Search This Blog

Wednesday, April 01, 2015

Google gives Apps admins more control over their files and docs

Network World Network/Systems Management - Newsletter - networkworld.com
Don't be fooled! The fake tech stories you're not going to read about | Detecting advanced threats with user behavior analytics

Network World Network/Systems Management

Google gives Apps admins more control over their files and docs
Google is giving systems admins more control over Apps documents in an attempt to alleviate concerns about securing company data after moving email and productivity software to the cloud. Read More


RESOURCE COMPLIMENTS OF: IoT Stream Conference

Separating Internet of Things Hype from Reality
Join tech leaders at IoT Steam Conference on April 23 to define the Internet of Things (IoT) technology stack and the interoperability requirements that will drive IoT forward. If you're responsible for bringing IoT products to market and want to collaborate hands-on to solve real IoT challenges, this is an event you don't want to miss! Register today to receive $100 off. Discount code: idg-100

WHITE PAPER: Aerohive

WLAN Buyer's Guide
It is crucial to thoroughly understand the systems management capabilities of any WLAN being considered, since this will be the largest ongoing expense of the overall deployment. Learn how to evaluate properly by reading Aerohive's WLAN Definitive Guide. View Now>>

Don't be fooled! The fake tech stories you're not going to read about
Oh, it's that time of year again…It's hard to put too much of your back into what's mostly an online media quibble, given that eastern Massachusetts is finally starting to become visible again as the snow melts, but we'll flex our kvetching muscles here – the tech world does just get awfully pleased with itself on April Fool's Day, doesn't it? Everybody's got to have a clever little gag on their site, a funny prank – or a fake news story. Read More

Detecting advanced threats with user behavior analytics
Day after day, an employee uses legitimate credentials to access corporate systems, from a company office, during business hours. The system remains secure. But suddenly the same credentials are used after midnight to connect to a database server and run queries that this user has never performed before. Is the system still secure? Read More

Why HBO partnered with Apple for HBO Now
During Apple's most recent special event, the company announced that HBO Now, a new HBO service which doesn't require a cable TV subscription, would premiere on Apple TV. Read More


WHITE PAPER: Aerohive

The Network Impact of 802.11ac
This paper discuss two approaches for efficient WLAN design. Both let you integrate 802.11ac into your WLAN and help lay the foundation for future, high-speed technologies. View Now>>

HP hits former Autonomy execs with $5B suit
The UK's Serious Fraud Office may have dropped its investigation of software firm Autonomy earlier this year, but that doesn't appear to have done much to allay HP's ire. Read More

7 principles of data-driven transformation
Harnessing information so that your organization can become data-driven is no simple task. You need to be able to rapidly assimilate, integrate and analyze your data — existing internal data and the growing stream of big data from new internal and external sources — and turn it into insights that you can act upon at the point of action. Read More

Tanium's fast-acting endpoint management tool grows up
A tool for nearly real-time management of clients like desktops, laptops and Windows tablets is now set to take on massive organizations that have millions of endpoints.Tanium is software that can examine and modify all such clients across an enterprise within 15 seconds, according to the company. Read More


WEBCAST: Aerohive

Gigabit Speed Wireless Networks with 802.11ac
With the development of 802.11ac, WLANs surpass the gigabit speed barrier. Watch this webinar recording featuring author of "802.11ac: A Survival Guide" (O'Reily), Matthew Gast, for a discussion on 802.11ac and why it's posed to become the 802.11 standard of choice and how to incorporate it into your network plans. View now>>

New malware program used in attacks against energy sector companies
A new malware program is being used to do reconnaissance for targeted attacks against companies in the energy sector. Read More

Verizon subscribers can now opt out of 'supercookies'
Verizon customers can now opt out of having a unique identifier placed on their phones that critics have labelled a 'supercookie' because it's almost impossible to remove. Read More

Thousands call on Congress to overturn net neutrality rules
Opponents of the U.S. Federal Communications Commission's new net neutrality rules aren't giving up, with a conservative advocacy group saying it has collected more than 540,000 signatures on a petition asking Congress to overturn the agency's action. Read More


SLIDESHOWS

Meet the White House's new open source-happy IT director

"First Geek" David Recordon comes from Facebook, open standards world.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 'Largest DDoS attack' in GitHub's history targets anticensorship projects

2. Acer Chromebook 15 review: Massive display, with mixed results overall

3. Linus Torvalds suspends key Linux developer

4. NAC is back. And better than ever

5. 9 security gadgets for mobile devices

6. SDN management battle: TAPs vs. network packet

7. Review: Portnox, Extreme lead NAC pack

8. Microsoft adds MDM capabilities to Office 365

9. 9 Common Spanning Tree Mistakes

10. 8 free Wi-Fi stumbling and surveying tools


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: