Search This Blog

Thursday, May 30, 2013

WindowSecurity.com - DeviceLock - Voted WindowSecurity.com Readers' Choice Award Winner - Endpoint Security

WindowSecurity.com - DeviceLock - Voted WindowSecurity.com Readers' Choice Award Winner - Endpoint Security

Hi Security World,





Just Published
-----------------------------------------------------------------
DeviceLock - Voted WindowSecurity.com Readers' Choice Award Winner - Endpoint Security (on 30 May 2013 by The Editor)
http://www.windowsecurity.com/news/WindowSecurity-Readers-Choice-Award-Endpoint-Security-DeviceLock-Apr13.html
DeviceLock was selected the winner in the Endpoint Security category of the WindowSecurity.com Readers' Choice Awards. GFI EndPointSecurity and CopyNotify! Data Security Software were runner-up and second runner-up respectively.



Recent Articles & Tutorials
-----------------------------------------------------------------
The Android Invasion: BYOD Security Implications and Solutions (on 29 May 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/android-invasion-byod-security-implications-solutions.html
This article will go beyond previous discussions on this site about mobile security threats and examine how you may be able to tame the emerging monster that BYOD is becoming.

Video: Windows Server 2008 R2 Dcpromo "Operating System Compatibility" Message (on 22 May 2013 by Derek Melber)
http://www.windowsecurity.com/articles-tutorials/windows_server_2008_security/video-windows-server-2008-r2-dcpromo-operating-system-compatibility-message.html
This video explains the meaning behind Windows Server 2008 R2 Dcpromo "Operating System Compatibility" message.

Group Policy Changes: Windows Server 2012, Windows 8 and Window RT (Part 3) (on 15 May 2013 by Deb Shinder)
http://www.windowsecurity.com/articles-tutorials/Windows_Server_2012_Security/group-policy-changes-windows-server-2012-windows-8-window-rt-part3.html
In this, Part 3, we’ll wrap up this article series with all the other “little� changes to Group Policy and how they improve the Windows admin experience.

Why Bring Your Own Device (BYOD) needs your attention (on 8 May 2013 by Ricky M. Magalhaes)
http://www.windowsecurity.com/articles-tutorials/Mobile_Device_Security/why-bring-your-own-device-byod-needs-your-attention.html
We are in the middle of the biggest computer revolution since the PC; the explosive number of devices is descending on corporates. In some cases the personal devices can outnumber the corporate devices. This article will cover strategies that should be considered when securing your company.





WindowSecurity.com Sections
-----------------------------------------------------------------
- Articles & Tutorials (http://www.windowsecurity.com/articles-tutorials/)
- Products (http://www.windowsecurity.com/software/)
- Reviews (http://www.windowsecurity.com/articles-tutorials/Product_Reviews/)
- Free Tools (http://www.windowsecurity.com/software/Free-Tools/)
- Blogs (http://www.windowsecurity.com/blogs/)
- Forums (http://forums.windowsecurity.com/)
- White Papers (http://www.windowsecurity.com/white-papers/)
- Contact Us (http://www.windowsecurity.com/pages/contact-us.html)



Techgenix Sites
-----------------------------------------------------------------
- MSExchange.org (http://www.msexchange.org/)
- WindowsNetworking.com (http://www.windowsnetworking.com/)
- VirtualizationAdmin.com (http://www.virtualizationadmin.com/)
- ISAserver.org (http://www.isaserver.org/)
- MSPanswers.com (http://www.mspanswers.com/)
- WServerNews.com (http://www.wservernews.com/)


--
Visit the Subscription Management (http://www.techgenix.com/newsletter/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@WindowSecurity.com
Copyright WindowSecurity.com 2013. All rights reserved.

No comments: