|
Allowing vendors to run a product demonstration without your guidance will only highlight their strengths and present a subjective and skewed view of their product offering.
|
|
|
Issuing an RFP to vendors is a critical step in your email security gateway solution selection process.
|
|
|
This worksheet allows enterprises to profile their email security gateway (ESG) requirements and generate a rank-ordered vendor shortlist from a fixed list of vendors....
|
|
|
This tool will help you develop a retention and disposition schedule for the information in your enterprise.
|
|
|
A great number of electrons have been accelerated in describing Google's move to purchase Motorola Mobility Holdings for about $12.5B. During a dinner I shared with MS...
|
|
|
This week, after 15 years of being either one thing or another, Salon.com announced that it was up for sale. According to its SEC filing, the firm showed $1.4 million in...
|
|
|
User compliance is the strongest determinant of managing personal mobile devices in a safe and efficient manner. Use this training slideshow in conjunction with a personal...
|
|
|
Developing and enforcing a personal mobile device acceptable use policy is critical to maintaining corporate network security. Use the Personal Mobile Device Remote Wipe...
|
|
|
A little jostling for market share is always a good thing, and the occasional sector blowup or segment technology revolution keeps everyone on their toes and healthy. But...
|
|
|
When you look at the current landscape of devices and appliances, there is one remaining mountaintop, one last hurdle, a towering K2, which, like the mountain itself, has...
|
|