Search This Blog

Tuesday, September 06, 2011

Sister organizations pool their resources to share SIEM and logging

University tests ERP on new Dell cloud | What you need to know about HP's acquisition of Autonomy

Network World IT Best Practices

Forward this to a Friend >>>


Sister organizations pool their resources to share SIEM and logging
You've heard the expression, "Two can live as cheaply as one," but can five log as cheaply as one? Five sister clubs of the Canadian Automobile Association pooled their resources to acquire one high-end SIEM and logging system from LogRhythm to meet their logging requirements for PCI compliance. Read More


WHITE PAPER: Diskeeper Corporation

Ensuring Maximum Performance on Windows 7 Systems
Independent tests show that fragmentation prevention and defragmentation resulted in performance benefits significantly beyond those delivered by the native Windows 7 utility. Learn more.

WHITE PAPER: GFI Software

Messaging and Web Security Best Practices for 2011
In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years. Read More

University tests ERP on new Dell cloud
University of Kentucky CIO Vince Kellen is considering moving some of the university's SAP work to a cloud environment, which would make him a relatively early adopter of ERP in the cloud. Read More

What you need to know about HP's acquisition of Autonomy
Here's why you should be paying attention: It's a big analytics play that could help lead the way to making sense of all the unstructured data that's overwhelming enterprises of all sizes, says analyst Charles King. Read More


WHITE PAPER: CA Technologies

CA Technologies Newsletter featuring Gartner Research
This publication, enhanced by Gartner research, reveals how to take a proactive IT approach which ensures visibility and control during the adoption of virtualization and cloud environments. Read now

What to do about rogue IT
The CEO has fallen head over heels for his iPad. The marketing team has set up shop on every social media site known to man. The sales group has secretly purchased its own software-as-a-service subscriptions. Meanwhile, the VP of operations is wondering whether there isn't something better out in the cloud that the company could use to run its supply chain. Read More

Top cybersecurity concerns: Malicious code, employees run amok
When 3,300 information-technology professionals were asked about cybersecurity, they said malicious code attacks accounted for the main type of cyberattack their organizations suffered during the past year, although "internal unintentional actions" by well-meaning insiders also wreaked havoc. Read More


WHITE PAPER: BMC

How SaaS Can Benefit the IT Help Desk
Small and midsize businesses that are using software as a service (SaaS) to automate their IT help desk(s) and IT infrastructure are reporting significant savings. Read More!

Spirits Distributor Serves Real-Time Business Intelligence
Charmer Sunbelt Group CIO Paul Fipps doesn't usually make IT investment decisions on instinct alone. Except, that is, when it came to implementing SAP's new in-memory analytics engine. Read More

Why Companies Should Donate Used PCs Instead of Recycling
When we write about sustainability in CIO, we often focus on how IT leaders can help their companies cut energy consumption. It's an obvious target because it's relatively easy to quantify. Whether or not you have formal goals for reducing carbon emissions, those kilowatts saved and gallons of heating oil conserved drop right to the bottom line. Read More



SLIDESHOWS

The world's geekiest license plates
This slideshow goes out to all those drivers who aren't afraid to say it loud: I'm a geek and I'm proud. It's filled with images of vanity plates so geeky that they prompted someone else to take a picture and post it on Flickr. Enjoy.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

MOST-READ STORIES

  1. DoE devices security system to thwart rampant copper thefts
  2. Age bias in IT: The reality behind the rumors
  3. Microsoft's 5 biggest weaknesses
  4. Microsoft's IE will drop under 50% share by mid-2012
  5. Mapping the price of pot across the Internet
  6. Lenovo heats up price war with $199 IdeaPad tablet
  7. 10 energy projects that could electrify the world
  8. The Ruby Principle tells us Apple didn't fake latest 'lost iPhone'
  9. Microsoft claims its private cloud is up to four times cheaper than VMware's
  10. Desktop virtualization users say the technology brings challenges

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: