Monday, May 07, 2012

CTIA Wireless 2012 product primer

  Next-gen firewalls: Off to a good start | SonicWall stands tall in SSL decryption testing
 
  Network World Daily News PM

Forward this to a Friend >>>


CTIA Wireless 2012 product primer
Hot products at the annual wireless conference include everything from LTE signal boosters to wireless pet trackers Read More


RESOURCE COMPLIMENTS OF: Research In Motion

Introducing BlackBerry® Mobile Fusion
Easily manage and secure mobile device deployments with BlackBerry® Mobile Fusion. From a single interface, manage BlackBerry® smartphones, BlackBerry® PlayBook™ tablets and devices that use the iOS® and Android™ operating systems. Put an end to mobile chaos. Learn more at blackberry.com/mobilefusion

WHITE PAPER: Oracle

Migrating Your Legacy IBM Database Environment
Download this guide to ensure a seamless migration and take advantage of reduced costs associated with extremely efficient day-to-day database administration. Learn More!

Next-gen firewalls: Off to a good start
When we tested four next-gen firewalls strictly on performance, we found that the products could forward packets at impressive rates, but throughput dropped when advanced security features were turned on. We now dive deep into application identification and control - the defining features of next-gen firewalls - to find out what works and what doesn't. Read More

SonicWall stands tall in SSL decryption testing
If one of the main advantages of a next-generation firewall is application and protocol identification and control, then SSL decryption is a basic requirement. We looked at the SSL decryption capabilities of the next-generation firewalls to see how well they would be able to discover applications, protocols, and URLs hidden within encrypted connections. Read More

Next-gen firewalls require external visibility tools
Knowing what's happening on your network is a pre-requisite to controlling the traffic. We call that visibility because it combines all of the information the firewall knows, including session and application information, traffic volumes, and rate information, into a way to "see" into your network -- to give you visibility. Read More

Palo Alto next-gen firewall stacks up well
Palo Alto Networks has bet everything on being a next-generation firewall. Without the next-generation hook, Palo Alto has little chance at breaking into the established world of firewalls, and they've done a good job at defining the category on their own terms. Read More


WEBCAST: BMC Software

BMC Control-M - Single Point of Control Demo
With BMC Control-M, you schedule and manage everything — down to the very last platform and application — from one simple interface. It's the foundation of workload automation, really — the ability to run application and business processes as one. Siloed job schedulers can't do it. BMC Control-M can. Learn More!

Basic firewall functionality: Check Point's maturity shows through
Enterprise firewalls must have policies to control traffic, ability to create site-to-site VPNs using standards-based IPsec, translate addresses and port numbers (NAT) when needed, and apply basic bandwidth management to traffic. They must also support features such as high availability (active/passive or active/active), virtual LANs, Ethernet link aggregation, and global management systems. Read More

Fortinet has highest catch rate in IPS testing
We tested the intrusion prevention capabilities of each of the next-generation firewalls to determine how well they work and how the IPS integrates with system management. Read More

Tibco adds Hadoop support to its Spotfire in-memory analytics
Tibco has brought its Spotfire in-memory analytics software into the burgeoning ecosystem around Hadoop, an open-source framework for processing large sets of information, the company announced Tuesday. Read More

DHS looking for forensic tools to lift evidence from solid state drives
The Department of Homeland Security is looking for tools to help the law enforcement community better pull forensic evidence from solid state drives found in smartphones and GPS devices in particular. Read More


WHITE PAPER: SAP

Options for Improving Supplier and Customer Integration
A new report from Gartner outlines nine different frameworks that companies are using to address their integration challenges, and the benefits of including B2B outsourcing as part of a successful IT strategy. Learn More

Microsoft blames and bans Chinese security partner for leaking Windows exploit
Microsoft issued critical patch MS12-020 to fix the Windows' Remote Desktop Protocol (RDP) vulnerability last month as it was spotted on a Chinese hacker forum and was being exploited in the wild. The kicker is that the exploit code was leaked from one of Microsoft's security partners in the Microsoft Active Protection Program (MAPP). Read More

Now Yahoo Declares Patent War On Open Source
Yahoo's decision to recapture its lost profit potential by asserting its rights under its patent portfolio has already drawn a lot of criticism in tech circles. Yahoo CEO Scott Thompson has declared war on Facebook and others claiming "they own the web" by virtue of their large portfolio of patents. But now it seems they are going to claim patent rights over open source technologies as well. Read... Read More

Skype May be Windows Phone's Worst Enemy
It was always a mystery how Microsoft would juggle Skype, the VoIP audio and video conferencing software it purchased for $8.5 billion in October 2011, with its mobile phone product. Now that problem appears to be affecting Nokia. Read More

How we tested next-generation firewalls
We tested next generation firewalls by looking at seven separate areas that we felt would be important to network managers trying to deploy these products in enterprise networks. Read More

Hot Products at Interop 2012
Click through all the products being released at the Interop conference in Las Vegas this week Read More

10 Predictions for What the CIO Role Will Look Like in 2020
CIOs can expect their jobs to change dramatically by the end of the decade. Expect an increased role in everything from business planning and cybersecurity to robot management and, of course, the cloud. Read More

 
 
 

SLIDESHOWS

7 reasons why Linux is a desktop flop
Writer Maria Korolov runs through all the reasons why Linux has not made any headway despite its many strengths.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. iPhone 5 with larger screen and thinner form factor on the horizon
  2. John McAfee, antivirus pioneer, arrested by Belize police
  3. NASA, Air Force, Harvard, military, ESA hacked by Gray Hats 'The Unknowns'
  4. Next-gen firewalls: Off to a good start
  5. Hard time: 10 tech CEOs sent to the slammer
  6. Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
  7. Why Linux is a desktop flop
  8. 'Smishing' attacks are on the rise
  9. Alcatel-Lucent brings 40G to the core
  10. iPhone 5 rumor rollup for the week ending May 4
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment