• 1-800-526-8630U.S. (TOLL FREE)
  • 1-917-300-0470EAST COAST U.S.
  • +353-1-416-8900REST OF WORLD

PRODUCT FILTERS

REGION

235
43
35
33
28

COUNTRY

27
9
8
8
5

PRICE

89
110
182
434

PUBLISHED

7
29
109
434

PRODUCT TYPE

408
12
10
3
1

IT Security

(434 Products)

The massive use of information technologies poses a challenge to the confidence and security of the systems and computers in a society which increasingly rely on them. Every company is a potential target for hackers, and a loss of data might be a commercial disaster. This means two things: you can either need to protect your company from cyber attacks or make business protecting someone else’s data.

The global IT security market is expected to grow at a CAGR of 15.5% in the 2008-2012 period. We have all the information resources you need to be a leading player in this growing market. From manuals on security fundamentals to reports on cutting-edge technologies, our publications deal with all aspects of IT security, both from a technology and a marketing point of view, highlighting technical solutions, vendor strategies, market overviews and new business opportunities.

Topics covered include but are not limited to: encryption, loss prevention applications, data leakage, secure software and coding, virtual security appliance, and web application firewall. Publications about privacy issues are also featured.

A few examples of companies featured in our publications include Symantec, Juniper Networks, Inc., Cisco Systems, Inc., SonicWALL Inc., and Websense Inc. Show Less
Read more

PRODUCT TITLE

Analysis of the Latin American Managed Security Services Market 2014

As new trends and technologies are being implemented and utilized by Latin American companies, new and complex vulnerabilities are becoming a reality. As such, MSS services are becoming increasingly...

October 2014
FROM

2014 Identity Safety in Banking Scorecard: Finding a Balanced Approach as Fraud Diversifies

The litany of consumer PII made available to criminals in several years of massive data breaches fed the triplication of Existing Non-Card Account Fraud (ENCF) incidence in 2013, with checking and saving...

October 2014
FROM

Payment Card Industry (PCI) Data Security Audit Program

PCI Audit Program comes in PDF and WORD formats. The Audit program includes a brief policy statement for Sensitive Information and Record Management (Retention and Destruction). The Audit Program complies...

October 2014
FROM

Analysis of the Global Web Application Firewall Market

The Web Application Firewall (WAF) is an essential security tool for protecting Web applications and Web sites that are of ever-growing importance in today’s economy. The WAF market is primarily driven...

October 2014
FROM
Preparing the Data Center Against the 21st Century Attack Preparing the Data Center Against the 21st Century Attack - Product Thumbnail Image

Preparing the Data Center Against the 21st Century Attack

Data centers – which are at the heart of modern business – are no longer fortresses into which mission-critical corporate information is poured, stored and processed in guarded isolation. IT virtualization...

October 2014

Security Audit Program - ISO 28000, 27001, & ISO 27002 / HIPAA / SOX PCI-DSS Compliant

- Comes in MS EXCEL and PDF formats - Meets ISO 28000, 27001, 27002, Sarbanes-Oxley, PCI-DSS and HIPAA requirements - Over 400 unique tasks divided into 11 areas of audit focus which are the...

October 2014
FROM

Disaster Recovery Business Continuity Audit Program: ISO 28000 - ISO 27001 - ISO 27002 - ISO 22301 - HIPAA - SOX - PCI-DSS Compliant

- Comes in MS WORD format and PDF - Meets ISO 27001, 27002, 27031, 28000, Sarbanes-Oxley, PCI-DSS, FIPS-199, and HIPAA requirements - 38 specific items that the audit covers in the 13 page audit...

October 2014

Law Enforcement Biometrics Market in UK 2014-2018

About Law Enforcement Biometrics Biometrics is a technology that helps identify individuals on the basis of their physical or behavioral features. It involves verification and identification of...

October 2014
FROM

Managed Security Services Market by Services, by Deployment Type, & by Organization Size - Global Forecast (2014 - 2019)

Managed Security Services Market by Services (Managed IDS/IPS, DDOS Protection, Managed SWG, SIEM, MICS, Log Management & Analytics), by Deployment Type (Hosted, On-Premise), & by Organization Size...

October 2014
FROM

Network Security Platform MSSP Vendor Rankings, North America

Every service-delivery platform used by a managed security service provider (MSSP) requires a significant investment in training and ongoing support by the MSSP. The decision of which vendors’ platforms...

September 2014
FROM

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

The growing number of cyber attacks and cyber crimes have resulted in compromise of data, important computing resources and network outages. With the implementation of Information and Communication...

September 2014
FROM

Toward Data-Centric Security for Big Data

Like the steam engine, the automobile, the computer, and every other technology that has definitively altered modern life, Big Data and analytics (BDA) is beginning to change the way people and organizations...

September 2014
FROM

Global Threat Intelligence Security Market 2014-2018

About Threat Intelligence Threat intelligence is a security service given by security vendors to thwart advanced attacks such as APT, advanced malware, and other new breeds of sophisticated threats...

September 2014
FROM

The Global Cybersecurity Market 2014-2024

The Global Cybersecurity Market 2014-2024 report provides readers with a detailed analysis of both historic and forecast global industry values, factors influencing demand, the challenges faced by industry...

September 2014
FROM

Turning the Tables on Cyber Threats

The bad guys are getting better quicker than the good guys are improving, despite the good guys’ proclivity to spend to keep the bad guys out. This situation prompts Stratecast to question whether security...

September 2014
FROM

Analysis of the Global SSL Certification Market

SSL certificates are an encryption technology used to secure communications between end users and Web sites. Certificate Authorities (CAs) also provide scan and inventory tools to help customers manage...

September 2014
FROM

Intrusion Detection Market in Southeast Asia 2014-2018

About Intrusion Detection System Intrusion detection system monitors the malicious intrusions at various levels in an enterprise. The system gathers information, analyses for malicious activities,...

September 2014
FROM

Global DDoS Prevention Market 2014-2018

About DDoS Prevention A DDoS attack is a malicious attempt to disrupt the normal functioning of a network resource by making it unavailable to its intended users. A DDoS attack is significantly different...

September 2014
FROM

BFSI Security Market by Physical Security, & by Cyber Security – Worldwide Forecasts & Analysis (2014 - 2019)

BFSI Security Market by Physical Security (Video Surveillance, Access Control, Intrusion Detection, PSIM), & by Cyber Security (IAM, Encryption, DLP, IDS/IPS, UTM, SVM/SIEM, Antivirus/Antimalware) –...

September 2014
FROM

Analysis of the Endpoint Security Market

The efficacy of traditional antivirus-based endpoint protection is beginning to be challenged. While it is true that the role of traditional protection has changed with today's cyber reality offering...

September 2014
FROM
Loading Indicator

Our Clients

Visonic Group Symantec Corporation Raytheon Company EMC Corporation Nagra Kudelski Group Cisco Systems, Inc.