Monday, December 13, 2010

Will small identity management firms thrive in 2011?

Businesses are still worried about the security of hypervisors | Mozilla patches 13 Firefox security bugs

Network World Security: Identity Management

Forward this to a Friend >>>


Will small identity management firms thrive in 2011?
We're almost to the end of 2010, and here is the first in a series of interviews with identity-management insiders about the twists and turns they expect in the industry during 2011, starting with executives at Sailpoint. Read More


WHITE PAPER: Oracle

Total Economic Impact of Oracle Identity Manager
A Forrester Study commissioned by Oracle. This paper details return-on-investment (ROI) calculations based on real customers' data, and guides you in computing cost savings with user provisioning. Use the model suggested in this report to design your implementation and measure results. Read now

WHITE PAPER: Symantec

Enterprise Vault & Microsoft Business Productivity Suite
Microsoft Business Productivity Online Suite (BPOS) is a set of Microsoft hosted messaging and collaboration services. Companies choose BPOS to migrate Exchange offsite -- to help reduce costs . This whitepaper outlines the integration of offsite email service with an on-premises Archive solution. Read now!

Businesses are still worried about the security of hypervisors
Despite the widespread use of virtual environments, 73% of a group surveyed say hypervisors create potential problems by adding a software layer that could be attacked and that their far-reaching privileges could be abused by attackers. Read More

Mozilla patches 13 Firefox security bugs
Mozilla has issued patches for 13 flaws in its Firefox browser, one of which represents the second try Mozilla is making to eradicate a weakness it tried to fix back in March. Read More


WEBCAST: MegaPath

Essentials of SIP Trunking: Spend Less on On-Premise Phones
Hear how SIP trunking matters in meeting business and operating challenges, plus the facts on types of customers who benefit from SIP trunks, how SIP trunks deliver value for voice communications, and what small businesses should look for in evaluating providers. Learn More

Teen arrested for selling Call of Duty DDoS tool
A teenager has been arrested after being caught selling a 'booting tool' used to attack and kick players of the hugely popular Call of Duty online game. Read More

Wikileaks DDoS tool downloads grow rapidly
A disproportionate number of people downloading the open source DIY tool being used to launch DDoS attacks on companies deemed hostile to Wikileaks appear to be based in the UK, new figures suggest. Read More


WHITE PAPER: Symantec

Windows Done Right: From Migration to Implementation
The recent IDC executive brief, "Doing Windows 7 Right: Efficiency from Migration to Implementation" offers a better understanding on how the migration to Windows 7 provides the opportunity to improve core elements of your IT infrastructure. Learn more.

Why Whack-a-Mole won't work against the likes of Wikileaks
Imitators of WikiLeaks are inevitable, with one already set to launch, which points up that the source of the problem surrounding leaked diplomatic cables is not WikiLeaks but the system that allowed the cables to be stolen in the first place. Read More

A new business model for distributing stolen documents
A new Web site Openleaks plans to distribute leaked documents, but by distributing them to news outlets, not posting them itself. Read More



FILL OUT A SURVEY, GET REWARDED
Get a free Starbucks gift card for participating in a Network World survey about application performance management best practices. Research firm NetForecast is surveying enterprises about APM practices for an upcoming Network World article. The first 100 participants will receive a $5 Starbucks gift card. Click here.

DECEMBER GOODIES FROM THE SUBNETS
SharePoint 2010 power user training for three people from Webucator, plus a brand new iPad available from Microsoft Subnet. Five massive libraries on CCNP, security, NX-OS up for grabs on Cisco Subnet. Enter to win!

SLIDESHOWS

Best and worst celebrity technology moments of 2010
Here's a look back at the year's most memorable – for better or worse – celebrity moments in technology.

Top 15 Holiday Deals on Notebooks, Netbooks, and Desktops
Black Friday is gone, Cyber Monday is history, and Cyber Week is over, but the deals are still around--if you know where to look. The holiday shopping season is in full swing, and retailers are offering great computer discounts to fit everyone's budget. Take a look inside to find netbooks for $300, desktops with widescreen monitors for under $600, and 15-inch laptops starting at $400. Check it out.

MOST-READ STORIES

  1. 300,000 Android phones activated a day, claims Google
  2. Death by open source
  3. Why IT jobs are never coming back
  4. Mozilla patches 13 Firefox security bugs
  5. Google "fixes" another Microsoft product
  6. Chillingo unveils winter lineup of iOS games
  7. Topless girl app could lead to Apple being sued
  8. Favorite cheap network tools
  9. Palin in cyberwar with London-based Wikileaks supporter
  10. Fix to Chinese Internet traffic hijack due in January

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment