Monday, April 20, 2009

CA builds, buys security management technology

CA introduces new log management product, re-brands two acquired applications via acquisitions
Network World logo

Network/Systems Management Alert

NetworkWorld.com | Network Management Research Center | Update Your Profile


Sponsored by Network Instruments
rule

Performance Monitoring in Virtualized Environments
Monitoring and maintaining virtual environments is a new challenge for network pros. Monitoring network and app traffic in an environment containing one-to-many relationships between virtual hosts and virtual machines presents concerns. This paper presents visibility options and their ramifications, and outlines new technology allowing visibility into external and internal traffic in a virtual environment.

rule

Spotlight Story
CA builds, buys security management technology

Denise Dubie By Denise Dubie
CA will share with RSA attendees its security product plans that include a new enterprise log management application and two updated releases the software maker gained via acquisitions. Read full story

Denise Dubie is senior editor with Network World.

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or
66.186.127.216 to your white-list file. Thank you.

RSA Conference kicks off on somber note The RSA Conference, which has become the annual tribal gathering for information-technology security professionals from around the world since it was first started 18 years ago, kicks off here this week amid a somber note due to the economic crisis.

CA makes security a priority Security technology isn't new for CA, but this year at its 12th CA World user conference in Las Vegas the company identified security as one of three focal areas (the others are governance and management). Senior Editor Denise Dubie sat down with Bilhar Mann, senior vice president and general manager of CA security management, to learn more.

CSOs need to keep evolving, CA security exec says This is a transcript of a keynote address presented at the RSA Conference on Thursday by Dave Hansen, corporate senior vice president and general manager for CA's Security Management Business Unit. The address is titled: "Strategic Security: The Evolving Role of the Security Professional."

CA security software for businesses gets upgrades CA announced upgrades to two software-security suites, one for large companies and one for small and midsize businesses.

Entitlement management: Access control on steroids Faced with looming regulations such as the Health Insurance Portability and Accountability Act and the Sarbanes-Oxley Act, Craig Shumard, chief information security officer for healthcare provider Cigna, knew he needed better tools for role-based access control.

CA to buy ID management vendor Eurekify CA Thursday announced it had inked a deal to acquire role-based access and identity management vendor Eurekify for an undisclosed sum.

CA jockeys for stronger position in security, management markets CA this week is set to unveil a slew of security, management and automation products that have industry watchers and IT managers speculating the embattled software vendor may succeed at making its technology better integrated and easier to use.

CA to buy data-leak prevention vendor CA Monday announced an agreement to acquire for an undisclosed sum data-leak prevention vendor Orchestria, boosting the software maker's security, privacy and compliance technologies.

What's going on with on H-1B visas Microsoft Subnet blogger Kerrie Meyler noticfes that the government has yet to reach the cap of 65,000 petitions for general H-1B visas. She wonders what is going on?

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Network Instruments
rule

Performance Monitoring in Virtualized Environments
Monitoring and maintaining virtual environments is a new challenge for network pros. Monitoring network and app traffic in an environment containing one-to-many relationships between virtual hosts and virtual machines presents concerns. This paper presents visibility options and their ramifications, and outlines new technology allowing visibility into external and internal traffic in a virtual environment.

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/20/09

Today's most-read stories:

  1. Microsoft discloses ambitious security strategy
  2. Cisco reveals aggressive pricing for blade server system
  3. PBX killer, Voice CAL coming to OCS in 2010
  4. Black Hat 'supertalk' halted due to vendor concerns
  5. Why is Google's Schmidt still on Apple's board?
  6. Forced week off at Adobe not exactly a vacation
  7. Cisco against Buy America provisions of broadband stimulus fund
  8. Breakthrough enables Terabit Ethernet
  9. Microsoft's cloud identity platform on track
  10. H1-B demand falls sharply
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news




IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: