Search This Blog

Thursday, May 21, 2015

WindowSecurity.com - Symantec Endpoint Protection - Voted WindowSecurity.com Readers' Choice Award Winner - Endpoint Security

WindowSecurity.com - Symantec Endpoint Protection - Voted WindowSecurity.com Readers' Choice Award Winner - Endpoint Security

Hi Security World,



Just Published
-----------------------------------------------------------------
Symantec Endpoint Protection - Voted WindowSecurity.com Readers' Choice Award Winner - Endpoint Security (on 21 May 2015 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Endpoint-Security-Symantec-Endpoint-Protection-Apr15.html
Symantec Endpoint Protection was selected the winner in the Endpoint Security category of the WindowSecurity.com Readers' Choice Awards. AGAT ActiveSync Shield and DeviceLock were runner-up and second runner-up respectively.



Recent Articles & Tutorials
-----------------------------------------------------------------
Developing and Assessing your DLP Strategy (Part 2) (on 20 May 2015 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/developing-and-assessing-your-dlp-strategy-part2.html
In this, Part 2, we will start to delve more deeply into the intricacies of DLP, characteristics of good DLP software solutions, and how to implement your DLP plan.

Sharing the Load â€" Securely (on 13 May 2015 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/sharing-load-securely.html
This article discusses ways that you can increase productivity, security, and efficiency by using delegation and other concepts, such as templates.

Developing and Assessing your DLP Strategy (Part 1) (on 6 May 2015 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/misc_network_security/developing-and-assessing-your-dlp-strategy-part-1.html
In Part 1 of our article series, we’ll start with a high level overview of the challenges and elements that are involved in creating and implementing an effective DLP policy.

Assessing the Security of Mobile applications (Part 2) - Testing the application (on 29 April 2015 by Ricky M. & Monique L. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/assessing-security-mobile-applications-part2.html
In this article we will cover testing of applications.




WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- CloudComputingAdmin.com (http://www.cloudcomputingadmin.com/)
- InsideAWS.com (http://www.insideaws.com/)
- WServerNews.com (http://www.wservernews.com/)


--
To unsubscribe: http://www.techgenix.com/newsletter/members.aspx?Task=OOS&SI=78504&E=security.world%40gmail.com&S=1&NL=10
To change your subscription settings: http://www.techgenix.com/newsletter/members.aspx?Task=US&SI=78504&E=security.world%40gmail.com&S=1

WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
TechGenix Ltd. Mriehel Bypass, Mriehel BKR 3000, Malta
Copyright WindowSecurity.com 2015. All rights reserved.

No comments: