Security Executive Commentary
-
Web 2.0 Security: Why Filtering and Reputation Schemes Are Not Enough
11/23/2009
Enter Web 2.0. Unfortunately, as with any good technology, it can be put into the wrong hands and used negatively. Web 2.0’s power is now harnessed by malware writers providing the groundwork for a new generation of hacker collaboration and preferred means of deployment.
-
SMB Customer Needs Are A Matter Of Scale
11/23/2009
By Dave Hunt, founder and CEO of C2C Systems
Technology vendors have come to recognize that there is profit potential in the small to midsized business (SMB) market, but often believe that the SMB customer requires fewer features and less maturity, when what they need is almost the same level of features, just easier to use, with fewer and simpler configuration options. -
Security As A Service: Hidden Treasures For Solution Providers
9/1/2009
By Kendra Krause, VP of Americas Channels, Fortinet
Today, solutions providers looking for new revenue opportunities are presented with a set of ideal conditions in which to expand their business. Several market dynamics are at play to support a managed services model for security, which offers a recurring revenue stream for partners who want to do more than sell a... -
Anti-spam: Why Prevention is better than Cure
8/31/2009
By David Kelleher, communications and research analyst, GFI
Spam is a waste of time and resources. Filtering the genuine email from the spam on a daily basis wastes a sizeable amount of time (and, therefore, money) over the span of a year. Installing an anti-spam filter will provide the necessary blocks needed to ensure that minimal time is spent sifting through unwanted... -
Disguising Malware: Spammers Begin Experimenting with URL Shortening Services
8/31/2009
By Bradley Anstis, director of technical strategy, Marshal8e6
Over the past few years, there has been an explosion in the use of social networking sites like Facebook and LinkedIn and the massive microblogging site Twitter — both among consumers and business users. These sites allow users to easily connect with friends, family, past colleagues, and new business prospects... -
10 Ways Small Business Can Improve Security During a Recession
7/7/2009
“Last year, mid-market companies spent 9.4 percent less on security than they did in 2007,” according to a report from Cambridge, Mass.-based Forrester Research. “Many small and mid-market companies are looking to continue to tighten IT budgets in 2009, however, one area where spending will increase...
-
Antivirus Is Not Enough
6/25/2009
Protecting critical information is critical to a business’ success. Like their enterprise counterparts, small businesses safeguard their data to stay ahead of the competition and remain profitable. However, while they understand the need for security, small businesses often do not have the staff or time to...
-
Selling Security In A Contracting Economy
6/2/2009
Why is it so important that customers invest in security in a contracting economy? How do you convince business owners to spend hard dollars on a product that, in their eyes, may have no immediate return; or a product that does not fall under the traditional “anti-virus, anti-spam” security umbrella? Up ...
-
Ten Things Resellers Should Know about Email Archiving
6/2/2009
Ask any solution provider about the value their customers place on email, and it will be abundantly clear that email is not just a communication tool but also a cache of knowledge about their business. The typical reasons to implement email archiving are capacity management to reduce the storage demands of the email...
-
Philosophies of Spam Solutions
5/11/2009
While spam by the billions reaches out to users around the globe, they are scanned, blocked, deleted, sorted, filtered, rejected, quarantined, moved, dropped, replied to, and bounced by a panorama of spam solutions and email systems as varied as they are many. Accompanying the ubiquity of spam is a mixed bag of...
This website uses cookies to ensure you get the best experience on our website. Learn more