======================================================================== SECURITY REPORT http://www.infoworld.com ======================================================================== Monday, August 23, 2004
TOP STORIES ======================================================================== * ECM wares seize control of records creation, management * Network detectives sniff for snoops * IDS early bird gets the worm * Attack of the inhospitable host ADVERTISEMENT -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- EMAIL IS A HEADACHE, but it's the backbone of your organization. Without a healthy email system, your whole operation could come to a screeching halt. So how do you solve your email problems and keep the information flowing? You create and manage the best messaging system for your business. Learn how from the industry's premier problem- solvers and visionaries at INBOX http://newsletter.infoworld.com/t?ctl=842D89:2B910B2 INBOX - THE EMAIL EVENT: Nov. 17-19, 2004, Atlanta -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- ECM WARES SEIZE CONTROL OF RECORDS CREATION, MANAGEMENT ======================================================================== Posted August 23, 2004 6:00 AM Pacific Time Under the shadow of government regulations IT must comply with, a host of ECM (enterprise content management) vendors are blending previously stand-alone RM (records management) capabilities into their CM and compliance recipes. For the full story: http://newsletter.infoworld.com/t?ctl=842D82:2B910B2 NETWORK DETECTIVES SNIFF FOR SNOOPS ======================================================================== Posted August 20, 2004 3:00 PM Pacific Time Just a few short years ago, an IDS was a luxury. Before the rise of the Web application and the worm, most networks were adequately defended by a firewall at the perimeter and a virus scanner at the mail server. Today, the firewall remains effective against clumsy DoS attacks and run-of-the-mill exploits, but it's hard-pressed to thwart application-layer attacks that piggyback on welcome protocols and worms that wind their way inside the network through any overlooked port or a mobile user's laptop. For the full story: http://newsletter.infoworld.com/t?ctl=842D86:2B910B2 IDS EARLY BIRD GETS THE WORM ======================================================================== Posted August 20, 2004 3:00 PM Pacific Time Intrusion detection and prevention systems are typically generalists, scanning network traffic and alerting you to any kind of threat or anomaly. Arbor Networks' Peakflow X is a specialist, using anomaly-based detection techniques specifically to thwart unknown or "zero-day" worms. If you're running Check Point Software Technologies or Cisco network gear, you can even automate port blocking to choke off propagating worms, while allowing legitimate traffic to pass through. For the full story: http://newsletter.infoworld.com/t?ctl=842D81:2B910B2 ATTACK OF THE INHOSPITABLE HOST ======================================================================== Posted August 20, 2004 3:00 PM Pacific Time Host-based intrusion detection and prevention products are available from a smattering of vendors, including big guns such as Cisco, Internet Security Systems, McAfee, and Symantec, but Sana Security's Primary Response is the one that stands out, and for several reasons. For the full story: http://newsletter.infoworld.com/t?ctl=842D83:2B910B2 ======================================================================== Storage: glamour isn't everything No, it's not terribly sexy. It's just essential. Because there's always going to be data, and more of it. To keep up with your options for keeping up with it, you can't do better than InfoWorld's "Storage Insider" newsletter. Delivered every Tuesday, it doesn't take up much space in your inbox. But the space it fills in your head couldn't be put to better use. Subscribe today at http://newsletter.infoworld.com/t?ctl=842D84:2B910B2 ADVERTISE ======================================================================== For information on advertising, contact [EMAIL PROTECTED] UNSUBSCRIBE/MANAGE NEWSLETTERS ======================================================================== To subscribe, unsubscribe or change your e-mail address for any of InfoWorld's e-mail newsletters, go to: http://newsletter.infoworld.com/t?ctl=842D85:2B910B2 To subscribe to InfoWorld.com, or InfoWorld Print, or both, or to renew or correct a problem with any InfoWorld subscription, go to http://newsletter.infoworld.com/t?ctl=842D88:2B910B2 To view InfoWorld's privacy policy, visit: http://newsletter.infoworld.com/t?ctl=842D87:2B910B2 Copyright (C) 2004 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107 This message was sent to: [EMAIL PROTECTED] ------------------------ Yahoo! Groups Sponsor --------------------~--> $9.95 domain names from Yahoo!. Register anything. http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/BCfwlB/TM --------------------------------------------------------------------~-> Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/kumpulan/ <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/
