Access your Pro+ Content below.
Microsoft Windows 7 security features
This article is part of the May 2010 issue of Information Security magazine
Seven years after kicking off its Trustworthy Computing initiative, Microsoft launched Windows 7 last October. The software giant touts the operating system, which builds on the security features of Vista, as key to its "End to End Trust" vision for a more secure Internet. With Windows 7, Microsoft also aims to make security easier to use; Vista, which debuted three years ago, caught criticism for security functionality users and administrators alike found clunky and obtrusive. Let's take a look at several of the security features of Windows 7, including a more flexible BitLocker for data protection, auditing enhancements to help meet compliance requirements, an improved User Access Control with fewer prompts, and new functionality to ensure system integrity. DATA PROTECTION In today's fast-paced, mobile environment there is more opportunity than ever before for data to fall into unauthorized hands. Hundreds of thousands of laptops containing sensitive information are lost, stolen or decommissioned every year. Additionally, ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Database activity monitoring can help with security and compliance by tracking everything going on in the database.
Microsoft Windows 7 security aims to improve security without the headaches of Vista.
OWASP Top 10 vulnerabilities list adds risk to methodology used to categorize coding errors.
Criminals are using the Zeus banking Trojan and other malware to hijack online business banking accounts.
Columns in this issue
Having a long-term goal for a career in information security isn't enough. Here are four key steps for planning for a career in information security.
A simplified information security risk equation helps translate information security risk to users.
The Rockefeller-Snowe cybersecurity bill has potential but raises a lot of questions.