In This Issue: Focus on Network Security

HEALTHY IT: Isolating Medical Devices >
SIEM TOOLS: Analyze and Prioritize >
UTM: Tips for Small-Scale Deployment >
IDS: Spotting Security Problems >

September 7, 2010  

e-mail sign up 

E-newsFedTechSearchMagazineResourcesHot TopicsNewsletters
    Online Help Today for Tomorrowís Technology Challenges  
Case Study

Quarantining Infection
VA finds cure for infected medical devices

After computerized medical devices at the Department of Veterans Affairs contracted viruses and malware, the agency moved to isolate some 50,000 of them from the network using virtual LANs and access control lists.

READ STORY >  SHARE >  twitter facebook linkedin

Tech Trends

Security Smarts
Management systems make sense of alerts

Tracking all the security events that occur on a large network can be near impossible for IT staff, so the Navy and the Federal Aviation Administration tap security information event management tools to analyze events and respond.

READ STORY >  SHARE >  twitter facebook linkedin

Tech Tips

SSL VPN Virtuoso
Try these four tips for deployment

Unified threat management devices offer SSL VPNs with a lower price tag and easier management than their enterprise-class brethren. Here are four suggestions for using small-scale SSL VPNs more effectively.

READ STORY >  SHARE >  twitter facebook linkedin

Tech Tips

Intrusion Detection Systems
Learn how to best apply an IDS to spot security problems

Learn how to best apply an IDS in your agency to detect security policy violations, data leakage, and misconfigured or unauthorized devices.

READ STORY >  SHARE >  twitter facebook linkedin
Best Practices

Data Loss Prevention
Ensure sensitive digital assets remain in your organization

Data loss prevention products offer valuable aid in detecting leakage of Social Security or credit card numbers. To get the most from these tools, apply proper policies and risk assessment.

READ STORY >  SHARE >  twitter facebook linkedin

White Paper

Security: Key strategies for safeguarding IT resources from interior and exterior threats.

Reference Guide

Security: Keeping information confidential, intact and accessible when threats emerge.

The 21st Century Government
View the 21st Century Government



Share FedTech E-Newsletter on: Twitter Facebook LinkedIn             Visit:  CDW-G

Banner Advertisement
  This e-mail is intended for the purposes of researching or purchasing products offered for sale by CDW·G.
All information is subject to CDW·G's terms, conditions and policies.

Copyright © 2010 CDW Government LLC, 230 North Milwaukee Avenue, Vernon Hills, IL 60061; 800.808.4239


Become an Insider

Unlock white papers, personalized recommendations and other premium content for an in-depth look at evolving IT