Stories by Alyson Behr

CyberGatekeeper polices policies

SAN FRANCISCO (09/19/2003) - Ensuring that remote system software and hardware configurations comply with corporate standards and security requirements is no small task. Trying to base network security on physical location or geographic whereabouts can be like trying to nail Jell-O to a tree because remote users can be coming in off a VPN, wireless connection, PDA, or even by a dial-up connection.