Browse Business Software Categories

Close  

Articles on IT Security Software

Why BYOD Is Like Cancer (And How Endpoint Security Is the Cure)

Why BYOD Is Like Cancer (And How Endpoint Security Is the Cure)

Posted April 29, 2014 by Miranda Limonczenko

Despite its rapid adoption, BYOD complicates endpoint security. Each phone, laptop and tablet connected to your network acts as another cancerous cell, growing your security risk and making your business susceptible to viruses and hacks.… Read More 

Behind the Software Q&A with LogicMonitor CEO Kevin McGibben

Behind the Software Q&A with LogicMonitor CEO Kevin McGibben

Posted February 19, 2014 by Mark Aspillera

Just because network stacks continue to get more complex doesn't necessarily mean that the means to monitor them properly have to get just complicated. LogicMonitor operates on that principle, offering dynamic stack monitoring based on… Read More 

First Look: LogicMonitor's Lightweight Java-Based Stack Monitoring

First Look: LogicMonitor's Lightweight Java-Based Stack Monitoring

Posted February 11, 2014 by Mark Aspillera

Solutions designed to monitor a stack, the sum total ecosystem of all the IT hardware and software necessary to run daily operations, are nothing new. What is new, however, is the idea of stack monitoring… Read More 

Behind the Software Q&A with Aerohive

Behind the Software Q&A with Aerohive

Posted February 5, 2014 by Ashley Dotterweich

As mobile devices become a more integral part of the workplace, organizations must find new ways to provide reliable, secure Wi-Fi connections. Aerohive is shaking up traditional Enterprise Wi-Fi systems by providing smarter, simpler Wi-Fi… Read More