Thursday, August 20, 2009

Rohati tailors access control to the cloud

Is Cloud Computing real? Ask DISA.; SpringSource enables Java cloud apps
Network World logo

Cloud Security

NetworkWorld.com | Update Your Profile


Sponsored by Red Hat
rule

Virtualization on IBM System Z Advantages
Not all virtualization solutions are created equal. You can achieve up to 80% savings on energy and floor space and up to a 90% reduction on software license fees. Learn about the cost savings, security benefits and unique approach Red Hat provides with open source virtualization integrated into the operating system kernel.

Learn More

rule

Spotlight Story
Rohati tailors access control to the cloud

Rohati Systems is working on a version of its security appliance that will run on virtual machines to enforce corporate access controls as applications and data move into the cloud. Read full story

Related News:

Is Cloud Computing real? Ask DISA.
The Defense Information Systems Agency is using cloud computing more and more with the help of HP, Northrup Grumman, Mitre and Simtone, but it needs to trumpet its successes and spread its lessons-learned more aggressively.

SpringSource enables Java cloud apps
Java framework builder SpringSource  is set to provide enterprise Java developers a platform for cloud-based deployments with the unveiling of SpringSource Cloud Foundry.

Microsoft Exchange 2010 poised to be a big hit with the enterprise
With Exchange 2010 in its final beta release the product is poised to become Microsoft's bridge between traditional on premises software and cloud computing.

SQL injection attacks led to massive data breaches
The huge data thefts at Heartland Payment Systems and other retailers resulted from SQL injection attacks and could finally push retailers to deal with Web application security flaws.

Gonzalez's lawyer to contend he was not the kingpin of Heartland, Hannaford breaches
The attorney for Albert Gonzalez, the man indicted on charges related to the massive data thefts at Heartland Payment Systems and four other retailers, claims it was another member of Gonzalez's gang who was the real leader of the heists.

If there's a compliance officer on the floor, hide the VMotion
Securing VMotion with a VLAN may lock it down from a technical standpoing, but don't try telling that to a compliance auditor...

Judge: Defunct airport fast pass company can't sell customer data
A federal judge has issued an order banning the operator of a now-defunct registered air-traveler program from selling any of the highly personal data it collected on tens of thousands of people who signed up.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Successfully Detecting Network Threats
Better understand your business and security risks by continuously knowing who is on your network, what data they are seeing, and which actions they are taking with that data. Get the real-time activity correlation and analysis and network threat detection you need.
Read Now


Masters of Enterprise Storage
Visit this site to learn of newest storage advancements, issues and product announcements - issues such as Fibre Channel over Ethernet and whether vendors' plans for the technology make sense. The site includes a weekly blog, briefs on storage technologies and products, and links to stories on IDG's sites about storage.
Click here.

 

August 20, 2009

TOP STORIES | MOST DUGG STORIES

  1. How to build a 100,000-port Ethernet switch
  2. Windows 7 RC downloads end Thursday
  3. The 10 stupidest tech company blunders
  4. Apple disasters
  5. Account password reset procedures a joke
  6. Windows WINS attacks in the wild
  7. When Apple flops: The worst products of all time
  8. DNS 'blacklist' unveiled
  9. Port 666
  10. FAQ: How to get Windows 7 on the cheap

ESG: Why SharePoint Needs WAN Optimization
According to recent research from the Enterprise Strategy Group (ESG), implementing SharePoint is a Top 5 initiative for CIOs. But a hidden challenge in SharePoint is to ensure that end users are able to quickly access and edit files when connected via the WAN. Learn about the key benefits organizations have realized as a result of Wide Area File Services Technology.
Click here to continue.



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment