New & Notable
Lotus Notes Domino Security News
September 26, 2006
IT admins keep working to make networks secure even as more unsecured personal gadgets, like smart phones and BlackBerrys, find their way into companies.
August 31, 2006
At this year's Conference on Email and Antispam, one expert said that despite the increasing complexity of online scams and attacks, digital criminals are less about the technology and more about the crime.
August 22, 2006
DeepNines claims McAfee is marking and selling products based on the DeepNines patent for the Security Edge Platform, a unified threat management product that integrates several tools into a single device.
August 17, 2006
One of the industry's most knowledgeable AV gurus has left Symantec for Microsoft. Vinny Gullotto will be charged with forming an AV research unit to rival Symantec and McAfee.
Lotus Notes Domino Security Get Started
Bring yourself up to speed with our introductory content
SearchDomino.com expert Chuck Connell suggests how to create a single sign-on for a VB.NET and a Lotus Notes TeamRoom database. Continue Reading
SearchDomino.com expert Chuck Connell helps a Lotus Domino administrator troubleshoot a "File truncated – file may have been damaged" error when attempting to restore an archived NSF file. Continue Reading
SearchDomino.com expert Chuck Connell examines what to consider when setting corporate mail file size policies. Continue Reading
Evaluate Lotus Notes Domino Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Here are the top 10 Notes/Domino administration tips from 2006. From improving your Domino Web Access performance and combating calendar delegation issues to running an ND upgrade pilot and managing Windows Client Access Licenses, these topics ... Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Powered by IT Central Station
Cisco ASA has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports ...Continue Reading
Manage Lotus Notes Domino Security
Learn to apply best practices and optimize your operations.
If a public key in the Notes Address Book (NAB) isn't the same as the one in the ID file, processes fail, including email encryption, renames and recertifications, password checking and public key checking, and requests sent to the AdminP task. ... Continue Reading
During the course of several recent Domino domain audits, consultant Andy Pedisich discovered what was thought to be an extinct Lotus Notes security problem. Unfortunately, it still seems prevalent in many Lotus Notes R6 and R7 domains. Find out if ... Continue Reading
Instant messaging can be very beneficial to SMBs -- just think how much you'll save on phone bills. But there are security issues that you must be prepared for first. Continue Reading
Problem Solve Lotus Notes Domino Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Telecommuters often feel isolated from their company, and security-wise that is the last thing you want. Security expert Jonathan Hassell provides a list of items -- from router configuration instructions to VPN alternatives -- to include in a ... Continue Reading
Chuck Connell, the SearchDomino.com resident expert on Domino security and administration, offers a variety of downloads on his Web site. Continue Reading
Educated end users are a valuable defense in the fight against spyware. Learn how to conduct effective security awareness training and create spyware policies. Continue Reading