Category: Gartner
Forcepoint Named a 2020 Gartner Peer Insights Customers’ Choice for Enterprise DLP
The Gartner Peer Insights Customers’ Choice is a recognition of vendors in this market by verified end-user professionals, taking into account both the number of reviews and the overall user […]What to Expect from the Next Generation of Secure Web Gateways
While secure web gateways (SWGs) have operated on a far more compressed timetable, a similarly drastic evolution has taken place. SWGs are still largely focused on ensuring users are protected […]File Integrity Monitoring: Definition, Benefits and Key Features
File integrity monitoring is crucial for the security of an organization’s information systems, as well as for regulatory compliance. This article will explore what file integrity monitoring is and help […]McAfee and Atlassian Collaborate to Deliver Cloud Security Capabilities
Today cloud adoption is considered mainstream, with 83% of enterprise workloads expected to in the cloud by 2020 . As more organizations move their workloads to the cloud and to […]How People Are Starting to Use SASE
With people moving beyond the bounds of traditional offices to work just about anywhere, the way in which you defend them and your data is also changing. Security that used […]Near Real-Time DLP and Malware support for IaaS
Cloud and IaaS (Infrastructure as a Service) represents the future of IT, as organizations across industries, consolidate their data centers. According to a press release from Gartner, “The worldwide public […]Time to Shift from Threat-Centric Security towards Data-Centric Security
In today’s assume-breach era, constantly chasing the latest threat isn’t a viable strategy for data protection. Data threats will continue to grow in frequency and scale. Last year, 60% of […]Introduction to Reverse Engineering Cocoa Applications
While not as common as Windows malware, there has been a steady stream of malware discovered over the years that runs on the OS X operating system, now rebranded as macOS. February saw three particularly interesting publications on the topic ofThe Forrester Wave: Privileged Identity Management, Q4 2018
The Forrester Wave: Privileged Identity Management (PIM), Q4 2018 evaluates 11 PIM providers and recognizes BeyondTrust as a Leader. This research report analyzes, scores, and compares 11 PIM providers on […]Centrify: Zero Trust Lessons from a Holiday Classic
Every year when the holidays roll around, I’m amazed at the way shopping deals dominate the headlines. Black Friday and Cyber Monday are annual juggernauts that produce some amazing opportunities for shoppers and retailers alike. Yet this year,Load More