Search This Blog

Tuesday, September 01, 2009

Catbird reports whether cloud security meets compliance standards

Savvis unveils cloud-based service; IBM puts virtual desktops in the cloud
Network World logo

Cloud Security

NetworkWorld.com | Update Your Profile


Sponsored by TippingPoint
rule

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.

Read More

rule

Spotlight Story
Catbird reports whether cloud security meets compliance standards

Catbird is adding a feature to its security platform that gives cloud users a reading on how well their data use complies with specific regulatory requirements. Read full story

Related News:

Savvis unveils cloud-based service
Savvis is announcing a cloud-computing platform that it claims is the first fully virtualized private data center offering aimed at enterprise customers.

IBM puts virtual desktops in the cloud
IBM is rolling out a subscription service that aims to make it easier for large companies to use desktop virtualization, a technology that has been slow to take off but which some say has big potential.

Cloud-enterprise integrations readied for Amazon EC2 users
Cast Iron Systems is looking to make it easier for users of cloud applications on the Amazon EC2 to integrate with their in-house enterprise systems.

Xen.org aims for the cloud with open source initiative
Developers of the Xen open source hypervisor are trying to make Xen the industry's cloud-building platform of choice.

EMC acquires cloud support vendor FastScale
EMC has acquired FastScale Technology, a vendor of software for data centers, in an effort to focus on supporting private cloud infrastructures.

Blog: Clouds Hanging Over VMworld 2009
I'm not crazy enough to think everyone is going stop their virtualization initiatives in their tracks and get themselves ready to stand up a Xen Cloud, but the concept and the potential strength behind the concept is intriguing.

VMware publishes virtualization security, compliance guidelines
VMware today published security and compliance recommendations for its virtualization products. The vendor's guidelines focus primarily on optimizing use of management and security tools available from VMware parent company EMC and EMC's RSA security division.

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

ESG: Why SharePoint Needs WAN Optimization
According to recent research from the Enterprise Strategy Group (ESG), implementing SharePoint is a Top 5 initiative for CIOs. But a hidden challenge in SharePoint is to ensure that end users are able to quickly access and edit files when connected via the WAN. Learn about the key benefits organizations have realized as a result of Wide Area File Services Technology.
Click here to continue.


Go Green - Save Green - IT Power Management
Download this whitepaper and discover the building blocks of a successful IT Power Management policy and how this policy can align with your business's green initiatives.
Learn More

 

September 01, 2009

TOP STORIES | MOST DUGG STORIES

  1. Wi-Fi encryption cracked in 60 seconds
  2. Developer denies software to beat Chinese censors is malicious
  3. 12 words you can never say in the office
  4. FBI investigating laptops sent to U.S. governors
  5. China game boss sniped rivals, took down Internet
  6. The opposite of Twitter
  7. 12 cool ways to donate your PC's spare processing power
  8. Proposed bill gives Obama power to shut down Internet
  9. Group offers tools to evade China's Web censorship
  10. 5 techs that could reinvent cell phones

IDC: Optimizing Storage to Reduce Data Footprint and Lower Costs
Read this review on today's storage optimization and technologies. Learn how they reduce the data footprint and identify how various technologies work toward this goal.
Learn more



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: