Archive for June, 2010

BARRACUDA SPAM & VIRUS FIREWALL

Managing and protecting spam & virus of mail is very tough job for administrator. Day by day the treat is increasing. New methods of delivering spam mails. If you use any mail server or any size we required a spam & virus firewall solution. In market you receive different products; some of them are very […]

Portal & Collaboration Software

Collaboration and integration is one of the primary requirements of every organisation now. It increases the productivity, single platform for communication and interaction. Employees interact in three primary ways: conversations, transactions, and collaborations. Understanding their differences is necessary to ensure the appropriate software technology is employed to meet your needs. Conversational interaction is an exchange […]

Active Directory Federation Services (ADFS)

Active Directory Federation Services (ADFS) is standards based Web Single Sign-On (SSO) service that enables federated identity by implementing claims based authentication across forests. It is part of Windows Server 2003 R2 and later releases of Microsoft’s server Operating System as a server role. Claims based authentication is the process of authenticating a user based […]

Mobile Workers Security

The increasing importance of mobile workers in today’s businesses has been acknowledged. The mobile worker population is split into three main segments, home-based mobile workers, office-based mobile workers and non-office-based mobile workers. Organisations should develop a proactive policy and strategy that embraces new ideas and methods to create a secure mobile workplace. “Secure mobility” is […]

Physical Security

Considering the physical security, most organisations keep a surveillance camera, security guard and door access control. This we seen normal in physical security side. But physical security is more extended considering its threat. Threats to physical security come in many forms including natural disasters, emergency situations, and man-made threats. All possible threats must be identified […]