Tuesday, October 06, 2009

Review: HP blade takes a stab at Cisco

HP security blade scores impressive performance results for UDP traffic; New Firefox security technology blocks Web attacks, Mozilla claims
Network World logo

Security Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Oracle
rule

Consolidation, Compression, Performance
Live: Thursday, October 8, 2009 at 2:00pm ET/ 11:00am PT. Join us for our upcoming Webcast on Oracle Database 11g Release 2. We will discuss how to; consolidate on low-cost servers and storage grids, compress data for reduced storage and faster performance, and control costs throughout the data center.

Register today.

rule

Spotlight Story
Review: HP blade takes a stab at Cisco

HP has an alternative to the many security appliances that combine firewall, intrusion detection and VPN functions: Just put a single blade in the vendor's ProCurve switch and be done with it. Read full story

Related News:

HP security blade scores impressive performance results for UDP traffic
Want to get the highest possible performance out of your security device? Make sure it only handles connectionless UDP traffic – the stuff that, according to studies from CAIDA and other sources – makes up less than 5 percent of traffic on Internet backbones.

New Firefox security technology blocks Web attacks, Mozilla claims
Mozilla has released a test build of Firefox that adds new technology, dubbed "Content Security Policy," that's designed to stymie most Web-based attacks, the browser maker said.

Lockheed gets $31M to bolt down military network security
In its ongoing effort to tighten the security around military networks, the Defense Advanced Research Projects Agency today gave Lockheed Martin $31 million to work on its advanced network project.

Protection, Meet Racket
Right now, it is very straightforward — if you publish on Android Market, your application will be made available for free download outside of the Market. This appears to hold true regardless of whether or not you are using the built-in Android Market copy protection mechanisms, which have been demonstrated to be ineffective.

Hacker leaks thousands of Hotmail passwords, says site
More than 10,000 usernames and passwords for Windows Live Hotmail accounts were leaked online late last week, according to a report by Neowin.net.

How to stop IT managers from going rogue
Nearly half of all data breaches come from inside an organization, which is why industry watchers say enterprise IT departments need to invest in technology that ensures no one person has all the power.

Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


Are netbooks ready for the enterprise?
NetbooksFive reasons to deploy netbooks and five reasons not to.

Demo's biggest stars ever
Demo1,500 innovators have presented at Demo. Here are the best.

NetScaler VPX: Harness the Power of Virtualized Web App Delivery
Want to make your Web app delivery more flexible, dynamic and cost effective? Then attend this exclusive technical seminar which shows you how Citrix NetScaler VPX - a virtualized app delivery controller appliance - can improve your network infrastructure by offering: increased physical, functional, and operational flexibility for delivery of all of your Web apps and more.
Click here to register today.


Sophos Security Solution Center
With the threat landscape constantly changing, you need to have comprehensive protection that isn't complicated. With Sophos, you get complete protection for less investment. You get best-in-class threat protection, and data security and compliance that are simple and affordable so you can get more out of your existing security budget. Review timely resources at this Solution Center.
Visit this site today!

 

October 06, 2009

MOST-READ STORIES

  1. Apple may take Woolworths to court over similar logo
  2. Good and wicked cool mobile, wireless companies to watch
  3. Ig Nobels honor Tequila diamonds, bra that converts to gas mask
  4. FBI warns of social networking fraud, malware escalation
  5. Cisco's struggle to move TelePresence down market prompts buyout
  6. Cisco releases IOS 15.0
  7. Microsoft turning configuration management "on its side"
  8. Vonage apps brings VoIP to BlackBerry and iPhone
  9. Verizon CTO: 'We told you so' about FiOS
  10. ICANN studies secretive domain owners

Addressing Web Threats
Recent research among senior IT managers reveals that, although organizations are taking steps to protect against Web-related threats to the enterprise, significant vulnerabilities still exist. This white paper provides specific considerations for addressing Web security liabilities.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment