Close

See How Your Peers Are Moving Forward in the Cloud

New research from CDW can help you build on your success and take the next step.

Sep 28 2009
Security

October 2009

 

 

In This Issue: Focus on Security

CISCO ASA: Utility Safeguards Network >

WINDOWS 7: Securing Removable Drives >

UTM: Multifunctional Devices Ease Administration >

October 7, 2009  
e-mail sign up 

Manage your subscription 
Forward to a friend 
View web version 


 
 







 
    Online Help Today for Tomorrow's Technology Challenges  
 
Case Study

Cisco ASA Aids Security
How the Helix Water District safeguards its networks

Choosing the Cisco Adaptive Security Appliance for virtual private network and firewall functions, the California utility uses the device to secure remote access and to separate networks.

READ STORY >  SHARE > 

Tech Tips

Windows 7: Securing Removable Drives

Pointers on using BitLocker in the new OS

In this hands-on piece, learn tips and tricks for using Group Policy settings if you wish to block users from installing USB drives; or, if you allow the drives, how to encrypt the data using Window 7's BitLocker To Go.

READ STORY >  SHARE > 

Tech Trends

Unified Threat Management
UTMs save money and simplify management

Discover why all-in-one security appliances offering firewall, virtual private network and antivirus appeal to cash-strapped state and local governments such as Jefferson County, Wis., and the city of Lincoln, Neb.

READ STORY >  SHARE > 

Product Review

SonicWall UTM
NSA 4500 offers multithreat protection

Our StateTech reviewer looks at how well the SonicWall NSA 4500 unified threat management device stymies security threats. The scalable appliance can handle 500 client VPN sessions.

READ STORY >  SHARE > 

Column

Fighting Off Future Attacks

The key is to find vulnerabilities before hackers do

After Pennsylvania's website succumbed to a SQL injection attack, Pennsylvania CIO Brenda Orth reveals how the state adopted an award-winning process for validating the security of its applications.

READ STORY >  SHARE > 

White Papers



Security: Key strategies for safeguarding IT resources from interior and exterior threats


E-Rate for Libraries: Information and guidance on the discount program that can help give your library a technology boost

Reference Guide



Security: Keeping information
confidential, intact and accessible when threats emerge

Best Practices


Full-disk Encryption: Six tips for protecting sensitive data

Security Blunders to Avoid: Three things that invite trouble

Securing Smart Phones: How to keep your data to yourself

Webinar


Assessing IT Security: Who's assessing your IT security? Hackers or a trusted partner?

Community


Visit the 21st Century Classroom
Visit the 21st Century Community




 
 
Share StateTech Newsletter on:              Visit:  CDW-G

 
 
This e-mail is intended for the purposes of researching or purchasing products offered for sale by CDW·G.

All information is subject to CDW·G's terms, conditions and policies. E-mail xxxxxx

© Copyright 2009 CDW Government, Inc. 230 North Milwaukee Avenue, Vernon Hills, IL 60061; 800.808.4239

This is a commercial message.

If you would prefer not to receive further messages from CDW·G, please click on the following e-mail link and send a message with or without any text:

Click here for opt out

You will receive one additional e-mail message confirming your removal.