John Howie


John Howie is the Chief Operating Officer of the Cloud Security Alliance. He is also a visiting professor at the University of Arizona and at Edinburgh Napier University.

The Inevitability of IPv6, Part 1
Learn about some of the new features of IPv6, as well as some of the reasons you should care about it—even if you don't plan on implementing it in the near future.
Microsoft Forefront Security for Exchange Server
Forefront for Exchange is designed to overcome the limitations of any one email server antivirus product by running up to five antivirus engines simultaneously. See how to set up and manage Forefront on Exchange 2007 servers that host mailboxes.
Microsoft Office SharePoint Server 2007 and RMS 2
MOSS's Information Rights Management (IRM) feature gives administrators and users control over how others can use Office files within SharePoint and after they're downloaded.
Enterprise Event Logging for SMBs
These event log collection and management tools might have been designed as enterprise solutions, but SMBs with extensive logging needs will want to explore these products.
Toughening Up Virtual Server 1
Are you about to jump on the virtualization bandwagon? Before you do, you need to be aware of the technology's real security concerns. Here are some practical solutions that you can use.
MOM Management Packs
MOM provides a powerful way to monitor your servers and business-critical infrastructure. Management packs for MOM let you monitor a wide range of server-health indicators and alert you to critical events that require intervention.
MOM for SMBs
MOM 2005 Workgroup Edition is designed for use in networks with up to 10 servers. Here's how to prepare for, install, and use it.
Secure VPN Alternatives 1
VPNs will always have a place in some companies, but here are some alternatives that provide more security.
Security Log Collection 1
Select the right security log management tool for your company.
When You Must Use Passwords
Use these guidelines in situations in which you must use passwords for authentication.
Authentication Options 1
The problems associated with using usernames and passwords for authentication are causing many companies to search for alternative authentication methods. Here are three options.
Windows Server 2003 Certificate Services - 26 May 2006
Windows Server 2003 Certificate Services contains new features and improved security. Three key new features are Version 2 certificate templates, key archival and recovery, and delta Certificate Revocation Lists (CRLs).
Reaping the Benefits of WPA and PEAP 3
Learn about the benefits and configuration steps for securing your wireless networks by using WPA or WPA2 technology.
Securing Networks with WPA-PSK and WPA2-PSK 2
Learn the steps for securing your wireless networks via WPA or WPA2 and Pre-Shared Key technology.
Collecting and Analyzing Event and System Logs
Use EventCombMT to collect event and system logs from multiple remote locations.
Hyper-V Master Class

Hyper-V Master Class with John Savill
Live Online Training: Thursdays, April 27th to May 18th
Register by April 20th and Save 20%!

John Savill provides 12 hours of detailed instruction covering all the key aspects of a Hyper-V based virtualization environment covering both capabilities in Windows Server 2012 R2 and Windows Server 2016. John will walk attendees through resource allocation and architecture, storage, networking (including Network Virtualization), clustering, migration technologies, replication, private cloud, session virtualization, migration from other technologies, integration with Microsoft Azure, and more. At the end of this class, attendees will be able to architect and manage an enterprise-level Hyper-V environment.


Join the Conversation

Sponsored Introduction Continue on to (or wait seconds) ×