Three “mega” drivers are combining to create a fundamental transformation in the security industry. A dynamic threat landscape, business-led digital transformation and regulatory upheaval are collectively causing substantial consequences to the security operations of most enterprises.
SecureData carried out a research survey to gauge the reaction of 100 senior IT managers to the introduction of Microsoft’s Surface tablet, including which features are thought to be the most effective, those that are least desirable, and whether the Surface brings security risks.
2012 saw the first 4G mobile network launched in the UK and was followed by an influx of 4G-enabled devices. But how will this improved access impact businesses and remote working? Are IT departments prepared for the security risks it could bring? SecureData surveyed IT managers across the UK to find out.
Firewalls have evolved rapidly since the original days of the port 80 filter. They now include next generation firewall (NGFW) or unified threat management (UTM) functionality, remote access capabilities, intrusion prevention and other advanced features. Find out how to make the right choice for your business.
UK enterprises are facing a major new compliance challenge in the shape of the EU’s General Data Protection Regulation. SecureData commissioned independent research to gauge the reaction of IT managers, and how ready they are to meet these new requirements.
We know security is changing. It’s time for a different approach. IT leaders must enable their customers to use the Internet, cloud computing and business applications to their full potential in a secure way. In this whitepaper, we explore why a holistic approach to security is the answer.
Migration to the cloud is happening across all businesses, but Security-as-a-Service demands a trusted partner that can deliver on its promises. In this whitepaper, SecureData takes the pulse of IT managers when it comes to security outsourcing.
Threat Intelligence has become a buzzword, a term that seemingly holds the key to defending against tomorrow’s attacks. But what is meant by “Threat Intelligence???, and how does it differ from Security or Cyber Intelligence? Find out in this whitepaper.