Friday, May 11, 2007

Symark updates access-control software; Oracle product aids compliance

Network World

Standards and Regulatory Compliance News Alert




Network World's Standards and Regulations News Alert, 05/11/07

Symark updates access-control software, 05/08/07:  Symark this week unveiled the fifth version of its PowerBroker authorization and access-control software for heterogeneous Unix and Linux networks. New to the product are reporting capabilities which Symark says will help enterprises meet regulatory-compliance standards.

Next-generation multimedia networks face security challenges, 05/08/07:  There may be no hotter topic in telecom right now than IP Multimedia Subsystem (IMS), an evolving standard that promises to offer a common way for multiple wireless and wireline networks to deliver multimedia applications.

Privacy groups renew push against Real ID bill, 05/04/07:  Privacy advocates are making a last-ditch effort to muster public opposition to the controversial Real ID bill, which proposes to create a national standard for issuing state drivers' licenses and other forms of state-issued identification.

Network World VoIP and Convergence Buyer's Guide

Find the right products for your enterprise - fast. Our extensive database of detailed product information will quickly help you pinpoint the hardware or software you need to build out a converged voice and data network. With the side-by-side comparison tool you can evaluate product features and make the best decision for your enterprise.

Click her to go to the Buyer's Guide now.

Oracle database auditing product aids compliance, 05/07/07:  Oracle Monday announced general availability of auditing software that consolidates and manages information from databases, providing an in-depth view of audit data.

Editorial: A security tool with a message, 05/10/07:  Security experts will tell you that it isn't always about technology. While the latest tools help, more often than not security comes down to policy and staff education. If you can get employees to commit policy to memory and understand how threats may target or involve them, you've gone a long way toward locking down the organization.

TODAY'S MOST-READ STORIES:

1. Top 15 controversial Microsoft quotes
2. Analysts squash IBM layoff rumors
3. With Yahoo deal off, what next for Microsoft?
4. Five cool future IT positions
5. IPv4: No way to slow down
6. 10 ways to boost your IT org now
7. Is organized crime moving into cybersphere?
8. Microsoft/Best Buy racketeering case revived
9. More move to Vista, but concerns increasing
10. Classic e-mail scammers inspired by 'Three Kings'

MOST DOWNLOADED PODCAST:
5 Cool iPod Tricks and Tips


Contact the author:

Contact Site Editor Jeff Caruso



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: networking.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments: