Search This Blog

Monday, November 23, 2009

Cisco Network Security Survival Guide

Cisco iPhone app tracks security; What's Next for Brocade?
Network World logo

Cisco Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Fluke Networks
rule

3 Tips to Get Out of Firefighting Mode
Join Enterprise Management Associates (EMA) for this webcast on how to become more proactive with network and application management. EMA offers guidance on how to pick a pilot project to demonstrate immediate success as well as tips on how to lengthen MTBF and shorten MTTR.

Click here to get all the details now!

rule

Spotlight Story
Cisco Network Security Survival Guide

Get the real scoop of what Cisco's new term borderless networks is all about, learn how to use some of the mainstream hacking tools, and understand how you can use what you probably already have to better defend your network. Cisco's techwise TV show just released a new video that I thought was worth mentioning. Here is their description; "The idea was to really narrow down the control points that... Read full story

Related News:

Cisco iPhone app tracks security
Colleague Ellen Messmer has a story this week on a new iPhone application from Cisco that can be used to receive more than a dozen security-related information feeds pertaining to Cisco products and general security topics. The application is free too, Messmer reports.

What's Next for Brocade?
I never really believed the rumors about HP buying Brocade. No disrespect to Brocade, I just thought that HP's interest was really in Ethernet and IP networking and not Fibre Channel. Will another company acquire Brocade? I can't think of any obvious takers. The financial analyst rumor that Juniper would buy Brocade were ridiculous and obviously spread by someone who doesn't know Juniper. IBM...

Telepresence Comes of Age
Half of companies are deploying or planning to evaluating telepresence. Typical deployments are limited; only a handful of rooms located in large office locations. But with the mean price of a room deployment hovering around $250,000, plus on-going costs for bandwidth and management, how can organizations justify such an expense, especially in light of shrinking or flat IT budgets? The answer is...

Juniper steals spotlight from Cisco again with second flavor of 100G Ethernet
In the jostling to grab the headlines for next-gen 100Gbps Ethernet, Juniper this week unveiled its second offering: a 10x10G Ethernet physical interface card (PIC) for its T1600 core router.

How much revenue growth did Cisco really earn from Flip and TelePresence?
Lately, I've been trying to put into perspective the "dollar amount success" for 2 of Cisco's much ballyhooed products, the Flip video camcorder and the Cisco TelePresence video solution. Since I don't have any inside information on which to make dollar amount conclusions, I've had to rely totally on what Cisco has made available to the public, for instance, during Cisco's F1Q10 earnings call, John...

100G Ethernet cheat sheet
With enterprises and carriers moving beyond 1G and 10G Ethernet to 40G and 100G Ethernet, we thought it might be handy to bundle up our most recent coverage of high-speed Ethernet in one tidy package.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

The Executive Guide to Data Loss Prevention
Independent, objective research that examines the business justification for implementing DLP solutions and outlines the resource requirements to successfully deploy DLP in an enterprise. Data loss prevention (DLP) technology has never been more important. To that end, we've developed tools to help guide organizations considering DLP technologies.
Read more.


 

November 23, 2009

MOST-READ STORIES

  1. New attack fells Internet Explorer
  2. Steve Jobs is a man of a few words
  3. Oddball gifts for uber geeks
  4. Global warming research exposed after hack
  5. Google adding IPv6 to YouTube
  6. The 5 best, and 5 worst, features of Google Chrome OS
  7. Cisco's free iPhone apps grabs security feeds
  8. Microsoft Windows chief decries standards grandstanding
  9. Federal government using PS3 to crack pedophile passwords
  10. Top 10 free Windows tools for IT pros, at a glance

Improve Data Center Monitoring and Management with BSM and ITIL
Older generation monitoring products are not able to unify fault/event, performance management and BSM all within one system. This gap forces IT to deploy and integrate multiple systems in order to get an end-to-end view. Read this white paper to learn about a streamlined approach that goes beyond measuring the technical performance of servers and network nodes and provides real-time visibility into the business impact of specific service problems.
Learn more!



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: