article thumbnail

New Tech Spotlight: Security Technology Takes Center Stage

Forrester IT

Venture capital and private equity spending on security technology reached an all-time high in 2018. While that total may pale in comparison to other fast-growing markets such as fintech ($124B) or transportation tech ($150B), consider that 65% of that $31B in security has […].

Security 321
article thumbnail

Breaking Down User Activity Monitoring Tools: Security and HR Perspectives

SecureWorld News

These systems allow for the generation of detailed reports and comparisons between departments and individual users. When and why companies implement UAM solutions UAM tools are often employed when a company's HR or information security departments identify specific issues that cannot be resolved by other means.

Tools 99
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Public Cloud IaaS : A Price/Performance vs. Security Analysis

Cloud Musings

The key challenge for decision makers is how to balance the business need to quickly transition to cloud with the equally important business need of maintaining information security and privacy. Lucky for us, two recent public cloud reports from Gartner and Cloud Spectator have gone a long way toward addressing this critical question.

Analysis 131
article thumbnail

Cognitio’s Roger Hockenberry Cited in BizTechReports

CTOvision

In the aftermath of high-profile data breaches at Sony, Target and Home Depot, chief information officers (CIOs), chief information security officers (CISOs) and other IT security professionals both in government and the private sector are playing from behind. . Are you trying to forge those relationships?

article thumbnail

Cognitive on Cloud

Cloud Musings

When selecting a cloud service provider however cognitive on cloud ROI requires more than just a total cost of ownership comparison. Companies that are leveraging cloud today must also prepare for the cognitive computing era.

Cloud 70
article thumbnail

Security Experts Assess 2.0 Draft of NIST Cybersecurity Framework

SecureWorld News

Defending and Investigating Advanced Intrusions on Secure Email Gateways" at SecureWorld Dallas on Oct. 26 ; and Tim Gallo, Americas Mandiant Principal Architect, is joining a panel on "Navigating the Cybersecurity Symphony in the Age of AI" at SecureWorld Seattle on Nov. 8 (day 1 of the 2-day conference).

article thumbnail

DCAP Systems: Protecting Your Data with Advanced Technology

SecureWorld News

Huge arrays of unstructured data utilized and modified by many users as well as the ever-growing complexity of attacks, lead to the fact that the usual means of protecting the perimeter of a corporate network no longer meet current information security requirements. What is Data-Centric Audit and Protection?

System 74