Monday, May 24, 2010

Novell unveils new version of Identity Manager

IBM red-faced after handing out infected USB drives | Firewalls and more tethering

Network World Security: Identity Management

Forward this to a Friend >>>


Novell unveils new version of Identity Manager
Last week Novell brought BrainShare back to Europe after a four year absence. But the gathering in Amsterdam almost didn't happen, as the Icelandic ash cloud closed Amsterdam's Schiphol airport two days before the conference was to begin. I heard lots of stories about people scrambling for ways to get to the city. But it did get going on time and, I'm really happy to say, it looks like Novell is back. Read More


RESOURCE COMPLIMENTS OF: WatchGuard

Compare Major UTM Brands Head to Head
Get the honest facts about UTM network security solutions. This white paper compares the major brands showing just how much performance you get for your dollar. WatchGuard has done the homework for you - compiling published numbers from SonicWall, Cisco, Fortinet and Juniper and providing a straightforward comparison. Download here.

WEBCAST: Oracle

Accelerate Access Governance
The Burton Group's, Kevin Kampman, provides an overview of the latest technology for identity management. Sift through key, mandatory requirements and features and functionality that can wait. There is guidance on how you can get a 360-degree view of users' access and behavior, best practices and a real-world implementation. View Now

IBM red-faced after handing out infected USB drives
Delegates at an Australian security conference got hit by a double dose of malware thanks to IBM Read More

Firewalls and more tethering
Mark Gibbs wrestles with a firewall and cell phone tethering software. Read More


WHITE PAPER: MessageLabs

Ensure 360-Degree Border Security
Managing the security and availability of Web, email, and IM is complex. This paper will discuss the modern threat of blended attacks from web, email and IM. and highlight how a comprehensive hosted solution by Symantec Hosted Services can secure your networks from these threat vectors. Read Now

How managers stopped worrying and learned to trust the cloud
Managers are getting more trusting on cloud security Read More

Social Networks May Be Sharing Your Info with Advertisers
Lately, social networking sites have been bending over backwards to assure their users that user privacy is of utmost importance--but it may have all been in vain, as the Wall Street Journal discovered Thursday that several social networking sites are sharing, with advertisers, information that can be used to identify individuals. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Does Google Have Wi-Fi Data from Your Company?
Google is facing scrutiny and investigation around the world following revelations that it has been capturing and archiving wi-fi data collected by its Google Street View vehicles that drive around capturing the image data used by the Street View service. It is questionable whether Google should have done that, but what is not questionable is whether or not Google should have any data from your wi-fi network. Read More

Oracle buys Secerno to get database firewall
Oracle has bought UK database security startup Secerno for an undisclosed sum, bringing to an end the independence of one of the last decade's most unusual UK-based startups. Read More

A third of over 55s worried about ID theft
More than a third of over 55s say having their ID or bank details stolen is their biggest worry when it comes to the web, says Panda Security. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

Car hackers can kill brakes, engine, and more
Researchers at the University of Washington and UC San Diego have taken a close look at the computer systems used to run today's cars and discovered new ways to hack into them, sometimes with frightening results.

20 Crazy Concept Phones
From snake phones to handsets that look like hockey pucks, these hopelessly impractical devices are the coolest-looking phones you'll never want to own.

MOST-READ STORIES

  1. Steve Jobs: Unimpressed with Google open source video codec
  2. Just when you thought the iPad couldn't be more popular
  3. Google says Google TV coming this fall
  4. Wal-Mart pushing for chip-and-pin payment cards in U.S.
  5. Black duck eggs and other secrets of Chinese hackers
  6. Cisco makes another optical acquisition
  7. I could license you to use this software, but then I'd have to kill you
  8. FTC takes out notorious porn- and botnet-spewing ISP
  9. Just how many radios do you need, anyway?
  10. Google rolls out Android OS upgrade

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment