Friday, January 27, 2012

6 hot security startups to watch in 2012

  Facebook IPO filing seen coming as early as next week | Security roundup: The triumph of hactivists, the sorrow of Symantec
 
  Network World Daily News PM

Forward this to a Friend >>>


6 security companies to watch
This group of security companies includes several that want to capitalize on technology ideas that were originally devised to serve communities of special interest but could now take on a wider cybersecurity role. Fixmo, for example, has its roots in the National Security Agency where its mobile security makes it possible to run critical applications in sandboxes that are insulated from the rest of the machine, making them less likely to fall victim to malware that might have infected the device. Read More


RESOURCE COMPLIMENTS OF: CloudPassage

CloudPassage
CloudPassage Halo is the award winning cloud server security platform that has everything you need to secure your cloud servers - from dynamic firewalls to intrusion detection, and account management. Halo is SaaS and installs in 5 minutes. Halo Basic is free for up to 25 servers. Try Halo

WEBCAST: Radware

Control the Cloud Like You Do Your Own Infrastructure
Industry analyst Robin Layland joins Alan Murphy from F5 Networks and Greg Smith from Citrix to explore how an ADC can allow you to control your applications running in the cloud as effectively as you control them when they are running in your data center. Learn More

Facebook IPO filing seen coming as early as next week
Suspended trading adds to speculation that long-anticipated public offering is near Read More

Security roundup: The triumph of hactivists, the sorrow of Symantec
It was another busy week for hactivists attacking the online targets of their ire. This time, hackers under the banner AntiSec appeared to have hacked the website of OnGuardOnline.gov, the U.S. government's online security website, in protest against the much-railed-against legislation Stop Online Piracy Act (SOPA) as well as other bills regarding intellectual protection. Similarly, the group Anonymous is believed to be behind the distributed denial-of-service attack on Thursday that brought down the European Parliament's website in what is thought to be retaliation for European support for the shutdown of the Megaupload file-sharing site the week before. Anonymous also opposes a treaty being ratified in Europe now called the Anti-Counterfeiting Trade Agreement. That deals with infringement of intellectual property rights. Read More

Happy birthday, iPad! RIP, pretenders
Two years ago today, Steve Jobs unveiled the iPad. Computing has never been the same, despite all the 'iPad killers' Read More


WHITE PAPER: VCE/VMware

Centralized Virtual Desktop Eases PC Procurement
As CVD technology matures, it will become increasingly applicable to greater parts of organizations and a greater breadth of industry verticals beyond the typical healthcare, finance, government, and education verticals that dominate the CVD market today. Learn More

Dying Jobs kept letter from Gates at his bedside
Shortly before Steve Jobs died in October, he received a letter from longtime business adversary Bill Gates that moved him so much that he kept it by his bedside, according to the Apple founder's widow, as relayed by Gates to a British interviewer. Read More

The real reasons why SOPA and PIPA are real bad
A reader letter makes Gibbs sum up why SOPA and PIPA are such bad ideas. Read More

MacIT: IT groups grapple with managing fast-growing iOS devices
Apple recently has improved its mobile device management features, but IT groups are discovering a new set of challenges when they start to move to larger numbers of iOS devices, MacIT conference attendees are confirming this week. Read More


WHITE PAPER: Internap

New eBook: A Colocation Buyer's Guide
Whether you're determining if colocation is the right fit for your business or you are currently in the process of selecting a colocation provider, you'll find this eBook an essential must read for making the right decision for your business. Learn More

Hacking stunt: Stealing smartphone crypto keys using plain old radio
Encryption keys on smartphones can be stolen via a technique using radio waves, says one of the world's foremost crypto experts, Paul Kocher, whose firm Cryptography Research will demonstrate the hacking stunt with several types of smartphones at the upcoming RSA Conference in San Francisco next month. Read More

CloudPassage launches new security product for public clouds
CloudPassage is launching a new security product for virtual servers in public clouds such as Amazon Web Services that it says takes care of the all-important need for security when using services from infrastructure providers. Read More

How to Prevent Thumb Drive Security Disasters
Small USB flash drives can cause big security headaches. Learn how four very different organizations have managed to balance the need to allow employees to transfer files for legitimate business purposes with the need to prevent data leaks. Read More

Linux Mint 13 gets back to desktop basics
Bucking the trend of increasingly experimental desktop interfaces, the developers behind the Linux Mint are adopting a simpler desktop for the next version of the open-source Linux distribution. Read More

New leaders emerging in WAN optimization market
In yet another sign that growing revenues are reshaping the vendor outlook in the network management sector, Gartner recently named vendor Silver Peak one of the leaders in its magic quadrant for the WAN optimization market. Read More

 
 
 

SLIDESHOWS

2012's 25 Geekiest 25th Anniversaries
Network World's 6th annual collection of the year's "geekiest anniversaries" this time includes the births of pioneering companies such as UUNet and NEXTEL; technologies like OS/2 and SPARC; television classics topped by "Star Trek: The Next Generation" and the first "Simpsons" shorts; disposable contact lenses; the first naked-eye supernova in four centuries; and, who could possibly forget The Woodstock of Physics?

CISCO SUBNET
Looking for a place where everyone understands your joy and pain with Cisco routers, switches and other gear? Check out our Cisco Subnet, a community of Cisco experts blogging on the latest network topics. Enter here.

MOST-READ STORIES

  1. iPad 3 rumor rollup for the week of Jan. 26
  2. First 'Super Wi-Fi' network goes live in North Carolina
  3. Cloud activity to explode in 2012
  4. 6 security companies to watch
  5. 15 worst Internet privacy scandals of all time
  6. Say goodbye to Fast Ethernet
  7. Stealing smartphone crypto keys using plain old radio
  8. Threatened by Anonymous, Symantec tells users to pull pcAnywhere's plug
  9. 10 best new Google Android apps for fun and, uh, work
  10. Social media 'private' data is fair game for e-discovery in court
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: