{"id":1422,"date":"2005-05-20T00:00:00","date_gmt":"2005-05-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/20\/microsoft-launches-two-new-security-offerings-for-enterprises\/"},"modified":"2021-12-30T11:39:21","modified_gmt":"2021-12-30T11:39:21","slug":"microsoft-launches-two-new-security-offerings-for-enterprises","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/20\/microsoft-launches-two-new-security-offerings-for-enterprises\/","title":{"rendered":"Microsoft launches two new security offerings for enterprises"},"content":{"rendered":"<p>Microsoft Corporation India Pvt. Ltd. launched two new enterprise security offerings,- the Windows Server 2003 Service Pack 1 and a Security Risk Self-Assessment Tool.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Microsoft Windows Server 2003 Service Pack 1 (SP1) provides Windows Server 2003 users with significant security enhancements as well as reliability and performance improvements.  The tool provides customers with a reduced attack surface by gathering information about specific server roles, and then automatically blocking all services and ports not needed to perform these roles.<\/p>\n<p>The Security Risk Self-Assessment Tool from Microsoft is designed to help organizations with fewer than 1,000 employees assess weaknesses in their current IT security environment.  It helps identify processes, resources, and technologies that are designed to promote good security planning and risk mitigation practices within enterprises.<\/p>\n<p>The Microsoft Security Risk Self Assessment Tool is a detailed questionnaire that organisations need to fill out and responses are then processed to evaluate the organization&#8217;s security practices in such areas as Infrastructure, Applications, Operations, and People.<\/p>\n<p>http:\/\/www.zdnetindia.com\/news\/pr\/stories\/122228.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1422","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1422"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1422\/revisions"}],"predecessor-version":[{"id":3909,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1422\/revisions\/3909"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}