Vanguard wants the mainframe to be the center of security
Versions offers more management, more integration, and more compliance
While a NAC solution blocks infected endpoints from entering the network, what happens when a connected PC becomes non-compliant?
Symantec Corp.’s Advanced Threat Research team reports that Windows Vista does deliver tangible security improvements—but Vista is still far from invulnerable.
IT is still largely unprotected from one area of enterprise risk: the insider threat.
Two strategies and a dozen tips help you improve your user’s NAC
Microsoft doesn’t put enough edge into its security products, yet.
The Daylight Saving Time changes may not have the impact of Y2K, but the ripples may give IT managers heartburn nonetheless
In the second of our two-part series, Michigan’s CISO discusses planning for pandemics and other natural (and even man-made) disasters.
Hackers can take control of a Vista machine
What's on SPI Labs' list of top Web application security threats it expects this year?
A new exploit potentially lets an attacker execute code on a user’s machine
PGP Corporation may have the handle on protecting sensitive data everywhere
With a little prioritization, setting up a network security plan doesn't have to eat up all your time.
Even in the most "monolithic" of IT settings, the mainframe data center, there may be compelling justifications for violating the one-stop-shop approach that vendors are keen to promote these days.
SIM adds real-time capabilities but compliance, not threats, stills drives this market
Security and compliance policies are only successful if they are enforced. That’s where network access control comes in.
Spam and phishing attacks are getting worse, and new Web threats will complicate networks until some reputations are established
We sort out the options with the most buzz for 2007—NAC, Vista, and NAP—for enforcing security with devices requesting network resources.
A majority of survey respondents looking to implement an NAC solution want to reduce malware incidents, control remote access to the network, and enforce endpoint configurations.