Security Tag

What are the hot collaboration trends heading into 2020 and beyond, and more importantly, what should IT leaders do to ensure success? Join Nemertes Service Director Irwin Lazar to learn the critical developments that will shape workplace transformation in the next year....

Seeking a SOC? The Time is Right! If you're like most enterprise security professionals, you know you need a security operations center (SOC). But should you build out your own, engage a third party, or take a hybrid approach? This webinar provides you with the...

The challenges related to enterprise team messaging security can be a big barrier to entry. The team messaging market continues to grow, with nearly 60% of the approximately 600 companies participating in Nemertes Research’s annual unified communications and collaboration study either already using or planning to...

In my previous blog I discussed the five components of a successful video governance strategy: Assessment, Access, Encryption, Approval, and Retention.  I discussed best practices for addressing each of these areas, but didn’t address the “how.” How you enforce security, governance, and retention policies requires a critical...

You've been breached. Now what? You may think you know the answer, but in this cloud-first, mobile-first environment, it's time to rethink your incident response policy. This webinar covers how to modify your security operations to take into consideration your next-generation security architecture and protect assets...

You've got firewalls, anti-malware, next-generation endpoint security, and NAC. You're rolling out CASB and analytics, and extending protection to cloud, mobile, and IoT resources. But how does it all come together? This webinar reveals what a next-generation security architecture looks like--and which technologies, and vendors, should...

Thanks to cloud computing, the proliferation of endpoints, the emergence of new technologies and paradigms like IoT and Blockchain, enterprise data protection has undergone a paradigm shift. The challenge is no longer simply to classify and lock down structured data in protected on-premise environments. Today...

Cybersecurity professionals do a great job when it comes to understanding, and mitigating, technical and functional risk. But CEOs and board members tend to think in terms of business risk. This webinar shows cybersecurity professionals how to articulate requirements in business terms. With that knowledge, they...