|In This Issue: Focus on Network Security
HEALTHY IT: Isolating Medical Devices >
|September 7, 2010
e-mail sign up
|Online Help Today for Tomorrowís Technology Challenges|
After computerized medical devices at the Department of Veterans Affairs contracted viruses and malware, the agency moved to isolate some 50,000 of them from the network using virtual LANs and access control lists.
Tracking all the security events that occur on a large network can be near impossible for IT staff, so the Navy and the Federal Aviation Administration tap security information event management tools to analyze events and respond.
SSL VPN Virtuoso
Unified threat management devices offer SSL VPNs with a lower price tag and easier management than their enterprise-class brethren. Here are four suggestions for using small-scale SSL VPNs more effectively.
Intrusion Detection Systems
Learn how to best apply an IDS in your agency to detect security policy violations, data leakage, and misconfigured or unauthorized devices.
Data Loss Prevention
Data loss prevention products offer valuable aid in detecting leakage of Social Security or credit card numbers. To get the most from these tools, apply proper policies and risk assessment.
Security: Key strategies for safeguarding IT resources from interior and exterior threats.
Security: Keeping information confidential, intact and accessible when threats emerge.
View the 21st Century Government
| This e-mail is intended for the purposes of researching or purchasing products offered for sale by CDW·G.
All information is subject to CDW·G's terms, conditions and policies.
Copyright © 2010 CDW Government LLC, 230 North Milwaukee Avenue, Vernon Hills, IL 60061; 800.808.4239
Unlock white papers, personalized recommendations and other premium content for an in-depth look at evolving IT
Copyright © 2023 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061
Do Not Sell My Personal Information