SearchMidmarketSecurity

New & Notable

Get Started

The secrets of proper firewall maintenance and security testing techniques

The Verizon 2015 PCI Compliance Report cited a lack of firewall maintenance and security testing as major causes for compliances breaches. Expert Kevin Beaver offers tips to successfully manage these tasks.

Get Started

Introduction to mobile device management products

Expert Matt Pascucci describes how implementing mobile device management products can protect smartphones and tablets, as well as enterprise networks and infrastructures.

Evaluate

What enterprises need to know about the Regin malware toolkit

The sophisticated Regin malware contains features that hackers can adopt into other enterprise malware threats. Expert Nick Lewis explains how to combat this risk.

News

March 2015 Patch Tuesday: Microsoft offers quick FREAK fix

Microsoft's March 2015 Patch Tuesday bulletins include a fix for the FREAK vulnerability, as well as five critical fixes, but surprisingly, an expert says one of the fixes deemed non-critical actually demands immediate attention.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Midmarket IT Security challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Midmarket IT Security Basics

  • Get Started

    unified threat management (UTM)

    Unified threat management (UTM) is an approach to security management that allows an administrator to monitor and manage a wide variety of security-related applications and infrastructure components through a single management console.

  • Get Started

    endpoint security

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.

  • Get Started

    IPsec (Internet Protocol Security)

    IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication.

View All Get Started

Sections from across SearchMidmarketSecurity

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

ComputerWeekly

Close