Friday, May 11, 2012

Next-gen firewalls: Off to a good start

7 ways to mask your Internet identity | Does 'stand your cyberground' stand a chance?

Network World Compliance

Forward this to a Friend >>>


Next-gen firewalls: Off to a good start
When we tested four next-gen firewalls strictly on performance, we found that the products could forward packets at impressive rates, but throughput dropped when advanced security features were turned on. We now dive deep into application identification and control - the defining features of next-gen firewalls - to find out what works and what doesn't. Read More


WHITE PAPER: IBM

Cloud Computing in the Midmarket: Assessing the Options
This paper looks at how organizations can integrate cloud solutions into existing infrastructures and how an incremental implementation approach might work. The paper also explains some principles for measuring the success of your cloud solutions. Learn More

In this Issue


WHITE PAPER: F5

High-Performance DNS Services in BIG-IP Version 11
To provide high-quality user experiences on the Internet, networks must be designed with optimized, secure, highly available, and high-performance IP services. Domain Name System (DNS) is one of the most difficult, but important, IP services to optimize and secure. Learn More Today!

7 ways to mask your Internet identity
You can't erase all of the personal info that's out on the Web, but you hide in plain sight Read More

Does 'stand your cyberground' stand a chance?
Internet security experts say the concept has merit, but major legal and ethical problems still need to be sorted out Read More

25 geeky gifts for Mother's Day
Cool, fun and practical, these Mother's Day gifts have a tech edge Read More

BlackBerry 7 smartphones approved for DOD use
Research in Motion's BlackBerry 7 smartphones have been approved for use by the Department of Defense, the company announced this week. Read More

Hacktivists have the enterprises' attention. Now what?
Experts say enterprises need to be more prepared for anything and everything, including eventual compromises. Read More


WEBCAST: Attachmate

Verastream Host Integrator
This six-minute product demo shows how you can use Verastream Host Integrator to modernize and service-enable legacy assets for use across your enterprise. No changes to mainframe-application code are required. Learn More!

Who are tech's highest paid CEOs?
Oracle's Larry Ellison finally ousted from the top spot on our list of highest paid tech execs Read More

New York City agency pushes plan to prevent cyberattacks on elevators, boilers
Imagine what would happen if an attacker broke into the network for the industrial control systems for New York City's elevators and boiler systems and decided to disrupt them, imperiling the lives of hundreds of thousands of residents relying on them. Think it could never happen? Think again. Read More

Adobe's security chief praises Apple for Flash-crippling move
Adobe's head of security is applauding Apple's move to block outdated versions of his company's Flash Player. Read More

Apple patches 36 bugs in OS X, fixes encryption password goof
Apple on Wednesday patched 36 vulnerabilities in Mac OS X, most of them critical, plugging a hole that revealed passwords used to encrypt folders with an older version of FileVault. Read More

U.S. seeking to build international unity around cyberdefense for industrial control systems
In the interests of thwarting cyberattacks on critical infrastructure such as energy, water and manufacturing, the Department of Homeland Security (DHS) is quietly reaching out to other governments around the world to find what problems may exist elsewhere and what research can be shared to improve industrial control systems (ICS). Read More


WHITE PAPER: BMC Software

5 steps from Scheduler to Enterprise Workload Automation
A patchwork of job schedulers can cause many inefficiencies, hindering IT's ability to serve the business. An enterprise approach solves these issues and adds new value. Five steps can take you from a costly mishmash to benefits like increased productivity, lower costs, and better service. Learn More!

Mobile BYOD users want more security
A survey of more than 4,000 mobile-device users and IT professionals shows wildly abundant use of mobile devices, but profound concerns about security and how employee-owned devices ought to be used for business purposes. Read More

BeyondTrust acquires eEye in union of security vendors
BeyondTrust, a software firm that specializes in identity and access management for the enterprise, has announced the acquisition of eEye Digital Security, which makes products for vulnerability management, patch remediation, malware defense and configuration compliance. Read More

Carrier CEOs touch on customer trust
Trust is central to mobile operators' relationships with consumers, and carriers may have their work cut out for them in restoring that trust, based on executives' comments during a keynote session on Tuesday at CTIA Wireless. Read More

Will BYOD revive the network-access control idea? Gartner thinks it will
Is the BYOD craze going to bring a revival of NAC, the policy-based network-access control that was hyped a decade ago but didn't end up widely adopted for endpoint security? Read More

MasterCard's PayPass Wallet will span online, mobile, in-store shopping
MasterCard WorldWide announced a digital wallet on Monday that consumers will be able to use for purchases in stores, on the Web and on their mobile phones. Read More

Avaya joins crowded BYOD, MDM field
At Interop this week, Avaya will toss its hat into the rapidly expanding BYOD ring with new software for its policy manager that helps IT get a handle on mobile device management (MDM). Read More

iPhones, Android devices hot targets among 50,000 network attacks on California university
Almost 50,000 separate network attacks each week take aim at the California State University, San Bernardino, and the latest trend is seeing attackers go after students' Google Android and Apple iPhone mobile devices. Read More



SLIDESHOWS

Who are tech's highest paid CEOs?
Oracle's Larry Ellison finally ousted from the top spot on our list of highest paid tech execs.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. FBI issues warning on hotel Internet connections
  2. Yahoo CEO apologizes for tumult
  3. CTIA: At a show full of pom-pom waving, Sprint's Hesse sounds a warning
  4. Sprint launches 'Tri-Fi' 4G mobile hotspot
  5. iOS vs. Android in the enterprise
  6. Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
  7. Who are tech's highest paid CEOs?
  8. 10 must-have gadgets for the traveling executive
  9. AT&T sees an end to Wi-Fi-only tablets
  10. IT toolbox for the iPad

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: