Search This Blog

Wednesday, September 14, 2011

Stupid, arrogant and greedy

Consumer devices create security, management headaches for IT | SAP adds security, management for app stores

Network World Security: Identity Management

Forward this to a Friend >>>


Stupid, arrogant and greedy
Kenneth P. Weiss founded Security Dynamics in 1984, served as CEO until 1986 and remained chairman of the board and CTO until 1996. Under his watch the company developed the SecurID token. Once the SecurID's potential was recognized by both customers and investors, Weiss set out to expand his company, and he initiated the purchase in 1993 of RSA, a small, fledgling encryption company that was gaining some notoriety in the field of Internet commerce security. Read More


WHITE PAPER: Citrix

21st Century Security: Increase 2048 SSL Processing Times
Step up to 21st century security with 2048-bit RSA encryption keys while maintaining SSL transaction performance. Citrix NetScaler uses multiple SSL chips enabled by Citrix nCore architecture to boost SSL transaction rates with 2048-bit keys by five times. Download the free white paper for details. Read now

WEBCAST: Cymphonix

Gain Complete Control Over Internet Bound Traffic
The Cymphonix Network Composer is the only network appliance that provides comprehensive clarity into all internet bound network traffic and simply powerful tools to manage that traffic with a holistic approach. Learn More Today!

Consumer devices create security, management headaches for IT
It seems the debate about whether or not employees will be allowed to use personal devices for work purposes is over; the practice is already rampant, according to new research. In a survey of 741 IT professionals, 87% said the employees at their companies are using personal devices for work purposes. But that doesn't mean IT is happy about it. Among survey respondents, 82% said they're concerned about... Read More

SAP adds security, management for app stores
SAP customers looking to open iTunes-like enterprise app stores through Apple's Volume Purchase Program (VPP) will soon have the ability to manage and deploy the software securely thanks to new VPP support in the Sybase Afaria platform, SAP said Tuesday at the Tech Ed conference in Las Vegas. Read More


WHITE PAPER: Cisco Systems

Video Collaboration Guide
Did you know that more than half of communication efficiency is determined by nonverbal cues—namely tone of voice and body language? Read now!

US needs to kick network security intelligence up a notch
There is an urgent need for businesses and our government to develop high-level cyber-intelligence as a way to combat the unacceptable levels of online security threats because the current "patch and pray" system won't cut it in the future. Read More

Security pros come clean at Summit on Advanced Persistent Threats
Put about 100 chief information security officers, CIOs and CEOs into a room and what they are willing share about cybersecurity just might surprise you. More information about just what they shared will be revealed soon in a report stemming from a closed-door Summit on Advanced Persistent Threats held in Washington, D.C., in July, where business and government security professionals acknowledged to each other that their organizations had either been hacked through stealthy infiltration to steal valuable sensitive information and intellectual property, or that they wouldn't know it if it had been. Read More


WHITE PAPER: Enterasys Networks

Humanize the enterprise: Follow your Network
Have you seen the future of accessible and secure network management? Meet isaac, the industry's first social media interface that connects your IT network with your social network. Now your network can speak directly to you — in your terms, in your language. Learn more

US plan fires up gigabit application development for ultrafast networks
The US government and the National Science Foundation have announced a plan they say will go a long way toward building applications that can take advantage of ultrafast broadband networks. Read More

Cleversafe enhances ultra-secure cloud storage platform
Cleversafe, a cloud storage vendor that distributes data through the cloud, announced enhancements to its Cleversafe platform that make it more reliable and scalable for companies that are managing large collections of unstructured data for business analytics. Read More

App stores should cooperate to improve smartphone security
App store vendors need to collaborate more closely to keep smartphone users safe, including putting together a system for grading application security, according to E.U. cybersecurity agency ENISA. Read More



SLIDESHOWS

Cloud companies to watch: A product sampler
Our Cloud Companies to Watch story gives you the lowdown on a handful of startups looking to make their mark in a business so far dominated by the likes of Amazon, Google, Rackspace and VMware. Here's a closer look at some of the products and services being rolled out by these newcomers.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. Cisco unveils routers, takes swipe at Juniper
  2. You might be a terrorist if you take a photo at Mall of America
  3. 7 hot cloud companies to watch
  4. iPhone 5 rumor rollup for the week ending Sept. 9
  5. Inside Cisco's global security operations
  6. Cisco's new aggression
  7. Want a job? These 10 tech firms are hiring
  8. HP introduces new enterprise security software
  9. Windows 8: A visual tour of what we now know
  10. 2010's IT companies to watch: Where are they now?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: