Search This Blog

Monday, November 26, 2012

Cloud Backlash: You Can't Call The Whole Thing Off

  Making Your WAN a Fast Lane: One Company's Story | Secure Web gateways: slamming the door on malware
 
  Network World IT Best Practices

Forward this to a Friend >>>


Cloud Backlash: You Can't Call The Whole Thing Off
I am privileged to co-chair the SDForum Cloud Services SIG. This SIG, which Tibco graciously hosts in its Silicon Valley facility (directly across the street from VMware's HQ, I might add), is fortunate with its location-it attracts a fascinating range of speakers from innovative startups to large established technology powerhouses, all presenting on their cloud computing products, services, and plans. So I was a bit taken aback at the last meeting, when, during the pre-presentation networking, one attendee told me "I'm starting an anti-cloud company." Read More


RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

WHITE PAPER: Citrix Systems

Best Practices for Implementing 2048-bit SSL
Ready for 2048-bit SSL? Not with F5. Shift to Citrix NetScaler. 2x faster 2048-bit SSL performance. Download the Citrix and Verisign 2048-bit Performance Kit. Learn More

Making Your WAN a Fast Lane: One Company's Story
As associate director at Linklaters, David Bennett is responsible for the WAN and reports into the CIO as the head of (ISS) Information Systems and Strategy development. He shared a case study of the firm's recent WAN revamp with CIO.com Read More


WEBCAST: Silver Peak Systems, Inc.

Easily Achieve Disaster Recovery Objectives with Silver Peak
How Silver Peak Systems ensure recovery point objectives (RPO) are achieved. Gunnersen was amazed by Silver Peak's data mobility performance, price and deployment ease. Learn more.

Secure Web gateways: slamming the door on malware
The Web has become the new security battle front, surpassing even e-mail as the leading source of malware infections. In a recent study, Google found that one in 10 Web sites that it crawled contained a malicious payload. And Gartner Group estimates that 75% of enterprises will be infected this year with targeted malware that evades their traditional defenses. Why? While more than 80% of enterprises have some form of URL filtering in place, less than 15% have any form of deep inspection on Web payloads, resulting in a Web security gap. Read More


WHITE PAPER: CA Technologies

Transforming IT Processes and Culture
Based on market research and case studies, this thought-provoking white paper shows you how innovative IT organizations are launching "overlay teams" to visualize and manage services from a cross-silo perspective. Learn More

10 tips for implementing IPS securely
An intrusion prevention system (IPS) includes all the features of an intrusion detection system but also has the ability to act upon malicious traffic. Since the IPS usually sits in line with network traffic it can shut down attacks, typically by blocking access from the attacker or blocking access to the target. In some cases, the IPS can talk to the firewall to block an attack. Read More

CIO Rebecca Jacoby steers Cisco's IT ship
Running the internal IT operations of Cisco Systems is a big job not just because of the size of the company -- more than 70,000 employees worldwide and a market capitalization in the range of US$100 billion -- but also because Cisco is continually developing new IT products across a broad range of technologies and is known for rapidly adopting those products for its own use. Cisco CIO Rebecca Jacoby spoke with IDG News Service on the sidelines of the NetWork conference last week and shared some insights into the legendary enterprise IT company's own enterprise IT. Read More

'Bring your own services' is the next big thing not to worry about
CIOs often complain that the bring-your-own-device (BYOD) movement is undermining their ability to keep their infrastructure and data secure. Every employee who comes to work with his or her smartphone or tablet and pulls up sales reports, help tickets and other corporate data creates a small hole in the armor companies have spent billions to build. Over time, the argument goes, the holes become a dangerous sieve. Read More

 
 
 

SLIDESHOWS

Be a hero for the holidays
Peruse through Network World's 2012 version of the cool yule tools.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 12 sweet Cyber Monday tech deals
  2. Bye-bye, mouse. Hello, mind control
  3. Tutorial on using Windows 8
  4. School district opts for VDI in computer labs
  5. First look: Firefox 17
  6. .xxx to launch porn search engine
  7. 2013 IT salaries: 15 titles getting the biggest pay raises
  8. Windows XP countdown clock ticks under 500 days
  9. 10 things you can get from Windows 8 that Windows 7 just doesn't have
  10. Symantec spots odd malware designed to corrupt databases
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: