• March 10, 2009 10 Mar'09

    Next version of Microsoft ISA Server brings Web security to midmarket

    Microsoft's Forefront Threat Management Gateway (TMG) adds HTTP and HTTPs antimalware inspection, application vulnerability and Web filtering. TMG will integrate tightly with other Microsoft Security products under the upcoming Forefront Security ...  Continue Reading

  • March 10, 2009 10 Mar'09

    eBook: Virtualization Security

    Space savings and reductions in energy costs are causing more organizations to move, or at least consider the move, to virtual environments. Download this eBook and discover how to mitigate the inherent security risks associated with the adoption of...  Continue Reading

  • March 10, 2009 10 Mar'09

    Three steps to achieve security for smartphones within a budget

    Expensive mobile device security management systems don't fit within midmarket budgets. Following these three steps will offset the risks posed by unsecured mobile devices -- and do so within budget.  Continue Reading

  • March 09, 2009 09 Mar'09

    eBook: Encryption 360 Degrees

    Data breaches and regulatory mandates are fueling the exploding interest in encryption. This exclusive eBook evaluates today's encryption technologies from all angles and projects trends throughout 2009 to give you a complete picture of today's ...  Continue Reading

  • March 09, 2009 09 Mar'09

    eBook: Understanding GRC

    This in depth eBook explores all facets of GRC from the complexities of evaluating the right solution for your organization to implementing governance frameworks. Download this exclusive resource today and stay ahead of the GRC curve.  Continue Reading

  • March 06, 2009 06 Mar'09

    Bringing compliance under control

    Regulatory and contractual compliance are key considerations for all enterprises. And there's no shortage of vendors claiming to have the silver bullet for solving compliance woes. This lesson will explore which technologies really work.  Continue Reading

  • March 06, 2009 06 Mar'09

    Considerations for encryption and compliance

    It's often thought that a wide-ranging encryption implementation can prevent data loss and satisfy compliance mandates. Reality, of course, is more complex. Contributor Trent Henry discusses the pros and cons of various encryption strategies, as ...  Continue Reading

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

ComputerWeekly

Close