In This Issue: Focus on Security

CYBERSECURITY: Technology Plus Teamwork >
WINDOWS 7: Securing Removable Drives >
UTM: Multifunctional Devices Consolidate Security >


November 4, 2009  

e-mail sign up 
Manage your subscription 
Forward to a friend 
View web version 

E-newsFedTechSearchMagazineResourcesHot TopicsNewsletters
    Online Help Today for Tomorrow’s Technology Challenges  

Cybersecurity: Technology Plus Teamwork
Agencies want security that won't break the bank

Ever walk and juggle at the same time? Welcome to cybersecurity. With limited dollars, agencies must find a formula to make the most of money, people and technology, says Justice's Vance Hitch.

READ STORY >  SHARE >  twitter facebook linkedin

Tech Tips

Windows 7: Securing Removable Drives
BitLocker can help manage portable storage devices

Learn tips for using Group Policy settings if you wish to block users from installing USB drives; or, if you allow the drives, how to encrypt the data using Windows 7's BitLocker To Go.

READ STORY >  SHARE >  twitter facebook linkedin

Tech Trends

Unified Threat Management
Will UTM save money and simplify security?

Discover why all-in-one security appliances that offer firewall, VPN and antivirus protection might appeal to agencies looking to ease security management and make it more efficient.

READ STORY >  SHARE >  twitter facebook linkedin

Product Review

SonicWall UTM
NSA E5500 offers multithreat protection

Our FedTech reviewer looks at how well the SonicWall NSA E5500 unified threat management device stymies security threats. The scalable appliance can handle 500 client VPN sessions.

READ STORY >  SHARE >  twitter facebook linkedin

Bridging the Gap

Securing Teleworkers
Assuring safe remote access — no matter the device

What happens if your agency can't afford to buy hardware for teleworkers? Can you secure their personal systems? Some feds say it's possible and point to NIST's recently updated security guidance.

READ STORY >  SHARE >  twitter facebook linkedin

White Papers

Security: Key strategies for safeguarding IT resources from interior and exterior threats

Mobile Computing Security: Protecting data on devices roaming on the perimeter

Reference Guide

Security: Keeping information confidential, intact and accessible when threats emerge

Trade Shows

November 2-5
TechNet Asia-Pacific

November 17-19
Coast Guard Innovation Expo
Virginia Beach, Va.


Assessing IT Security: Who's assessing your IT security? Hackers or a trusted partner?


The 21st Century Government
Visit the 21st Century Government

Share FedTech E-Newsletter on:             Visit:  CDW-G

  This e-mail is intended for the purposes of researching or purchasing products offered for sale by CDW·G.
All information is subject to CDW·G's terms, conditions and policies. E-mail xxxxx

Copyright © 2009 CDW Government, Inc. 230 North Milwaukee Avenue, Vernon Hills, IL 60061; 800.808.4239

  About CDW·G | Privacy Policy | Terms and Conditions | Subscribe | Unsubscribe | Feedback  

Become an Insider

Unlock white papers, personalized recommendations and other premium content for an in-depth look at evolving IT