My spin: Securing a Microsoft Windows environment is NOT easy at all and can be a full time job. Get all the help you can in securing your business’ infrastructure.
McAfee Security Joins Leading Security Experts to Discuss Intrusion Prevention and Protection for Microsoft Environments
Network Associates, Inc. (NYSE:NET) , the leading provider of intrusion prevention solutions, today announced its sponsorship of and participation in the Microsoft(R) Security Strategies Roadshow, an educational security outreach program that will focus on network and system security. The Microsoft Security Strategies Roadshow, sponsored by Microsoft and produced by Windows &.NET Magazine, will be produced in 20 cities across the country starting January 15 through May 12, 2004.
The Microsoft Security Strategies Roadshow will deliver a free full day of training to help IT managers and security professionals learn the importance of intrusion prevention, patch management, hardening best practices and securing client computers. At the event, McAfee(R) Security experts will discuss the important topic of intrusion prevention in a presentation titled, “Stopping the Evolving Threat with Intrusion Prevention.” As part of the presentation, McAfee Security experts will teach IT managers how to go beyond merely detecting threats to preventing them altogether with the McAfee “Path to Prevention,” a comprehensive plan of action to help businesses defend critical assets throughout the enterprise.
“Network Associates(R) is pleased to support Microsoft as a co-sponsor of the Microsoft Security Strategies Roadshow and looks forward to sharing its McAfee Prevention-in-Depth(TM) strategy to help protect Microsoft environments from threats at every level of the IT infrastructure,” said Michael Callahan, vice president of North America marketing for Network Associates. “Network Associates will help IT professionals across the country learn the importance of resource protection and how to implement the necessary security tools to reduce their exposure to malicious attacks and vulnerabilities. Attendees will also learn how to eliminate lost costs associated with system and network downtime.”
Latest posts by Ramon Ray (see all)
- How A Beauty Company Keeps Its Tech Edge – CTO Interview. Outsource and Get Expert Help. - September 18, 2018
- 7 Steps to Creating Your Own Startup - September 13, 2018
- Apple’s New Product Lines. What’s In It for Small Business? - September 12, 2018