Search This Blog

Friday, May 09, 2014

Cisco, EMC joint venture charts growth

The Emerging Cybersecurity Software Architecture | Check Point: 'Unknown malware' hits enterprise nets 53 times a day

Network World Cisco

Forward this to a Friend >>>


Cisco, EMC joint venture charts growth
The VCE converged infrastructure joint venture between EMC and Cisco said this week it surpassed its goal of generating $1 billion in sales in 2013. VCE also said it is on a $1.8 billion annualized demand run rate coming out of 2013. Read More


WHITE PAPER: Dell and Intel

The Dell Advantage: What You Don't Know about Dell
These "fast facts" demonstrate Dell's industry leadership, unique design philosophy, and #1 positions in cloud, virtualization, iSCSI and enterprise support, find out how Dell is helping its customers get more from their technology. Learn more!

WHITE PAPER: Network Instruments

Survival Tips for Big Data's Impact on Network Performance
The pressure is on to show tangible value from big data rollouts. Learn how performance monitoring tools can provide network managers and IT administrators insight and visibility into networks, infrastructures and applications far in advance, resulting in smooth transitions, accomplished network managers, and project success. Learn More

The Emerging Cybersecurity Software Architecture
It's been a busy week for the information security industry. FireEye announced the acquisition of nPulse which adds network forensics to its advanced malware detection/response portfolio. IBM chimed in with a new Threat Prevention System that includes an endpoint security client, threat intelligence feeds, and integration with its network security and analytics platforms. Finally, Symantec... Read More

Check Point: 'Unknown malware' hits enterprise nets 53 times a day
Companies were getting hit on average with "unknown malware" around 53 times a day in 2013, according to Check Point's annual analysis of threat data collected from about a thousand enterprise customers. Check Point defines 'unknown malware" as malicious code that exploits a known vulnerability or weakness, but can't be detected at the time of its discovery by up-to-date anti-virus or intrusion-prevention systems. Read More


WHITE PAPER: IBM

The Forrester Wave™: Online Collaboration Software Vendors
This report and associated Excel model highlight the key criteria CIOs and their staffs should evaluate when looking at prospective providers of online collaboration services. Learn More

Quick look: America's first spaceport
Virgin Galactic, SpaceX and others expect the site to be the hub of commercial space operations Read More

Will Wave 2 of 802.11ac minimize Ruckus Wireless' advantage?
The industry is well into the 802.11ac Wave 1 cycle now, with almost every vendor having product available. Now is the time many of us industry watchers start looking ahead at what's next and for Wi-Fi that's 802.11ac Wave 2. Wave 2 brings more bandwidth, in theory a little over 3.5 Gig; a remarkable speed for Wi-Fi. Read More


WHITE PAPER: Sophos, Inc.

Endpoint Buyer's Guide
Evaluating the many components that make up an endpoint security solution may seem overwhelming. Get independent research and test results to help you determine your requirements and identify the vendor that best meets your needs. Learn More

Inside United Airlines' nerve center
When Tracy Lee talks about the weather he's not just making idle conversation. Read More

Internet shocker - online recommendations that you can believe
Read More


SLIDESHOWS

7 cool free open source projects you need to check out

The free open source world continues to expand at a phenomenal pace.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Worst of DRM set to infest physical law school casebooks

2. 10 nerdiest Linux gadgets

3. 7 in 10 office workers barely use Microsoft Office anymore

4. Inside United Airlines' nerve center

5. Microsoft calls out malicious downloaders

6. The day the AV died

7. Adobe Voice video app focuses on narration

8. FBI: "Sky was the limit" for this now jailed scammer

9. Will Wave 2 of 802.11ac minimize Ruckus Wireless' advantage?

10. Is that Twitter account a bot? Researchers make app to find out


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: