Our Blog
Home / Blog
SAM in 2021: 10 Key Considerations for a Successful SAM Program
Most IT professionals agree that 2021 will be a year to do more with what we already have. A software asset management (SAM) program can help you do just that as it delivers comprehensive visibility over your software estate and cloud usage. This insight not only...
Forcepoint Survey: How are Hospitals Planning for Future Cybersecurity Demands?
Digital health services such as telehealth and patient portals have been gaining momentum in recent years, but it’s only in the last year that virtual care became a must-have. Hospitals are rushing to adopt new digital technologies, but are they ready to...
Top Data Security Challenges and How to Address Them
Addressing an organization’s data security challenges requires some heavy lifting – no question about it. Whether data security worries center around internal security lapses or stem from the harsh reality of being targeted by those with malicious intent,...
Protecting Data at Rest vs Data in Motion
Protecting sensitive data such as personally identifiable information (PII), intellectual property, or healthcare data, has become a requirement for most businesses collecting and processing these types of data. Whether it’s to comply with data protection legislation...
Ken Xie on Fortinet’s Business Momentum, TAA, and the Future of Cybersecurity
For the past 21 years, Fortinet has been focused on developing a comprehensive security platform designed to protect all network edges, adapt to digital innovation requirements, and unify networking and security functions into a single solution. Fortinet's CEO Ken Xie...