Monday, July 26, 2010

How to clamp down on privileged users in a virtualization environment

  How can wireless and wired security be brought together, rationalized and managed? | How to secure and manage employee-owned mobile devices
 
  Network World Network/Systems Management

Forward this to a Friend >>>


How to clamp down on privileged users in a virtualization environment
Management and security, always a troublesome twosome, have reared their ugly heads yet again. This time, they're causing problems for virtualization initiatives, quashing deployment plans while IT managers grapple with how to finesse management and security of the virtual machines moving around the server infrastructure. Read More


WHITE PAPER: HP

ESG: Business Value of Reservationless Storage Capacity
This report explores the value of some exciting new storage technologies which are collectively known as "reservationless storage." ESG Lab hands-on testing of the HP StorageWorks product line and analysis are used to quantify the business value of reservationless storage. Read Now

WHITE PAPER: Novell

Efficiently Delivering Enterprise-Class File-Based Storage
IDC: Read about the exponential growth in file-based storage. Learn how having intelligence on data stored can help storage managers make smarter decisions about data storage, protection, archiving, retention, and disposition. Read Now.

How can wireless and wired security be brought together, rationalized and managed?
Like many things in IT, this security convergence is a work in progress. But as wireless LANs become the primary connectivity for more enterprise users, integrating wired and wireless becomes more pressing, especially around security. Read More

How to secure and manage employee-owned mobile devices
With the rise of personal mobile devices, a growing number of enterprises have scrapped the homogeneity mandate. Instead of requiring employees to use a standard smartphone, more IT departments are now looking at some degree of control over employee-owned (or "employee-liable") devices, to manage and secure them. Read More

When taking stock of performance, beware the benchmarking blues
Done well, benchmarks provide a basis for sound decision making. Yet, badly crafted benchmarks are remarkably common. Even worse, a poorly crafted benchmark can intuitively look like a good one, thereby discouraging a deeper benchmarking evaluation that could deliver superior results. Read More


WEBCAST: Accelops

Why Private Clouds May Prevail
Cloud computing's perceived challenges of security, visibility and management may give the upper hand to private clouds. Join Yankee Group for this Webcast that discusses how to ensure you deploy a cloud that meets your organization's security and compliance needs. View Now

Top 5 myths of disaster recovery
When it comes to disaster recovery, many companies think five 9s of uptime is required, that all data needs the same protection, and that all you need is clustering. Mike Denapoli from Double-Take Software talks with Keith Shaw about these and other myths of disaster recovery in this podcast. (10:42) Read More

Bring your own everything
The "bring your own" craze started with instant messaging but certainly didn't end there. Today employees are bringing the rest of their social network tools to work, their own smartphones, their own computers, and now, with the advent of Google Voice, their own phone number and voice mail. Read More

Manage your IT certifications through a single source
Over the years, you've earned technical certifications from numerous vendors and agencies. There's a new service that helps you manage these certifications through a single Web portal. This clearinghouse aggregates and demonstrates your certifications to employers on one neat transcript. Learn more and join today. Read More


WHITE PAPER: MessageLabs

Employee Web Use and Misuse:
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection. Read Now

Best desktop search tools
Looking for a relatively simple and inexpensive way to improve end user productivity? Desktop search tools can help end users swiftly locate critical nuggets of data, freeing up time for more important tasks. Read More

Desperately seeking desktop data
Six products that can help you quickly dig up that key nugget of information. Read More

Build archiving systems to meet compliance demands
For a viable archiving strategy, you need to know the regulation landscape -- and the key technologies that will help you comply. Read More

The challenges of virtualization
As we have said in multiple newsletters, virtualization changes everything. We are going to use the next two newsletters to describe some of the changes brought on by server virtualization and to describe the project that we are undertaking to drill down further into how virtualization changes the network. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Say what?
Earlier this month, Microsoft's chief operating officer made a statement that sent everyone's jaws a-dropping. "It looks like the iPhone 4 might be their Vista, and I'm OK with that," he said during a keynote speech at the company's annual partner conference. It got me thinking about quotes that have and will go down in history from the industry's most famous executives. Can you guess who made the following statements?

15 summer vacation ideas for geeks
From Star Trek and Space Camp to baseball minutiae, vintage video games, anime, pirates, Harry Potter and They Might Be Giants, there's a vacation option for any type of geek this summer.

MOST-READ STORIES

  1. Town official doubly insulted by spyware allegation
  2. BlackBerry Apps: Four Types to Avoid
  3. Couple charged in $40M theft of GM hybrid car tech
  4. Rap videos are making Cisco seem hip again
  5. Avaya CEO on how to win over Nortel customers
  6. Apocalypse: 52% of CIOs Plan to Blow Up IT Groups
  7. Bare-metal desktop hypervisors: A primer
  8. Microsoft signs big licensing deal for Arm chip technology
  9. Fake femme fatale shows social network risks
  10. Is open source Snort dead? Depends who you ask

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment