Wednesday, September 02, 2009

Data leakage prevention going mainstream; Military set to lay out $42M to develop advanced network prioritization, security technology

Data leakage prevention going mainstream; Military set to lay out $42M to develop advanced network prioritization, security technology
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile


Sponsored by Qwest
rule

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.

Read More

rule

Spotlight Story
No vacation from identity

Last week I was talking about the definition of identity. And when that subject comes up it almost invariably starts a discussion of names and their relationship to identity. There's nothing special about names, though -- they're just the values attached to some of the attributes (first name, last name, middle name/initial, surname, christian name, patronymic and so on) of our identity but aren't necessary for identifying someone within a given context. Read full story

Related News:

Data leakage prevention going mainstream
Data leakage or data loss prevention systems have gradually entered the mainstream as their increasing maturity has allowed increasing adoption. From barely registering in our research two years ago, we now find different forms of DLP in about one-third of enterprises in Nemertes Research's spring 2009 benchmark study.

Military set to lay out $42M to develop advanced network prioritization, security technology
BBN, which was bought by defense giant Raytheon today, got almost $11 million to help build self-configuring network technology that would identify traffic, let the network infrastructure prioritize it down to the end user, reallocate bandwidth between users or classes of users, and automatically make quality of service decisions.

VMware publishes virtualization security, compliance guidelines
VMware today published security and compliance recommendations for its virtualization products. The vendor's guidelines focus primarily on optimizing use of management and security tools available from VMware parent company EMC and EMC's RSA security division.

Catbird reports whether cloud security meets compliance standards
Catbird is adding a feature to its security platform that gives cloud users a reading on how well their data use complies with specific regulatory requirements.

Symantec warning: Spam targeting your achy breaky heart
The information security gurus at Symantec Corporation have seen it fit to warn us all that spammers are now looking to con troubled lovers into parting with their personal information, at the very least, in return for a reversal of fortunes in their relationships. The company issued a five-point advisory for consumers to Computerworld Singapore on Tuesday, September 1, 2009:

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Live Security Panel - Sept. 29
Presented by: CIO, Computerworld, CSO, InfoWorld & Network World -- Security Directions: A Virtual Conference Protecting Your Enterprise in a Dynamic Infrastructure Date: September 29, 2009 Time: 9:30am - 6:30pm Join us on Sept. 29th for a live virtual event that will provide candid, expert information on top security challenges and issues - all from the comfort of your desktop. Register today and you may win the grand prize - a flat screen LCD TV.
Register Now!


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

September 02, 2009

TOP STORIES | MOST DUGG STORIES

  1. Wi-Fi encryption cracked in 60 seconds
  2. 12 cool ways to donate your PC's spare processing power
  3. Developer denies software to beat Chinese censors is malicious
  4. 15 smartphone apps you shouldn't live without
  5. Only 13% of Wikipedia contributors are women
  6. The ABCs of WAN optimization savings
  7. 12 words you can never say in the office
  8. Apple: 'Exploding' iPhones 'not our fault'
  9. Slideshow: VMworld product blitz
  10. Group offers tools to evade China's Web censorship

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment