Search This Blog

Monday, August 22, 2011

Cisco adds wireless-only endpoint security option

Security rundown for week ending Aug. 19 | HP's Apotheker changes his tune on mobility

Network World Cisco

Forward this to a Friend >>>


Cisco adds wireless-only endpoint security option
Remember back in April, when Cisco overhauled its network management strategy and announced the Cisco Enterprise Prime product portfolio? The company has now decided to offer at least one component of the suite -- the Identity Services Engine (ISE) -- as a stand-alone, wireless-only module. Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Remote Support for PCs, Macs, Tablets and Smartphones
Provide instant, on-demand remote support with LogMeIn Rescue. Without pre-installed software, quickly connect to PCs, Macs and smartphones anywhere in the world. Get in, solve the problem

WHITE PAPER: Fluke Networks

Importance of Permanent Link Testing
This white paper is the joint effort of 2 industry leaders of high speed infrastructure cabling and testing, Panduit and Fluke Networks. This technical paper provides a thorough analysis and review of different testing techniques and their associated benefits for high speed permanent links. Learn More Today!

Security rundown for week ending Aug. 19
Some older assumptions about security -- such as firewalls are needed for perimeter defense, and we'll all make do with reusable passwords and browser-based SSL connections provide great security -- were once again ripped apart as we heard this week from several individuals who say they simply don't agree. Read More

HP's Apotheker changes his tune on mobility
Six months after laying out his "strategic vision" for HP, CEO Leo Apotheker took the actions to realize it. And abandoned the mobile computing space. Read More


WHITE PAPER: Riverbed

Accelerate WAN File Transfers by 50x
According to Taneja Group research, 83% of IT managers are considering a move to the cloud a top priority. This paper highlights their research and provides guidance on how to overcome cloud adoption barriers and further leverage virtualization and consolidation efforts by strategically deploying WAN optimization. Read now!

With SSL, who can you really trust?
SSL, the encryption scheme that protects virtually all secure online transaction, requires that users rely on trusted third parties, but what if they can't be trusted? Read More

Can Cisco Still Compete In the Public Sector and Other Cash-Strapped Industries?
Cisco's financial announcement last week was welcome news for financial markets in a state of turmoil. Cisco shares climbed 16% on Thursday when the company reported positive results and provided indications that its cost-cutting measures are starting to deliver results. Read More


WHITE PAPER: Riverbed

Business Value with Network and Application Visibility
In this white paper, IDC analyzes the ROI that customers can expect from Riverbed Cascade, based on interviews with Cascade customers. Additionally, IDC lays out the business case for proactively managing network and application performance. Get the visibility you need to achieve your IT objectives. Read Now.

Comcast offers IPv6 in Michigan
Comcast has added Michigan to its list of states - including Pennsylvania, California, Colorado, Illinois and Florida -- where the cable ISP is offering services that support the next-generation Internet standard known as IPv6. Read More

The world's geekiest license plates
This slideshow is filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

Tips and tricks for protecting Android devices
Android doesn't rival BlackBerry when it comes to security and enterprise support. But Android devices can still be reasonably secure. Here are some tips to help you protect your investment, privacy, and data.

MOST-READ STORIES

  1. HP's webOS crashes under Apple, Android pressure
  2. Torvalds says, "Virtualization is evil"
  3. Linus Torvalds: ARM has a lot to learn from the PC
  4. With SSL, who can you really trust?
  5. The collar bomber's explosive tech gaffe
  6. HP PC spin-off puts pressure on Microsoft to nail Windows 8
  7. HP plans PC spinoff, $10 billion Autonomy buy
  8. HP kills tablets, confirms PC spin-off plans
  9. Dropbox cloud was a haven for data thieves, researchers say
  10. NSTIC director: 'We're trying to get rid of passwords'

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: