The sWinMan guide to security planning

Have you visited our sister site, searchWindowsManageability.com? If not, you're missing out on some great content. Here you'll find a sampling of recent articles covering security planning.

Have you visited our sister site, searchWindowsManageability.com? If not, you're missing out on some great content. Below is a sampling of recent articles covering security planning.


Top 10 steps to a strong security plan
Devising one catch-all security planning checklist that every type of company could use is well nigh impossible. The need for a baseline guide, however, is great, so searchWindowsManageability asked a security expert to share his security checklist.

Migration, security, and the economy top 2002 management scene
We've put together some predictions for what to expect in 2002. An analyst even predicts that hopes for a happy new year will be realized in an economic comeback.

New software authorizes user network entry
Meetinghouse Data Communications, Inc. announced this week the availability of its 802.1X authentication software for Windows NT/2000. It promises to secure local area network (LAN) end-user access via encryption technology.

Database security dos and don'ts
Network-centric security measures won't keep hackers from entering the database and corrupting or stealing valuable information. Two database security experts describe the top five ways to bulletproof your database.

Security risks of remote software updates
SearchWindowsManageability expert Scott Blake addresses your fears about updating software remotely.


FOR MORE INFORMATION:

Best Web Links for Windows Manageability

The latest Industry news on Windows Manageability

Dig deeper on Security Tools

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchEnterpriseLinux

SearchDataCenter

Close