Search This Blog

Monday, January 24, 2011

Gartner slams Cisco's single-vendor network vision

Juniper raiding Cisco and Microsoft executive ranks | Cisco beefs up WIPS capabilities

Network World Cisco

Forward this to a Friend >>>


Gartner slams Cisco's single-vendor network vision
Businesses are better off deploying multivendor networks, no matter what Cisco and other large network vendors may tell you, according to a recent report from Gartner. Read More


WHITE PAPER: Vision Solutions

Easy Server Migrations without Downtime
How can you migrate a production system without incurring business downtime? This fundamental quandary—the seemingly impossible goal of successfully migrating systems without business downtime—and the solutions to that quandary are the subject of this executive overview. Read more.

WHITE PAPER: Google Postini

Top 5 Drivers for Email Archiving
This paper demonstrates the various reasons to archive email and other electronic content. It discusses how to handle objections, highlights the five key business drivers for archiving, and provides quantifiable justifications that show cost savings and risk reduction. Read now!

Juniper raiding Cisco and Microsoft executive ranks
Seeks seasoned marketing help to drive partner programsJuniper is poaching two familiar territories as it stocks up on marketing executives: Cisco and Microsoft. These moves are key for Juniper as it looks to emulate the channel success of Cisco and Microsoft, and build out its stable of third party software developers. Read More

Cisco beefs up WIPS capabilities
Cisco has enhanced its Adaptive Wireless Intrusion Prevention System (wIPS) so that its Wi-Fi access points can both forward traffic and scan for security anomalies. The company contends that the move should make it more affordable for enterprises to add the wireless intrusion prevention capabilities required to better protect their airwaves. Read More


WHITE PAPER: Symantec

Reduce the Cost and Complexity of "Reactive" eDiscovery
To completely understand the value of an archive in electronic discovery, it helps to understand why companies started using archiving to support legal processes in the first place. Read this white paper to learn best practices for choosing an archive solution that scales and your companies needs. Read now!

Is retaliation the answer to cyber attacks?
Should revenge assaults be just another security tool large IT shops use to counter cyber attacks? Read More

Cisco: Fraudster's money mules in short supply
A new security report from Cisco Systems estimates that the amount of stolen online bank account data far exceeds the number of people fraudsters can get to transfer stolen funds, who are known as "money mules." Read More


WEBCAST: Websense, Inc.

Securing the Social Web
Organizations around the world are racing to take advantage of social networking and media like Facebook, LinkedIn, and YouTube. Along with these new resources, comes new risk as user-generated content circumvents traditional security technologies such as antivirus and URL filtering. View Now

Yahoo IPv6 upgrade could shut out 1 million Internet users
Yahoo is forging ahead with a move to IPv6 on its main Web site by year-end despite worries that up to 1 million Internet users may be unable to access it initially. Read More

Cisco invests in cloud chip maker
Cisco has invested in Tilera, a developer of multicore processors for cloud computing and communications, as part of the chip maker's $45 million round announced this week. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. The case of Apple's mystery screw
  2. Is Apple expanding use of tamper-resistant screw for iPhone?
  3. Gartner slams Cisco's single-vendor network vision
  4. 12 geekiest snow and ice sculptures
  5. Yahoo IPv6 upgrade could shut out 1 million Internet users
  6. Fake GSM base station trick targets iPhones
  7. Google's management shakeup: The day after
  8. Gamers hijacked your server? Might be an inside job
  9. Cause of Windows Phone 7 data spikes found
  10. Is retaliation the answer to cyber attacks?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: