too rigid to impose on mobile devices, and enterprise mobility management tools have focused on smartphones and tablets. It seems some vendors were waiting to see if mobile devices would kill desktop and laptop use, but that has hardly been the case. It's clear that both kinds of computing -- mobile and PC-based -- are here to stay. Unified endpoint management is emerging to help admins manage all the devices on their network with one tool.
There are some important points to remember, however. Companies must do their due diligence and select the endpoint management product that meets their needs. That means figuring out what capabilities are necessary, and finding a product that matches up. And admins can't lock down any devices; workers need access to data so they can be productive, whether that's at a desk in the office, or at a coffee shop while they're on an international business trip.Continue Reading
SearchSecurity's Risk & Repeat podcast discusses the Symantec vulnerability disclosed by Google Project Zero and what the bug means for the antivirus industry. Continue Reading
Data center operators can use tools already in place to create IT asset management strategies that yield millions in savings. Continue Reading
Problem Solve Symantec Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
In this week's Risk & Repeat podcast, SearchSecurity editors discuss Mozilla's suggested deadline for Symantec to turn over its certificate issuance operations. Continue Reading
IT cannot manage what it doesn’t know is there. As a result, desktop inventory management and other tools are essential to keep track of and control desktops. Continue Reading