Friday, August 27, 2010

Measure and manage the risk inherent in your IT infrastructure

  H.264 Now Royalty-Free; HTML5 Video Situation Still a Mess | Getting VDI right
 
  Network World Compliance

Forward this to a Friend >>>


Measure and manage the risk inherent in your IT infrastructure
You've got a limited budget to spend on IT security measures. Wouldn't it be nice to have an advisor tell you precisely how to apply your resources to improve the security of your infrastructure and reduce the inherent risks to your business? Prevari's Technology Risk Manager uses predictive analytics to show you your risk level and what you can do to mitigate the risks. Read More


WHITE PAPER: Shoretel

TCO Whitepaper
Comparing competing solutions on equal footing can be difficult. We also know that a system with the lowest purchase price may not have the lowest total cost of ownership (TCO) over the lifespan of the IP unified communications system. To help with your comparison, learn the 12 cost components that must be incorporated in any TCO analysis. Read more!

WHITE PAPER: Tripwire

Taking the Time Crunch Out of IT Compliance with Automation
Read this exclusive white paper from compliance leader Tripwire to learn how a Protect, Detect, and Correct compliance strategy can give you back your most precious resource: time. Read More!

H.264 Now Royalty-Free; HTML5 Video Situation Still a Mess
The battle for the future of Web video has been nothing if not confusing, and it isn't over yet. MPEG-LA, the industry group responsible for various audio and video formats, announced that it'll keep H.264 video royalty-free--for online video that is free to end-users, anyway. Read More

Getting VDI right
Desktop virtualization makes it possible to centralize control and simplify management, improve security and compliance, and minimize help desk calls. It isn't perfect for all types of users within the enterprise, but when deployed appropriately, VDI can unlock new capabilities that could never be achieved through traditional physical desktop solutions. Read More

Visa offers new guidance on securing payment applications
Visa this week added new best practices for makers of payment applications and those using them. Read More


WHITE PAPER: BMC

Free yourself from old IT help desk technology
BMC software and salesforce.com have joined forces to deliver BMC ServiceDesk on Force.com, an ITIL help desk, self service, and inventory management solution on the Force platform. This paper explains the patented technology that makes the Force.com platform fast, scalable, and secure. Learn more!

Security chiefs at home: No such thing as 'off duty'
It's a good idea to think twice before pursuing certain professions -- they could change your daily habits, if not your entire outlook on life. A chief financial officer might choose a house project based on its impact on home value. An emergency room worker might forbid his kids from jumping on a trampoline. Read More

Share Printers on a Network
When you take into account its purchase price and all of the consumables it requires--toner or ink, paper, imaging drums, and more--you may find that a printer is one of the most expensive pieces of IT equipment in your business. Read More

Survey highlights wish list for communication systems
ShoreTel announced the results of a recent survey that identifies the latest communications system needs and priorities of CIOs and IT/Telecom Professionals. The survey was taken from prospective ShoreTel customers, and the 475 participants clearly spelled out many of the issues vendors must address if they are to satisfy customer communication needs. Read More


WEBCAST: NetApp

Consolidate and Virtualize Windows Applications
Listen to this on-demand Webcast and hear Chris Rima of Tucson Electric Power discuss how his organization managed data growth and improved performance with storage and server virtualization. You'll also hear Brian Garrett from ESG and NetApp experts discuss ways to consolidate your Windows® application data, files, and virtual machines. Learn More

Google Defends Net Neutrality Plan
Despite a high degree of opposition, Google is defending its net neutrality proposal co-authored with broadband and wireless provider Verizon. The search giant on Thursday issued counterarguments on six points (Google calls them myths) that the company believes have been misunderstood about its proposal. Google says the proposed framework defends net neutrality, would protect the current Internet we enjoy today, and is definitely not about writing legislation from the boardroom. Read More

Your Password Policy Stinks
Research has shown that accounts protected by passwords less than 8 characters are about as hard to break into as a safe made out of toilet paper. The minimum password length should between 12 and 16 characters, which means your password policy may need refreshing. Complex passwords are just not something the human mind was designed to remember. While I can remember a frightening amount of StarWars... Read More

Defending the Internet: National Security v. Big Brother
In the wake of revelations that the US military network was compromised in 2008, and that US digital interests are under a relative constant threat of attack, the Pentagon is establishing new cyber security initiatives to protect the Internet. The Pentagon strategy--which is part digital NATO, part digital civil defense, and part Big Brother--may ruffle some feathers and raise concerns that the US Internet is becoming a military police state. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Cloud storage lives up to the hype
We tested five cloud-based storage services under real-world conditions. We set up accounts, connected with the vendor storage network, uploaded and downloaded files, measured performance and analyzed cost structures. Our conclusions are that cloud-based storage can save you money. And cloud-based storage can be fast. However, there are still security concerns that you need to be aware of.

Wireless networks and mobility quiz
iPhones and other handhelds bought for home use are infiltrating corporate networks, but there's a host of other wireless technologies that comprise a wave of mobile computing that is creating sweeping changes in business infrastructure. How well versed are you in the technical and not-so- technical details?

MOST-READ STORIES

  1. Air Force uses real birds of prey to protect its own predators
  2. Pentagon official details U.S military net hack
  3. Microsoft: 'We love open source'
  4. Apple in talks to bring $0.99 TV rentals to iTunes
  5. Social Security Administration to award massive network deal
  6. Windows and Linux servers grow at Unix's expense
  7. Security chiefs at home: No such thing as 'off duty'
  8. Report: Sun, Microsoft and Mozilla leave the most vulnerabilities unpatched
  9. Technology's Biggest Myths
  10. Geezer Quiz 2010
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: