2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next 2015 Endpoint and Mobile Security Procurement: 10 Questions to Ask New Vendors-6 Next

What standards and/or benchmarks are offered out of the box with your configuration management offering?

In the spirit of 2015 planning, now is the time of year when IT teams start to tackle big, complicated issues like: What are the coming situational issues surrounding the security of our data? How are we as an organization really doing in securing our valuable information today? What do we need to do in the future to do better? How will we pay for it?

From BYOD to Windows XP end of life, there is no shortage of situational issues. Meanwhile, the bad guys are getting better and data breaches around the world and across industries are significantly affecting the bottom line. Planning for improved security in 2015 is no easy task.

Some IT departments will look to invest in new approaches. That’s why Lumension has partnered with analyst and President of Securosis, Mike Rothman, for the 2015 Endpoint and Mobile Security Buyer’s Guide. In addition to outlining some of the hot issues and recommended strategies, Rothman also outlines 10 questions every buying IT department should ask vendors to receive the best value for your money. 


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.