Wednesday, August 25, 2010

Cisco Security Manager Gets a Major Update

  Vyatta routing software certified for IPv6 | Data center switch maker teams with VMware to optimize gear for virtualization
 
  Network World Cisco

Forward this to a Friend >>>


Cisco Security Manager Gets a Major Update
Recently, Cisco introduced its 4.0 version of Cisco Security Manager (CSM). CSM is an enterprise class device management solution for managing Cisco security devices like ASA, IPS, IOS devices and VPN gateways. CSM is full of features designed to make life easier for administrators that work with lots of Cisco security devices and want a central management and troubleshooting solution. CSM offers... Read More


WHITE PAPER: Brocade

The State of Data Center and Network Infrastructure
Instead of a preparation method of rip and replace, examine how organizations can follow a more cost-effective strategy of evolving their data centers. Go inside the phased network architecture upgrade, which enables new levels of application flexibility and business agility. Read now!

WHITE PAPER: Zoho Corporation

A Service Desk That Transformed Cetero Research
Alex Walker, Director of IT at Cetero Research had a problem, and it was right out his office window. Alex could see his technicians dashing between buildings, clutching a PC like a football, rushing to the next break-fix. "I was being controlled by the end user," he says. Read More

Vyatta routing software certified for IPv6
The Vyatta open-source network operating system has been certified for IPv6, which is likely to become a key capability as the number of Internet addresses available under the current version of IP diminishes. Read More

Data center switch maker teams with VMware to optimize gear for virtualization
Data center switch maker Arista Networks this week is unveiling software designed to improve visibility, configuration and provisioning in virtual environments. Read More


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Nasty auto robocaller forced to pay $2.3M, sell Mercedes
At least this time one of these scammers is actually being hit in the wallet. Under a settlement with the Federal Trade Commission one of the telemarketers who blasted consumers with millions of illegal auto warranty robocalls last year will pay approximately $2.3 million in redress and give up his Mercedes. Read More

Open source tools at heart of DARPA's virtual satellite network
Open source software and algorithms will play a key role in the next stage of development for the military's advanced virtual satellite system that promises to replace monolithic spacecraft with clust Read More


PODCAST: Sprint

Sprint Provides Multiple Robust Network Access Solutions
Network options are critical to ensuring a converged network. This podcast outlines the critical components to achieve unified communications and provide users with an advanced mobile experience. Learn More

The emergence of virtual appliances
When most people talk about the adoption of virtualization, they are really talking about the adoption of server virtualization. While there is no doubt that server virtualization is the most common form of virtualization, there is also no doubt that other forms of virtualization are also gaining in importance. This WAN newsletter will talk about how virtual appliances are gaining in importance. Read More

CIO 100: How to Build an IT Culture of Trust
What's the secret to a high-performing team? Trust. This was one of the key themes at the CIO 100 symposium in Rancho Palos Verdes, Calif., which kicked off this week. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Cloud storage lives up to the hype
We tested five cloud-based storage services under real-world conditions. We set up accounts, connected with the vendor storage network, uploaded and downloaded files, measured performance and analyzed cost structures. Our conclusions are that cloud-based storage can save you money. And cloud-based storage can be fast. However, there are still security concerns that you need to be aware of.

Wireless networks and mobility quiz
iPhones and other handhelds bought for home use are infiltrating corporate networks, but there's a host of other wireless technologies that comprise a wave of mobile computing that is creating sweeping changes in business infrastructure. How well versed are you in the technical and not-so- technical details?

MOST-READ STORIES

  1. Zero-day Windows bug problem worse than first thought
  2. Linux community finally fixes 6-year-old critical bug
  3. Intel-McAfee deal baffles security analysts
  4. Android 2.2: How to install Flash on Froyo
  5. Intel buys McAfee: My two cents
  6. Microsoft won't showcase Hyper-V at VMworld
  7. Cameron Diaz could wreck your PC, McAfee warns
  8. Decorate with Linux
  9. Intel to buy McAfee in $7.68 billion blockbuster
  10. Does Intel buying McAfee have any impact on open source
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment