Wednesday, August 01, 2012

New Requirements for Security Monitoring

IBM attempts to redefine the IPS | The state of network security

Network World Security

Forward this to a Friend >>>


New Requirements for Security Monitoring
Today's security threats are difficult to defend against. On the one hand, the volume of malware variants has gone through the roof over the past few years. On the other, targeted attacks have become more stealthy and damaging. How can CISOs possibly combat this cybersecurity double-edged sword? With continuous monitoring of everything -- IT assets, configurations, network traffic, application... Read More


WHITE PAPER: McAfee

As Data Centers Evolve, So Do Security Needs
Choose McAfee Network Security Platform to stop threats and maintain continuity across data centers, cloud services, virtualized and in the rack deployments. Intrusion prevention at up to 80 Gbps leverages McAfee Global Threat Intelligence. Learn more. Learn more in the McAfee Securing Cloud-Based Services KnowledgeVault. Read now.

RESOURCE COMPLIMENTS OF: Accellion

10 Mobile Security Requirements for BYOD
An enterprise mobility strategy needs more than the provisioning and security available with mobile application and MDM solutions. Learn how mobile content management supports BYOD policies, provides IT with fine-grained control for files and devices, and helps to meet data security requirements. Read this whitepaper to learn the security requirements you need to look for to address BYOD in your enterprise.

IBM attempts to redefine the IPS
IBM Tuesday introduced what it's calling a "next generation" intrusion-prevention system (IPS), an offering that not only is designed to stifle network-based attacks, but adds application-level controls and URL filtering capabilities typically found in separate products such as Web security gateways. Read More

INSIDER
The state of network security
Network security is still as necessary as it was 15 years ago when the Black Hat Conference was first beginning. Sure the players have changed and the sophistication, but it is a classic good vs. evil scenario still. Read More


WHITE PAPER: Array Networks

Secure Your Business.
Employees want to work anytime, anywhere, often from personal and mobile devices. See what Frost & Sullivan has to say about the risk of relying on VPNs and learn about zero-trust models that keep devices "off-network" and prevent data from leaving the network. Learn more.

13 awesome and scary things in near Earth space
There were a few interesting news items regarding the space around Earth this week. First NASA published a depiction of how the asteroids and comets that travel near the Earth. Second, the space agency issued another depiction of three of the largest contributors to space debris and how it orbits the planet. It makes you wonder why more things don't smash into each other more often in space. Take a look at those news items and some other amazing things that have or will happen in the space around Earth. Read More

Outsourcers apparently don't miss a beat in face of massive India power outage
The massive power outages across most of northern India have not affected the software development, back office operations and services work that emanates from the country. Read More


WHITE PAPER: McAfee

Top 4 Security Surprises That Await Private Cloud Builders
This report published by Gabriel Consulting Group discusses security risks that prospective private cloud builders might be overlooking. Learn more.

Mobile malware cases nearly triple in first half of 2012, says NetQin
Mobile malware is rising fast, infecting nearly 13 million phones in the world during this year's first half, up 177 percent from the same period a year ago, according to Beijing-based security vendor NetQin. Read More

Hackers reveal critical vulnerabilities in Huawei routers at Defcon
Security researchers disclosed critical vulnerabilities in routers from Chinese networking and telecommunications equipment manufacturer Huawei at the Defcon hackers conference on Sunday. Read More

Can Big Data Help Universities Tackle Security, BYOD?
Universities have some of the most complex IT infrastructures around, and BYOD is a reality they can't escape. Chief Security Officers at universities are increasingly turning to Big Data analytics technologies to mine the data in their logs and improve their security footing. Read More



SLIDESHOWS

12 new network features in Windows 8
There are a bunch of new and impressive administrative features designed to increase network support, reliability, performance, and security.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Leaked Windows Phone 8 SDK brings app surprises
  2. Twitter's attempt to protect TV exec's privacy backfires
  3. Netflix uncages Chaos Monkey disaster testing system
  4. Possible Anonymous network attack could target Olympics partners BT, GlaxoSmithKline
  5. DeepField Networks exits stealth mode to reveal cloud genome mapping
  6. 12 new network features in Windows 8
  7. The day VMware ate Cisco
  8. How to watch the Olympics on the Internet
  9. Oracle buys Xsigo for software-defined networking
  10. The 5 hottest IT jobs right now

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment