Search
Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events Acronis #CyberFit Summit 2021 Avaya Newsroom Experiences That Matter Cisco Partner Summit Digital 2020 Intel Partner Connect 2021

Black Hat 2019: 12 Cybersecurity Myths That Could Put You At Risk

CRN asks 12 executives, sales and technical leaders attending Black Hat 2019 what they see as the top oft-repeated beliefs about cybersecurity that are foolishly accepted as fact.

Back 1 ... 8   9   10   11   12   ... 13 Next
photo

More Products Mean Better Security

Over the past two decades, customers have often gotten enamored with hot new technologies ranging from sandboxing and hosted intrusion prevention systems to endpoint detection and response and container security, according to Steve Quane, Trend Micro's executive vice president of network defense and hybrid cloud security.

But customers that chase after hot new things in endpoint, network, container, server and cloud security eventually find themselves stuck with a bunch of different point products that struggle to correlate activity, Quane said. This also forces solution providers and customers to become experts in dozens of different vendors and technologies, which Quane said it difficult to do.

As businesses pursue better visibility and greater interoperability, Quane expects they'll instead opt for better integrated, more broadly scalable platforms from a much smaller set of vendors.

 
 
Back 1 ... 8   9   10   11   12   ... 13 Next

sponsored resources