SECURITY ARCHIVES - Page 83

Anti-Spyware

01 Jan, 2009

Anti-spyware, now a security best practice, is packaged with antivirus and other software

Anti-Virus Solutions

01 Jan, 2009

Antivirus solutions compare files against a virus database or look for suspicious activity

Content Filtering

01 Jan, 2009

Content filtering rides herd on what is leaving and entering an organization

E-mail Security

01 Jan, 2009

E-mail can carry direct infections or use social-engineering tricks get users to do something dangerous

Firewall

01 Jan, 2009

Firewalls are evolving as the perimeter becomes porous and Web 2.0 throws up security challenges

Internal Threat

01 Jan, 2009

The internal threat echoes Walt Kelly's Pogo: 'We have met the enemy, and he is us'

Intrusion-Detection Systems

01 Jan, 2009

Intrusion-detection systems sound alarms when hackers try to invade the enterprise network

Intrusion-Prevention Systems

01 Jan, 2009

Intrusion-prevention systems scan for invaders - and take action when they turn up

Managed Security Services

01 Jan, 2009

Managed security services call in the experts and let clients focus on their own business

Network Access Control

01 Jan, 2009

Network access control employs a number of technologies to keep network order

Security Appliances

01 Jan, 2009

Security appliances speed and simplify deployment of protection

Security Metrics

01 Jan, 2009

Careful study of the numbers can make security procedures more efficient

Unified Threat Management

01 Jan, 2009

Putting multiple security tools in one system eases management and improves efficiency

Vulnerability Assessment

01 Jan, 2009

Finding weak spots is the first step toward maintaining and improving the security of a network

Facilities Access

01 Jan, 2009

IP and other emerging technologies are used to control entry to facilities

Usage Management and Monitoring

01 Jan, 2009

Usage management and monitoring tracks who is using the network and what they are doing

User Policies

01 Jan, 2009

A best practice is to make sure employees understand what they can and can't do

Authentication Systems

01 Jan, 2009

Authentication systems act as the gatekeepers for computing resources

Cyber Crime

01 Jan, 2009

The drive has grown stronger to separate users from their data and, eventually, their money

Data Security

01 Jan, 2009

Enterprises have a lot to protect and layered 'defense in depth' is the best way to do it

First « Prev |  79 | 80 | 81 | 82 | 83|84 | Next »
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.