37,083 Results for:

  • Sort by: 

Virtualization security tools defend across clouds

01 Dec 2015

Several vendors offer ways to protect virtual machines both in the data center and in the cloud. How do these products differ from what's available from VMware or Amazon Web Services? Read More

Readers' top picks for application security tools

01 Dec 2015

The top companies and application security products that organizations consider when they seek to reduce their application vulnerabilities. Read More

Support a guest security policy with endpoint hardening

03 Aug 2018

Guest security relies not only on a series of tools and best practices, but also on a security mindset that starts with endpoint hardening and follows the deployment of every VM. Read More

How to ensure hyper-converged infrastructure security

10 Jul 2018

To secure data in an HCI system, it requires tools and techniques that account for the unique features of hyper-convergence, such as shared resources and virtualized management. Read More

Comparing the top database security tools

13 Aug 2015

Expert Ed Tittel examines the strengths and weaknesses of top-rated database security tools -- from database activity monitoring to transparent database encryption -- to help enterprises make the right purchasing ... Read More

A guide to SIEM platforms, benefits and features

20 Dec 2018

Evaluate the top SIEM platforms before making a buying decision. Explore how the top SIEM platform tools protect enterprises by collecting security event data for centralized analysis. Read More

The UK manufacturing sector needs a digital upgrade

02 Jul 2019

In this week’s Computer Weekly, the UK manufacturing sector is lagging behind on digital technology – we examine the challenges for the industry in becoming a global leader. Our buyer’s guide looks at enterprise ... Read More

Cloud workload protection tool speeds cloud migration, saves time

30 Apr 2018

Informatica deployed Aporeto's IT security tool to protect its cloud servers. It gained peace of mind -- and valuable time. Read More

Endpoint security tools: A buyer's guide

10 Jul 2015

Learn how to evaluate and buy the right endpoint security products for your organization with this antimalware buyer's guide. Read More

How Shodan helps identify ICS cybersecurity vulnerabilities

04 Oct 2018

Shodan can be a helpful tool for security pros to locate ICS cybersecurity vulnerabilities. Expert Ernie Hayden explains how Shodan works and how it can be used for security. Read More