Search This Blog

Monday, March 01, 2010

Looking back at Microsoft Active Directory's launch

RSA Conference 2010 product highlights (slideshow) | How identity governance solves the compliance

Network World Security: Identity Management Alert

Forward this to a Friend >>>


A look back at the launch of Active Directory
Once again it's time to look back and see what we were talking about 10 years ago. And what we were talking about was the most highly anticipated launch in IdM history -- Microsoft's Active Directory. Read More


WHITE PAPER: Splunk

Make IT Data a Strategic Asset
This paper outlines the struggles organizations face managing silos of IT data and how, using Splunk, users are changing the way they do their jobs and elevating the role of IT in their organizations. Learn More!

WHITE PAPER: Tripwire

A Holistic Approach to Compliance Makes Business Sense
IT management has tremendous incentive to figure out a new, more effective and comprehensive approach to meeting information security and compliance goals. This webcast will explore those pain points, the solutions, and the best practices organizations should consider to make strategic information security an enabler of business value. Learn More!

RSA Conference 2010 product highlights (slideshow)
A range of vendors chose RSA Conference 2010 to unveil their latest products Read More

How identity governance solves the compliance
The identity management landscape is changing. The need for stronger auditing controls is giving rise to identity governance tools that are supplanting ID provisioning solutions as the centralized management layer for identity. Read More

Average annual cost of PCI compliance audit? $225k
Merchants that undergo network audits to ensure compliance with the Payment Card Industry Data Security Standards are paying an average of $225,000 each year. Read More


WHITE PAPER: Radware

Rethinking Application Security
Hacker motivation has changed from gaining fame to financial gain. Cyber crime activities now employ a new level of network attacks, which go undetected by standard network-security tools. This paper discusses the changing threat landscape and how you can protect your business from emerging threats. Read More

Cloud computing security challenges unite hosting providers, security specialists
As cloud computing adoption climbs, hosting providers are inking deals with security vendors to provide security-as-a-service options to customers. But will enterprise IT managers buy into these often novel forms of security woven into a cloud computing environment? Read More

Google Street View Raises Privacy Concerns...Again
It's like déjà vu all over again for Google with privacy concerns related to its Street View Maps. The European Union, which earlier this week revealed that it is investigating antitrust accusations against Google, has asked Google to make some changes to the way it gathers and retains data for Street View Maps. Read More

New zero-day involves IE, puts Windows XP users at risk
Microsoft on Sunday confirmed it's investigating an unpatched bug in VBScript that hackers could exploit to plant malware on Windows XP machines running IE. Read More


WHITE PAPER: Qwest

Connecting to Better Customer Service
Less than a third of surveyed IT executives believe their companies are "highly effective" at adapting to changing customer needs and priorities. Businesses that build a robust voice and data network infrastructure can achieve a high level of responsiveness, and transform customer information and feedback into actionable results. Click here.

EMC expands RSA consulting services
EMC is expanding its security consulting services to help enterprises tackle the complexities of securing their data and complying with regulations in virtualized computing environments. Read More

More than 100 companies targeted by Google hackers
The hackers who broke into Google two months ago have gone after more than 100 companies, according to an estimate by security vendor Isec Partners. Read More

FTC seeks extensive information from firms being investigated for P2P breaches
Several companies being investigated by the FTC for inadvertently exposing customer and employee data on peer-to-peer networks, have been asked by the agency to submit extensive information on their data-collection, usage and protection practices. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Forrester Research and Network World want to hear from you!
We are collaborating to conduct an on-line-based study focused around data center strategy. The survey should take approximately 12 to 15 minutes to complete. This is both a confidential and anonymous survey and your results will only be used in aggregate. As a special thankyou, all respondents will receive a free copy of the resulting research report from Forrester – a $500 value! Thank you for taking the time to fill out the survey.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

Videogame your way through the Olympics
If you're bored with (or inspired by) NBC's coverage of the games, there's always your PC or video game system that lets you feel like you're competing in these events.

The technology behind the Vancouver Olympic Games
Bell Canada is claiming the Vancouver 2010 Olympic network as the first IP-based converged network at any Olympic or Paralympic Games. It will be built to provide seamless telephone, wireless, radio and Internet communications services for fans, media, athletes and officials from around the world.

MOST-READ STORIES

  1. The evolution of removable storage
  2. Juniper aims higher than Cisco
  3. Microsoft recruited top notch guns for Waledac takedown
  4. HP ProCurve leveraging know-how of Cisco's certified engineers
  5. VMware buys management software from parent EMC
  6. 40/100G Ethernet needed, but too pricey
  7. Why Palm can't be saved
  8. Is it time for routers to borrow an idea from WAN accelerators?
  9. Microsoft launches 'phone home' anti-piracy update
  10. Is Android the Boys' Club of Smartphones?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: