• 1-800-526-8630U.S. (TOLL FREE)
  • 1-917-300-0470EAST COAST U.S.
  • +353-1-416-8900REST OF WORLD

PRODUCT FILTERS

REGION

318
37
34
33
26

COUNTRY

22
8
8
7
4

PRICE

90
121
251
472

PUBLISHED

4
27
107
472

PRODUCT TYPE

446
11
10
3
1
1

IT Security

The massive use of information technologies poses a challenge to the confidence and security of the systems and computers in a society which increasingly rely on them. Every company is a potential target for hackers, and a loss of data might be a commercial disaster. This means two things: you can either need to protect your company from cyber attacks or make business protecting someone else’s data.

The global IT security market is expected to grow at a CAGR of 15.5% in the 2008-2012 period. We have all the information resources you need to be a leading player in this growing market. From manuals on security fundamentals to reports on cutting-edge technologies, our publications deal with all aspects of IT security, both from a technology and a marketing point of view, highlighting technical solutions, vendor strategies, market overviews and new business opportunities.

Topics covered include but are not limited to: encryption, loss prevention applications, data leakage, secure software and coding, virtual security appliance, and web application firewall. Publications about privacy issues are also featured.

A few examples of companies featured in our publications include Symantec, Juniper Networks, Inc., Cisco Systems, Inc., SonicWALL Inc., and Websense Inc. Show Less
Read more

PRODUCT TITLE

Social, Mobile, Analytics, Cloud (SMAC) and Security Software Research Digest H1 2014

The SMAC and Security Software Research Digest is a digest of all the most important research in the software industry each quarter available as an annual subscription. It covers areas such as: -...

December 2014
FROM
Strategic Focus Report - Enterprise IT Security: Technology and market trends Strategic Focus Report - Enterprise IT Security: Technology and market trends - Product Thumbnail Image

Strategic Focus Report - Enterprise IT Security: Technology and market trends

This Strategic Focus report analyses the current trends, drivers, and challenges impacting the enterprise IT Security market. The report outlines the evolution of enterprise IT security technologies,...

November 2014
FROM

The Managed Security Services (MSS) Market in the Gulf Corporation Council (GCC) Countries

The research service discusses the managed security services (MSS) market in the Gulf Corporation Council (GCC) countries. The current market size has been discussed and forecasts have been provided...

November 2014
FROM
Cyber Security - Emerging Trends and Investment Outlook Cyber Security - Emerging Trends and Investment Outlook - Product Thumbnail Image Special Offer Sale Banner

Cyber Security - Emerging Trends and Investment Outlook

“Cyber Security - Emerging Trends and Investment Outlook” is a new report by It that globally analyzes cyber security environment, potential sources of cyber-attacks, preferred strategies deployed to...

November 2014
FROM

Professional Security Services in North America

Professional cyber security services are value-added security advisory, implementation services, and technical services, such as assessment, benchmarking, design, planning, configuration, and incident...

November 2014
FROM

Global BYOD Security Market 2015-2019

About BYOD Security Enterprise mobility refers to accessing of corporate data by the employees using their personal devices. Enterprise mobility solutions serve the purpose of keeping the remotely...

November 2014
FROM

Security Competitive Profiles - NICE Systems

At a corporate level, NICE Systems (NICE) positions itself as a software organisation with solutions to help customers gain value from Big Data, structured, and unstructured. The Security, Safety, and...

November 2014
FROM

Going to the Edge with Security

In this SPIE, we examine an alternative approach of pushing security processing outward to the edge of carrier networks. More than Protection The prospect of moving security processing to the...

November 2014
FROM

Global Security Market in Schools 2014-2018

About Security in Schools Security solutions in schools comprise of security systems such as video surveillance and access control. These solutions are adopted by school authorities to monitor and...

November 2014
FROM

Global Internet Security Market (Products & Services, Technology, Application and Geography) - Size, Share, Global Trends, Company Profiles, Analysis, Segmentation and Forecast, 2013 - 2020

The internet, in its essence has come a long way and has been constantly evolving in its approach to the consumers. The world, today, is inevitably attached to the internet with online networking. Organizations...

November 2014
FROM
Cyber Security Fundamentals Cyber Security Fundamentals - Product Thumbnail Image

Cyber Security Fundamentals

Cyber Security, data protection, information privacy. By these or any other names, the importance is the same. We must protect our confidential information. Our trade secrets. Our proprietary data....

November 2014

Fraud in Global B2C E-Commerce & Online Payment 2014

The report, “Fraud in Global B2C E-Commerce and Online Payment 2014” shows that as online retail revenue is increasing at double digit growth rates globally, and is expected to total nearly 2 trillion...

October 2014
FROM

Global Mass Transit Security Market 2014-2018

About Mass Transit Security Mass transit security refers to the security systems used in mass transit locations to detect, monitor, and scan travelers and their belongings. Across the globe, the road,...

October 2014
FROM

Global Fraud Detection and Prevention Market 2014-2018

About Fraud Detection and Prevention Fraud has become a very big problem for businesses across the world and can be of various types - fraudulent transactions (both online and offline), inaccurate...

October 2014
FROM

Network Security Automation: Making Data Actionable

In this SPIE, we examine the environmental factors creating the need for automation within our network security environments. The necessary steps to get to automation are discussed—steps that we refer...

October 2014
FROM

Analysis of the Latin American Managed Security Services Market 2014

As new trends and technologies are being implemented and utilized by Latin American companies, new and complex vulnerabilities are becoming a reality. As such, MSS services are becoming increasingly...

October 2014
FROM
Preparing the Data Center Against the 21st Century Attack Preparing the Data Center Against the 21st Century Attack - Product Thumbnail Image

Preparing the Data Center Against the 21st Century Attack

Data centers – which are at the heart of modern business – are no longer fortresses into which mission-critical corporate information is poured, stored and processed in guarded isolation. IT virtualization...

October 2014

Law Enforcement Biometrics Market in UK 2014-2018

About Law Enforcement Biometrics Biometrics is a technology that helps identify individuals on the basis of their physical or behavioral features. It involves verification and identification of...

October 2014
FROM

2014 Identity Safety in Banking Scorecard: Finding a Balanced Approach as Fraud Diversifies

The litany of consumer PII made available to criminals in several years of massive data breaches fed the triplication of Existing Non-Card Account Fraud (ENCF) incidence in 2013, with checking and saving...

October 2014
FROM

Security Audit Program - ISO 28000, 27001, & ISO 27002 / HIPAA / SOX PCI-DSS Compliant

- Comes in MS EXCEL and PDF formats - Meets ISO 28000, 27001, 27002, Sarbanes-Oxley, PCI-DSS and HIPAA requirements - Over 400 unique tasks divided into 11 areas of audit focus which are the...

October 2014
FROM
Loading Indicator

Our Clients

Our clients' logos