Search This Blog

Wednesday, November 04, 2009

Centrify takes to the cloud

Microsoft re-patches last month's critical IE update; Worms back at top of Microsoft threat list
Network World logo

Security: Identity Management Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by TippingPoint
rule

Identity Management E Guide
Identity management cannot be ignored – it is the key to preventing data breaches. This Network World Executive Guide provides in-depth information on today's most pressing security issues.

Read More

rule

Spotlight Story
Centrify takes to the cloud

Centrify announced last week that it has added Ubuntu 9.10 Server Edition to the long list of non-Windows operating systems whose authentication it has integrated with Active Directory. It has supported Ubuntu for quite some time, but what really exited the Centrify folk was the fact that this version of Ubuntu includes an open source cloud computing environment that can be easily integrated with Active Directory through the Centrify Suite for identity, access and privilege management. Read full story

Related News:

Microsoft re-patches last month's critical IE update
Microsoft on Monday re-patched Internet Explorer, the third time it's been forced to repair one of the updates delivered in its largest-ever bug fix, which was delivered on Oct. 13.

Worms back at top of Microsoft threat list
Long dismissed as a security scare of the past, Internet worms appear to have made a strong comeback, jumping to take the top two places on Microsoft's latest threat list.

ArcSight adds unstructured log analysis with Logger 4
Event management vendor ArcSight will soon start selling a new version of its product, designed to mine unstructured computer logfiles for signs of hacking or illegal activity.

Security platform tracks net access, policies
Bradford Networks is introducing Network Sentry, a hardware/software package that enahnces its established network access control gear to include tracking of gear and access applying policies dynamically.

Hackers exploit Google Wave's popularity
Hackers are exploiting web users that were too late in signing up for Google Wave, says Symantec.

eBay phishing scam scariest email blunder of 2009
The eBay email fraud campaign, which took place in May this year, and aimed to get users of the online auction site to disclose their bank details has been named this year's scariest email blunder by Proofpoint.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Why the Branch Office No Longer Needs IT
Is your business ready for managed services? Can you mitigate the potential risk and loss of data for access to business information and applications? What services should you consider outsourcing to a managed services provider and what can you do to mitigate the potential for loss? This webcast will address the current state of the market for branch office focused managed services and provide insights and considerations into managed services that you should be considering.
Click here to learn more.


Implementing Best Practices for Web 2.0 Security
Web 2.0 has ushered in a new era in how organizations communicate and do business. Learn the top 10 best Security practices to consider for getting the most from Web 2.0 with minimal risk.
Download it today!

 

November 04, 2009

MOST-READ STORIES

  1. Microsoft takes shot at Google Apps
  2. Tone-deaf Unisys official on why cloud computing rocks
  3. The Cisco squeeze
  4. After one year, Conficker infects 7 million computers
  5. Verizon Droid FAQ: What we know so far
  6. These 12 gadgets let you cut the cord for good
  7. Cisco's data center guru talks direction, strategy
  8. Sprint launches netbook deal, expands WiMAX coverage
  9. IPhone cellular unlock promised by hacker this week
  10. Cisco lays out why it might let Tandberg go free

When Pressing the Send Button Results In Compliance Violations
Protecting confidential data is serious business. Failure may result in fat fines and even jail time - not to mention damage to your brand. WatchGuard's easy-to-use, all-inclusive email and web secure content and threat prevention appliances offer a complete data protection solution.
Click here.



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: