Mobile security and access controls
Does anyone have any recommendations for server mobility software – that provides adequate access controls ensuring only the right people get to the right data?
View ArticleWindows Updates fail
From a reader: Windows Updates are not working for us. Our InstallShield updates are being blocked, maybe by something in our firewall? Not sure. Where should we start looking?
View ArticleISA server and Web monitoring configuration confusion
From a reader: I’m installing Web monitoring software and Microsoft ISA server so that we can get a handle on employee surfing and lock down troublesome sites. Now we already have a network firewall...
View ArticleNeed a .NET reporting tool that can Integraph with Windows RMS
From a reader regarding a recent technical tip posted to SearchMidmarketSecurity.com entitled: “Microsoft Windows RMS enables granular access control over sensitive data”...
View ArticleEmail and Web Security Merger
Is your organization merging, or planning to merge, your email security and Web security gateway capabilities? Why does it make sense to do so, but more importantly, what are some of the gotchas you...
View ArticleEmail Security SaaS
For those of you who have outsourced email security, what were you looking for in terms of differentiators between email SaaS providers?
View ArticleBrowser upgrades
What are your biggest challenges when pushing upgrades, like new browsers, across your organization?
View ArticleEncryption: An “unapproachable” subject?
In a recent SearchMidmarketSecurity.com article, contributor Mike Chapple says, “Unfortunately, many security practitioners don’t fully understand encryption due to the technology’s ill-deserved...
View ArticleForefront: All-in-one or best-of-breed?
I recently talked to two Forefront customers, who had a lot of praise for Forefront’s all-in-one management console and its protection against external threats. Any Forefront users out there? What do...
View ArticleWhy IPS?
For those who use an IPS, what were your reasons for implementing it? Here’s a tip on determining your IPS needs: http://searchmidmarketsecurity.techtarget.com/tip/0,289483,sid198_gci1349855,00.html
View ArticleDefense in depth and unified threat management appliances
Experts tout unified threat management appliances as an ideal antimalware, intrusion prevention and content filtering firewall for midmarket companies. But doesn’t this counter the long-standing...
View ArticleSMB encryption options and vendor vetting
From a reader: With the Nevada data protection regulation and upcoming Massachusetts data protection law, we’re looking for a checklist of encryption issues we should raise as we begin to look at...
View ArticleNeed help reducing email security false positives
From a reader: What can our company do to minimize false positives in our email security filters?
View Article