{"id":61,"date":"2004-09-22T00:00:00","date_gmt":"2004-09-22T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/09\/22\/4-must-have-security-solutions\/"},"modified":"2021-12-30T11:36:25","modified_gmt":"2021-12-30T11:36:25","slug":"4-must-have-security-solutions","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/09\/22\/4-must-have-security-solutions\/","title":{"rendered":"4 must-have security solutions"},"content":{"rendered":"<p>The corporate network has no boundaries anymore.  Employees, contractors and business partners might connect to an organization?s network via laptop computers, PCs or servers from almost any point, including branch offices, homes, hotel kiosks or airport terminals.  How do you make sure that these machines comply with corporate policies and are updated with the correct security patches and configured properly?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>An emerging class of security compliance gateways can scan networks to ensure that any new machines being hooked onto the network comply with an organization?s security policies and are configured properly, said Alan Paller, research director at the SANS Institute, a security training and education organization.  <\/p>\n<p>The four essential items are:<br \/>\n1. Vulnerability Management<br \/>\n2. Automated Patch Management<br \/>\n3. Enterprise firewalls and intrusion prevention<br \/>\n4. Token Based Identity Management<\/p>\n<p>http:\/\/www.fcw.com\/fcw\/articles\/2004\/0920\/tec-4sec-09-20-04.asp<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-61","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/61","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=61"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/61\/revisions"}],"predecessor-version":[{"id":2548,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/61\/revisions\/2548"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=61"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=61"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=61"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}