Feeling a bit insecure these days? Boy, do we have a cure for you! Just read this issue cover to cover, and I guarantee a secure feeling will wash over you. Of course, it'll then be your responsibility to use this newfound knowledge to apply security in just the right amounts for your IT infrastructure. If you use wireless technology, run Linux or are considering an MPLS-based VPN service, read on. . . .
Feeling a bit insecure these days? Boy, do we have a cure for you! Just read this issue cover to cover, and I guarantee a secure feeling will wash over you. Of course, it'll then be your responsibility to use this newfound knowledge to apply security in just the right amounts for your IT infrastructure. If you use wireless technology, run Linux or are considering an MPLS-based VPN service, read on.

Some vendors (names removed to protect the ignorant) just don't understand how important an audience you are--220,000 professional technologists. You're the group that drives critical business technology decisions. Some vendors prefer to fixate on CxOs, thinking that their final sign-offs on purchase orders translate into their making technology decisions. But we all know that the CEO or COO isn't capable of, say, evaluating or debating the inherent weaknesses of WEP. If he or she were, why would a company need an IT organization?

Thankfully, most IT products aren't selected just on the basis of a brand name or vendor-CEO relationship. Which brings us back to the security discussion. If vendors want your business, they must understand the importance of building security into the base design of a product--it can't be treated as a layered product.

The link for this article located at Network Computing is no longer available.