
Welcome to SearchSecurity.com's supplement to the latest issue of Information Security magazine. Now that you've read the story in the magazine, continue to explore these topics on SearchSecurity.com.
|
|
Combining high-performance traffic inspection with automated response capabilities, IPS allows organizations to respond quickly to threats and monitor the huge volume of high-speed traffic entering their networks. In this issue, we compared five leading inline IPS appliances from Cisco Systems, ISS, Radware, Sourcefire and Top Layer. Now, learn more about the keys to successful intrusion detection and prevention in this learning guide. It features insight into the technology, how it works, and advice for troubleshooting and configuring your IDS/IPS.
>>GET THE IDS/IPS LEARNING GUIDE
|
||||
This month's feature showed you the ways that organizations can leverage vulnerability management processes and tools to reduce security exposures and demonstrate security's value to the business. Now, arm yourself with information about the types of correlation tools that offer the best value. Register for an hour-long webcast on Nov. 30 with Burton Group analyst Diana Kelley. She'll explain:
>> PREREGISTER FOR THE WEBCAST
Katrina's Security Survivors
As Hurricane Katrina hit, information security teams were scrambling to make sure their disaster recovery plans could withstand the storm's devastation. Information Security magazine profiled executives at three Gulf Coast businesses who worked tirelessly to keep their organizations up and running. Read the extended interviews with these security practitioners and find out the lessons they learned from Katrina.
>>CLICK TO READ THE PING WITH TIM OZMUN
>>CLICK TO READ THE PING WITH JENNIFER CREGER
>>CLICK TO READ THE PING WITH BILL DERWOSTYP
RELATED INFORMATION:
>> CLICK TO READ "NEW ORLEANS CIO: IT WAS THE WILD, WILD WEST"
>> CLICK TO READ "NEW ORLEANS CIO: VOIP, PORTALS AND KATRINA"
|
E-mail Security Decisions Attend this FREE seminar in the city of your choice -- Boston, Toronto or Chicago -- and gain proven infrastructure hardening techniques combined with practical strategies focused on the most urgent e-mail security threats (phishing, spyware, denial of service attacks and more). With four key sessions, this intensive 1-day training event guarantees unbiased expertise without any vendor spin from the podium. You gain little-known e-mail security tips, tactics and techniques from two of the industry's leading e-mail security authorities, Dr. Joel Snyder and Lee Benjamin. |
HIGHLIGHTS ARCHIVES |
|
October 2005 September 2005 August 2005 July 2005 June 2005 May 2005 April 2005 |
This was first published in October 2005
Security Management Strategies for the CIO
Join the conversationComment
Share
Comments
Results
Contribute to the conversation