sponsored by Intel Corporation
Posted:  31 Aug 2007
Published:  01 Aug 2005
Format:  PDF
Length:  4  Page(s)
Type:  White Paper
Language:  English
Network access depends more and more upon wireless LANs and WANs, as well as virtual private network (VPN) remote access. All of these technologies have the potential to open the network perimeter to threats.

Read this white paper to learn more about:

  • The threat of viruses and worms
  • Additional controls to secure the enterprise network
  • Reducing the risk of exposure to attacks from malware
  • Ways to provide a robust computing environment to the enterprise

Access Control | Authentication | Group Policy | LAN | Network Security | Security Threats | VPN | WAN

View All Resources sponsored by Intel Corporation

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement