Search This Blog

Monday, April 02, 2012

WindowSecurity.com - Monthly Article Update

WindowSecurity.com - Monthly Article Update

Hi Security World,

New articles added to WindowSecurity.com last month:

Title: EventSentry - Voted WindowSecurity.com Readers' Choice Award Winner - Event Log Monitoring
Author: The Editor
Link: http://www.WindowSecurity.com/news/WindowSecurity-Readers-Choice-Award-Event-Log-Monitoring-EventSentry-Feb12.html
Summary: EventSentry was selected the winner in the Event Log Monitoring category of the WindowSecurity.com Readers' Choice Awards. GFI EventsManager and ManageEngine EventLog Analyzer were runner-up and second runner-up respectively.

Title: Myths of Securing Windows Desktops (Part 2)
Author: Derek Melber
Link: http://www.WindowSecurity.com/articles/Myths-Securing-Windows-Desktops-Part2.html
Summary: In part two of this article about Securing Windows desktops, the author discusses endpoint firewalls, data protection, and whitelisting of applications as to make sure that readers are fully aware of the capabilities and limitations of each security solution.

Title: Identity (Management) Crisis (Part 4): Selecting a Comprehensive Identity Management solution
Author: Deb Shinder
Link: http://www.WindowSecurity.com/articles/Identity-Management-Crisis-Part4.html
Summary: In this, Part 4, we'll look more closely at the criteria for choosing a comprehensive identity management solution for an organization or a federated identity management solution.

Title: Myths of Securing Windows Desktops (Part 1)
Author: Derek Melber
Link: http://www.WindowSecurity.com/articles/Myths-Securing-Windows-Desktops-Part1.html
Summary: In this article the author discusses two of the areas that you will need to solve: Anti-virus and privilege management.

Title: Security Considerations for Cloud Computing (Part 2)
Author: Deb Shinder
Link: http://www.WindowSecurity.com/articles/Security-Considerations-Cloud-Computing-Part2.html
Summary: In this article, we'll introduce the idea of thinking about private cloud security within the context of each of the five essential characteristics that define a cloud-based solution.

Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@windowsecurity.com

Copyright © WindowSecurity.com 2012. All rights reserved.

No comments: