This is the third article in this series covering Web Security. The first gave the arguments that may lead you to obtain so form of protection, the second discussed a more open approach. This article will concentrate on solutions available to businesses.