This Week's Issue
Browse All Issues
Search All Articles
Product News & Information
News & Information
General Feature Articles
You Searched For:
Articles in the Security - Accounting & Logging category
Number of Matches:
1 of 1
Change Your Search
Results are sorted in Volume and Issue order, alphabetical by first letter of title.
A Data-Centric Security Model
- Data Protection Is The Ideal Supplement To Traditional Infrastructure Security
June 27, 2008,
Vol. 30, Issue 26
Many businesses now realize that rather than continuing to add layers of infrastructure security, it’s more effective to protect critical data throughout its life cycle, regardless of where it resides or moves.
Is Your Off-Network Equipment Safe?
- Welcome To The Off-Network Jungle: Security Has To Extend Beyond The Firewall
October 19, 2007,
Vol. 29, Issue 42
The Ponemon Institute recently released a study talking about the security risks posed by off-network, data-bearing equipment. This shows that most companies are largely clueless as to the state of security in their off-network equipment.
Know What You Have: Six Tips To Better Asset Management
August 17, 2007,
Vol. 29, Issue 33
Without a strong program to manage them, IT’s biggest assets can also be its biggest liabilities.
Protecting Intellectual Property & Assets
- The Increasing Value Of Information Assets & ITís Role In Helping Companies Keep Them Secure
August 10, 2007,
Vol. 29, Issue 32
While computer security has historically dealt with defense against external threats, increasingly, company executives are concerned with the adverse financial and publicity consequences of the loss of sensitive information.
Management Platform Turns Data Into Intelligence
- RSA enVision Helps SMEs Achieve Log Management Success
June 8, 2007,
Vol. 29, Issue 23
Helps organizations collect, store, manage, and make sense of security and compliance log information.
- IT Asset Recovery Services
April 20, 2007,
Vol. 29, Issue 16
Email governance is the process of flagging noncompliant company emails, organizing email into categories, and archiving messages for long-term retrieval. Newer systems are component-based or use a desktop agent to avoid the trap of re-archiving every email in a proprietary system.
Tracking Your IT Assets
- Tags, Barcodes & Other Methods For Safeguarding Your Equipment
September 23, 2005,
Vol. 27, Issue 38
Even though the cabling infrastructure through which data travels is often taken for granted, the use of tools that monitor and manage that physical infrastructure can pay huge dividends for your data center in both time and money savings.
Click any of the letters below to view a listing of articles
with titles beginning with that letter:
This Week's Issue
Browse All Issues
Browse All Articles
Enter a word or phrase to search by:
ALL Words ('network' AND 'storage')
ANY Words ('network' OR 'storage')
Exact Match ('network storage'- all words MUST appear together)
Enter A Specific Date Range, If Desired:
Published On Or After (mm/yyyy):
Published On Or Before (mm/yyyy):
Paid subscribers to
Computer Power User
magazine have complete access to the entire Editorial archive of
of these publications. If you're not a subscriber and you'd like to get a sample of what you're missing,
to search through this incredible information resource and view partial article content.
Copyright & Legal Notice
Search results delivered by the Troika
Copyright © by Sandhills Publishing Company 2013. All rights reserved.