Home |Idioma: Español

Analistas de seguridad
img_analistas

The market for content monitoring and filtering and data loss prevention technologies is maturing rapidly buy remains fundamentally adolescent. The successful vendors will be those that recognize that addressing business requirements is key. (Gartner)

Más información…

Many of the security controls that are believed to be “best practices” — full-disk encryption on laptops, data leak prevention (DLP) policies for detecting protected health information (PHI) or PII, and device control software — are designed to reduce the impact of employee accidents. (Forrester)

Más información…

The reality is that our users are almost addicted to their mobile devices and their ready access to data. Their expectation is that it will be available to them 24 by 7. And when the masses are screaming for their devices and their access to data to do the next critical task, we as security professionals would need to have some pretty compelling reasons why we should not go down a particular path. Our job has moved from being the people who say ‘no’, to the people who say ‘yes, and here is how’. (Aberdeen Group)

Más información…

IT departments that turn to a single vendor for integrated solutions that provide security, system, and storage capabilities have experienced a reduction in vendor sprawl within their architecture. Consequently, they have significantly reduced system complexity. (IDC)

Más información…