In these case studies, we focus on how end-users have deployed and managed various security products or services. These profiles include interviews with both the vendor and customer and can run either as support for features or independently. If you have ideas, please email Managing Editor Greg Masters.
To ensure it could effectively react to all alerts, IDT put in place an automation solution. Greg Masters reports.
Biopharma companies need a secure digital signing infrastructure. SureClinical found an answer for them, reports Greg Masters.
Queens College found a solution to monitor activity and manage devices on its network, reports Greg Masters.
A Chicago-area high school found a solution to broaden its internet pipeline and maintain compliance, reports Greg Masters.
To avoid damage from staff using social media, a radio network made certain its cloud was defended. Greg Masters reports.
When a care provider supplied laptops to its roving employees, it added a security solution to enable efficient collaboration. Greg Masters reports.
Needing more than signature-based remedies, First Financial Bank found a way to close the gap between what exists and what's possible. Greg Masters reports.
Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.
A university rolled out a wireless network, but was hampered with a user-support problem...until a solution was found. Greg Masters reports.
A website attack prompted an Australia-based mining company to shore up its security implementation, reports Greg Masters.
Sign up to our newsletters
SC Magazine Articles
- FireEye: First multi-vendor ATM malware targeting cardholders
- Customer data possibly compromised in online photo store malware attack
- Excellus BlueCross BlueShield announces breach, 10.5M records at risk
- CVS employee steals data on 55K Molina Healthcare members
- False Facebook 'dislike button' ensnares users