In these case studies, we focus on how end-users have deployed and managed various security products or services. These profiles include interviews with both the vendor and customer and can run either as support for features or independently. If you have ideas, please email Managing Editor Greg Masters.
Biopharma companies need a secure digital signing infrastructure. SureClinical found an answer for them, reports Greg Masters.
Queens College found a solution to monitor activity and manage devices on its network, reports Greg Masters.
A Chicago-area high school found a solution to broaden its internet pipeline and maintain compliance, reports Greg Masters.
To avoid damage from staff using social media, a radio network made certain its cloud was defended. Greg Masters reports.
When a care provider supplied laptops to its roving employees, it added a security solution to enable efficient collaboration. Greg Masters reports.
Needing more than signature-based remedies, First Financial Bank found a way to close the gap between what exists and what's possible. Greg Masters reports.
Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.
A university rolled out a wireless network, but was hampered with a user-support problem...until a solution was found. Greg Masters reports.
A website attack prompted an Australia-based mining company to shore up its security implementation, reports Greg Masters.
With the addition of 15,000 mobile devices accessing its network, a medical center found assurance - and met compliance mandates, reports Greg Masters.
Sign up to our newsletters
SC Magazine Articles
- John McAfee points to lone woman as Ashley Madison attacker while company offers reward
- Zero-Day, Angler kit exploits help drive up malvertising by 325%
- Judge grants father in custody case access to ex-wife's Facebook profile
- IBM: Corporations could be the next target for ransomware attacks
- Class action complaint filed against IRS over data breach