E-Security stresses tough policies

Products alone aren’t enough to secure the network from cyber threats — companies have to deploy the necessary policies and procedures.

  • E-Mail
By  Greg Wilson Published  October 14, 2001

Products alone aren’t enough to secure the network from cyber threats — companies have to deploy the necessary policies and procedures.

Visitors that need to know the initial steps in developing security policies can drop by the E-Security Gulf Group in hall six.

The security services vendor is focusing on its best practice security procedures both through its booth with CA and the Reseller Channel Forum.

“We have a simple ‘best practice’ security procedure that focuses on the assessment, architecture, application and administration of security within business,” says Jorge Sebastiao, managing, E-Security Gulf Group.

Alongside a series of seminars hosted by the security firm, it’s also pushing its managed security services at the show.

Remotely managed services will become increasingly popular as organisations find that they don’t have the resources to secure their environment internally. GO TO STAND: L6-3

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code