Search This Blog

Friday, December 14, 2012

Oracle rolls out new database security package

  Dell software aims to automate mobile device management | US targets $47 million for seven advanced offshore wind projects
 
  Network World Security

Forward this to a Friend >>>


Oracle rolls out new database security package
Oracle is simplifying its security offerings by combining a pair of existing tools into a single package. Read More


RESOURCE COMPLIMENTS OF: Ipswitch

Wired & Wireless Networks? WhatsUp Gold can help!
As an IT manager, you're busy taking care of the availability, performance & security of your company's IT infrastructure. But things like BYOD, rogue devices, AP over-subscription & bandwidth policy abuse can make that complex. WhatsUp Gold provides ONE dashboard to visualize, isolate & resolve wireless problems before they impact your organization. Stop being the last to know about your wireless issues- Try WhatsUp Gold free for 30 days!

WHITE PAPER: Avaya

Delivering game-changing productivity & dependability
By creating one contiguous, end-to-end Fabric, Avaya is empowering businesses to achieve unprecedented levels of infrastructure productivity, service agility, and network dependability, the very essence of the fast, flexible, and secure design aspirations. Read Now

Dell software aims to automate mobile device management
To handle the explosion of mobile devices in the enterprise, Dell this week unveiled plans for a server designed to automate a wide range of mobile management jobs for mid-range business customers. Read More

US targets $47 million for seven advanced offshore wind projects
The US Department of Energy this week continued its massive push to develop wind driven electricity with new projects it says will focus on installing utility-scale offshore wind turbines and connecting offshore turbines to the power grid. Read More


WEBCAST: HP

Storage in the Cloud
Cloud will impact your storage environment. Hear what a HP Storage expert has to say. View Now!

Are BYOD Employees Decommissioning Mobile Devices Properly?
Sales of mobile devices are expected to surge this holiday season. Whether your firm has embraced bring-your-own-device (BYOD) or elected to look the other way that means many of your employees can be expected to upgrade their tablets and smartphones. But what about their old devices? Will they be decommissioned properly? Read More

16 most anticipated tech products of 2013
We're not sure some of them are even on the drawing board, but they'd be great to see Read More


WEBCAST: Oracle

A Winning Analytics Formula
Watch this Webcast and you will have the opportunity to experience a live demo of the analytics dashboard. It's a great opportunity to see what analytics can do for your business Learn More

Botnet operators in FBI bust show little talent, expert says
A criminal organization recently busted by law enforcement distributed malware on Facebook using two separate botnets built from tools that are easily found in the hacker underground, a security expert said. Read More

Microsoft: Most PCs running pirated Windows in China have security issues
Microsoft has launched a new anti-piracy campaign in China, which intends to highlight the security risks of buying counterfeit software. Read More

Japan police offers first-ever reward for wanted hacker
Japanese police are looking for an individual who can code in C#, uses a "Syberian Post Office" to make anonymous posts online, and knows how to surf the web without leaving any digital tracks -- and they're willing to pay. Read More

Trustworthy systems, trustworthy vendors, and how to identify them
It's sad but true that some of the world's best minds in computing have dedicated themselves to creating new ways to attack information technology infrastructures. The assaults have resulted in a significant cost factor in enterprise computing, influencing the purchasing decisions both for general-purpose processing, storage and networking products and for specialized security hardware, software and services. Read More

 
 
 

SLIDESHOWS

Top network and IT industry stories of 2012
The cloud, tablets, software-defined networking, IPv6 and 4G wireless reshape the enterprise IT landscape in 2012.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 13 events that defined Cisco's 2012
  2. Who makes the most popular anti-virus in the world? Microsoft (yeah, that's right)
  3. Juniper buys SDN startup for $176 million
  4. The weirdest, wackiest and coolest sci/tech stories of 2012
  5. Young people bedding their smartphones: Cisco study
  6. Fave-reads: 5 must-read books for IT career growth
  7. Riverbed announces three releases for the Steelhead Mobile Controller appliance
  8. Microsoft: What it did right and wrong in 2012
  9. IE exploit can track mouse cursor - even when you're not in IE
  10. Dexter malware infects point-of-sale systems worldwide, researchers say
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: