Midmarket IT Security Midmarket Security School:
Midmarket Security School
This resource will at as a guide for mid-market IT security professionals looking to get security specific information about the mid-market industry and organizations. Experts offer tips and tricks on how to secure network devices, data and systems in a cost effective way; as well as intrusion defense solutions, compliance technologies and identity and access management services.
New in this guide
- Intelligent threat management podcast (Intelligent threat management: Assessing the state of your security)
- Get more out of your security event log data (Intelligent threat management: Assessing the state of your security)
- Five network security issues to avoid (Network infrastructure security on a budget)
Regardless of your company's size, managing identity can be a huge undertaking that requires the efficient oversight of many moving parts. In this lesson, guest instructor Richard Mackey, principal with consultancy SystemExperts, helps you put together the pieces of an identity and access management architecture. Mackey explores the essentials of identity and access management, from the role of directories to effectively establishing approval workflows. You'll walk away with tips for tackling the five key challenges in managing identities and effective access control strategies.
There are many tools and processes that aid in threat management. But as a midmarket organization, your time and resources may limit what you are able to do in terms of assessing the state of your security. In this Midmarket Security School lesson, Joel Snyder, senior partner at Opus One, offers some techniques and advice on how to improve your company's awareness of its security state. Learn how to better utilize your security event log data, how to build a security dashboard as well as how to gain better insight into your organization's security posture.
New This lesson examines how Windows Vista presents unique intrusion defense challenges. Peter Gregory explains how well Windows Vista security features support and extend intelligent enterprise security practices.
About the author:
Peter H. Gregory is an author and information security practitioner.
Regulatory and contractual compliance are key considerations for all enterprises. And there's no shortage of vendors claiming to have the silver bullet for solving compliance woes. This lesson will explore which technologies really work.
When it comes to network infrastructure security, the IT managers of midmarket organizations sometimes need to get creative. Leveraging existing products is one way to save money, but you also need to know what areas need some dollars. In this Midmarket Security School lesson, you'll learn some techniques to save money on network security infrastructure in your midmarket business.
In this lesson, learn about the basics of intrusion defense. Joel Snyder defines the network perimeter and the technologies crucial to success, including corporate intrusion detection systems and content filtering technologies.
Over 80% of corporate network traffic is generated from remote offices, according to research firm Gartner. Here, noted network security expert David Strom will focus on securing the remote data and remote network devices in locations beyond the corporate headquarters.
In this lesson, Strom will provide an overview of the remote office security management landscape, step-by-step advice for setting up a managed unified threat management remote firewall/VPN and real-world advice from security practitioners on remote office security.