Device security control and security of portable devices

News

Device security control and security of portable devices

This month, Information Security magazine reviews six device control tools that manage the access and privileges meted out to removable storage devices like USB drives, MP3 players and other media.

Once you've digested the verdict on those products, SearchSecurity.com expert Shon Harris tackles the quandary facing security managers of balancing the demand for these convenience storage devices and implementing guidelines for their safe use. Harris provides three steps to follow that address regulatory concerns, classification of data and access controls.




Leverage compliance, measure risk
It seems like the concept of balancing security with user/customer demand is central to a security manager's job. But what about balancing security and regulatory compliance demands? Just because your organisation complies with SOX, does that mean it's more secure? As a complement to story in the March issue (Balancing Act), writer George Hulme talks to security managers about how they leverage compliance to help with their risk assessments and measurements.
>> Read Leverage compliance, measure risk.

Enterprise UTM: A Different Animal
Unified threat management has its own look in the enterprise--and it doesn't always resemble the all-in-one platform popular with small- and medium-sized businesses. Expert Lisa Phifer hosts a Webcast this month that will help you sort the two and make the right call based on the needs of your organisation.
>> Check back to register for this upcoming UTM webcast

HIPAA Learning Essentials
A Maine health care provider rid itself of its spyware-ridden PCs for a thin client environment. Not only did the move centralise security management, but it greatly helped the organisation with its HIPAA compliance efforts. SearchSecurity.com can help even further with its comprehensive HIPAA Learning Guide. The guide is a collection of new articles, expert analysis and advice, white papers and case studies to keep you on track in what is a perpetual challenge to maintain compliance with an important regulatory privacy and security mandate.
>> Review the HIPAA Learning Guide

PING with Mark Odiorne
In this exclusive interview with Information Security magazine Mark Odiorne, CISO at Scottish Re, provides insight on attacking your own network, prioritising security for senior management and the joys of compliance.
>> Read the interview with Mark Odiorne





 


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy