Friday, March 11, 2011

Gartner Security Special: 2 Reports + Magic Quadrant

 
 
Discover Worldwide Business Knowledge
 
gry arrow External Threats: Vulnerability Management
gry arrow Information Threats: Data Management
gry arrow Identity Threats: Magic Quadrant
 
Welcome to issue 81 of the Global Roundup. This week is a security special with papers from top analyst firm Gartner. We've got a report on understanding vulnerability management, tips for building an effective information security strategy, and a Magic Quadrant on user provisioning solutions. Discuss the IT issues that matter most to you on the Global Roundup group on LinkedIn.
 
External threats: Implement a Vulnerability Strategy
External threats are one of the most important security considerations your organization faces - and in recent years the external threat environment has become quieter and much more dangerous. Today's attacks are more targeted and usually aim to steal data, compromise a specific account or disrupt operations. To combat this, your organization should combine vulnerability management and shielding technology. This Gartner research paper explains how do so effectively.
 
Download the white paper
 
Information Threats: Secure your Organization's Data
As well as protecting from malware and other external threats, it is important to secure your company's valuable information. This requires an integrated approach, where the key components of security are infused across all dimensions of the business. This Gartner research paper provides a complete security program model and can help your organization work toward it. Read the paper now and learn how to build an effective information security program.
 
Download the white paper
 
Magic Quadrant: Manage Identities with User Provisioning
As well as for the purposes of protecting your documents, you should also implement security in order to improve access compliance, automate governance, and streamline automation. User provisioning manages identities across enterprise systems, applications and resources to help make access to these assets more secure. This Gartner Magic Quadrant provides research and analysis of the leading user provisioning solutions on the market. Download it before making your purchasing decision.
 
Download the white paper
 

Kind regards

Kasey Cassells
e-Editor
IDG Connect

P.S: Don't forget to
tell us your views on the LinkedIn group!

gry arrow Forward this mailer to a Friend/Colleague
Find us on: Facebook Facebook Twitter Twitter LinkedIn LinkedIn RSS Feed RSS Feed
Subscribe to topical weekly email Roundups from IDG Connect.
If you do not wish to receive any further emails click here
Contact us if you need any assistance or additional information.
 
IDG Connect
IDG Connect's Privacy Policy Copyright © 2010. All rights reserved.
IDG Connect, Staines One, Station Approach, Staines Middlesex, TW18 4LY, UK.
www.idgconnect.com

No comments: