In This Issue: Focus on Network Security

REMOTE ACCESS: SSL VPNs Connect Attorneys >
SIEM TOOLS: Analyze and Prioritize >
CENTRALIZATION: Minnesota Shares Security Services >
REVIEW: WatchGuard XTM 530 Appliance >

September 7, 2010  

e-mail sign up 

    Online Help Today for Tomorrow’s Technology Challenges  
Case Study  

A Case for SSL VPNs
Remote access to legal documents mobilizes the law

The Floyd County Prosecutor's Office in Indiana dismissed productivity problems by deploying a Cisco Adaptive Security Appliance 5510 with an SSL VPN to enable attorneys and aides to work on case files remotely.

READ STORY >  SHARE >  twitter facebook linkedin

Tech Trends  

Security Smarts
Management systems make sense of alerts

Tracking all the security events that occur on a large network can be near impossible for IT staff, so the state of Michigan and Fairfax County, Va., tap security information event management tools to analyze and correlate events and respond appropriately.

READ STORY >  SHARE >  twitter facebook linkedin


Centralized Cybersecurity
Level the playing field across agencies

Chris Buse, chief information security officer for the state of Minnesota, maintains that centralizing vulnerability and threat management and other services strengthens security while reducing costs.

READ STORY >  SHARE >  twitter facebook linkedin
Product Review  

WatchGuard XTM 530
Appliance rolls multiple functions into a single device

The WatchGuard unified threat management appliance guards against viruses and malware, performs intrusion detection and prevention, blocks web pages and performs URL filtering to protect small and midsize organizations.

READ STORY >  SHARE >  twitter facebook linkedin

Tech Tips  

SSL VPN Virtuoso
Try these four tips for deployment

Unified threat management devices offer SSL VPNs with a lower price tag and easier management than their enterprise-class brethren. Here are four suggestions for using small-scale SSL VPNs more effectively.

READ STORY >  SHARE >  twitter facebook linkedin

White Paper

Security: Key strategies for safeguarding IT resources from interior and exterior threats.

Reference Guide

Security Reference Guide: Deterring threats and enabling operations with integrated, multilayered strategies

Best Practices

Data Loss Prevention: Ensure digital assets remain in your organization

Wireless Security: How Michigan safeguards wireless LANs

Tech Watch

Security Smarts: Governments guard against mobile malware

Visit the 21st Century Classroom
Visit the 21st Century Community


Visit the ARRA Solutions Center

Share StateTech E-Newsletter on: twitter facebook linkedin             Visit:  CDW-G

Banner Advertisement
  This e-mail is intended for the purposes of researching or purchasing products offered for sale by CDW·G.
All information is subject to CDW·G's terms, conditions and policies.

Copyright © 2010 CDW Government LLC, 230 North Milwaukee Avenue, Vernon Hills, IL 60061; 800.808.4239


Become an Insider

Unlock white papers, personalized recommendations and other premium content for an in-depth look at evolving IT