Search This Blog

Friday, March 01, 2013

Hottest products at RSA Conference 2013

  Azure outage births free cert monitoring software | Google privacy chief blasts Microsoft's "Scroogled" campaign at RSA Conference
 
  Network World Compliance

Forward this to a Friend >>>


Hottest products at RSA Conference 2013
Our roundup of new security products on hand at this week's show. Read More


WHITE PAPER: Ixia Anue

The Evolving Visibility Challenge
Network monitoring has become more complex over the last few years, due in large part to virtualization and convergence. Learn how a state-of-the-art monitoring system that maximizes your existing monitoring tool investment can help you attain greater visibility into your network without adding complexity. Say goodbye to virtual blind spots. Learn More

WHITE PAPER: Cisco Systems

Winning Strategies for Omnichannel Banking
Research reveals new ways for banks to prosper. Customers are ready for omnichannel experiences. Respond now-learn how to manage the transition to omnichannel banking and reap the rewards of delivering innovative services. Read Now

Azure outage births free cert monitoring software
Cloud crash made Stackify mad as hell, so it did something about it Read More

Google privacy chief blasts Microsoft's "Scroogled" campaign at RSA Conference
You know people are sensitive about their online privacy when Microsoft seeks advantage over Google by running TV ads that claim anyone using services like gmail gets "scroogled" because Google sells keyword and behavior data to marketers. Read More

INSIDER
NBA Team Rebounds From IT Disaster
After Katrina, the New Orleans Hornets built a stronger disaster-recovery operation: a hot site with a diesel engine big enough to 'power a locomotive.' Read More

RSA: IT security managers skeptical on Big Data Security proposition
While "Big Data Security" is now the industry buzzword and defines a way to get enterprise customers into a new method of threat detection based on mining massive amounts of security-event and business data to pinpoint threats, the response from a few IT shops seems to be"thanks, but no thanks." Read More


WHITE PAPER: Cisco

Forrester: Defining the Next-Generation Workspace
How will you meet the needs of a mobile workforce? In this Forrester study, discover approaches to BYOD and desktop virtualization. Learn why Cisco Unified Workspace may be the solution for your mobility, virtualization, and security challenges. Read Now

Top 10 security startups at RSA
Read More

FTC moves against mobile device makers over security
While targeting HTC, move seen as warning to all makers who fail to update Android devices in a timely manner Read More

Juniper's "device fingerprinting" security technology gets mixed reviews
Detection and blocking of security threats against organizations often is done through IP address-based methods and reputation services, but Juniper this week launched an effort to encourage security managers to abandon IP-based detection in favor of the "device fingerprinting" its security gear now supports to pinpoint devices used in online attacks. The idea is getting mixed reviews so far. Read More

RSA 2013: Keynotes highlight state of optimism and fear
Sure, things are tough for security pros right now, note keynote speakers. But all is not lost in the war against cybercrime Read More


WHITE PAPER: Netscout Systems Inc.

Good APM Practices Get Results
According to NetForecast's survey, enterprises with application performance management (APM) best practices benchmark scores above six on a ten-point scale experience 75% better results in critical areas. This research paper reveals the survey results as well as discusses the best practices for APM. Learn More.

SMS becoming meaty attraction for spammers
Unlimited messaging plans offer fertile ground for bold junk mail campaigns Read More

McAfee acquires ValidEdge sandboxing technology
McAfee yesterday said it has acquired the ValidEdge anti-malware sandboxing technology from LynuxWorks in order to add a new type of malware detection to its network and endpoint products. The first integration of sandboxing into its product line is expected in the second half of this year. Read More

Zendesk hack a reminder of SaaS risk
Third-party cloud provider hack behind compromised user data from Twitter, Tumblr and Pinterest Read More

25 Most Beastly Robotic Animals
What a zoo! These mechanical creatures run, crawl, swim and fly not much unlike the real things Read More

 
 
 

SLIDESHOWS

10 tech company social media bloopers

Social media blunders are nothing new, and the technology industry is not immune to them.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Sergey Brin says using a smartphone is 'emasculating'

2. Microsoft's Secure Boot, Red Hat request ignites Linus Torvalds' NSFW flame war

3. iPad 5 rumor rollup for the period ending Feb. 27

9. The best office apps for your iPad, round 5

4. 25 most beastly robotic animals

5. 10 network virtualization, SDN and data center companies to watch

6. Juniper Networks tried to sell enterprise assets: report

7. Forrester: 70% of 'private clouds' aren't really clouds at all

8. 9 Linux podcasts you should follow

10. Marissa Mayer: CEO of the year 1955

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: