• August 30, 2010 30 Aug'10

    How to build a toolset to avoid Web 2.0 security issues

    An enterprise defense-in-depth strategy should include security tools that monitor, prevent, alert, encrypt and quarantine data from leaving your network, as well as processes put in place to monitor the Web for sensitive data that may have leaked.  Continue Reading

  • August 30, 2010 30 Aug'10

    How to use NeXpose: Free enterprise vulnerability management tools

    Learn how to use NeXpose Community Edition, a free collection of vulnerability management tools that offers pre-defined scan templates, and the ability to scan networks, OSes, desktops and databases.  Continue Reading

  • August 26, 2010 26 Aug'10

    Security as a Service (SaaS)

    Security-as-a-service (SaaS) is an outsourcing model for security management. Typically, Security as a Service involves applications such as anti-virus software delivered over the Internet but the term can also refer to security management provided ...  Continue Reading

  • August 26, 2010 26 Aug'10

    SaaS

    Security-as-a-service (SaaS) is an outsourcing model for security management. Typically, Security as a Service involves applications such as anti-virus software delivered over the Internet but the term can also refer to security management provided ...  Continue Reading

  • August 26, 2010 26 Aug'10

    Security as a Service

    Security-as-a-service (SaaS) is an outsourcing model for security management. Typically, Security as a Service involves applications such as anti-virus software delivered over the Internet but the term can also refer to security management provided ...  Continue Reading

  • August 26, 2010 26 Aug'10

    Intel-McAfee marriage could fuel renewed chip security interest

    Hardware-based security is in use at some enterprises and gains in virtualization are predicted on the horizon, but the technology has seen slow adoption.  Continue Reading

  • August 25, 2010 25 Aug'10

    Desktop virtualization enhances telework security at CDC

    The Centers for Disease Control and Prevention has turned to desktop virtualization as a way to provide its teleworkers with all the applications they need to do their jobs from home securely.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close