Security, Risk Management, and Compliance Research Initiatives

Security and Compliance covers firewalls, network security architecture, IDS/IPS, encryption, software based security architectures, data center physical security, persona management, pervasive protection, privacy, VOIP/UC security, social compliance, and mobile security.

Jun 17, 2015
What cybersecurity professionals need is a next-generation architecture to integrate these new tools into a seamless web of protection.
Apr 20, 2015
Complementary Webinar: Tue, Mar 10, 2015 2:00 PM - 3:00 PM EDT
Feb 11, 2015
Security is viewed as a business enabler by a plurality of organizations (42%), and more view security as a business enabler than do not.
Dec 05, 2014
More than half of companies are increasing security spending, primarily because of new visibility, scope, and role for IT professionals.
Dec 05, 2014
Consider adding two-factor authentication to your arsenal of enterprise protection, if you haven’t already.
Sep 09, 2014
Webinar Playback
Jun 25, 2014
Jun 16, 2014
Jun 16, 2014
64% of companies plan to deploy an MDM solution by the end of 2014.
Apr 28, 2014
Almost 20% of organizations use PaaS now, and more than 40% use IaaS, and the market is seeing rapid expansion
Apr 03, 2014
Security professionals and other senior executives are beginning to see security as a way to enable, enhance, and grow the business
Feb 25, 2014
Issue Paper
Nov 13, 2013
Presentations from Nemertes' 2013 Navigator360 Conference
Aug 19, 2013
Mobile security within the enterprise is an increasingly important aspect of overall mobility
Jul 19, 2013
IT leaders must define a new operating model that allows for innovation and adapts to the changes.
Jul 19, 2013
Jun 27, 2013
Slightly less than a third of companies cite “security and authentication” as holding them back from leveraging more Software as a Service.
Apr 18, 2013
Apr 15, 2013
Apr 09, 2013