Close

See How Your Peers Are Moving Forward in the Cloud

New research from CDW can help you build on your success and take the next step.

  In This Issue: Focus on Security

CISCO ASA: Utility Safeguards Network >
WINDOWS 7: Securing Removable Drives >
UTM: Multifunctional Devices Ease Administration >

PREMIERE ISSUE

November 4, 2009  

e-mail sign up 
Manage your subscription 
Forward to a friend 
View web version 

 
 
Statetech Search Magazine Resources Hot Topics Newsletters
 
    Online Help Today for Tomorrow’s Technology Challenges  
 
Case Study

Cisco ASA Aids Security
How the Helix Water District safeguards its networks

Choosing the Cisco Adaptive Security Appliance for virtual private network and firewall functions, the California utility uses the device to secure remote access and to separate networks.

READ STORY >  SHARE >  twitter facebook linkedin

Tech Tips

Windows 7: Securing Removable Drives
Pointers for using BitLocker in the new OS

Learn tips for using Group Policy settings if you wish to block users from installing USB drives; or, if you allow the drives, how to encrypt the data using Windows 7's BitLocker To Go.

READ STORY >  SHARE >  twitter facebook linkedin

Tech Trends

Unified Threat Management
UTMs save money and simplify management for agencies

Discover why all-in-one security appliances that offer firewall, VPN and antivirus appeal to state and local governments looking to cut costs, such as Jefferson County, Wis., and the city of Lincoln, Neb.

READ STORY >  SHARE >  twitter facebook linkedin

Product Review

SonicWall UTM
NSA E5500 offers multithreat protection

Our StateTech reviewer looks at how well the SonicWall NSA E5500 unified threat management device stymies security threats. The scalable appliance can handle 500 client VPN sessions.

READ STORY >  SHARE >  twitter facebook linkedin

Opinion

Fighting Off Future Attacks
The key is to find vulnerabilities before hackers do

After Pennsylvania's website succumbed to an SQL injection attack, state CIO Brenda Orth reveals how the state adopted an award-winning process for validating the security of its applications.

READ STORY >  SHARE >  twitter facebook linkedin

White Papers


Security: Key strategies for safeguarding IT resources from interior and exterior threats

E-Rate for Libraries: Information and guidance on the discount program that can help give your library a technology boost

Reference Guide


Security: Keeping information confidential, intact and accessible when threats emerge

Best Practices


Full-Disk Encryption: Six tips for protecting sensitive data

Security Blunders to Avoid: Three missteps that invite trouble

Securing Smartphones: How to keep your data to yourself

Webinar


Assessing IT Security: Who's assessing your IT security? Hackers or a trusted partner?

Community


Visit the 21st Century Classroom
Visit the 21st Century Community



Advertisement
 
 
Share StateTech E-Newsletter on: twitter facebook linkedin             Visit:  CDW-G

 
  This e-mail is intended for the purposes of researching or purchasing products offered for sale by CDW·G.
All information is subject to CDW·G's terms, conditions and policies. E-mail 71213

Copyright © 2009 CDW Government, Inc. 230 North Milwaukee Avenue, Vernon Hills, IL 60061; 800.808.4239

 
  About CDW·G | Privacy Policy | Terms and Conditions | Subscribe | Unsubscribe | Feedback