You've requested...

Share this with your colleagues:

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers.

If a new window did not open, click here to view this asset.

Download this next:

Computer Weekly - 19 June 2012: How to succeed at desktop virtualisation

Computer Weekly – 19 June 2012: How to succeed at desktop virtualisation 

In this week’s Computer Weekly, our latest Buyer's Guide examines the tools, technologies and best practices for success in desktop virtualisation. We ask if a six-year-old hardware technology – Trusted Platform Module - could be a key to tackling IT security threats. We look at how universities are dealing with their IT challenges as they await the first intake of students at new higher tuition fees. Deloitte's CIO talks about how the global advisory firm is introducing a bring your own device (BYOD) scheme. And we look at new environmental guidelines that will help companies understand the carbon footprint of their IT. Read the issue now.

 

Buyer's Guide to desktop virtualisation – part one: How to exploit thin-client computing

Thin-client computing – or more accurately, server-based computing – has been around for years. We look at how the technology can help cut costs and improve flexible working while maintaining security, as part of a desktop virtualisation strategy. 

 

Could 2012 be the year TPM security technology reaches critical mass?

Since 2006, many new computing devices have been sold with a built-in trusted platform module (TPM) chip, but enterprises have yet to embrace the technology in their information security strategies.

 

Fujitsu UK CEO steers private sector course in bid to cut public exposure

Duncan Tait took the helm at Fujitsu at the height of the credit crunch and all the upheaval it triggered, but revenues and orders are on the rise again.

 

Case study: Greenwich University centralises IT development onto single platform

A web portal implemented by Greenwich University has enabled it to centralise administrative processes and teaching resources, allowing staff and students to access services with a single log-in.

 

Dealing with the practicalities of the consumerisation scheme at Deloitte

Deloitte CIO Matt Peers is embracing the benefits of a bring your own device project but says there are limits to what you can do. 

 

Opinion: Bed down for Byte Night

The annual IT industry charity sleep-out to raise funds to help homeless children takes place this year on 5 October. Byte Night founder Ken Deeks writes about how you can help. 

 

The CIO role through the lens of MIT: Agile rebel or company dishwasher?

A conference at the Massachusetts Institute of Technology highlighted the changing role of the CIO.

 

Cutting emissions in the big picture

New guidelines on carbon footprinting in IT were published earlier this year which, if widely adopted, could lay bare the extent of emissions beyond the boundaries of a company’s own premises.

 

This week's digital edition is sponsored by BCS Institute, Computer Aid, Intel, RES Software, Skillsoft and Terrapin.

These are also closely related to: "Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers."

  • How to configure Mac OS X Server

     


    In the previous article in this series, we showed you how to secure a Mac using the functions built into its operating system, OS X.

     

    These functions range from simple password protection and patch management through to full-disk encryption.

     

    However, these are not the only security functions available. Indeed, OS X has a whole security and management infrastructure available for administrators called Managed Preferences, which can be managed most easily using OS X Server.

     

    Capable of running on any Mac that can run OS X 10.8, it is priced at £13.99 for unlimited client connections, so easily affordable.

     

    Apple also sells a customised Mac mini desktop computer with improved storage capabilities, which comes with OS X Server installed for small and medium-sized companies, as well as workgroups, which want a dedicated machine.

     

    In this article, we’ll show you just a couple of the security features of OS X Server: global password policies and data loss prevention

     

    Contents:

               

    •  Configuring Mac OS X Server for the first time
    • Types of user account
    • Setting up a global password policy
    • Creating a network user
    • Managing preferences
    • Binding clients
    • Next steps

     

     

    Click on the button below to download this report

  • The Demise in Effectiveness of Signature and Heuristic Based Antivirus

     

     

    Today there is an urgent emphasis being placed by vendors on the need for antivirus to be installed on an increasing number of computing platforms used within organisations.

     

    The aim of this is to satisfy risk controls while also forming part of an organisation’s technical information security strategy.

     

    This market demand for antivirus has led to a number of security products which do little to actually protect the user, their data or the organisation.

     

    This paper outlines why, in our opinion, the antivirus based approach adopted by organisations to technical risk management, not only fails to provide the protection it is designed to, but it in fact increases an organisation’s susceptibility to attack.

     

    Overall our view is that signature based antivirus is tackling a problem we had 20 years ago and is not relevant to many of today’s threats for businesses, although we feel it still has a role in protecting the consumer. As a result, NCC Group’s opinion is that security budgets might be more effectively directed

     

    Click on the button below to download this report

     

     

    NCC Group is a global information assurance specialist.

Find more content like what you just read: