1
  • Defense in depth and unified threat management appliances

    Experts tout unified threat management appliances as an ideal antimalware, intrusion prevention and content filtering firewall for midmarket companies. But doesn't this counter the long-standing security practice of defense-in-depth? With a one vendor, platform, and management console, aren't we...

    SearchMidmarketSecurityATE150 pointsBadges:
  • ISA server and Web monitoring configuration confusion

    From a reader: I'm installing Web monitoring software and Microsoft ISA server so that we can get a handle on employee surfing and lock down troublesome sites. Now we already have a network firewall installed that isn't going anywhere. Should I set up ISA as a secondary firewall? Any alternative...

    SearchMidmarketSecurityATE150 pointsBadges:
  • Email Security SaaS

    For those of you who have outsourced email security, what were you looking for in terms of differentiators between email SaaS providers?

    SearchMidmarketSecurityATE150 pointsBadges:
  • Encryption: An “unapproachable” subject?

    In a recent SearchMidmarketSecurity.com article, contributor Mike Chapple says, "Unfortunately, many security practitioners don't fully understand encryption due to the technology's ill-deserved reputation as the unapproachable domain of mathematicians and cryptographers." Do you agree? And what...

    SearchMidmarketSecurityATE150 pointsBadges:
  • Why IPS?

    For those who use an IPS, what were your reasons for implementing it? Here's a tip on determining your IPS needs: http://searchmidmarketsecurity.techtarget.com/tip/0,289483,sid198_gci1349855,00.html

    SearchMidmarketSecurityATE150 pointsBadges:
  • Forefront: All-in-one or best-of-breed?

    I recently talked to two Forefront customers, who had a lot of praise for Forefront's all-in-one management console and its protection against external threats.  Any Forefront users out there? What do you think? Do you agree? What have been some of your challenges? Also: what do you consider to...

    SearchMidmarketSecurityATE150 pointsBadges:
  • Browser upgrades

    What are your biggest challenges when pushing upgrades, like new browsers, across your organization? 

    SearchMidmarketSecurityATE150 pointsBadges:
  • Email and Web Security Merger

    Is your organization merging, or planning to merge, your email security and Web security gateway capabilities? Why does it make sense to do so, but more importantly, what are some of the gotchas you weren't expecting?

    SearchMidmarketSecurityATE150 pointsBadges:
  • Need a .NET reporting tool that can Integraph with Windows RMS

    From a reader regarding a recent technical tip posted to SearchMidmarketSecurity.com entitled: "Microsoft Windows RMS enables granular access control over sensitive data" http://searchmidmarketsecurity.techtarget.com/tip/0,289483,sid198_gci135 6909,00.html Do you know of any reporting service tool...

    SearchMidmarketSecurityATE150 pointsBadges:
  • Windows Updates fail

    From a reader: Windows Updates are not working for us. Our InstallShield updates are being blocked, maybe by something in our firewall? Not sure. Where should we start looking?

    SearchMidmarketSecurityATE150 pointsBadges:
  • Mobile security and access controls

    Does anyone have any recommendations for server mobility software – that provides adequate access controls ensuring only the right people get to the right data?

    SearchMidmarketSecurityATE150 pointsBadges:
  • SMB encryption options and vendor vetting

    From a reader: With the Nevada data protection regulation and upcoming Massachusetts data protection law, we're looking for a checklist of encryption issues we should raise as we begin to look at vendors. Also: What are some red flags to look for as we talk/negotiate with vendors? What are...

    SearchMidmarketSecurityATE150 pointsBadges:
  • Need help reducing email security false positives

    From a reader: What can our company do to minimize false positives in our email security filters?

    SearchMidmarketSecurityATE150 pointsBadges:
  • Phishing training and awareness materials needed

    Can anyone recommend training materials we could supply/send to end users to build awareness around phishing? We're looking for online courses, or handouts. Any recommendations?

    SearchMidmarketSecurityATE150 pointsBadges:
  • Need help automating network security monitoring

    This from a reader: In a recent SearchMidmarketSecurity.com technical tip, "Starting points for network monitoring" , expert Joel Snyder talked about the importance of automated network monitoring and what companies can learn once these products are implemented on networks. I'm wondering if you...

    SearchMidmarketSecurityATE150 pointsBadges:
  • BitLocker and Business versions of Windows

    BitLocker drive encryption is intriguing and important, but it's available only in Vista and Win 7 Ultimate and Corporate editions. Since these are the most expensive versions of the OS, most smaller companies use the Business version of Windows--what are some encryption options for them? As a...

    SearchMidmarketSecurityATE150 pointsBadges:
  • Network access controls and 802.1X

    Is 802.1x the best option for implementing network access controls (NAC)? What are the advantages and disadvantages of 802.1x? What are some other options; and can you compare and contrast the advantages of those against 802.1x?

    SearchMidmarketSecurityATE150 pointsBadges:
1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following