What's up IT?
Putting security where it belongs
Tuesday, 1 June 2004 11:58 ESTAs the number of computational devices that companies use in their everyday business has expanded exponentially in recent years, effective management of those assets has become imperative. In recent years, business information systems have expanded into networks, encompassing partners, suppliers and customers. And this brings greater security challenges - employees need to reach out to the world outside the corporate boundaries and those with whom we do business need access to corporate resources. The challenges that this poses are those of making sure that only authorised people are able to access precious company resources so that nothing sensitive leaks out, as well as trying to prevent the unwanted from coming in.
But effective and proactive management of corporate networks to ensure security is no longer just 'nice to have' - it has become a business imperative, especially in the light of regulations that have been passed recently on both sides of the pond. At the heart of most of this legislation is the requirement for greater accountability in business.
|
Featured Articles
In this paper I will try to explain the philosophy behind the Security Enhanced Linux (SE Linux). I will however try to explain the concept with an example but to keep the length readable I will restrain myself to go into much of implementation details for e.g. commands and similar stuff.
VoIP Telephony: Benefits for Businesses
Voice-over-Internet Protocol, or VoIP service, has been talked about for a number of years but is now being adopted by mainstream businesses in order to save money as well as deploy powerful new capabilities for end-users.
Review: SmartLine DeviceLock
Businesses have spent millions protecting their corporate email and gateway servers from a vast range of security threats such as, malware and identity theft and data loss. But with USB memory, portable storage and media devices, IT professionals take no steps to monitor the usage of these devices, therefore ignoring the threat of internal security breaches at the network end-points.
Network Security Tools

SpyDefense SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.

Proactive Security Auditor Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.

File Securer File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.
Press Releases
Boiling Springs Savings Bank Taps Comodo For Online Verification Solution
|