Balancing security products with management time: are you stretching yourself too thin?

By

With new threats emerging by the second, enterprise security has become paramount. IT managers, however, are faced with the daunting task of coordinating numerous elements from VPNs and e-mail scanning systems to content filters and anti-virus software.


Indicative of the growing security challenge is the emergence of increasingly intricate, blended threats, such as Nimda and Beagle. Unlike yesterday's viruses, blended threats combine the characteristics of viruses, worms, Trojan horses, and other malicious code with multiple methods of ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:

Most Read Articles

Phishing attack nets enormous npm supply chain compromise

Phishing attack nets enormous npm supply chain compromise

"VoidProxy" PhishKit targets Google and Microsoft users

"VoidProxy" PhishKit targets Google and Microsoft users

Apple adds "mercenary spyware" protection to new A19 chip

Apple adds "mercenary spyware" protection to new A19 chip

VicRoads to phase out passwords in favour of passkeys

VicRoads to phase out passwords in favour of passkeys

Log In

  |  Forgot your password?