Search This Blog

Tuesday, October 26, 2010

Server Virtualization Security: A Lot More Work Is Needed

A deep dive into Cisco's ScanSafe SaaS security tool | White House group takes aim at Internet privacy

Network World Security

Forward this to a Friend >>>


Server Virtualization Security: A Lot More Work Is Needed
Security tools must be complemented with skills, processes, and organizational changes If you attended VMworld in late August, you know that virtualization security was featured extensively. Ditto for VMworld Europe where VMware CEO Paul Maritz included a few security slides in his keynote presentation. Maritz and VMware get it -- virtualization security has been somewhat neglected until recently. If server virtualization is truly to become next-generation cloud infrastructure, security... Read More


WHITE PAPER: Citrix

Load Balancers Are Dead
Gartner Research Note "Load Balancers are Dead: Time to Focus on Application Delivery" helps you understand how to replace your basic load balancing technology and focus on getting the highest availability, performance and security for your web apps. Includes key recommendations you can use. Read now.

WHITE PAPER: HP & Intel

Rethinking Server Virtualization
Server virtualization is an ever more important tool for reducing cost, increasing availability, and enhancing business agility. But for many organizations, the savings that come from server consolidation are the primary reason for server virtualization. Read Now!

A deep dive into Cisco's ScanSafe SaaS security tool
Cisco ScanSafe offers Cloud Based Web SecurityCisco now has two web security offerings, one that is on premise (Ironport Web Security Appliance) and one that is in the cloud (ScanSafe Web Security). Cisco says you can also combine the two services for a hybrid approach to web security. Most are new to Cisco's ScanSafe SaaS offering so that is what the focus of today will be on. First lets start with what is ScanSafe web security? ScanSafe... Read More

White House group takes aim at Internet privacy
Internet privacy issues at top of White House committeeThe White House National Science and Technology Council today said it would set up a multi-agency subcommittee to monitor and address global Internet privacy policy challenges and help address those  challenges through coordinated US government action. Read More

Kinect Long Term Privacy Issues Daunting?
Microsoft's new Kinect gesture-based game controller is about to invade living rooms across the world, but a privacy group is concerned about long term facial and voice recognition privacy issues.Microsoft's new Kinect gesture-based game controller is about to invade living rooms across the world. If Microsoft has its way, the living room is only the start of interactive sci-fi-like gesturce controlled technology in every room of every house. Read More


WHITE PAPER: Riverbed

What's Needed for Cloud Computing
Just what is cloud computing anyway? Skeptics might say it is nothing but industry hyperbole, visionaries might say it is the future of IT. In reality, both statements are true-cloud computing has been embellished by the tech industry but it does hold real potential for new types of on-demand dynamic IT services. Read now!

Security company strengthens CAPTCHAs with video
A security company called NuCaptcha is incorporating advertising into a video CAPTCHA system that is much harder for computers to break. Read More

Fix a Windows Infection Using Linux
If you use Linux on your company's desktop or server computers, you're already familiar with many of the security advantages the open source operating system offers over its Windows and Mac rivals. What many people don't realize, however, is that Linux can also be used to rescue a computer that has been crippled by malware. Read More

SCADA security: A real-world case study
A few years ago, my consulting organization was asked to perform a security assessment of the SCADA system for a large water and power company in a large metropolitan area, with service and resources spread across an even larger geographical area. This article and the next are the story of that initial assessment, the follow-through by the organization, and the repeat assessment story of a decade later. Read More


WHITE PAPER: CA

The Most Important Metric for your VMs
The management tools selected to support virtualization is essential to the ability of IT to grow the virtual environment without proportionately increasing the staff to manage all of the new physical host servers and their guest VMs. Learn More

Google Android security improves, but trails iPhone and BlackBerry
Android 2.2 improved security, but the iPhone and BlackBerry are still ahead of Google's smartphone OS. Read More

Burning question: How can security risks be mitigated in virtualized systems?
Virtualization poses storage, VM sprawl and security challenges. Read More

Report: Global theft decreases in 2010
The 2010 Global Retail Theft Barometer finds theft was down from 2009 rates. But more than a quarter of U.S. retailers were still impacted by crime. Read More

IBM says software helps predict natural disasters
IBM patents natural disaster warning systemIBM says it has patented a natural disaster warning system, which uses analytic techniques that accurately and precisely conducts post-event analysis of seismic events, such as earthquakes, as well as provide early warnings for tsunamis, which can follow earthquakes. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Goodies from the Subnets
We've got 15 copies of books up for grabs: Cisco Nexus Switching and Microsoft SQL Server 2008 R2 Unleashed. Enter to win one!

SLIDESHOWS

The world's coolest data centers
Data centers need to be secure, temperature controlled, spacious, redundant, reliable – nothing sexy. But that doesn't mean they can't be. Here are a few that rise above the crowd and take advantage of the possibilities.

10 spooky Halloween iPhone apps
iPhone app developers have been working overtime this year to help you transform your favorite device into a high-tech scarephone. Have they succeeded? We'll let you be the judge of these 10 spoooooooky iPhone apps.

MOST-READ STORIES

  1. Open source report: Ubuntu moves away from GNOME
  2. 25 new IT companies to watch
  3. 4G defined: WiMAX and LTE don't qualify
  4. Buzzblog: Why IPv6? Vint Cerf keeps blaming himself
  5. How to secure iPads for corporate use
  6. Cisco FabricPath enables faster, flatter data center networks
  7. Technologically clueless Russian spy hired as 'IT innovator'
  8. 25 hot products from new IT companies
  9. Macbook Air could foretell death of hard drives
  10. Sprint and 4G: A dog with a bone

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


1 comment:

server virtualization said...

As a Dell employee I think your article about Server Virtualization is quite impressive. Server Virtualization helps save space in your data centers as the number of physical servers is much less than the number of servers that are being used.