ISA server and Web monitoring configuration confusion
From a reader: I’m installing Web monitoring software and Microsoft ISA server so that we can get a handle on employee surfing and lock down troublesome sites. Now we already have a network firewall...
View ArticleEmail Security SaaS
For those of you who have outsourced email security, what were you looking for in terms of differentiators between email SaaS providers?
View ArticleBrowser upgrades
What are your biggest challenges when pushing upgrades, like new browsers, across your organization?
View ArticleEncryption: An “unapproachable” subject?
In a recent SearchMidmarketSecurity.com article, contributor Mike Chapple says, “Unfortunately, many security practitioners don’t fully understand encryption due to the technology’s ill-deserved...
View ArticleForefront: All-in-one or best-of-breed?
I recently talked to two Forefront customers, who had a lot of praise for Forefront’s all-in-one management console and its protection against external threats. Any Forefront users out there? What do...
View ArticleWhy IPS?
For those who use an IPS, what were your reasons for implementing it? Here’s a tip on determining your IPS needs: http://searchmidmarketsecurity.techtarget.com/tip/0,289483,sid198_gci1349855,00.html
View ArticleDefense in depth and unified threat management appliances
Experts tout unified threat management appliances as an ideal antimalware, intrusion prevention and content filtering firewall for midmarket companies. But doesn’t this counter the long-standing...
View ArticleSMB encryption options and vendor vetting
From a reader: With the Nevada data protection regulation and upcoming Massachusetts data protection law, we’re looking for a checklist of encryption issues we should raise as we begin to look at...
View ArticleNeed help reducing email security false positives
From a reader: What can our company do to minimize false positives in our email security filters?
View Article