enterprisesecuritymag

security management

Implementing Checkpoint for Productivity
Enterprisesecuritymag >> cioviewpoint

Bill Kohler, CIO, Americas International SOS

The Next Generation Threat Prevention Space: Today’s malicious code is very sophisticated, often using evasion techniques and other obfuscation methods to avoid detection by traditional signature-based anti-malware solutions. While...

Ongoing Authorization: Changing how Government does Security Compliance
Enterprisesecuritymag >> csoinsight

Jeff Eisensmith, CISO, DHS

The Department of Homeland Security is the steward of a great deal of information. Information used to support the department’s mission, personally identifiable information of the citizens we serve, and that of our employees must be...

Why the Cloud May be the Safest Place to Store Your Sensitive Data
Enterprisesecuritymag >> cxoinsights

David Burg, Principal and Global and US Advisory Cybersecurity leader, PwC

The use of cloud computing is officially mainstream across most industries, yet many executives still worry that provider security practices remain inadequate to protect sensitive data and mission-critical workloads. It’s a long-held...

Simplicity-The Virtue Of Future Security Solutions
Enterprisesecuritymag >> cxoinsights

Barmak Meftah, President and CEO, AlienVault

What significant changes did the enterprise security industry witness in 2013? What did these changes mean to vendors and customers? We saw our industry mature on two fronts:  First, it is becoming apparent to customers, analysts and...

Key Elements of Effective Security Planning
Enterprisesecuritymag >> cxoinsights

Rickie K Helmer, CEO and ISO/IEC 27001 ISMS expert, NetQuest

Most of us are aware of the fact that security threats of all kinds challenge us once we venture onto the internet, whether we are using it privately or through our daily work. When journeying into new ventures of investment in new technology,...

Is There Auditible Security in the Cloud?
Enterprisesecuritymag >> cioviewpoint

Preston Williams III, Senior Partner and CIO, GBC Global Services

I recently watched the CSPAN coverage of cloud computing in political campaigns held at the Graduate School of Political Management at George Washington University. Participants shared their views about cloud computing in campaigns, but the issue...

Provensec: Vulnerability Management Platform Built in the Cloud
Enterprisesecuritymag >> vendor

Russell Poffenroth, VP, Sales & Marketing

Provensec, a well-known vulnerability management solution provider, has become a leader in the safety and vulnerability assessment market. The security market in the enterprise traditionally focuses on alleviating elements of fear, uncertainty,...

AlgoSec: Automating Security Policy Management
Enterprisesecuritymag >> vendor

Yuval Baron, Chairman, CEO, & CCSO

Provisioning solutions to simplify and automate management of entire multi-vendor firewall estate

Trustwave: New wave in Smart Security
Enterprisesecuritymag >> vendor

Robert McCullen, President & CEO

Trustwave provides end-to-end managed security services which broadly encompasses threat, vulnerability, and compliance management