Title: Today's News
![]() |
![]() |
![]() |
Issue Sponsored By:
>
SearchWin2000.com Webcasts
IN THIS ISSUE:
>
Microsoft to release enterprise version of its firewall
>
Microsoft to keep governments in the security loop
>
Salesforce.com breaks into Office
>
More headlines
>
Preparing to deploy Active Directory
>
What are the minimum user rights needed?
>
Planning, implementing and maintaining routing and remote access
>
The Missing Link: Microsoft's iPod uprising
![Headlines]()
![]()
Microsoft to release enterprise version of its firewall
[SearchWindowsSecurity.com]
ISA Server 2004 Enterprise Edition, which touts three main features, is expected to make its debut at this month's RSA Conference.
MORE INFO:
> Tech tip: ISA Server security don'ts
> Find more resources on the topic of network firewalls
| |
![]() |
| |
![]() |
SearchWin2000.com Webcasts
Sign up to receive the Webcast Alerts newsletter from SearchWin2000.com to hear about our latest webcasts with top experts. Webcast topics include Securing Computers Using GPOs, How to Stop Directory Harvest Attacks, Anti-Spam Best Practices, Exchange 2003 Migration Best Practices and more.
Subscribe now and you'll be notified of upcoming events!
|
| |
|
| |
Microsoft to keep governments in the security loop
[SearchSecurity.com]
Redmond launches a program to keep governments informed when it's dealing with security problems.
Salesforce.com breaks into Office
[SearchCRM.com]
A new developer program will facilitate integration with Microsoft's Office applications.
More headlines
[From around the Web]
Compressed files strike another blow to AV (SearchSecurity.com)
Spammers turn to directory harvest attacks (vunet)
Unisys continues down the open Linux road (SearchEnterpriseLinux.com)
Exploit released for combined RealPlayer, IE flaws (eWEEK)
![Also on SearchWin2000.com]()
![]()
CHECKLIST:
Preparing to deploy Active Directory
Don't let your Active Directory deployment turn into a fiasco. Be prepared by knowing what to expect ahead of time. This checklist provides a step-by-step approach that will help steer you around the pitfalls, while highlighting the best practices for a successful deployment.
ASK THE EXPERT:
What are the minimum user rights needed?
OS Troubleshooting Expert Bernie Klinder provides guidance on the question of balancing system functionality with security needs.
CHAPTER OF THE WEEK:
Planning, implementing and maintaining routing and remote access
Remote network access isn't always just a technical headache -- it can also be a security nightmare. Learn how to dodge the bullets in this information-packed chapter. The topics include routing protocols, remote security and access policies, authentication, IPSec policy and troubleshooting.
![The Missing Link]()
![]()
Microsoft's iPod uprising
[Wired News]
To the chagrin of Microsoft management, Apple's ubiquitous iPod is wildly popular among employees at Microsoft's headquarters campus in Redmond, Wash. So worried are executives, that memos have begun circulating that discourage iPod use. And brandishing the red-hot tune device is career suicide for those in the Windows Digital Media Group.
|
![]() |
|
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Contact Us
Sales
For sales inquiries, please contact us at:
[EMAIL PROTECTED]
Editorial
For feedback about any of our articles or to send us your article ideas, please contact us at:
[EMAIL PROTECTED]
|
|
![]() |
![]() |
|
![]() |
|
![]() |
|