• June 27, 2007 27 Jun'07

    The next security acquisition? Here's a wish list

    Instead of guessing which companies will cash out next, Dennis Fisher makes a list of security mergers he'd like to see either for sheer entertainment value or actual customer value ...  Continue Reading

  • June 26, 2007 26 Jun'07

    Screencast: How to configure a UTM device

    Unified threat management technologies provide protection against various network attacks, but properly configuring UTM boxes can be a whole other battle. In this exclusive screencast, expert David Strom gives an easy-to-follow, on-screen ...  Continue Reading

  • June 26, 2007 26 Jun'07

    M&A: Merging network security policies

    Company mergers often call for the consolidation of two different network policies. But before making any final decisions on technology, the staff members of both organizations need to be on the same page. In this tip, contributor Mike Chapple ...  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close