Search This Blog

Wednesday, September 07, 2011

Aveksa catches a Wave

Windows 7 rollouts without the pain | NSA extends label-based security to big data stores

Network World Security: Identity Management

Forward this to a Friend >>>


Aveksa catches a Wave
In the past I've warned you about putting too much credence into publications such as Gartner's "Magic Quadrant" or Forrester's "Wave." Not that there's bad research, but that your needs might not fit the profile the report was drawn for -- better to pay the money and have an independent analyst do a report tailored to your situation. Read More


WHITE PAPER: Riverbed

Application-Aware Network Performance Management
Riverbed® Cascade© stacks up extremely well against the competition. How well? In particular, Cascade outperforms other application-aware network performance management solutions in such important areas as product strength and cost efficiency. Read Now.

WEBCAST: CA Technologies

Business Service Assurance
Define and manage IT service quality & delivery based on business impact and priority. View Now

Windows 7 rollouts without the pain
Migrating to the next version of Windows can be a painful exercise for enterprise IT departments. That said, with support for Windows XP ending and with hardware refresh cycles kicking in, the move to Win 7 is unavoidable for most enterprises. The good news is that there are specific tools built to help with Windows 7 deployments. We tested Acronis Snap Deploy 3 With Universal Deploy 3, Microsoft Deployment Toolkit 2010, Prowess SmartDeploy Enterprise, and Symantec Ghost Solution Suite 2.5. Read More

NSA extends label-based security to big data stores
The National Security Agency has submitted new label-based data store software, called Accumulo, to the Apache Software Foundation, in hopes that other parties will further develop the technology for use in secure systems. Read More

Scammer "crams" $35 million in false phone charges -- from prison
The US Department of Justice said a man who placed $35 million worth of false telephone bill charges while serving jail time has been sentenced to 21 more years for the cramming scam. Read More


WEBCAST: Citrix Systems

Forrester Webinar – "Enabling 2011 Business Initiatives"
Forrester Webinar – "Enabling 2011 Business Initiatives" – shows how to use virtual appliances to build a network infrastructure that supports top business priorities. Includes expert recommendations for how to optimize your data center for Cloud computing and loads that change with user and business needs. Compliments of Citrix. View now

Comodo hacker claims credit for DigiNotar attack
The hacker responsible for a stunning attack on a Dutch company that issues security certificates for websites warned on Monday that he would "strike back again," after previously breaching another company earlier this year. Read More

Hackers spied on Iranians using fake Google certificate
About 300,000 Iranians had their Gmail accounts compromised and their messages read by hackers, according to a forensics firm that has investigated the theft of hundreds of digital certificates from a Dutch company. Read More

How to Secure Your Apache Web Server
Installing and maintaining a secure web server on Linux can be a challenge. It requires in-depth knowledge of Linux, Apache, and PHP server-side options. One of the main problems is to find the balance between security and productivity and usability. The best solution depends on the specific project requirements, but all installations share certain common characteristics. Here are some best practices... Read More


WHITE PAPER: GFI Software

Social Networking and Security Risks
Each social networking tool comes with its own set of security concerns which can put your information systems and/or personal data at risk. This white paper will look at some of these risks and identify possible solutions to help protect you, your personal information and your company data. Read now!

Mobile apps and security: What you need to know
A Melbourne-based app developer has spoken about the security pitfalls of smartphone apps, saying that while certain mobile environments are more susceptible to malware, such risks can be eliminated through encryption and using common sense. Read More

FAA slaps $175,000 fine on MIT for batteries that caught fire at FedEx
The Federal Aviation Administration (FAA) today said it would seek a $175,000 civil penalty against the Massachusetts Institute of Technology (MIT) for alleged violations of Department of Transportation Hazardous Materials Regulations. Read More

Search and seizure: No Fourth-Amendment rights at Borders
In 2002, the Homeland Security Act established the Department of Homeland Security (DHS) combining a number of U.S. law enforcement andd. The US Customs Service and the Immigration and Naturalization Service contributed to the formation of the newly named Immigration and Customs Enforcement (ICE) and the Customs and Border Protection (CBP) agencies. Read More

HP (again) shows us how not to do it
HP management has not been good to the company over the last few years. One would have to do a lot of searching to find a management team that has so thoroughly messed up in the court of public opinion. Read More

Microsoft: Stolen SSL certs can't be used to install malware via Windows Update
Microsoft said that a digital certificate stolen from a Dutch company could not be used to force-feed customers malware through its Windows Update service. Read More



SLIDESHOWS

What do top CIOs make?
How high can a senior IT leader ascend in the ranks of a public company? High enough to rank among a company's most highly paid executives. High enough to enjoy perks such as company cars, financial planning services, and access to the corporate jet.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. IPv6: What you need to do now
  2. iPhone5 rumor roll-up for the week ending Sept. 2
  3. Xsigo has a fabric to go up against Cisco, others
  4. 531 spy certs target CIA, Google, Microsoft, Mozilla
  5. HP's trusty 12c financial calculator turns 30
  6. 10 ways to enhance Google+
  7. Juniper, like Cisco, may cut staff
  8. Age bias in IT: The reality behind the rumors
  9. FAA slaps $175,000 fine on MIT for batteries that caught fire at FedEx
  10. Microsoft's 5 biggest weaknesses

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: