========================================================================
SECURITY REPORT                                 http://www.infoworld.com
========================================================================
Monday, August 23, 2004

TOP STORIES
========================================================================
* ECM wares seize control of records creation, management
* Network detectives sniff for snoops
* IDS early bird gets the worm
* Attack of the inhospitable host

ADVERTISEMENT
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
EMAIL IS A HEADACHE, but it's the backbone of your
organization. Without a healthy email system,
your whole operation could come to a screeching
halt. So how do you solve your email problems and
keep the information flowing? You create and
manage the best messaging system for your business.
Learn how from the industry's premier problem-
solvers and visionaries at INBOX http://newsletter.infoworld.com/t?ctl=842D89:2B910B2
INBOX - THE EMAIL EVENT: Nov. 17-19, 2004, Atlanta
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --

ECM WARES SEIZE CONTROL OF RECORDS CREATION, MANAGEMENT
========================================================================
Posted August 23, 2004 6:00 AM Pacific Time

Under the shadow of government regulations IT must comply with, a host
of ECM (enterprise content management) vendors are blending previously
stand-alone RM (records management) capabilities into their CM and
compliance recipes.

For the full story:
http://newsletter.infoworld.com/t?ctl=842D82:2B910B2


NETWORK DETECTIVES SNIFF FOR SNOOPS
========================================================================
Posted August 20, 2004 3:00 PM Pacific Time

Just a few short years ago, an IDS was a luxury. Before the rise of the
Web application and the worm, most networks were adequately defended by
a firewall at the perimeter and a virus scanner at the mail server.
Today, the firewall remains effective against clumsy DoS attacks and
run-of-the-mill exploits, but it's hard-pressed to thwart
application-layer attacks that piggyback on welcome protocols and worms
that wind their way inside the network through any overlooked port or a
mobile user's laptop.

For the full story:
http://newsletter.infoworld.com/t?ctl=842D86:2B910B2


IDS EARLY BIRD GETS THE WORM
========================================================================
Posted August 20, 2004 3:00 PM Pacific Time

Intrusion detection and prevention systems are typically generalists,
scanning network traffic and alerting you to any kind of threat or
anomaly. Arbor Networks' Peakflow X is a specialist, using anomaly-based
detection techniques specifically to thwart unknown or "zero-day" worms.
If you're running Check Point Software Technologies or Cisco network
gear, you can even automate port blocking to choke off propagating
worms, while allowing legitimate traffic to pass through.

For the full story:
http://newsletter.infoworld.com/t?ctl=842D81:2B910B2


ATTACK OF THE INHOSPITABLE HOST
========================================================================
Posted August 20, 2004 3:00 PM Pacific Time

Host-based intrusion detection and prevention products are available
from a smattering of vendors, including big guns such as Cisco, Internet
Security Systems, McAfee, and Symantec, but Sana Security's Primary
Response is the one that stands out, and for several reasons.

For the full story:
http://newsletter.infoworld.com/t?ctl=842D83:2B910B2


========================================================================
Storage: glamour isn't everything
No, it's not terribly sexy. It's just essential.
Because there's always going to be data, and more of
it. To keep up with your options for keeping up with
it, you can't do better than InfoWorld's "Storage
Insider" newsletter. Delivered every Tuesday, it doesn't
take up much space in your inbox. But the space it
fills in your head couldn't be put to better use.
Subscribe today at
http://newsletter.infoworld.com/t?ctl=842D84:2B910B2

ADVERTISE
========================================================================
For information on advertising, contact [EMAIL PROTECTED]

UNSUBSCRIBE/MANAGE NEWSLETTERS
========================================================================
To subscribe, unsubscribe or change your e-mail address for any of
InfoWorld's e-mail newsletters, go to:
http://newsletter.infoworld.com/t?ctl=842D85:2B910B2

To subscribe to InfoWorld.com, or InfoWorld Print, or both, or to renew
or correct a problem with any InfoWorld subscription, go to
http://newsletter.infoworld.com/t?ctl=842D88:2B910B2

To view InfoWorld's privacy policy, visit:
http://newsletter.infoworld.com/t?ctl=842D87:2B910B2

Copyright (C) 2004 InfoWorld Media Group, 501 Second St., San Francisco,
CA 94107



This message was sent to: [EMAIL PROTECTED]


------------------------ Yahoo! Groups Sponsor --------------------~--> 
$9.95 domain names from Yahoo!. Register anything.
http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/BCfwlB/TM
--------------------------------------------------------------------~-> 

 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/kumpulan/

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 



Reply via email to