Tuesday, October 26, 2010

Weekly Update: Security Policy Group, Intruder Detection and more

**** NETWORKING-DECISION-MAKERS ****

Tuesday, October 26, 2010 http://toolbox.com


**** Highlights from the Community ****

Research: You Sent What? Linking identity and data loss...
http://it.toolbox.com/trd/1/3/22454/0/Highlight/?mid=

Research: Overcome 3 Challenges of Virtualization
http://it.toolbox.com/trd/1/3/22656/0/Highlight/?mid=

Blog Post: Is your home network secure??
http://it.toolbox.com/trd/1/2/41977/3/Highlight

Blog Post: False Positive, False Negative
http://it.toolbox.com/trd/1/2/41970/3/Highlight

Security-policydevelopment-sp discussion: Is there any activity in this group?
http://it.toolbox.com/trd/1/2/3831988/1/Highlight

Networkadmin-l discussion: Windows DHCP server - allow MAC address from...
http://it.toolbox.com/trd/1/2/3826487/1/Highlight

**** SPONSOR MESSAGE: NTRADMIN ****

Web-Based Remote IT Management
NTRadmin. Remote System Management Solution for MSPs, IT Departments & Support Teams. Scales to fit your company. Increase IT Productivity with routine IT Task Automation. 50+ Pre-defined Scripts. Proactive Management of 1000s of PCs, Macs, Linux or Windows Mobile Devices. Organize, Inventory & Track Assets. Troubleshoot Remotely. Leverage Alerts & Monitoring, Configuration Management, Enterprise-grade Security. Immediate ROI with 5-minute SaaS Implementation. Easy Integration with CRM, Help Desk, Billing, Alerts & Backup. Add Value to Existing Business Systems. Increase Savings while Minimizing IT Management Effort. Try it now for FREE!
http://www.ITtoolbox.com/erd/20515

**** SPONSOR MESSAGE: ****


**** SPONSOR MESSAGE: ****

**** RESEARCH ****
http://it.toolbox.com/research


DELIVER SMARTER PRODUCTS AND SERVICES BY ALIGNING IT DEVELOPMENT AND OPERATIONS: HOW IBM CAN BRIDGE THE GAP BETWEEN DEVELOPMENT AND OPERATIONS
By IBM
A dynamic infrastructure is one that is designed to enable today's instrumented and interconnected world, helping...
http://it.toolbox.com/trd/1/3/22686/0/Docs/?mid=

LOAD TESTING 2.0 ï¾— THE NEXT GENERATION OF LOAD TESTING FOR THE WEB 2.0 WORLD
By Gomez, Inc.
Why are Load Testing 2.0 solutions needed and who can benefit from them? Understand the limitations of load testing 1.0...
http://it.toolbox.com/trd/1/3/22683/0/Docs/?mid=

PROOF POSITIVE - EXTENDED VALIDATION SSL INCREASES ONLINE SALES AND TRANSACTIONS
By VeriSign
With the threat of identity theft and other types of fraud rampant on the internet, many consumers are reluctant to...
http://it.toolbox.com/trd/1/3/22673/0/Docs/?mid=


YOU SENT WHAT? LINKING IDENTITY AND DATA LOSS PREVENTION TO AVOID DAMAGE TO BRAND, REPUTATION AND COMPETITIVENESS
By CA Technologies
From unencrypted laptops left in taxis to the wholesale theft of customer records, data loss incidents are a regular...
http://it.toolbox.com/trd/1/3/22454/0/Docs/?mid=

OVERCOME 3 CHALLENGES OF VIRTUALIZATION
By IBM
Recent analyst reports indicate that when businesses add integrated service management to manage virtualization, the...
http://it.toolbox.com/trd/1/3/22656/0/Docs/?mid=


DATA QUALITY STRATEGY: A STEP-BY-STEP APPROACH
By SAP
To realize the full benefits of their investments in enterprise computing systems, organizations must have a detailed...
http://it.toolbox.com/trd/1/3/21518/0/Docs/?mid=

ACHIEVE HIGH-PERFORMANCE AND LOW LATENCY THROUGH CLOUD TECHNOLOGY
By Panasas
Ever-increasing growth in the volume of stored data coupled with applications that require demanding computational and...
http://it.toolbox.com/trd/1/3/22309/0/Docs/?mid=

BENEFITS OF A TAPE-FREE GLOBAL BACKUPS & RESTORES
By IBM
With more than a petabyte of data in its global storage infrastructure, a major global media and entertainment company...
http://it.toolbox.com/trd/1/3/22430/0/Docs/?mid=


**** DECISION MAKER BLOGS ****
http://it.toolbox.com/blogs

Recent Blog Entries

SAP ENTERPRISE MOBILITY VENDOR CHOOSES SYBASE'S UNWIRED PLATFORM
Posted by Kevin_Benedict (Mobile Industry Analyst, Mobile Consultant & Web 2.0 Marketing E)
When SAP announced they were going to acquire Sybase, the SAP enterprise mobility...
http://it.toolbox.com/trd/1/2/42053/3/Blogs

IS YOUR HOME NETWORK SECURE??
Posted by Hank Arnold (Network Administrator) Comments(5)
I've been in several folks' hoses setting up their Wi-Fi routers. In just about every case...
http://it.toolbox.com/trd/1/2/41977/3/Blogs

FALSE POSITIVE, FALSE NEGATIVE
Posted by skobina (Network & Security Expert) Comments(1)
A positive is where detection has been made. If this is a real attack then appropriate action...
http://it.toolbox.com/trd/1/2/41970/3/Blogs


**** DECISION MAKER GROUPS ****
http://networking.ittoolbox.com/groups

Recent Threads

EPIC SITE-TO-SITE VPN USE. (Cisco-infrastructure-l)
Asked By mark-allen
Has anyone successfully connected 2 clients running Epic software via a site-to-site VPN?
http://it.toolbox.com/trd/1/2/3837316/1/groups

MAKE LOG OF FILE RENAME OR DELETE AT OPERATING SYSTEM LEVEL (Networkadmin-l)
Asked By aasoft | Replies (1)
I have requirement that i have given a software to my user in which he has to scan students...
http://it.toolbox.com/trd/1/2/3834750/1/groups

CAN I MANAGE CISCO IDS-4215 WITH CISCO IPS IME (Cisco-infrastructure-l)
Asked By dheeraj_vicky | Replies (1)
I have Cisco IDS-4215 , but I need to manage it and take reports. For that I have Cisco IPS...
http://it.toolbox.com/trd/1/2/3834485/1/groups

IS THERE ANY ACTIVITY IN THIS GROUP? (Security-policydevelopment-sp)
Asked By David-Lineman (President) | Replies (3)
My work is devoted full-time to the topics of developing, implementing and maintaining security...
http://it.toolbox.com/trd/1/2/3831988/1/groups

ROUTER AND DHCP SERVER (Cisco-infrastructure-l)
Asked By aneesh.t.v tv | Replies (3)
Does the router's WAN or LAN interface will automatically configured ip address from an...
http://it.toolbox.com/trd/1/2/3830003/1/groups

SYSTEM ADMIN JOB CHANGE ABROAD (Networking-career)
Asked By amit_mcsa | Replies (5)
My name is Amit Korgaokar and I am from Goa India. I have done my bcom degree and MCSA...
http://it.toolbox.com/trd/1/2/3829908/1/groups

WINDOWS DHCP SERVER - ALLOW MAC ADDRESS FROM ALLOWED LIST (Networkadmin-l)
Asked By kouliscon | Replies (1)
I recently implemented a new DHCP server which is on a Windows Server 2008 machine...
http://it.toolbox.com/trd/1/2/3826487/1/groups


----------------------------------------------------------------------
DO YOU VIRTUALIZE WITH VMWARE? CONNECT WITH OTHER EXPERTS
Discuss issues related to the use of VMware virtualization software, including automation, server consolidation, business
continuity, and desktop and remote management.

http://it.toolbox.com/trd/860930
----------------------------------------------------------------------


***** UPCOMING EVENTS *****
http://networking.ittoolbox.com/events

LISA '10
by USENIX
Date: November 7-12, 2010 Location: San Jose, CA
http://it.toolbox.com/trd/1/3/22506/0/Events/?mid=

_____________________________________________________________________
*Manage Toolbox Subscriptions: http://it.toolbox.com/trd/787198
*Leave Newsletter: http://it.toolbox.com/home/settings/unsubscribe/?list=networking-decision-makers&mid=
*View All Newsletters: http://it.toolbox.com/trd/218494
*Advertising Information: http://it.toolbox.com/trd/787199
*Suggest Content: mailto:Content@ITtoolbox.com
*Recommend this Newsletter: http://it.toolbox.com/trd/80469
*Additional Questions: mailto:ITtoolboxNewsletters@ITtoolbox.com
Copyright (c) 1998-2010 Toolbox.com. All rights reserved.

No comments:

Post a Comment