Friday, January 30, 2009

Acquisition unites risk and compliance competitors

Disk-drive encryption gets boost from Opal standards effort
Network World logo

Compliance Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by MovinCool
rule

Effectively Cool your Equipment Closets.
Keep your server and telecom closets cool with self-contained spot air conditioners, which are more effective than traditional precision-cooling systems. You'll learn the cost and flexibility benefits of spot coolers and get tips on how to find the right product for your IT environment. Learn more today. Download this whitepaper now.

rule

Spotlight Story
Acquisition unites risk and compliance competitors

Denise Dubie By Denise Dubie
Archer Technologies acquires competitor Brabeion Software to improve upon its enterprise governance, risk and compliance products. Read full story

Related News:

The 7 dirty secrets of the security industry Do you ever get the feeling your security providers are failing to tell you the whole truth? We entrust the industry to protect us from unacceptable risk. But we must confront the underlying truth: The goal of the security market is to make money.

Disk-drive encryption gets boost from Opal standards effort The Opal industry-standards effort unveiled this week by the Trusted Computing Group should prove a boon to information technology professionals exploring desktop encryption options.

Opal promising interoperable disk-drive security The Opal security specification from the Trusted Computing Group promises interoperable encryption, authentication and management capabilities for disk-drive manufacturers and security software vendors.

State's plan to reprogram huge spectrum asset faces challenges South Carolina wants to repurpose a big chunk of long-dormant spectrum, enough to offer high-bandwidth broadband services from border to border. But the plan faces challenges...

Groups: U.S. gov't still withholding treaty information The Office of the U.S. Trade Representative has withheld more than 1,300 pages on an anticounterfeiting trade agreement being quietly negotiated after two digital rights groups filed a request for information, the groups said.

Coming soon: Full-disk encryption for all computer drives The world's six largest computer drive makers Tuesday published the final specifications (download PDF) for a single, full-disk encryption standard that can be used across all hard disk drives, solid state drives (SSD) ...

Scott Hogg on Core Networking and Security: Windows 7 IPv6 support The more some things change the more they same the same. That is certainly true for the IPv6 support in Windows 7. Even though Windows 7 is the latest Microsoft desktop operating system, its IPv6 support is very similar to the features inside Vista and Server 2008.

Comply! Compliance with regulations is a bear, but there are tools to get you there. Our revamped Product Guide can help you sort through them all.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


Betting on SuperNAP
In Las Vegas, data center takes power and cooling to the limitIn Las Vegas, data center takes power and cooling to the limit.

Data gone missing
10 woeful tales of data gone missing10 woeful tales involving backup tapes: some current, some classic and one just plain unusual.

Sponsored by MovinCool
rule

Effectively Cool your Equipment Closets.
Keep your server and telecom closets cool with self-contained spot air conditioners, which are more effective than traditional precision-cooling systems. You'll learn the cost and flexibility benefits of spot coolers and get tips on how to find the right product for your IT environment. Learn more today. Download this whitepaper now.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


Take Control of Network TCO by Automating IPAM
Join ESG and Infoblox to learn about reducing network TCO while boosting network availability by automating IPAM.
Review this information-packed webinar today.

 

01/30/09

Today's most-read stories:

  1. Google M-Lab provides a window into your ISP
  2. Don't fear the penguin: A newbie's guide to Linux
  3. Laid-off Nortel workers lobby for severance
  4. Online privacy tips for teens . . . and the adults who ignore them
  5. World's first 2Tb drive launched in Australia
  6. New Data Center: storage
  7. Tech industry's most famous Super Bowl ads
  8. Fallout 3: Operation Anchorage DLC now available
  9. Ex-Fannie Mae employee accused of planting computer time bomb
  10. FTC slaps Do Not Call violators with $1.2 million in penalties


Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment