While the IC’s research organization looks into adding security to cloud environments, in the here and now, intelligence agencies are sharing more data.
HEALTHY IT: Isolating Medical Devices > SIEM TOOLS: Analyze and Prioritize > UTM: Tips for Small-Scale Deployment > IDS: Spotting Security Problems >
Quarantining Infection VA finds cure for infected medical devices
After computerized medical devices at the Department of Veterans Affairs contracted viruses and malware, the agency moved to isolate some 50,000 of them from the network using virtual LANs and access control lists.
Security SmartsManagement systems make sense of alerts
Tracking all the security events that occur on a large network can be near impossible for IT staff, so the Navy and the Federal Aviation Administration tap security information event management tools to analyze events and respond.
SSL VPN Virtuoso Try these four tips for deployment
Unified threat management devices offer SSL VPNs with a lower price tag and easier management than their enterprise-class brethren. Here are four suggestions for using small-scale SSL VPNs more effectively.
Intrusion Detection Systems Learn how to best apply an IDS to spot security problems
Learn how to best apply an IDS in your agency to detect security policy violations, data leakage, and misconfigured or unauthorized devices.
Data Loss Prevention Ensure sensitive digital assets remain in your organization
Data loss prevention products offer valuable aid in detecting leakage of Social Security or credit card numbers. To get the most from these tools, apply proper policies and risk assessment.
Security: Key strategies for safeguarding IT resources from interior and exterior threats.
Security: Keeping information confidential, intact and accessible when threats emerge.
Copyright © 2010 CDW Government LLC, 230 North Milwaukee Avenue, Vernon Hills, IL 60061; 800.808.4239
Copyright © 2017 CDW LLC 230 N. Milwaukee Avenue, Vernon Hills, IL 60061