2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next 2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors-5 Next

What products, devices, and applications can be patched with the offering? How quickly after the vendor issues a patch can we install it in our environment?

In the spirit of 2015 planning, now is the time of year when IT teams start to tackle big, complicated issues like: What are the coming situational issues surrounding the security of our data? How are we as an organization really doing in securing our valuable information today? What do we need to do in the future to do better? How will we pay for it?

From BYOD to Windows XP end of life, there is no shortage of situational issues. Meanwhile, the bad guys are getting better and data breaches around the world and across industries are significantly affecting the bottom line. Planning for improved security in 2015 is no easy task.

Some IT departments will look to invest in new approaches. That’s why Lumension has partnered with analyst and President of Securosis, Mike Rothman, for the 2015 Endpoint and Mobile Security Buyer’s Guide. In addition to outlining some of the hot issues and recommended strategies, Rothman also outlines 10 questions every buying IT department should ask vendors to receive the best value for your money. 


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.