Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2007

Events: Information security conferences for March 2007

MARCH SANS 2007 http://www.sans.org/sans2007/ March 29-April 6 San Diego, Calif. The SANS Institute's annual event offers training to help security managers acclimate to the demand for risk management skills. For the first time, the conference offers a combination of SANS' top four one-day legal classes taught by Ben Wright. The SANS Future Visions and Decisions Summit makes its first appearance at the conference, while the SANS Quiz Show returns. Smart Defense Seminar www.events.techtarget.com/sd/ April 18; Boston, Mass. April 24; Dallas, Texas April 26; Minneapolis This three-city, one-day seminar will enable you to best use your technologies and policies to thwart the latest threats and justify your intrusion defense investments. Technical contributor and senior partner of Opus One, Joel Snyder, will focus on network-based defenses. He'll outline key components of a sound perimeter defense strategy and how to manage an intrusion defense infrastructure. MAY DallasCon 2007 www.dallascon.com May 7-12 Dallas, Texas Attend ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • Product review: Six removable device control security products

    Six removable device control security products that provide centrally managed granular control over ports, interfaces and storage devices are reviewed. This review evaluates: DeviceLock 6.0 from SmartLine, Sanctuary Device Con-trol 4.0 from SecureWave, Endpoint Access Manager 3.0 from ControlGuard, Device-Wall 4.5 from Centennial Software, Safend Protector 3.1 from Safend and Protect Mobile from Workshare.

  • Prioritizing compliance and information security

    Have compliance demands refocused and weakened information security efforts?

Columns in this issue

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

-ADS BY GOOGLE

Close