Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
How to choose full disk encryption for laptop security, compliance
Full disk encryption is becoming a priority for laptop security in midmarket companies because of regulatory compliance and fear of data breaches. Consider central management, ease of deployment, user transparency, reporting, platform support and ... Continue Reading
Understand the pros and cons of Microsoft Windows 7 DirectAccess
Discover how Microsoft's Windows 7 DirectAccess can help midsized companies obtain secure remote end-to-edge and end-to-end access, tunneled through a Windows Server 2008 R2 DirectAccess Server. Plus, examine the advantages and limitations of this ... Continue Reading
Microsoft SharePoint security hinges on authorization, external user management
Management of external user access controls, authentication and authorization are important Microsoft SharePoint security best practices. This is the second of a two-part series of technical tips. Continue Reading
-
Start with centralized endpoint security management when buying suites
Single vendor centralized management of endpoint security suites, including policy creation and management, and compliance reporting is the primary consideration when choosing and buying an endpoint security suite Continue Reading
Think about performance, data protection when choosing endpoint security suites
Endpoint security suites offer multiple malware detection techniques and data protection features that appeal to midmarket IT organizations. This is part one of a two-part series on choosing endpoint security suites. Continue Reading
Poor Microsoft SharePoint security permissions policies can derail deployments
A strong Microsoft SharePoint security policy starts with proper permissions and access controls to internal resources, and to control external users. This is the first of a two-part technical tip.Continue Reading
Steps to take in buying a network-based intrusion prevention system
This guide offers advice on the steps you need to take before buying a network-based intrusion prevention system.Continue Reading
How to build the right managed security service level agreement
Midmarket companies have little leverage in contractual negotiations with large managed security service providers, and should look toward smaller MSSPs for more flexibility in defining service level agreements.Continue Reading
Security enhancements in Microsoft Essential Business Server 2008
Microsoft Essential Business Server solves major security and network management issues for midmarket companies that are outgrowing Microsoft Small Business Server 2003 and are too small for enterprise solutions.Continue Reading
Three ways to prioritize endpoint security over perimeter defenses
Midmarket organizations should prioritize endpoint security management over perimeter defenses.Continue Reading
-
Web application firewall worth depends on developer efforts
SMBs are buying Web application firewalls (WAF) for PCI DSS compliance, but if they are installed and forgotten, they won't be compliant or secure.Continue Reading
How to make data loss prevention tools affordable and manageable for midmarket
Data loss prevention can work for the midmarket if organizations have streamlined requirements and can easily identify and locate sensitive data.Continue Reading
Selecting a SIM for a midmarket business
Although you think security information management (SIM) systems are too pricey and complex for your midmarket business, you may want to reconsider. Diana Kelley details some ways to cut cost and complexity while taking advantage of a SIM tool in ...Continue Reading
Next version of Microsoft ISA Server brings Web security to midmarket
Microsoft's Forefront Threat Management Gateway (TMG) adds HTTP and HTTPs antimalware inspection, application vulnerability and Web filtering. TMG will integrate tightly with other Microsoft Security products under the upcoming Forefront Security ...Continue Reading
What are common (and uncommon) unified threat management features?
Unified threat management products have gained popularity because they bring multiple security tools together into one appliance. In this SearchSecurity.com Q&A, Michael Cobb reviews just what those security tools are.Continue Reading