In This Issue: Focus on Security

CISCO ASA: Utility Safeguards Network >
WINDOWS 7: Securing Removable Drives >
UTM: Multifunctional Devices Ease Administration >


November 4, 2009  

e-mail sign up 
Manage your subscription 
Forward to a friend 
View web version 

StatetechSearchMagazineResourcesHot TopicsNewsletters
    Online Help Today for Tomorrow’s Technology Challenges  
Case Study

Cisco ASA Aids Security
How the Helix Water District safeguards its networks

Choosing the Cisco Adaptive Security Appliance for virtual private network and firewall functions, the California utility uses the device to secure remote access and to separate networks.

READ STORY >  SHARE >  twitter facebook linkedin

Tech Tips

Windows 7: Securing Removable Drives
Pointers for using BitLocker in the new OS

Learn tips for using Group Policy settings if you wish to block users from installing USB drives; or, if you allow the drives, how to encrypt the data using Windows 7's BitLocker To Go.

READ STORY >  SHARE >  twitter facebook linkedin

Tech Trends

Unified Threat Management
UTMs save money and simplify management for agencies

Discover why all-in-one security appliances that offer firewall, VPN and antivirus appeal to state and local governments looking to cut costs, such as Jefferson County, Wis., and the city of Lincoln, Neb.

READ STORY >  SHARE >  twitter facebook linkedin

Product Review

SonicWall UTM
NSA E5500 offers multithreat protection

Our StateTech reviewer looks at how well the SonicWall NSA E5500 unified threat management device stymies security threats. The scalable appliance can handle 500 client VPN sessions.

READ STORY >  SHARE >  twitter facebook linkedin


Fighting Off Future Attacks
The key is to find vulnerabilities before hackers do

After Pennsylvania's website succumbed to an SQL injection attack, state CIO Brenda Orth reveals how the state adopted an award-winning process for validating the security of its applications.

READ STORY >  SHARE >  twitter facebook linkedin

White Papers

Security: Key strategies for safeguarding IT resources from interior and exterior threats

E-Rate for Libraries: Information and guidance on the discount program that can help give your library a technology boost

Reference Guide

Security: Keeping information confidential, intact and accessible when threats emerge

Best Practices

Full-Disk Encryption: Six tips for protecting sensitive data

Security Blunders to Avoid: Three missteps that invite trouble

Securing Smartphones: How to keep your data to yourself


Assessing IT Security: Who's assessing your IT security? Hackers or a trusted partner?


Visit the 21st Century Classroom
Visit the 21st Century Community

Share StateTech E-Newsletter on: twitter facebook linkedin             Visit:  CDW-G

  This e-mail is intended for the purposes of researching or purchasing products offered for sale by CDW·G.
All information is subject to CDW·G's terms, conditions and policies. E-mail 71213

Copyright © 2009 CDW Government, Inc. 230 North Milwaukee Avenue, Vernon Hills, IL 60061; 800.808.4239

  About CDW·G | Privacy Policy | Terms and Conditions | Subscribe | Unsubscribe | Feedback  

Become an Insider

Unlock white papers, personalized recommendations and other premium content for an in-depth look at evolving IT