Search This Blog

Monday, October 19, 2009

Gartner spotlights market leaders

NASA network security torched; Overlooked VOIP Security Features
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by HP ProCurve
rule

802.11n Drives an Architectural Evolution
The sharp capacity increase possible with 802.11n is a compelling force behind the evolution in WLAN architectures. This paper examines both the centralized WLAN switch architecture and the optimized WLAN architecture, so that the wireless network choice an organization makes today will protect its investment and allow it to experience the substantial benefits of 802.11 for years to come.

Learn more

rule

Spotlight Story
Gartner spotlights market leaders

It's October, time (in the Northern Hemisphere) for apples, cider and hay rides. It's also time for Halloween and Gartner Magic Quadrants (MQ). Not sure which is scarier! Read full story

Related News:

NASA network security torched
While NASA may be focused on keeping its manned space flight plans intact, apparently it has seriously neglected the security of its networks. Watchdogs at the Government Accountability Office issued a 53-page report pretty much ripping the space agency's network security strategy stating that NASA has significant problems protecting the confidentiality, integrity, and availability of the information and variety of networks supporting its mission centers.

Overlooked VOIP Security Features
I am wanker when it comes to VOIP. I am not a huge VOIP fan. Nope. Not much at all. When I was growing up, phracking never really appealed to me. I remember tripping my first 5ESS and not thinking "that's cool" but "so what". Kinda weird because VOIP possesses all the elements I like in engineering design. It has many parts, separate protocols, programming elements, high end user satisfaction, massive...

Ford tech trade secrets stolen by China?
Despite the fact that the auto industry is going through some extremely tough times apparently doesn't make foreign countries covet its technology any less.

Ethernet everywhere!
Inside planes, trains, cars and spaceships, Ethernet is a morph master

Online libel case stirs up free speech debate
An Illinois politician's attempt to unmask the identity of an e-mail poster who allegedly made disparaging remarks about her teenage son in an online forum is stirring a debate about free speech rights on the Internet.

How to protect a database from the inside out
Your databases contain your company's most sensitive information -- credit card numbers, bank records, customer account information, financial records and so on. Chances are your database security is based on building a secure perimeter around the database, but this still leaves the data at risk. Sentrigo puts a sensor on your database to detect each illicit activity so you can detect, alert and prevent data breaches. This sensor helps protect databases from the inside out.

Sneaky Microsoft plug-in puts Firefox users at risk
An add-on that Microsoft silently slipped into Mozilla's Firefox last February leaves that browser open to attack, Microsoft's security engineers acknowledged earlier this week.

Windows 7 Migration: Four Planning Tips
As you plan for your enterprise Windows 7 deployment, you can also clean house and improve efficiency. Here's a look at four key areas to consider.

Five Problems Keeping Legacy Apps Out of the Cloud
Did you think all those legacy apps would just float up into someone else's cloud infrastructure? Management, licensing and migration concerns highlight the list of troubles that vendors are now trying to address.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

The Power of Virtualized Web Application Delivery
The increased dependency on Web applications has created greater complexity in the environment making availability, performance and security of Web applications an imperative. This white paper discusses how any size organization can tune its Web application delivery services with a virtualized solution that will meet the unique characteristics of each individual application.
Read More


Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More

 

October 19, 2009

MOST-READ STORIES

  1. How to royally foul-up an IT outsourcing project
  2. Husband, wife team arrested for allegedly stealing from Cisco
  3. Missing dot drops Sweden off the Internet
  4. 15 genius algorithms that aren't boring
  5. NASA network security torched
  6. The Internet has shifted under our feet
  7. 10 great Google Apps add-ons for the enterprise
  8. He knows .Net and SQL ... not missile launchers
  9. Microsoft apologizes, recovers most Sidekick data
  10. Facebook applications at risk from attack

Protecting Against the New Wave of Malware
This white paper examines why older, traditional antivirus approaches don't work and why a new approach to endpoint security is required to better protect your company from malicious threats. Learn about the scope of the malware problem and strategies that can help you defend against evolving threats.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: