Tuesday, July 21, 2009

Novell makes a run at cloud security

Businesses dismiss cloud security concerns; McAfee getting more aggressive on cloud-based security
Network World logo

Cloud Security

NetworkWorld.com | Update Your Profile


Sponsored by BMC Software
rule

Dell's SMART Approach to Workload Automation
Read a compelling case study by EMA, Inc. to learn how Dell uses BMC CONTROL-M to cut cost and increase productivity with workload automation.

rule

Spotlight Story
Novell makes a run at cloud security

Novell is trying to secure cloud services with technology that maps corporate security policies to service providers' clouds so applications and databases get the same protection they do in corporate owned facilities. Read full story

Related News:

Businesses dismiss cloud security concerns
Business leaders have more confidence in cloud computing than the organizations' technical managers, according to business Internet service provider Star, which found that UK CIOs have dismissed security concerns about cloud computing..

McAfee getting more aggressive on cloud-based security
McAfee says it intends to expand its security-as-a-service offerings in recognition that customers are opting more and more to adopt cloud-based deployments.

Virtualization, cloud underlie Microsoft's Linux kernel submission
Experts say Microsoft's submission of virtualization driver source code to the Linux kernel marks a watershed event in the vendor's understanding of cloud computing and the future of open source.

July Giveaways
Cisco Subnet is giving away 15 copies each of books on Enterprise Web 2.0 and Building a Greener Data Center; Microsoft Subnet is giving away training from New Horizons to one lucky reader and 15 copies of Microsoft SQL Server 2008 Reporting Services Unleashed. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Deadline for entries July 31.

Network World on Twitter? You bet we are


Botnet boom
BotnetsThe number of botnets has grown from about 1,500 two years ago to 3,500 today.

Summer of geeks
IT quizSpace camp! They Might Be Giants! Check out these and 9 other vacation options.

Successfully Detecting Network Threats
Better understand your business and security risks by continuously knowing who is on your network, what data they are seeing, and which actions they are taking with that data. Get the real-time activity correlation and analysis and network threat detection you need.
Read Now


 

July 21, 2009

TOP STORIES | MOST DUGG STORIES

  1. Military spends $155M for the nucleus of future wireless networks
  2. Why would Microsoft patent a 'butt hinge with butt straps?'
  3. Microsoft stuns Linux world, submits source code for kernel
  4. Cisco lays off hundreds in San Jose
  5. Hello, Gorgeous! 15 of the greatest tech designs ever
  6. Eight real-life robots that could kill us all
  7. 10 gifts from Apollo
  8. Nortel: Why Avaya?
  9. Best Buy calls Twitter a job qualification
  10. How to use electrical outlets and cheap lasers to steal data

Distinguish your Business Through Superior Service
Distinguish your business from competitors by delivering superior service. Download this whitepaper today and discover how top-flight service management can deliver a world-class customer experience.
Distinguish your Business Through Superior Service



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment