Wednesday, November 28, 2007

Enterasys secures virtual data centers; Microsoft won't confirm proxy configuration flaw

Security Alert Network World logo
NetworkWorld.com | Security Research Center | Update Your Profile
Enterasys secures virtual data centers

Jim Duffy By Jim Duffy
Enterasys adds policies to its switches, routers and management products to support virtualized data centers. Read full story

Jim Duffy is managing editor of Network World's service provider equipment coverage. He has 18 years of high-tech reporting experience, including over 12 years at Network World. Previously, he was senior editor at Computer Systems News and associate editor/reporter at Electronic News and MIS Week. He can be reached at jduffy@nww.com.


SPONSORED BY BLUE COAT
rule

Get the latest on Web Acceleration Tools
Discover how to significantly improve document delivery times for users that are physically away from your centralized data center. A document that takes 80 minutes to delivery to a user across the globe could be delivered in three minutes with Web acceleration. Learn how your IT organization can benefit from this technology. Listen to this Webcast now.

rule
RELATED NEWS:

Microsoft won't confirm proxy configuration flaw, impending patch, 11/27/07: Microsoft Tuesday was still examining the details of a vulnerability discovered by a hacker that appears to exploit an eight-year-old flaw in Windows.

NAC saves college time and admin headaches, 11/27/07: Until Carroll College bought into NAC technology, it took six weeks of work by a dozen full-time IT staff and student volunteers to clean up student PCs, stemming infections they brought to the network.

Webroot, Email Systems team for new e-mail security service, 11/27/07: Webroot announced this week that will be teaming up with Email Systems, a software-as-a-service security provider, to deliver e-mail security services to enterprise users.

Free password generators, Part 2, 11/27/07: Last time I asked, "What's a good password?" and discussed a Web-based service for creating random passwords. This time I’m looking at the Bytes Interactive ...

When it's OK to use NAC endpoint checking sporadically, 11/27/07: A recurring theme among NAC customers is they use NAC endpoint checking sporadically. When a computer has been scanned and found compliant once, ...

FTC: 8.3 million US victims of ID theft in 2005, 11/27/07: About 8.3 million U.S. residents -- nearly 4 percent of the nation's population -- were victims of identity theft in 2005, but few victims identified computer-related crime as the culprit, according to a U.S. Federal Trade Commission report released Tuesday.

New legal guidelines proposed for online games, 11/27/07: Video games that include an online element expose players and publishers to a host of new risks for which they must prepare. That's the message from French lobbying group the Internet Rights Forum, which issued guidelines for publishers and legislators on Tuesday.


HOLIDAY GIFT GUIDE
2007 Cool Yule Tools - Holiday Gift Guide Find the very best tech holiday gift ideas.

'07 ENTERPRISE ALL-STARS
'07 ENTERPRISE ALL-STARS Honoring outstanding technology projects.

SPONSORED BY BLUE COAT
rule

Get the latest on Web Acceleration Tools
Discover how to significantly improve document delivery times for users that are physically away from your centralized data center. A document that takes 80 minutes to delivery to a user across the globe could be delivered in three minutes with Web acceleration. Learn how your IT organization can benefit from this technology. Listen to this Webcast now.

rule

Join Network World's Technology Opinion Panel
Here is your chance to help shape the future of IT. You know what products and enhancements are needed, you have the insight and foresight to be out front and provide direction to Network Word and the network industry. To join the panel, complete a brief registration survey
. The panel is strictly for technology professionals to share their vision.

Featured reader resource

90% of IT Managers are leaving their company at risk for a DNS ATTACK. Get the tools and resources you need to keep your DNS healthy and secure. Run a DNSreport on your domain today - 56 critical tests run in 8 seconds.

Visit www.dnsreport.com to learn more. (apply coupon NWW2007NLA for a 25% membership discount)

 

11/28/07

TODAY'S MOST-READ STORIES:

  1. 2007 Cool Yule Tools Gift Guide
  2. 2007 Enterprise all-stars
  3. BSA, software giants target little guys
  4. Teleworkers called back to cubicle life
  5. Al Gore's Web site hacked
  6. Microsoft to close 8-year-old vulnerability
  7. AT&T to hike prices on dial-up
  8. Testing all-in-one firewalls
  9. Parts of Cisco.com inaccessible
  10. Security concerns cloud virtualization

MOST POPULAR SLIDESHOW:
2007 Enterprise All-Star winners


Executive Guide The Security Treadmill

This Executive Guide offers interviews with leading, real-world security experts who tell you how to get inside users' heads, fight for a bigger security budget, and whether VoIP security issues are overstated or underrated, and much more. Review this informative guide today.

Click Here for More Information



IT Buyers guide

IT Buyer's Guides
Compare products, get advice, and check out tests and reviews from the experts at Network World. Over 70 categories. Visit now.

 


To continue receiving NetworkWorld's Security Alert newsletter, please add @nwfnews.com to your white list.

COMPLIMENTARY SUBSCRIPTIONS AVAILABLE
As a NW newsletter subscriber you are eligible to receive 50 issues of Network World Magazine, in print or electronic format, free of charge.

Sign up for your subscription today: Apply here. International subscribers,click here.

 

SUBSCRIPTION SERVICES
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Terms of Service/Privacy

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772
Copyright Network World, Inc., 2007

 

 



No comments:

Post a Comment