Archive for the ‘SA’ Category

IT Infrastructure Threat Modeling Guide

June 22nd, 2009 Comments off

The IT Infrastructure Threat Modeling Guide is now available.
Organizations today face an increasing number of threats to their computing environments. You need a proactive approach to assist you in your efforts to protect your organization’s assets…(read more)

Categories: Compliance, Risk Magement, SA Tags:

We just released the Hyper-V™ Security Guide!

April 1st, 2009 Comments off

The new Hyper-V Security Guide has been released. It provides methods and best practices to strengthen the security of computers running the Hyper-V role on Windows Server® 2008. The guide covers the following three topics:

Hardening Hyper-V
…(read more)

Categories: Hyper-V, SA, SASC, security, Solution Accelerator Tags:

The Hyper-V Security Guide

February 12th, 2009 Comments off

The benefits of virtualization are more evident than ever. Microsoft Hyper-V™ technology allows consolidation of workloads that are currently spread across multiple underutilized servers onto a smaller number of servers. This capability provides you with…(read more)

Categories: Hyper-V, SA, security Tags: