Microsoft endpoint security management News
March 10, 2010
Early adopters share why their moves to Microsoft Forefront Security will offer value once the kinks have been worked out.
December 03, 2009
Microsoft introduces the successor to the ISA Server, the Forefront Threat Management Gateway. TMG introduce Web security to the ISA line, which was long used as a proxy server.
April 14, 2009
Microsoft continues to meld security and identity management, with the Beta 2 release this week of Stirling, the next generation of its Forefront Security Suite.
Microsoft endpoint security management Get Started
Bring yourself up to speed with our introductory content
Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted. Continue Reading
Evaluate Microsoft endpoint security management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Your organization may primarily be a Windows shop, but Macbooks are becoming popular among executives and Macintosh computer security must be understood. Continue Reading
Windows Firewall with Advanced Security extends security to Windows 7 and Windows Server 2008 end users. Continue Reading
Full disk encryption is becoming a priority for laptop security in midmarket companies because of regulatory compliance and fear of data breaches. Consider central management, ease of deployment, user transparency, reporting, platform support and ... Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
Valuable Features: Having experienced the frustrations of poorly designed/executed interfaces first-hand, one of the most valuable features...Continue Reading
The way that it automates the provisioning of accounts is valuable but there were some deployment issues.Powered by IT Central Station
Valuable Features: The way that it automated the provisioning of accounts for employees and students and the quick response time. •...Continue Reading
I wouldn't consider this appropriate for fewer than around 2,000 users, unless you are synchronizing multiple databases.Powered by IT Central Station
Improvements to My Organization: To be honest - it hasn't. It was sold and installed for us at a large sum, with questionable implementations....Continue Reading
Manage Microsoft endpoint security management
Learn to apply best practices and optimize your operations.
Booting a system from a virtual hard drive is one of the perks of Windows 7. After reviewing the security benefits, Tony Bradley offers a step-by-step plan for creating a VHD. Continue Reading
Tony Bradley explains why the security features in IE 8 may convince midmarket organizations to make the browser upgrade. Continue Reading
Platform security expert Michael Cobb explains the benefits and drawbacks of Windows Vista Service Pack 1. Continue Reading
Problem Solve Microsoft endpoint security management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform. Continue Reading
Although Windows 7 is more secure than its predecessors, it remains vulnerable to security threats. In this tip, Brien Posey details five steps for securing Windows 7 desktops. Continue Reading
Many patch management systems fail to address endpoint application security. Tom Chmielarski suggests three areas to examine to ensure that your endpoint applications are secure. Continue Reading