Access "Thin clients a malware-free desktop option"
This article is part of the March 2007 issue of Compliance vs. security: Prevent an either-or mentality
Managing, maintaining and securing PCs always has brought some level of agony for security professionals. Whether it's a virus, worm, spyware, corrupted files or incessant patching, something always is bringing PCs down. That's a headache David Barter, technical services manager for Androscoggin Home Care & Hospice of Lewiston, Maine, knows all too well. "Systems in four of our remote offices were breaking often," he says. And part of the problem was that those Windows-based PCs were getting bogged with spyware. That just wasn't acceptable for Androscoggin, considering the increased reliance on electronic health records to deliver care, the security requirements associated with HIPAA, and just how much care Androscoggin delivers each year. More than 375 physicians utilize the hospice and home care services the non-profit provides. And, in 2005, Androscoggin served more than 8,000 patients and families, and provided more than 140,000 home care and hospice visits. "The PCs were just killing us," says Barter. That was just part of the challenge he faced. ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
DigitalPersona Workstation Pro and Server for Biometric Authentication
This review evaluates DigitalPersona Pro, a single sign-on (SSO) software suite that allows an enterprise to replace passwords with biometric fingerprint readers or provide dual-factor authentication.
-
Security product and tools news and releases: Trend Micro, Citrix
Get the latest news and releases on security tools and products for intrusion detection and protection, email and USB security. Get info on price, setup and installation.
-
Enterprise UTM products differ from all-in-one SMB appliances
UTM appliance struggle to find their niche in the enterprise as large companies prefer best-in-breed security products.
- Events: Information security conferences for March 2007
-
Risk Policy: Elemental Security Platform product review
In this review, get information and advice on Elemental Security Plaform (ESM) products, such as expenses and setup, configuration and compliance features.
-
Prioritizing compliance and information security
Have compliance demands refocused and weakened information security efforts?
-
DigitalPersona Workstation Pro and Server for Biometric Authentication
-
- Viewpoint: Creative patch management workarounds
-
Product review: e-DMZ Security's eGuardPost
This product review examines e-DMZ eGuardPost's capabilities that allow security managers to apply granular access controls to remote connections. The appliance also comes bundled with Security's Password Auto Repository (PAR), e-DMZ's flagship product, which securely stores and manages administrative passwords
-
Thin clients a malware-free desktop option
A Maine health care provider sheds its spyware-ridden, burdensome PCs for a safer, more manageable thin client environment.
-
Sun Microsystems' Sun Java System Identity Manager 7.0 Product Review
Product review of Sun Microsystems' Sun Java System Identity Manager 7.0 tool security features, configuration, setup and installation.
-
Product review: Six removable device control security products
Six removable device control security products that provide centrally managed granular control over ports, interfaces and storage devices are reviewed. This review evaluates: DeviceLock 6.0 from SmartLine, Sanctuary Device Con-trol 4.0 from SecureWave, Endpoint Access Manager 3.0 from ControlGuard, Device-Wall 4.5 from Centennial Software, Safend Protector 3.1 from Safend and Protect Mobile from Workshare.
-
Columns
-
Bruce Schneier and Marcus Ranum debate the necessity of penetration tests
Pen tests identify your organization's weaknesses. Bruce Schneier and Marcus Ranum debate whether organizations really want to document all the ways networks are insecure.
-
Ping: Mark Odiorne
Mark Odiorne
-
CISO priorities focused on compliance over security
Regulatory demands have forced CISOs to prioritize compliance over data and intellectual property protection.
-
Secure software development needs to be treated as other engineering disciplines
Almost no university teaches quality or security as part of their software engineering or computer science majors, a major reason for today's application security problems.
-
Bruce Schneier and Marcus Ranum debate the necessity of penetration tests
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO