Tuesday, January 22, 2013

What's lurking in your network? Find out by decrypting SSL

  Security vendors failing to tackle mobile malware, say CISOs | Cisco SDN splash coming?
 
  Network World Network Optimization

Forward this to a Friend >>>


What's lurking in your network? Find out by decrypting SSL
Organizations have spent vast sums of money on security systems and, when deployed and operated correctly, they play a key role in safeguarding the organization. However, most systems have one critical dependency: The traffic flowing through must be readable. If the traffic is encrypted, many systems are almost completely useless, giving the system owner a false sense of security. Read More


WHITE PAPER: Netscout Systems Inc.

Service-Oriented Performance Management Strategy
This white paper is to help IT organizations adopt a management methodology that enables them to improve the user experience by focusing on service delivery management. Learn More.

WHITE PAPER: HP, Microsoft & Intel

On the Fast Track to Data
The ongoing data explosion puts organizations in a unique situation. Not only do they operate in a world where information is power, the number of sources and volume of relevant data continues to multiply at unprecedented levels. Read Now!

Security vendors failing to tackle mobile malware, say CISOs
Malware is still the biggest threat to mobile security, but most mobile device management (MDM) strategies tend to focus on securing the physical device in case of loss of theft, according to Peter Gibbons, head of Information Security at Network Rail. Read More

Cisco SDN splash coming?
Cisco appears ready to let more of its SDN cat out of the bag. Read More

Truth in IT job postings: What those want ads really mean
Make no mistake about it: There's a massive difference between what employers say and what they actually mean. Read More


WHITE PAPER: AT&T / AT&T Wireless

CIO Roundtable: Global Firms Discuss the Big Data Challenge
The question challenging even the largest global firms, such as those that make up the AT&T Business Advisory Council (ABAC), is this: How can organizations separate unneeded data from what is essential – then get that vital information to those who can use it to drive the business forward? Read Now.

The next-generation enterprise WAN – let's start with why
For the last several columns we've looked at the key factor affecting WAN performance – loss, latency, jitter and bandwidth – and various ways of addressing these issues. As 2013 begins, I'd like to step back and look at the bigger picture, before any further dives down into the details. Read More

Cisco virtual desktop users to get access to Jabber HD voice and video
Users of Cisco's virtual desktop system will soon be able to engage in voice and video communications with their colleagues using the Jabber instant messaging tool. Read More

Networking air quality measurements
Have you ever wondered how safe the air is in your local environment? The Air Quality Egg provides accurate citizen-driven air quality tracking. Read More


WHITE PAPER: Exceed Group

Fortune 500 optimized mobile plan to save 28%
Exceed Group helped a global manufacturing company implement a complete wireless expense management solutions with Mobil-Eye. Read about what steps they took to reach full optimization of their AT&T and Verizon contracts. Learn how to get your own free Mobil-Eye wireless expenses analysis. Learn More.

Feds turn to agile development as budget cuts loom
As the threat of federal budget cuts hover, IT managers are turning to agile development to speed up projects and quickly show their value. Read More

Cisco, VMware and OpenFlow fragment SDNs
Three controller "standards" emerging in nascent network programmability, virtualization market. Read More

Virtual networks in Windows 2012 and Azure VMs
This article addresses a key function built-in to Windows 2012 that on first blush may seem like a complex technical networking feature, but that functionality has GREAT implications when extending your on-premise Windows to the cloud (like Azure VMs). You don't recognize the value of Virtual Networking in Windows 2012 until you truly start to see where the functionality is CORE to an organization. Read More

 
 
 

SLIDESHOWS

9 essential Internet Explorer 10 add-ons
Quality add-ons for Internet Explorer are few and far between.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. Tony Fadell on the unique nature of Apple's design process
  2. Truth in IT job postings: What those want ads really mean
  3. RSA: How to steal encryption keys off hardware chips and smart cards
  4. 2013 job watch: Top 11 metro areas for tech jobs
  5. Security Holy Grail anyone?
  6. 'Rogue clouds' giving IT staffs nightmares
  7. Cisco working on an IT simplification platform
  8. Verizon client worker outsourced part of his job to China so he could have more free time
  9. Blogger's request jolts lawmakers into 'emergency' mode
  10. Day after patch, Java zero-day sold to highest bidders
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_optimization_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment