Search This Blog

Wednesday, September 04, 2013

What to look for when evaluating password manager software

VMworld 2013: Gigamon's 'visibility-as-a-service' and the risk of virtual networks | Top 6 Microsoft insider CEO candidates

Network World Security

Forward this to a Friend >>>


What to look for when evaluating password manager software
Here are the significant issues that can distinguish one password manager product from another. You'll probably make a similar list of requirements as you do your own research for password managers. Read More


WHITE PAPER: IBM

Security First Insurance
Using IBM Content Analytics and ECM software, the insurer enhances service to policyholders no matter which channels they use to get in touch. Learn More.

WHITE PAPER: HP and Intel® Xeon® processors

HP StoreOnce with Symantec Backup Solutions
This paper looks specifically at the considerations and benefits achievable when an organization deploys data protection architectures powered by HP StoreOnce appliances and Catalyst APIs with Symantec OpenStorage Technology (OST). Learn More

VMworld 2013: Gigamon's 'visibility-as-a-service' and the risk of virtual networks
During last week's VMworld event, traffic visibility leader Gigamon debuted what it is calling "Visibility as a Service," or VaaS. Network visibility was a big theme at VMworld this year as VMware launched its NSX network virtualization product. During his keynote, VMware CEO Pat Gelsinger stated that the network is the next IT domain to be impacted by virtualization and, in fact, it's the limitations... Read More

Top 6 Microsoft insider CEO candidates
There are at least six internal candidates to replace retiring Steve Ballmer Read More


WHITE PAPER: HP

Big Security for Big Data
The multitude of devices, users, and generated traffic all combine to create a proliferation of data that is being created with incredible volume, velocity, and variety. As a result, organizations need a way to protect, utilize, and gain real-time insight from "big data." So, how do you get started? Learn More

Is it time to start hacking the hackers?
In the light of unprecedented attacks by cybercriminals against businesses that span every industry, this question has come to the fore: Is it time to fight back? Read More

Best tools for protecting passwords
Passwords are a security weak link, but these products help shield passwords from attackers Read More


WHITE PAPER: F5 Networks

Moving Beyond MDM with BYOD 2.0
This paper examines how BYOD 2.0 builds on the BYOD 1.0 foundation but makes a substantial shift from a device-level focus to an application-level focus to reduce overhead and unburden IT by allowing them to concern themselves only with the enterprise data and applications they need to secure, manage, and control. Learn More

4 billion call records added daily to AT&T database for DEA phone surveillance
If you don't like that the NSA stores phone data for five years, then you definitely won't appreciate that the DEA has data on phone calls from as far back as 1987. You can thank AT&T for that as the telecom giant is paid by the government to have its employees work on the Hemisphere Project next to law enforcement agents in government offices. It gives new meaning to the "rethink possible" marketing... Read More

NIST subjects draft cybersecurity framework to more public scrutiny
Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is rapidly developing a set of guidelines and best practices to help organizations better secure their IT systems. Read More

Many major brand mobile apps not secure on Android, says study
In a study on mobile applications and their level of security, RIIS, LLC, a firm that specializes in mobile app development, said that some of the nation's top brands, including airlines, retail outlets, entertainment companies, and insurance companies, are producing applications for Android that place users and their personal information at risk. Read More


SLIDESHOWS

Top tech hoarders: 15 companies with huge cash piles

Apple, Microsoft, Google and Cisco are flush with cash, and so are many other tech companies.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Microsoft to acquire Nokia's mobile phone business

2. Cisco responds to VMware's NSX launch, allegiances

3. Jealous much? 8 techy things that can spark office envy

4. Facebook legal skirmish highlights user privacy risks

5. 10 sorriest technology companies of 2013

6. 12 terrific new updates in VMware vSphere 5.5

7. Microsoft ends top Masters certification exams for IT pros

8. Tech's cash kings are sitting on billions

9. 5 things you need to know about geofencing

10. 10 overhyped tech products that crashed and burned


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: