Get in-depth technical advice and learning materials related to the strategies, technologies and business processes associated with the mid-market security space. Nowhere else will you find such a highly targeted combination of resources specifically dedicated to the success of today's IT-security professionals.
View the complete archive of Midmarket Security Management news, research and expert advice.
Go to SearchMidmarketSecurity.comRecently on SearchMidmarketSecurity.com
Windows Phone 7 security: Assessing WP7 security features
Windows Phone 7 security features are proving to be a mixed bag. Sam Cattle assesses the enterprise security pros and cons of the latest Windows mobile platform.
-
More Highlights
-
Find remote mobile device wipe solutions on a budget
Several remote mobile device wipe solutions are within the price range of a m...
-
Midmarket security tutorials
SearchMidmarketSecurity.com’s tutorials offer IT professionals in-depth lesso...
-
Smartphone security implications of Microsoft Exchange Activesync
How can employees securely sync their smartphones to your company's Exchange ...
-
-
Definitions
-
endpoint security
Endpoint security is an approach to network protection that requires each com...
-
IPsec (Internet Protocol Security)
IPsec (Internet Protocol Security) is a framework for a set of protocols for ...
-
risk analysis
Risk analysis is the process of defining and analyzing the dangers to individ...
-
Browse Midmarket IT Security Topics
-
Assessing and Managing Security Risks
Midmarket IT organizations need a streamlined approach to risk management and risk assessments. Here, you'll learn the strategic side to security, including the basics on risk a... More about Assessing and Managing Security Risks
-
Recent Definitions
-
risk analysis
- Risk analysis is the process of defining and analyzing the dangers to individuals, businesses, and government agencies posed by potential natural and human-c... -
clean desk policy (CDP)
- A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office. M... -
managed security services (MSS)
- Managed security services (MSS) is a systematic approach to managing an organization's security needs.
-
-
Highlights
-
More Assessing and Managing Security Risks Topics
-
Microsoft Windows Security
Most midmarket IT organizations are heavily invested in Windows. Rather than bolt on security, those IT teams must extend the capabilities offered in Windows Server, Windows Vis... More about Microsoft Windows Security
-
Recent Definitions
-
stack overflow
- A stack overflow is an undesirable condition in which a particular computer program tries to use more memory space than the call stack has available. In pro... -
endpoint security
- Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards befo... -
Back Orifice
- Back Orifice is a rootkit program designed to expose the security deficiencies of Microsoft's Windows operating systems. The program's name is inspired by the ...
-
-
Highlights
-
More Microsoft Windows Security Topics
-
Network Security Strategy and Operations
The security of a midmarket organization's IT network is important to the protection of network infrastructure and resources available over a network. Here you'll learn about in... More about Network Security Strategy and Operations
-
Recent Definitions
-
IPsec (Internet Protocol Security)
- IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing laye... -
intrusion detection (ID)
- Intrusion detection (ID) is a type of security management system for computers and networks. An ID system gathers and analyzes information fr... -
Snort
- Snort is an open source network intrusion detection system (NIDS) created by Martin Roesch.
-
-
Highlights
-
More Network Security Strategy and Operations Topics
-
Security Threats and Vulnerabilities Management
Threat and vulnerability management is crucial to the protection of data stored in servers, desktops, laptops and workstations. Here, midmarket IT organizations will find expert... More about Security Threats and Vulnerabilities Management
-
Recent Definitions
-
SEO poisoning (search poisoning)
- Search poisoning, also known as search engine poisoning, is an attack involving malicious websites that are designed to show up p... -
endpoint security
- Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards befo... -
IPsec (Internet Protocol Security)
- IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing laye...
-
-
Highlights
-
More Security Threats and Vulnerabilities Management Topics