CheckPoint

Specifying and supporting disk encryption

Encryption is at the top of the business agenda following a spate of embarrassing data breaches. How can you design and implement encryption systems to suit your customers’ needs without making life harder all round?

Managing and migrating firewalls

Firewalls can provide you with a host of information about what’s going on inside and outside your customer’s network. But that information isn’t necessarily easy to manage and analyse.

Download


Subscribe and get the magazine in the post before it's online

Subscribe and get access to all of the back issues

To read a sample eMagazine - March 2010

 
FREE SUBSCRIPTION!
Banner

IT EXPERT TOP TIP

  businesses Governance, risk and compliance aren't just for big business, and they're not just a burden of red tape. The better the governance, risk and compliance policies of a company, the better it does at business. This guidance from the IT Policy Compliance Group is specifically written for small business; take a look to see what you should be recommending strategically. http://www.itpolicycompliance.com/guidance/smb_special_interests/ read more

TAKE THE POLL

Unified communications

Banner

The #1 Bestseller for Only 77p

RECENT COMMENTS