Search This Blog

Wednesday, July 18, 2012

For BYOD Best Practices, Secure Data, Not Devices

Shopaholic Cisco buys Virtuata | How to Build a Data Protection Plan That Ensures Application Recovery

Network World Security

Forward this to a Friend >>>


For BYOD Best Practices, Secure Data, Not Devices
IT organizations are justifiably concerned about the security risks inherent in bringing your own device (BYOD). Many are turning to mobile device management (MDM) products and services to address the problem. But a number of mobile security vendors believe organizations are focusing the device when they should be focusing on the data. Read More


RESOURCE COMPLIMENTS OF: Sparqlight

Get Work Done! - Free Enterprise Social Workflow
Sparqlight, the Enterprise Social Workflow Application, is a smart, simple and better way to measure, improve and get work done. Now any enterprise can deploy social workflow to every person and every system in your organization. That's powerful, that's revolutionary, that's getting work done. #GETWORKDONE

RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant remote support with LogMeIn Rescue
With LogMeIn Rescue, you can start a support session in just 60 seconds. Connect 24/7 to PCs, Macs, smartphones and tablets. You'll get in, solve the problem and save the day without ever leaving your desk. Try it free today.

Shopaholic Cisco buys Virtuata
Cisco added to its long list of acquisitions after recently plucking off Silicon Valley-based Virtuata. Virtuata is a provider of virtual machine and cloud security and will be incorporated into Cisco's data center group, which is run by former Q-Fabric chief David Yen. No financial details were given but the company only has 15 people, so it's likely to be a relatively small deal for Cisco. Read More


WHITE PAPER: McAfee

Risk and Compliance Outlook Report 2012
McAfee retained Evalueserve to conduct an independent assessment of the factors organizations that use risk and compliance products face in 2012. Learn more.

How to Build a Data Protection Plan That Ensures Application Recovery
When it comes to data protection, organizations are demanding faster recovery times than ever before. Achieving rapid recovery requires a plan that focuses on applications, not just data and servers. Read More


WHITE PAPER: Fluke Networks

Maintain Fiber Network Health
This white paper helps fiber installers and network technicians understand the key parameters for selecting an OTDR. Choosing the right device not only solves this new generation of datacenter testing requirements, but also helps professionals work efficiently, and increase the reliability and value of the enterprise fiber network. Learn More!

Cloud WAN optimizer Aryaka looks to expand
Aryaka, a WAN optimization startup that relies on cloud-based technology, announced today that it has finished a $25 million series C venture funding round and plans to add security. Read More



SLIDESHOWS

9 itsy-bitsy, teeny-weenie computers
Here are eight products, and a project in development, that are leading the effort to make PCs small enough to slip into your pocket.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 'Not cool, guys' -- Torvalds bemoans size of RC7 for Linux kernel Version 3.5
  2. Hey Sprint LTE phone owners: Carrier now has a 4G network for some of you
  3. Microsoft reveals 'magical' new Office 2013
  4. 10 new features of Microsoft Office 2013
  5. Artificial intelligence becoming fantasy football reality
  6. HOPE 9: Whistleblower Binney says the NSA has dossiers on nearly every U.S. citizen
  7. Nielsen: Android nears 52% of market share of U.S. smartphones
  8. Gartner: cloud putting crimp in traditional software, hardware sales
  9. 9 itsy-bitsy, teeny-weenie computers
  10. The worst security snafus of 2012

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: