Search This Blog

Tuesday, May 14, 2013

Verizon Enterprise Solutions chief: 'We build infrastructure at scale'

US government is 'biggest buyer' of zero-day vulnerabilities, claims report | Will entering your ATM PIN in reverse summon the police?

Network World Security

Forward this to a Friend >>>


Verizon Enterprise Solutions chief: 'We build infrastructure at scale'
In the battle for the next generation of enterprise IT, John Stratton carries a lot of weapons. Stratton is president of Verizon Enterprise Solutions, the nearly $30 billion unit formed just over a year ago to deliver networking, cloud, mobility, managed security, telematics and a host of other services in a more coordinated fashion for Verizon's top enterprise buyers. Building on a traditionally strong base of wired and wireless network services, Verizon Enterprise also blends in acquired assets like cloud hosting company Terremark, security company Cybertrust and Hughes Telematics. In this installment of the IDG Enterprise CEO Interview Series, Stratton spoke with Chief Content Officer John Gallant about Verizon Enterprise's progress since its inception, including a dramatic streamlining of internal systems and processes designed to make life much easier for the company's customers. Stratton also discussed the company's suite of services aimed at simplifying life for IT teams struggling with mobility and the influx of consumer devices, and he talked candidly about the prospects for a third mobile platform to rival Apple's iOS and Google's Android. He also talked about how cloud is reshaping the IT landscape and hinted at a series of major upcoming cloud announcements from Verizon Enterprise. Also, he explained how the "Internet of Things" is creating powerful new business opportunities for Verizon and its enterprise customers. Read More


WHITE PAPER: F5

Vital Security Strategies for Microsoft Exchange
The demand for access to email anytime, anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn about vital security requirements every Exchange environment should have in place to improve security and availability for Exchange. Read Now.

WHITE PAPER: Raritan Inc

The Distributed Enterprise: Remote Access and IT Management
For IT managers, remote offices can cause any number of headaches. Fortunately, Raritan offers solutions to help manage remote office control, security and budgetary issues. This white paper examines and analyzes the increases in uptime and security provided by out-of-band access and control tools. Learn more.

US government is 'biggest buyer' of zero-day vulnerabilities, claims report
When it comes to exploiting zero-days for cyberweapons and cyber-spying, China's not the only "devil" . . . Read More

Will entering your ATM PIN in reverse summon the police?
Before escaping his captors on foot, the man who was carjacked by the Boston Marathon bombing suspects was forced at gunpoint to withdraw money from an ATM. Had he possessed the knowledge and presence of mind to enter his PIN in reverse, some believe, the machine would have automatically notified the police that he was doing so under duress and officers would have been dispatched. Read More


WHITE PAPER: SAP

Best Practices for a Mobility Center of Excellence
As adoption of mobile technology across the enterprise continues at a rapid pace, IT organizations are trying to deal with a set of unique mobility challenges. By embracing a mobility center of excellence, you can not only accelerate deployment within your organization, but also minimize redundant efforts to maximize success. Learn More

Lookout will intercept privacy-invading mobile ad networks, apps
Mobile security vendor Lookout plans to start flagging as adware mobile apps that use aggressive ad networks if they don't obtain explicit consent from users before engaging in behavior that potentially invades privacy. Read More

Using security skills for charitable cause
Back in 2007 Johnny Long came to a fork in the road. An accomplished IT security pro with 13 years working at one of the big names, he had a great career and family, but he didn't feel fulfilled. And he had no idea why not. Read More


WHITE PAPER: Tripwire

SANS Secure Configuration Management Demystified
Security experts and analysts agree that a systematic, enterprise-wide program of secure configuration management is one of the most beneficial security solutions you can implement. It provides an objective, concise measure of your overall security posture. Learn More

What's old is new again: Spammers revived old schemes in March quarter
Spammers revived some old scams during the first three months of 2013, according to Kaspersky Lab, but spam volumes remained flat. Read More

BYOD Policy: Employee Right to Social Media Privacy Is Paramount
BYOD guidelines are just being defined, but one warning must rise above the din: never, ever, try to gain unauthorized access to an employee's private social networking site. Read More

Bank security weaknesses led to cyber looting of $45M from ATMs
Alberto Yusi Lajud Pena, found dead in the Dominican Republic two weeks ago, was the leader of the New York cell of an international gang of cyber thieves that authorities allege stole a staggering $45 million from ATM machines around the world. Read More



SLIDESHOWS

Sun's stars: Where are they now?

One of the brightest lights in Silicon Valley for more than two decades.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. iPhone rumor rollup for the week ending May 10

2. Smartphones driving violent crime across U.S.

3. Boston dumps Microsoft Exchange for Google Apps

10. Understanding Software Defined Networking

9. Google's five-year plan for authentication: It's complicated

6. 10 more of the world's coolest data centers

5. Why Microsoft won't charge for Windows 'Blue' & this time

4. IT pros leave money on the table, job site finds

7. Nothing funny about how The Onion got hacked

8. Thoughts from Interop 2013: The network has never been more important


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: