effective

All-flash storage stumbles on cost per gigabyte

All-flash storage stumbles on cost per gigabyte

Part 1: Non-dedupe users pay a premium.
Ry Crozier Jul 14 2015 10:32AM Storage
Vista proven an effective net filter by EC tests

Vista proven an effective net filter by EC tests

All tools found to have weaknesses.
John Hilvert Jan 17 2011 9:11AM Security
First hour of a phishing campaign the most effective

First hour of a phishing campaign the most effective

Taking down sites after five hours pointless.
Dan Raywood Dec 7 2010 12:54PM Security
Google hacking increasingly effective

Google hacking increasingly effective

Google is the search engine of choice for both consumers and hackers, according to infosec experts.
Mark Mayne Oct 28 2008 10:04AM Security
Effective Data Loss Prevention in an SSL World

Effective Data Loss Prevention in an SSL World

Today, businesses are increasingly moving to SSL-encrypted traffic on their network for greater security and data protection.
Wayne Neich Oct 17 2008 12:22PM Security
Effective PC management can slash costs

Effective PC management can slash costs

A new report from Gartner suggests that IT managers could save 42 percent of the total cost of a PC just by managing it correctly..
Iain Thomson Mar 12 2008 7:28AM Hardware
Using industry best practices for effective security training

Using industry best practices for effective security training

Growing IT security threats, coupled with regulatory mandates to protect information and ensure privacy, are generating a renewed focus on security awareness training programs, which can heighten security awareness, improve application and infrastructure security, and enhance security incident handling and response.
Luis Navarro, Jun 25 2007 11:31AM Security
From InfoSec 2007: Effective biometrics solutions still face hurdles before widespread deployment

From InfoSec 2007: Effective biometrics solutions still face hurdles before widespread deployment

Biometrics is an effective authentication technology loaded with potential, but it must clear significant hurdles before gaining widespread adoption, a prominent security consultant said Monday at the InfoSec World 2007 conference in Orlando.
Dan Kaplan Mar 21 2007 12:25AM Security
2 minutes on ... Is FISMA effective?

2 minutes on ... Is FISMA effective?

Some believe it is nothing more than a paper exercise. The government earned poor marks on information security this year. Of the 24 agencies graded, seven agencies failed outright and, overall, agencies received an average grade of D+.
Ericka Chickowski May 10 2006 8:07PM Security
Defending your IT infrastructure through effective patch management

Defending your IT infrastructure through effective patch management

Imagine that you are the IT Director of a large retail bank with an active and highly visible Internet banking service. Driving into the office, half-listening to the radio news, you hear your bank’s name being announced. Immediately followed by the words "hacker," "massive system failure" and "identity theft."
David D'Agostino Aug 25 2004 10:27AM Security
An Effective Managed Security Relationship Depends on the SLA

An Effective Managed Security Relationship Depends on the SLA

Managed security services, the outsourcing of monitoring and management of security devices, is a fast-growing market.
Nathan Tennant Jan 19 2004 11:22AM Security
Designing and Deploying Effective Defenses Against Denial-of-Service Attacks

Designing and Deploying Effective Defenses Against Denial-of-Service Attacks

Vince Liu Jan 14 2004 1:32PM Security
Reaction Remedies - The Way it Should Work: A CA Guide to Effective Network Security

Reaction Remedies - The Way it Should Work: A CA Guide to Effective Network Security

With the internet and mobile working playing an increasingly important roles in business, connecting to internal systems is becoming far easier.
Mike Small Jan 12 2004 12:51PM Security
Embracing Mobility: Three Steps to an Effective Mobile Security Policy

Embracing Mobility: Three Steps to an Effective Mobile Security Policy

Mobile technology has arrived.
Tom Goodman Jan 9 2004 1:42PM Security

Log In

  |  Forgot your password?