Wednesday, August 04, 2010

Centrify announces free security apps, tools

Who really sets global cybersecurity standards? | Softer data-leak prevention

Network World Security: Identity Management

Forward this to a Friend >>>


Centrify announces free security apps, tools
Gartner's recent CIO survey places identity management as the No. 1 security priority through 2011. That's the good news. The same survey also indicates that spending on solutions will be down, however. Fortunately, I guess, vendors are doing what they can to make it easier for you to acquire the identity services you need. Read More


RESOURCE COMPLIMENTS OF: Quest Software

Choosing the Right Active Directory Bridge Solution
What do you need to know when evaluating AD bridge solutions? In this Quest Software white paper, discover the questions to ask when choosing the best solution for your company. Don't waste time and money with systems that don't play well together! Read More

WHITE PAPER: Palo Alto Networks

Re-Inventing Network Security
Enterprise networks and applications have evolved but security infrastructure has not. Learn why application visibility and control (regardless of port, protocol, or encryption) are critical for preventing increasingly sophisticated threats that target enterprise users and data. Read now!

Who really sets global cybersecurity standards?
Herding wild cats may be easier than settling issues or making over-arching decisions that affect international cybersecurity. Read More

Softer data-leak prevention
Data-leak prevention is growing at 10% a year, a bit slower than anticipated but still pretty fast compared to other security technologies. In this year's research we see DLP use or active evaluation among 36% of research participants. The primary driver is compliance, as with most security funding. In looking at DLP deployment over time we noticed something very interesting: quite a few companies that deployed DLP last year pulled back on their deployments because of a backlash from users and management. Read More


WHITE PAPER: Qwest

The Three Ps of Evaluating Managed Network Services
To reduce costs and keep IT resources focused on the core business, more organizations are choosing to outsource network management. To deliver on this promise, it's essential to choose the right service provider. This in-depth report explores the key considerations, including solution portfolio, partnerships and processes. Read now!

JailbreakMe Exploits Serious iPhone Security Flaw
JailbreakMe makes the process of jailbreaking the Apple iPhone much simpler and less intimidating. Just visit a Web site on the iPhone, and voila! Jailbroken iPhone. Think about that for a minute, though. The simple act of visiting a Web site is able to fundamentally alter the core functionality of iOS. Read More

13% of UK firms don't use security software
More than one in ten (13 percent) UK firms don't have security software installed on their company computers, says Panda Security. Read More


WHITE PAPER: Qwest

Connecting to Better Customer Service
See how you can transform customer information and feedback into actionable results. Read now!

Software shouldn't fail
Software should work: it shouldn't fail. There are horrible stories on software failures [MK adds that the RISKS FORUM DIGEST is full of those stories] and many don't get publicity. Read More

Microsoft Rushes Unscheduled Patch for Shortcut Flaw
Microsoft is issuing an out-of-band patch today to address rising attacks against the Windows shortcut vulnerability discovered last month. The update comes just over a week ahead of the regularly scheduled Patch Tuesday for the month of August, but leaves Windows 2000 and Windows XP SP2 systems to fend for themselves. Read More

Keeping your company image safe on social media
The umbrella of security responsibilities now includes brand protection at many companies (See Brand protection: The expanding CSO portfolio for an in-depth look) and it seems like a constantly moving target. When the internet took off, organizations had to contend with scammers registering web site domains using company names for fraudulent purposes. Now similar activity is happening on the hottest forum for brand abuse--social networks. Read More

How to steal corporate secrets in 20 minutes: Ask
A few companies in the Fortune 500 need to upgrade their Web browsers. And while they're at it, a little in-house training on social engineering wouldn't be a bad idea, either. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

SLIDESHOWS

Nine real iPad alternatives
Even since Apple released its "magical and revolutionary" iPad, other vendors have been scrambling to deliver products that go Apple one better. Here are nine that are expected to hit the stores this year.

Defcon badge is unlike anything you have ever seen
It's unlike any conference badge you've seen before. Sleek, stylish, programmable, and made out of metal. It's the Defcon 18 conference badge. Unveiled at the annual hacker conference in Las Vegas, here's a look at this year's badge.

MOST-READ STORIES

  1. Nine real iPad alternatives
  2. Apple's iOS devices meet many enterprise security needs
  3. New Linux kernel borrows Google packet speeding tech
  4. iPhone apps that could save your life
  5. Hacker snoops on GSM cell phones in demo
  6. Microsoft patches dangerous Windows flaw
  7. Microsoft says patch clients first, then servers
  8. WPA2 vulnerability found
  9. 7 IT career rules worth breaking
  10. Microsoft: VMware customers are 'Windows customers first'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment