Access control, Antivirus, Antivirus software, Application security, Auditing, Authentication, Biometrics, Current threats, cybersecurity, Digital certificates, Encryption, Endpoint security, Firewall, Firewalls, Forensics, Hacking, Identity & Access Management, Incident response, Information risk management, Information security, Intrusion management, ISA Server, malware, McAfee, Password, Patch management, patching, PEN testing, Platform Security, Risk management, Secure Coding, Security in 2010, Security management, Security products, Security Program Management, Security tokens, SFTP, Single sign-on, Spyware, SSL, SSL/TLS, Symantec, Trojans, User Permissions, Veritas, Viruses, vulnerability management, Web security, Windows Security, worms VIEW ALL TAGS
What are the best practices for eliminating single points of failure (SPOF) in a network? What are the most common ways to eliminate them?
Experts tout unified threat management appliances as an ideal antimalware, intrusion prevention and content filtering firewall for midmarket companies. But doesn't this counter the long-standing security practice of defense-in-depth? With a one vendor, platform, and management console, aren't we...