Sistema

Thu
22
Oct

System Center 2012 Configuration Manager: Compliance Settings

Contributed by John J. Rayborn

The intent of this paper is to provide a discussion on what compliance means as it relates to desired configuration, why it is important to organizations to ensure systems on the enterprise / corporate networks are compliant, and provide information on how an organization can look to ensure desired configuration compliance is being obtained. It is meant to be informational as well as educational for awareness purposes. I will be looking to explain how desired configuration for compliance is accomplished as well as provide information / screenshots on the use of the Compliance Settings component available in Microsoft System Center 2012 Configuration Manager. The paper will also provide information on how compliance standards requirements among various Industries can be accomplished through the use of System Center 2012 Configuration Manager.

Fri
09
Oct

Network Demilitarized Zone (DMZ)

Contributed by Jack Webb

In today’s information security, it is necessary to take advantage of all possible security options available to IT professionals. One of these options is network demilitarized zone or DMZ. A DMZ is the process of setting up a semi-secure network segment that houses all publicly accessible resource. This paper will cover the purpose of DMZ and its benefits in relation to security. It will cover the types and levels of DMS and security measure used within. This paper will also cover the differences between hardware and virtual DMZs as well as any commercial or vendor support for the creation of a DMZ.

This document is in PDF format. To view it click here.

Thu
10
Sep

Mobile Device Management and Best Practices

Contributed by Adam Phelps

With the year 2014 slowly coming and quickly fading, the need to have the latest and greatest mobile device has become the new standard. Wireless speeds are increasing, Random Access Memory (RAM) is tripling, and processing time is becoming faster with half the size and power than in previous models. Moore’s law has been proven yet again. But what does this mean for those who use these fast devices for work through a company loan? How do you limit what an employee’s personal devices can access on the corporate network? What happens to the data when they leave? Who governs these rules and what is to become of them? In this paper, I plan to define what it takes to have good Mobile Device Management (MDM) policies and procedures in a corporate setting, and what a company should do to follow MDM best practices.

This document is in PDF format. To view it click here.

Wed
09
Sep

Security in Virtualization

Contributed by Larry Gene Hastings Jr

Wed
09
Sep

Securing a Virtual Environment

Contributed by Brian Fowler

In today’s world many corporations are moving into the realm of virtualization. Although this new technology allows companies to reproduce many different virtual servers and desktops, it also creates new problems in the ways of security. In this paper we will take a look at exactly what virtualization is, as it is applies to servers and desktops. Through this we will learn of the various problem and vulnerabilities that virtualization will cause. Knowing the problems with virtual systems, we will answer the real question how can a virtual environment be secured. Follow with me as we take an in depth at virtualization and the means of securing it.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Sistema