In This Issue: Focus on Network Security

LOCKDOWN: District Shores Up Security >
SIEM TOOLS: Analyze and Prioritize >
UTM: Tips for Small-Scale Deployment >
REVIEW: WatchGuard XTM 530 Appliance >

September 7, 2010  

e-mail sign up 

Edtech Focus on K-12 | :e-news EdTech K-12 Search Magazine Resources Reviews Newsletters
    Online Help Today for Tomorrow's Technology Challenges  
Case Study  

Security Lockdown
School district deploys UTM

Seeking to better block spam and stop students from accessing forbidden domains, the Lynden School District in Washington replaced a hodge-podge of security technologies from different manufacturers with a Fortinet unified threat management solution that saves time and eases administration.

READ STORY >  SHARE >  twitter facebook linkedin

Tech Trends  

Security Smarts
Management systems make sense of alerts

Tracking all the security events that occur on a large network can be near impossible for IT staff, so Montgomery County Public Schools in Maryland and Fairfax County Public Schools in Virginia tap security information event management tools to analyze and correlate events and respond appropriately.

READ STORY >  SHARE >  twitter facebook linkedin

Tech Tips  

SSL VPN Virtuoso
Try these four tips for deployment

Unified threat management devices offer SSL VPNs with a lower price tag and easier management than their enterprise-class brethren. Here are four suggestions for using small-scale SSL VPNs more effectively.

READ STORY >  SHARE >  twitter facebook linkedin

Product Review  

WatchGuard XTM 530
Appliance rolls multiple functions into a single device

The WatchGuard unified threat management appliance guards against viruses and malware, performs intrusion detection and prevention, blocks web pages and performs URL filtering to protect small and midsize organizations.

READ STORY >  SHARE >  twitter facebook linkedin

Best Practices  

Data Loss Prevention
Ensure sensitive digital assets remain in your organization

Data loss prevention products offer valuable aid in detecting leakage of Social Security or credit card numbers. To get the most from these tools, apply proper policies and risk assessment

READ STORY >  SHARE >  twitter facebook linkedin


What does it take to make one-to-one initiatives work for schools and their students?

White Paper

Security: Key strategies for safeguarding IT resources from interior and exterior threats

Reference Guide

Security: Deterring threats and enabling operations with integrated, multilayered strategies


Rest Secured: IT crafts strategies to protect people, information and buildings

Visit the 21st CenturyCampus
View the 21st Century Classroom


Visit the ARRA Solutions Center



Share EdTech E-Newsletter on: twitter facebook linkedin             Visit:  CDW-G

Banner Advertisement
  This e-mail is intended for the purposes of researching or purchasing products offered for sale by CDW·G.
All information is subject to CDW·G's terms, conditions and policies.

Copyright © 2010 CDW Government LLC, 230 North Milwaukee Avenue, Vernon Hills, IL 60061; 800.808.4239


Learn from Your Peers

What can you glean about security from other IT pros? Check out new CDW research and insight from our experts.