Wednesday, August 15, 2012

DLP tools deliver strong endpoint protection

How we tested DLP products | What's Driving Enterprise Security Strategy?

Network World Security

Forward this to a Friend >>>


DLP tools deliver strong endpoint protection
With serious data breaches occurring on almost a daily basis, concerns about data protection have skyrocketed. While some experts believe endpoint breaches may no longer comprise the majority of data leaks, the intentional or unintentional release of sensitive data from endpoints within an organization, whether by employees, contractors or guests, remains a serious problem that data loss prevention (DLP) products seek to address. Read More


WHITE PAPER: Cisco Systems

Cisco Wide Area Application Services Software Release 5.0
Cisco® Wide Area Application Services (WAAS) provides the industry's most scalable, highest performance WAN optimization solution. Cisco WAAS is able to improve end user experience and reduce bandwidth for key applications. Learn more.

RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant remote support with LogMeIn Rescue
With LogMeIn Rescue, you can start a support session in just 60 seconds. Connect 24/7 to PCs, Macs, smartphones and tablets. You'll get in, solve the problem and save the day without ever leaving your desk. Try it free today.

How we tested DLP products
We tested multiple common endpoint scenarios, by trying to upload, print, email or otherwise transfer data that should be blocked, quarantined, warned about or simply monitored under the rules and policies we set up. The following specific types of endpoint tests were conducted: Read More

What's Driving Enterprise Security Strategy?
ESG recently published a new research report titled, Security Management and Operations: Changes on the Horizon. As part of the survey, ESG asked 315 security professionals working at enterprise organizations (i.e. more than 1,000 employees) to identify the most important factors driving their organization's information security strategy in 2012. Read More


WHITE PAPER: Xirrus

Tablets in the Enterprise
Tablets are replacing laptops at lightning speed. Whether company-issued or part of the BYOD phenomenon, the increased use of smart devices has resulted in a dramatic shift in network traffic with an emphasis on wireless. This paper explains how to predict Wi-Fi demands and architect a best-fit wireless network strategy for your environment. Learn more.

Kaspersky pleads for crypto help to probe Gauss malware
Kaspersky Lab today appealed for help from top-notch cryptographers to help it break the encryption of a still-mysterious warhead delivered by the Gauss cyber-surveillance malware Read More

5 grand challenges that will boost future optic, photonic technology
Scientists with the National Research Council say that the development of photonic and optic technologies is key to the future of the United States and as such the government should create a "National Photonics Initiative" to more quickly advance the Read More


WHITE PAPER: Oracle

Lower IT Costs with Oracle Database 11g Release 2
Learn how you can transform your business, budgets, and service levels with Oracle Database 11g Release 2. You'll discover how its new options and features can help you reduce server and storage costs, improve query performance, and ensure availability during database application upgrades. Learn More!

The fascinating world of the ubiquitous antenna
Read More

NSS Labs to offer security gear picks and pans
NSS Labs, which tests security products, today introduced what it's calling the "Security Value Map," a graphical evaluation of security gear based on the relative merit of each product's technical and cost advantage. Read More

Startup envisions CISO collective to share cyberattack information
A startup called SecurityStarfish intends to become the central point where chief information security officers (CISO) can discretely share information about cyberattacks and obtain anonymized real-time information from others in order to deter cybercrime against their organizations. Read More

Swiss scientists develop algorithm to sniff out the source of malware and spam attacks
Swiss scientists have developed an algorithm that can be used to locate spammers as well as the source of a computer virus or malware. Read More



SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 9 'everything-as-a-service' (XaaS) companies to watch
  2. RTM builds of Windows 8 reveal Microsoft blocked any bypassing of the Metro desktop
  3. 25 essential business apps for Android
  4. Is EVERYTHING made in China?
  5. Swiss scientists develop algorithm to sniff out the source of malware and spam attacks
  6. iPhone 5 to come with much smaller 8-pin dock connector
  7. 10 trends driving big data in financial services
  8. WikiLeaks dumps Stratfor email dirt on TrapWire, a CIA-connected global spying system
  9. RTM builds of Windows 8 reveal Microsoft blocked any bypassing of the Metro desktop
  10. Cisco readying a new Nexus switch

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment