In This Issue: Focus on Network Security

LOCKDOWN: District Shores Up Security >
SIEM TOOLS: Analyze and Prioritize >
UTM: Tips for Small-Scale Deployment >
REVIEW: WatchGuard XTM 530 Appliance >

September 7, 2010  

e-mail sign up 

 
 
Edtech Focus on K-12 | :e-newsEdTech K-12SearchMagazineResourcesReviewsNewsletters
 
    Online Help Today for Tomorrow's Technology Challenges  
 
Case Study  

Security Lockdown
School district deploys UTM

Seeking to better block spam and stop students from accessing forbidden domains, the Lynden School District in Washington replaced a hodge-podge of security technologies from different manufacturers with a Fortinet unified threat management solution that saves time and eases administration.

READ STORY >  SHARE >  twitter facebook linkedin

Tech Trends  

Security Smarts
Management systems make sense of alerts

Tracking all the security events that occur on a large network can be near impossible for IT staff, so Montgomery County Public Schools in Maryland and Fairfax County Public Schools in Virginia tap security information event management tools to analyze and correlate events and respond appropriately.

READ STORY >  SHARE >  twitter facebook linkedin

Tech Tips  

SSL VPN Virtuoso
Try these four tips for deployment

Unified threat management devices offer SSL VPNs with a lower price tag and easier management than their enterprise-class brethren. Here are four suggestions for using small-scale SSL VPNs more effectively.

READ STORY >  SHARE >  twitter facebook linkedin

Product Review  

WatchGuard XTM 530
Appliance rolls multiple functions into a single device

The WatchGuard unified threat management appliance guards against viruses and malware, performs intrusion detection and prevention, blocks web pages and performs URL filtering to protect small and midsize organizations.

READ STORY >  SHARE >  twitter facebook linkedin

Best Practices  

Data Loss Prevention
Ensure sensitive digital assets remain in your organization

Data loss prevention products offer valuable aid in detecting leakage of Social Security or credit card numbers. To get the most from these tools, apply proper policies and risk assessment

READ STORY >  SHARE >  twitter facebook linkedin

Video

What does it take to make one-to-one initiatives work for schools and their students?


White Paper

Security: Key strategies for safeguarding IT resources from interior and exterior threats


Reference Guide

Security: Deterring threats and enabling operations with integrated, multilayered strategies


Feature

Rest Secured: IT crafts strategies to protect people, information and buildings


Community
Visit the 21st CenturyCampus
View the 21st Century Classroom


ARRA

Visit the ARRA Solutions Center


Advertisement

Advertisement

 
 
Share EdTech E-Newsletter on: twitter facebook linkedin             Visit:  CDW-G

 
 
Banner Advertisement
 
  This e-mail is intended for the purposes of researching or purchasing products offered for sale by CDW·G.
All information is subject to CDW·G's terms, conditions and policies.

Copyright © 2010 CDW Government LLC, 230 North Milwaukee Avenue, Vernon Hills, IL 60061; 800.808.4239

 
Close

Become an Insider

Unlock white papers, personalized recommendations and other premium content for an in-depth look at evolving IT