 |
the basics
What is enterprise information security? How can security benefit
from high-performance PCs?
what is the industry saying?
Learn the latest security trends, economic impact of security incidents, and about the move toward trusted computing.
|
|
designing, implementing, and justifying a solution
Need help designing or implementing a security solution? Justifying the solution?
client security solutions from OEMs
 |
IBM* |
 |
* |
 |
Compaq* |
 |
Hewlett-Packard* |
useful links
|
|
 |
|
 |
 |
|
|
|
|
 |
encrypted file systems
Deploying client file and folder couldn't be easierit's standard in Microsoft Windows 2000 and Windows XP operating systems. Encrypting File System (EFS) is based on public key encryption, taking advantage of the CryptoAPI architecture in Windows. Here's some detailed information on how to implement EFS to keep your information more secure. |
 |
 |
|
 |
 |
data protection and recovery in Windows XP* [DOC, 205KB] |
 |
 |
encrypting file system for Windows 2000* [DOC, 227KB] |
 |
 |
encryption and performance: Pentium 4 processor benefits [Flash* animation] |
|
|
|
 |
 |
 |
|
 |
|
more in the essential business technologies series |
|
 |
 |
|
 |
 |
 |
|
 |
|
 |
 |
the basics
|
 |
 |
what is the industry saying?
|
META Group: securing security operating procedures (SOPs)* [PDF, 89KB]
Meta Group projections and recommendations to IT executives on security spending and priorities.
|
|
|
CERT/CC: overview of internet attack trends* [PDF, 25KB]
White paper on internet attack trends published April 2002.
|
|
|
the economic impact of malicious code*
How much is this costing business? See one estimate of the costs of the latest malicious code attacks.
|
|
|
trusted computing
What is trusted computing? What are the benefits?
|
|
|
Flash* demo describing trusted computing
View this demo about the technologies that will improve computer security by adding progressive levels of protection across all computing devices.
|
|
|
|
 |
 |
designing, implementing, and justifying a solution
|
enterprise security and the importance of authorization technology
Focusing on the role of authorization in the enterprise security plan, "Enterprise Security and the Importance of Authorization Technology: Formulating an Enterprise Security Plan and an Introduction to Role-Based Authorization" discusses the technologies controlling which systems, resources, and projects a user can access.
|
|
|
Intel Learning Network Presentation: adaptive infrastructuresecurity
This 18-minute audio presentation discusses the role of security technology in network infrastructures, and presents security methods and new authentication technology to validate users and protect network assets.
|
|
|
CIO Magazine: finally a real return on security spending
|
|
|
|
 |
 |
client security solutions from OEMs
|
IBM*
|
|
|
*
|
|
|
Compaq*
|
|
|
Hewlett-Packard*
|
|
|
|
 |
 |
useful links
|
best security practices from Intel
Explore some of the issues for creating an enterprise security plan raised within the IT Best Practices book titled, Securing Business Information: Strategies to Protect the Enterprise and Its Network. It discusses the necessary steps for building the plan and identifies implementation technologies.
|
|
|
Trusted Computing Platform Alliance*
|
|
|
Computer Security Resource Center*
National Institute of Standards and Technology
|
|
|
CERT Coordination Center*
Internet security expertise from the Software Engineering Institute operated by Carnegie Mellon University.
|
|
|
|