Search This Blog

Monday, October 12, 2009

Engineers fix the shortcomings of the traditional firewall

Wikileaks plans to make the Web a leakier place; Does Microsoft complicate its licensing on purpose?
Network World logo

IT Best Practices

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by 3COM
rule

Comprehensive NAC
Read this whitepaper on improving endpoint defense, control and visibility through integrated management and enforcement.

Learn more

rule

Spotlight Story
Engineers fix the shortcomings of the traditional firewall

Do you find yourself putting a Band-Aid solution on a legacy firewall, such as strapping on an intrusion-prevention system here or antivirus software there? If the firewall is a security device, why should we have to surround it with other security devices to help it do its job? A group of security engineers addressed those shortcomings with a new kind of firewall built from the ground up. Read full story

Related News:

Wikileaks plans to make the Web a leakier place
Wikileaks.org, the online clearinghouse for leaked documents, is working on a plan to make the Web leakier by enabling newspapers, human rights organizations, criminal investigators and others to embed an "upload a disclosure to me via Wikileaks" form onto their Web sites.

Does Microsoft complicate its licensing on purpose?
Navigating Microsoft's complex rules and programs for software licensing has been notoriously difficult for businesses -- a pain point not lost on the company, which for years has said it is trying to simplify the process for customers.

BI helps New York-area hospitals track, fight H1N1
A New Jersey-based hospital chain is using a BI system to keep track of flu-like instances to help determine whether a swine flu epidemic is approaching.

DOJ tries to step in front of IBM mainframe biz steamroller
IBM's mainframe business has over the years been somewhat of a steamroller, rarely slowing down to take a look at the little things in its way it may have crushed.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Cell towers in disguise
Cell towersSome of the cell towers that dwell among us are cleverly hidden; others, not so much.

The ultimate smartphone
SmartphonesWhat if you could combine the best parts of every phone out there?

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More


Top to Bottom Performance Management Excellence at the City of Chicago
In this featured City of Chicago case study, learn how the City's performance management efforts leveraged BIRT Performance Scorecard to: Save $10 million by improving their management of Overtime through Performance Management, break down departmental silos by facilitating cross-communication and consolidating financial payment processes and unify the performance management efforts of 36 city departments. Attend this web seminar to receive a complimentary copy of the City of Chicago case study.
Click here to register today.

 

October 12, 2009

MOST-READ STORIES

  1. One by one, carriers succumb to Google Voice
  2. Compromised e-maill accounts exploited in fake shopping scam
  3. How dangerous could a hacked robot possibly be?
  4. Six everyday iPhone disasters and how to handle them
  5. Ex-Nortel CEO seeks $12 million from bankrupt company
  6. First Windows 8 details emerge
  7. 7 keys to the ultimate smartphone
  8. Harvard's robotic bees generate high-tech buzz
  9. Cisco extends security controls to 'dark Web'
  10. 15 genius algorithms that aren't boring

Best Practices for Selecting WAN Optimization Solutions
This white paper explains how to best make this critical technology decision. It provides an overview of best practices for defining requirements and comparing alternative solutions. Most important, it offers a metric – performance ROI – that IT organizations can use to select the WAN optimization solution that delivers the greatest business value.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: