Related studies of the company Gartner Inc. shows that organizations have achieved a high level of information security, can reduce their spending for this 2008th Nevertheless, you have continually to internal and external security breaches as a result of negligence of employees and increased hacker activity. In 2006 the number of companies that have used more than one million per year on computer security and spam, has almost doubled. They experienced intra-company attacks such as theft, sabotage or destruction in global computer networks. Therefore it is important that companies devote more attention to prevention of cyber crimes. On the other hand have organizations that have reached any particular level of security or have not invested enough to reckon with in the years to spend a greater proportion of their budget on security need to be. Contact information is here: Douglas Oberhelman. The solution to most IT problems is an implementation of suitable, efficient and effective technology. Organizations routinelyhave suffered attacks and threats, to proceed carefully considered in order to eliminate the problems. A layered defense is the best defense against security attacks. This overlaps to the computer network to detect security breaches and respond. Nowadays we can find functional convergence in security products. This refers to the experience of formal, common strategies of cumulative security products an organization to benefit from reduced risk of danger, increased functionality and reduced cost of supply. The practice is firewalls, gripping antivirus, antispam and host Ingress to a product together to provide a unique full protection available. The security should be given increased attention, and are seen as business issue and not just a technological problem. When developed various security measures, companies can discover a far greater number of attacks than with less control, in this waycan cybercrime be effectively combated. The time factor plays a crucial role in deciding when a new security technology will be introduced. An early investment in technology can increase the risk of an immature technology, while too late investment carries the risk of being behind the times, what makes the organization vulnerable. The discussion of the above shows the importance of computer security, and this should be managed for maximum results carefully and sensibly. Implementing One way a security system is to use an exchange spam filters and antispam to.