WHITE PAPER: Build better endpoint security to protect your entire network

By Quest As your IT environment grows, tracking and securing all the endpoints connecting to your network is a monumental task. Managing and deploying security updates is time-consuming and challenging because of the wide range of devices people use to get their work done. Every desktop, laptop, smartphone, tablet and internet-of-things (IoT) device connecting to […]
SAVE THE DATE: Security IT Summit – Summer 2021

Join us at the next Security IT Summit, which will take place in London this June – both live and virtual attendance options will be available! 29th June – Hilton London Canary Wharf – Booking form (flexible attendance options) Benefits of attending include: Receive a bespoke itinerary of relaxed, 1-2-1 meetings with innovative and budget savings suppliers […]
WHITE PAPER: 5 Steps to Battle Endpoint Cybercrime with KACE

By Quest Endpoint updates are becoming more complex and challenging than ever with Bring-your-own-device (BYOD) programs and internet-of-things (IoT) technologies. Each device connecting to your network increases the number of threats from malware and viruses. Read this white paper to learn five steps for building a unified endpoint security strategy that will give you: Clear […]
WEBINAR: Managing the Compliance & Security Nightmares Caused By A Remote Workforce

Webinar – March 11th, 12pm GMT How do companies protect themselves with the right tools to mitigate compliance and security concerns? There are precautions and best practices that are being employed by many companies, and should be part of the security and compliance infrastructure as companies adapt to the new norm of both people and […]
Zero Trust: The practical way to look at cybersecurity

By LogRhythm Zero Trust is quickly becoming the security model of choice for enterprises and governments alike. The need to protect, defend and respond to threats is more apparent than ever as we continue to work from remote locations. Where to start Zero Trust is more than implementing a new software, it is a change […]
Do you specialise in Intrusion Detection & Prevention? We want to hear from you!

Each month on IT Security Briefing we’re shining the spotlight on a different part of the cyber security market – and in March we’re focussing on Intrusion Detection & Prevention solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help IT security buyers find the best products and services available today. So, if you’re an Intrusion […]
Security IT Summit: Last call for delegates!

We have just a couple of delegate places left at the virtual Security IT Summit, which is taking place on March 9th & 10th – make sure you claim yours today! 9th & 10th March – 09:00-13:05 – Virtual booking form (flexible attendance options) Benefits of attending include: Receive a bespoke itinerary of relaxed, 1-2-1 meetings with innovative and […]
Remote Workforces Create New Security & Compliance Headaches

The new remote world has ushered in a host of security issues. Sensitive data now sits in laptops in employees’ houses and if an employee disconnects from the corporate VPN, the company goes blind. This massively increases the risk footprint and leaves the company out of compliance. Veriato utilizes AI-driven micro-agents that sit on the […]
Security software revenue to hit $45.5B in 2021

The digital transformation accelerated by the pandemic and the growing number of data breaches and cyberattacks has forced online users, companies, and organizations to increase their spending on security software solutions. According to data presented by StockApps.com, global security software revenues are expected to hit $45.5bn in 2021, a 20% increase in two years. For the purposes of the study, […]
WHITE PAPER: Get total endpoint security with KACE

As an IT professional, you’re likely under pressure to manage an increasingly complex environment, while also protecting your network and devices from cyberthreats. Read this white paper to discover how the KACE Unified Endpoint Manager by Quest enables you to streamline complex endpoint management tasks and gain greater control of both traditional and modern managed […]