Monday, May 23, 2011

How to protect smartphones & tablets

10 things we like and don't like about Check Point's R80 endpoint security product | Financial services firms increasing IT spending: survey

Network World Daily News PM

Forward this to a Friend >>>


How to protect smartphones and tablets
Managing mobile devices entails a level of complexity unheard of in the traditional enterprise world of Windows desktops. MDM software needs to control devices from multiple manufacturers, running different versions of as many as five operating systems, tied to carrier networks with their own particular constraints. Read More


WEBCAST: Brocade Communications Inc.

Ethernet Fabric for the Cloud Webcast
Discover how your company can optimize its investments in virtualization and cloud technologies. A new webcast reveals why IDC analysts believe a fabric-based network infrastructures are the cornerstone of a more efficient, cost-effective data center network. Learn more!

WHITE PAPER: Aerohive

Economics of Cooperative Control: Protocols are Free
Inter-AP protocols are free, but controllers are not. Aerohive's Cooperative Control controller-less WLAN architecture delivers an immediate and extremely significant CAPEX decrease. This paper explores the expansive economic benefits of Aerohive's unique approach. Read now!

10 things we like and don't like about Check Point's R80 endpoint security product
Check Point's Unified Endpoint Security Management tool offers powerful single client for comprehensive endpoint security Read More

Financial services firms increasing IT spending: survey
Three-quarters of IT leaders at financial services firms plan to increase IT spending over the next 12 months and 55% expect to shift more capital expenses to managed services, according to a survey by Bloomberg. Read More

Siemens' 'damage control' response to SCADA bug frustrates researcher
Siemens said it intends to fix a vulnerability discovered in its industrial control system products, but the NSS Labs researcher who found the bug says the company seems to be downplaying the seriousness of the problem to save face. Read More


WEBCAST: Oracle

Oracle Business Intelligence Foundation
Oracle BI Foundation Suite delivers the broadest end to end BI functionality from reporting, dashboards, scorecards, scenario modeling, forecasting to ad-hoc analysis. Register Today!

PlayStation Network hack will cost Sony $170M
Sony expects the hack of the PlayStation Network and will cost it ¥14 billion (US$170 million) this financial year, it said Monday. Read More

Oracle sued by university for alleged ERP failure
Montclair State University is suing Oracle over an allegedly botched ERP (enterprise resource planning) software project, saying a series of missteps and delays could ultimately cost the school some US$20 million more than originally planned, according to a complaint filed last week in U.S. District Court for the District of New Jersey. Read More

Apple iPad corporate security gets boost from GroupLogic
Businesses can now grant iPads safe remote access to files using new software designed to meet enterprise management and security concerns. Read More


WHITE PAPER: Citrix Systems

Security of Virtualization Divides IT and Security Pros
The "2010 State of Enterprise Security Survey - Global Data" report shows that about one-third believe virtualization and cloud computing make security "harder," while one-third said it was "more or less the same," and the remainder said it was "easier." Learn more now.

Indiana University positions self as home base for Software-Defined Networking
Read More

Say Goodbye to Wintel? What Microsoft Windows 8 Could Be
Don't get too comfortable with Windows 7. Microsoft is already hard at work on Windows 8 (and probably Windows 9, at the very least). While it's still only in the "rumor" stage, tidbits are spilling out as to what the upcoming operating system will offer. We already knew that it would support system-on-a-chip and mobile ARM processors, which could signal a new direction for PC development, but will these be true game changers? Read More

Having private parts is not probable cause for TSA to grope or body scan you
After the Texas House of Representatives unanimously passed "Restrain-the-TSA" legislation, which would make invasive pat-downs a crime at Texas airports, it seemed to inject a bit of sanity into arguments of what is reasonable and unreasonable to expect from the Fourth Amendment's "right of the people to be secure in their persons . . . against unreasonable searches and seizures." Being sexually assaulted... Read More



SURVEY: Future-proofing the cloud
Where do you think cloud computing is headed? This survey enables you to share your views on some potential future events, trends and technology changes driven by cloud computing. By compiling the shared knowledge, opinions and insights of survey participants, everyone will get a clearer view on which changes and trends are more, or less, likely to actually occur. That knowledge will be invaluable in helping you shape your private, public and hybrid cloud strategy and plans for the future.Take the survey.

GOODIES FROM THE SUBNETS
Up for grabs from Cisco Subnet: 15 copies of IPv6 for Enterprise Networks. Enter here.

SLIDESHOWS

A quick guide to '4G' phones
We've created this handy guide to 4G smartphones – all of which are based on the Android operating system right now – to help you look past the marketing rhetoric and learn what to really expect from these phones.

MOST-READ STORIES

  1. Windows debugging made easy
  2. iPhone 5 rumor rollup for the week ending May 20
  3. 10 things IT groups need to know about The Rapture
  4. Cisco sued for PoE patent infringement
  5. Microsoft: One in 14 downloads is malicious
  6. How to protect smartphones and tablets
  7. Cisco to dump Linksys, WebEx?
  8. IT consultant accidentally live blogs Bin Laden raid
  9. Cisco debuts 'private cloud' controller
  10. Six rising threats from cybercriminals

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment