Tuesday, August 14, 2012

The cloud services explosion

Cisco Ironport delivers strong email protection | DLP tools deliver strong endpoint protection

Network World Network Architecture

Forward this to a Friend >>>


The cloud services explosion
If you follow cloud computing, you're no doubt familiar with software-as a service, typically associated with Salesforce.com, or infrastructure as a service, which was pioneered by Amazon.com. But how about CaaS, SECaaS, DaaS, MaaS and BaaS? Read More


RESOURCE COMPLIMENTS OF: LogMeIn

Provide instant remote support with LogMeIn Rescue
With LogMeIn Rescue, you can start a support session in just 60 seconds. Connect 24/7 to PCs, Macs, smartphones and tablets. You'll get in, solve the problem and save the day without ever leaving your desk. Try it free today.

WHITE PAPER: Cisco Systems

Cisco Wide Area Application Services Software Release 5.0
Cisco® Wide Area Application Services (WAAS) provides the industry's most scalable, highest performance WAN optimization solution. Cisco WAAS is able to improve end user experience and reduce bandwidth for key applications. Learn more.

Cisco Ironport delivers strong email protection
The Cisco Ironport is an appliance that is deployed into an existing mail infrastructure. All emails are sent to the IronPort and the IronPort is either the last point out (most common configuration) or it can process email and then send it back to the mail server where it is sent out. Read More

DLP tools deliver strong endpoint protection
With serious data breaches occurring on almost a daily basis, concerns about data protection have skyrocketed. While some experts believe endpoint breaches may no longer comprise the majority of data leaks, the intentional or unintentional release of sensitive data from endpoints within an organization, whether by employees, contractors or guests, remains a serious problem that data loss prevention (DLP) products seek to address. Read More

How we tested DLP products
We tested multiple common endpoint scenarios, by trying to upload, print, email or otherwise transfer data that should be blocked, quarantined, warned about or simply monitored under the rules and policies we set up. The following specific types of endpoint tests were conducted: Read More

The fantastic world of steampunk technology
Gritty Waltham, Mass., was the perfect center of the steampunk universe earlie r this year with a variety of the sub-culture's notion of technology and society on display. If you are not familiar with the steampunk movement, it usually melds Victorian-era design, industrial technology and modern know-how into a fantasy world of machinery and style. In this case the pictures may do a better case of defining steampunk... Read More


WHITE PAPER: F5

Capitalize on the Cloud with a Sound Network Strategy
New research underscores cloud computing's challenging effects on corporate networks, but solutions are available. Learn More!

Businesses should pressure software vendors to meet new Microsoft encryption requirements
Businesses should start leaning on vendors now to upgrade applications that use less than 1024-bit encryption before it's too late. Read More

9 popular IT security practices that just don't work
The security products and techniques you rely on most aren't keeping you as secure as you think Read More

'WAN Optimization': the key WAN technology advance of the past decade
In our last several columns, we've been exploring the history of the Enterprise WAN and the consequences of that history. Read More

Software vendors reach out to users who resist upgrades
Several major software companies, including Microsoft and Symantec, kicked off an initiative called International Technology Upgrade Week to persuade customers to keep their code current. Read More


WHITE PAPER: Shoretel

Sophisticated Simplicity
The key is to build simplicity and ease of use into these solutions from Day 1. This white paper will demonstrate a clear path to UC simplicity, and to overall success of UC deployments. Learn more.

US warning: Big uptick in Reveton malware impersonating the FBI
The US Internet Crime Complaint Center (IC3) today warned that a new drive-by variant of the malware known as Reveton is impersonating e-mail from the FBI and looking for your money. Read More

Top 5 cities for big data jobs
The big data deluge is creating a hiring boom across North America. Modis, an IT staffing firm, identified five cities in particular where big data is driving job growth. Read More

Cisco readying a new Nexus switch
Cisco has another Nexus Ethernet data center switch in the works, this one with ultra-low latency and a more formidable rival to Infiniband. Read More

It's time for wireless LANs to evolve
Tablet computing, smartphones and the current BYOD craze have put a significant emphasis on the corporate wireless LAN network. Even in this current macro where IT spending seems to be in a bit of a lull, one of the few areas of enterprise networking spend that's growing is Wi-Fi. A recent ZK Research survey shows Wi-Fi being the No. 1 area of spend for network infrastructure over the next 12 months.... Read More



SLIDESHOWS

9 ex-Googlers on the move
Former Google employees continue to make their mark on the tech world.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. iPhone 5 to come with much smaller 8-pin dock connector
  2. WikiLeaks dumps Stratfor email dirt on TrapWire, a CIA-connected global spying system
  3. Cisco readying a new Nexus switch
  4. 10 trends driving big data in financial services
  5. RTM builds of Windows 8 reveal Microsoft blocked any bypassing of the Metro desktop
  6. Apple suppliers' banner July suggests iPhone 5, iPad mini launches imminent
  7. Top 5 cities for big data jobs
  8. Steam on Ubuntu could hurt gaming on Linux
  9. IBM claims spintronics memory breakthrough
  10. Open-source movements butt heads over logo

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_architecture_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment