Sponsored By

Security Action PlansSecurity Action Plans

Being smart about security is as much about commonsense practices as it is about deploying the right software tools.

Martin Garvey

May 27, 2005

7 Min Read

Centralize To Survive
To counter spyware, spam, viruses, and unauthorized network intrusions, companies must consolidate and automate. Sounds simple, but many companies still are recent converts to those practices.

For HNTB Corp., a large architectural and engineering firm, moving to an antivirus product with a central console to manage and impose security policies and monitor employees' system usage has dramatically improved the company's security performance. "We haven't had a major outbreak since we put this in place" nine months ago, information manager Travis O'Dell says. In fact, there have been no outbreaks of any kind. Previously, the company saw two or three over the same time period. SANS Institite


The following security white papers are courtsey of The SANS Institute, a cooperative research and education organization. In additional to the following papers, The SANS Institute offers more than 1,500 original computer security white papers across 71 different categories online at www.sans.org/rr/ free of charge.

A Guide to Discovering Web Application Insecurities, Before Attackers
Don Williams
Category: Web Servers
Posted: March 9, 2005

Security Improvement Of A Wide And Heterogeneous Set Of Network Devices: A Global Approach
Jean-Marc Millet
Category: Network Devices
Posted: February 19, 2005

Network Security - A Guide for Small and Mid-sized Businesses
Jim Hietala
Category: Security Basics
Posted: January 26, 2005

Governmental Effects upon the Cyber Security Decision Making Cycle
Bruce Norquist
Category: Security Modeling
Posted: March 9, 2005

About the Author(s)

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like

More Insights