Friday, February 15, 2013

12 hybrid security products to watch

  Merchants urged to avoid BYOD gear, jailbroken smartphones/tablets for payment processing | Products of the week 2.11.12
 
  Network World Compliance

Forward this to a Friend >>>


12 hybrid security products to watch
Securing a hybrid cloud is not the same thing as deploying hybrid security products. Read More


WHITE PAPER: IBM Corporation

Maximizing enterprise resource planning ROI
In this paper, we highlight the common reasons why midsize companies often do not realize significant ROI with their ERP system implementations and suggest solutions for getting the most value from their applications. Learn More.

WHITE PAPER: Silver Peak Systems, Inc.

Create Your WAN Optimization Shortlist
Understand what's new in the WAN optimization market, what vendors are the key players, and which products are most appropriate for particular use cases and scenarios. Learn more.

Merchants urged to avoid BYOD gear, jailbroken smartphones/tablets for payment processing
Businesses that want to make use of consumer-grade smartphones and tablets as a point-of-sale device to process payment cards are being advised to only do so when appropriate encryption controls and other security measures are in place. Read More

Products of the week 2.11.12
Our roundup of intriguing new products from companies such as CA and Cloudyn Read More

Sex sites out, IT sites in for cybercrooks planting malware
It's long been a tactic by cybercriminals to load up compromised websites with malware-laden links to snare victims, but instead of it being the sex sites as of old, the favored type of website now is for information technology, according to analysis in the Websense threat report out today. Read More

INSIDER
77 MORE great ideas for running a security program
Last year's collection of great ideas was so well received that we decided to do an encore. We've scoured our archives for ideas from CSOs, academics, consultants and philosophers, for concepts big and small. What these ideas have in common is the ability to elevate your department and your career. So grab your highlighter, start each day by reading until you hit an idea that challenges you, mark it, and try it. Rinse and repeat. 1 Cut everybody's speaking time to 5 minutes in this months meetings Experiment: Before your next status meeting, rule that each speaker has only five minutes to speak. Enforce this limit without exception, ideally by putting a kitchen timer on the conference table. See if you get the same amount of information, and whether it clarifies and prioritizes everyone's thinking as they prepare for the meeting. If the rule works, keep it. CLICK HERE TO DOWNLOAD THE PDF Read More


WHITE PAPER: Fiberlink Communications

The ABCs of Mobile Device Management
Check out our "ABC's of Mobile Device Management" e-book to learn about Android fragmentation, BYOD, the Cloud and more. Download it today! Learn More

Startup Nok Nok Labs pitches strong new authentication process
Nok Nok Labs officially opened its doors today to introduce client/server-based technology proposed as an innovative foundation for flexible, strong multi-factor security that can be used in e-commerce, Web services or the enterprise. Read More

iPhoneys: The iPhone 6 and iPhone 5S edition
Can't wait for the next Apple iPhone, whatever it's called? Neither can these designers, marketers and iPhone addicts Read More

Symantec SSL certificates feature cryptography 10k times harder to break than RSA-bit key
Symantec today began offering multi-algorithm SSL certificates for Web servers that go beyond traditional crypto to include what's known as the Elliptic Curve Cryptography (ECC) Digital Signature Algorithm (DSA), which the firm says will be 10,000 times harder to break than an RSA-bit key. Certificates are used to prove site identity to the visitor through a validation check that involves the user's browser and the site certificate, and Symantec is making the argument that authentication will happen faster using this particular ECC algorithm. Read More

Hybrid clouds pose new security challenges
If 2013 is the year enterprises begin implementing their hybrid cloud strategies, as the experts are predicting, then it follows that this will also be the year when hybrid cloud security takes center stage. Read More


WHITE PAPER: CA Technologies

Transforming IT Processes and Culture
Based on market research and case studies, this thought-provoking white paper shows you how innovative IT organizations are launching "overlay teams" to visualize and manage services from a cross-silo perspective. Learn More

New FIDO Alliance pushing 'fast-identity' strong authentication protocol
A new industry group called the Fast IDentity Online Alliance, or FIDO Alliance for short, makes its debut Tuesday to promote adoption in e-commerce and websites an innovative authentication protocol that's intended to bring a higher level of security for online users. Read More

Phishing attacks target home workers as easy 'back door'
Employees working from home could be an easy back door allowing targeted attacks to get behind an organisation's email defences, a survey from security training firm PhishMe has suggested. Read More

Multivendor power council formed to address digital certificate issues
With cyber-criminals increasingly exploiting digital certificates to undermine security the vendors with the most influence as certificate authorities have banded together to try and speak as an industry group to advocate for security best practices. Read More

Bit9 hack casts spotlight on security industry practices
By confessing that its mistakes led to security breaches at three customers, Bit9 has sparked debate over whether the industry is ready to block hackers that see vendors as the door to other companies. Read More

10 biggest time killers at work
Read More

 
 
 

SLIDESHOWS

12 hybrid cloud security products to watch

Here are 12 security products that you can buy for your hybrid cloud whether they run on premise, in the cloud or a little of both.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. No good deed goes unpunished, Dolly Parton edition

2. Ultimate Google toolbox: 20 tips, tricks and hacks

3. iOS devices hobble Exchange servers when they synch

4. Internet Explorer only? IE doubt it

5. 10 biggest time killers at work

6. Android phones are connecting without carrier networks

7. Windows 8 update: Bill Gates gushes about Surface Pro

8. Microsoft unleashes a Patch Tuesday to make your head spin

9. Career advice that will change your life

10. SDN meet sheds little light on Cisco 'Daylight'

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: