Email Alerts
-
The case for outsourcing e-mail security
Which is better for the enterprise -- installing, maintaining and managing an in-house solution, or outsourcing to an experienced managed service provider? Tip
-
Data security
This brief course overview discusses the basics of backing up data and includes an overview of methods, tape rotation, the grandfather-father-son practice and offsite copies. Tip
-
Proactive security: The future of secure networks
An intelligence-based approach that addresses all aspects of network security will empower companies to make informed, strategic decisions before attacks occur. Tip
-
Linking security to the enterprise mission
Security management software can improve the effectiveness of the security organization while providing a strong foundation for compliance requirements facing large organizations. Tip
-
Authorization by authentication
A look at how you can restrict HTTP traffic by authenticating at the firewall, router or switch. Tip
-
Mier Communications' approach to VoIP security ratings
Mier Communications' approach to VoIP security ratings provides some guidelines for securing IP telephony and VoIP infrastructure. Tip
-
Instant messaging and compliance issues: What you need to know
Instant messaging is breaking into almost every corporation in same shape or form. This can lead to serious issues for companies subject to federal compliance. Tip
-
Fight viruses and hack attacks with a network analyzer
Because firewalls and other security measures are not failsafe, you need additional tools. A network analyzer can help. Tip
-
Proactive security patch management reaps rewards
A new model for patch management can prevent attacks, minimize damage, and lower costs. Tip
-
Using passive-interface to prevent DoS
How to use the passive-interface command to prevent Denial of Service attacks. Tip
Network Management Strategies for the CIO