COMPUTING SECURITY AWARDS
|

|
DLP Solution of the Year
WINNER: CoSoSys – EndPoint Protector 4. CoSoSys takes the award for second year in a row
RUNNER-UP: Varonis – IDU Classification Framework
All of the 2015 Awards results can be seen by going to:
www.computingsecurityawards.co.uk
Please note: the winning products and services will not necessarily be the only solutions or the newest solutions available from the respective suppliers. You should contact these suppliers directly to learn more about what they can offer.

|
 |
Frictionless Security
'Adam Boone, chief marketing officer at Certes Networks, sets out three principles for protecting applications in the modern enterprise
|
 |
Lepide Auditor Suite 15.2
Change auditing is essential for enterprises, helping them to comply with ever tougher data protection regulation
|
 |
Titania PAWS Studio 2.4.4
SMBs that want to show compliance with data protection regulations will like Titania's PAWS Studio a lot
|
 |
How to avoid a tangled Web
Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks. Trend Micro offers its insights into Web application vulnerabilities and how to avoid these
|
|
|
|
|
Welcome to the December 2015 Newsletter.
In our Jan-Feb 2016 issue, we will be bringing you some of the top predictions from the experts about what will be uppermost in people’s minds, security wise, as we enter another year. It makes for intriguing, and often disturbing, reading.
Meanwhile, global research analyst Gartner has this to say, as far as cloud security is concerned: “Through 2020, 95% of cloud security failures will be the customer's fault. Security concerns remain the most common reason for avoiding the use of public cloud services. However, only a small percentage of the security incidents impacting enterprises using the cloud have been due to vulnerabilities that were the provider's fault. This does not mean that organisations should assume that using a cloud means that whatever they do within that cloud will necessarily be secure.
“The characteristics of the parts of the cloud stack under customer control can make cloud computing a highly efficient way for naive users to leverage poor practices, which can easily result in widespread security or compliance failures. The growing recognition of the enterprise's responsibility for the appropriate use of the public cloud is reflected in the growing market for cloud control tools.”
Gartner continues: “By 2018, 50% of enterprises with more than 1,000 users will use cloud access security broker products to monitor and manage their use of SaaS and other forms of public cloud, reflecting the growing recognition that, although clouds are usually secure, the secure use of public clouds requires explicit effort on the part of the cloud customer.”
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|