Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Protection Against Today's Network Attacks Begs for Unified Approach

By Scott Rosen
June 29, 2006

The increasingly complex security environment is fueling an innovative approach to network security called Unified Threat Management (UTM) that consolidates and integrates all of the major threat protection services into a single device. UTM can save time and money and redirect IT resources back to the business of improving the practice of law.

Even as companies are spending billions on sophisticated new security hardware and software, current research indicates that corporate networks are being successfully attacked. Data compromises are common. This article outlines the root causes for computer network vulnerabilities and how law firms can ensure better security and more efficient use of their security-related investments.

Read These Next
New York's Latest Cybersecurity Commitment Image

On Aug. 9, 2023, Gov. Kathy Hochul introduced New York's inaugural comprehensive cybersecurity strategy. In sum, the plan aims to update government networks, bolster county-level digital defenses, and regulate critical infrastructure.

Law Firms are Reducing Redundant Real Estate by Bringing Support Services Back to the Office Image

A trend analysis of the benefits and challenges of bringing back administrative, word processing and billing services to law offices.

Bit Parts Image

Summary Judgment Denied Defendant in Declaratory Action by Producer of To Kill a Mockingbird Broadway Play Seeking Amateur Theatrical Rights

The Bankruptcy Hotline Image

Recent cases of importance to your practice.

How AI Has Affected PR Image

When we consider how the use of AI affects legal PR and communications, we have to look at it as an industrywide global phenomenon. A recent online conference provided an overview of the latest AI trends in public relations, and specifically, the impact of AI on communications. Here are some of the key points and takeaways from several of the speakers, who provided current best practices, tips, concerns and case studies.