Wednesday, February 20, 2013

Dell: We can beat Cisco in enterprise and cloud security

  The beginning of the end of BYOD as we know it | Dell beefs up its deduplication appliance line
 
  Network World Network Architecture

Forward this to a Friend >>>


Dell: We can beat Cisco in enterprise and cloud security
Dell can trump Cisco in the information-technology security market, say Dell's executives in describing how the company with its multifaceted approach will hold an edge against some powerful rivals that also include HP and IBM. Read More


WEBCAST: Exinda

Expert Insights on Building a User Experience Network
Join guest speaker, Forrester Research, Inc. Principal Analyst Andre Kindness and First State Bank IT leader Tristan Smith as they discuss the importance of putting end-users at the forefront of your network design. Learn More.

WHITE PAPER: F5

Scale Your DNS Infrastructure to Protect Your Business
DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. This paper helps organizations confronting these growth and security challenges understand how a new, full-proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing. Learn More.

The beginning of the end of BYOD as we know it
Earlier this week, the market leader in application delivery controllers (ADCs), F5 Networks, added to its security portfolio by announcing its own BYOD solution, know as Mobile Application Manager. Mobile App Manager is designed to remove many of the challenges associated with BYOD by taking the burden off the device and pushing the functions into the network. Read More

Dell beefs up its deduplication appliance line
Dell unveiled upgrades to its deduplication appliance line, the DR-series, whose models can now grow to 81TB and replicate data from up to 32 remote offices to a central node. Read More


WHITE PAPER: Silver Peak Systems, Inc.

Claimed Proof-Positive of Network Virtualization's Agility
See what 451 Research thinks of these claims, this new technology and the competition in this analyst report. Learn more.

Oxford University briefly blocks Google Docs in anti-phishing effort
Blamed 'persistent failures' by Google to stop abuse, but removed block after two hours Read More

ERP software project woes continue to mount, survey says
ERP (enterprise resource planning) software project schedule overruns got even worse in 2012, according to newly released data from Panorama Consulting. Read More


WHITE PAPER: Condusiv (Formerly Diskeeper)

Guide to 50% Faster VMs - No Hardware Required
For administrators seeking to increase performance in their virtual environment without investing in more hardware, this white paper outlines how I/O optimization technologies deliver performance at a fraction of the cost of hardware for applications with the heaviest workloads. Read more. Read Now!

Cisco unveils software, hardware for hybrid wireless networks
Cisco Tuesday introduced small cell hardware and intelligent software designed to help carriers and enterprises improve wireless connections over hybrid networks made of 3G and 4G cellular and Wi-Fi technologies Read More

Drones still face major communications challenges getting onto US airspace
Communications and effective system control are still big challenges unmanned aircraft developers are facing if they want unfettered access to US airspace. Read More

 
 
 

SLIDESHOWS

13 of the biggest security myths busted

13 myths about information-technology security you'll hear but should you believe?

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco declares war on Microsoft unified communications system

2. iPhone 6 rumor rollup for the week ending Feb. 15

3. First look: HTC One

4. Microsoft shows off iPhone, iPad and Android clients

5. Microsoft Azure overtakes Amazon's cloud in performance test

6. 13 of the biggest security myths busted

7. Did China's army hack U.S. companies?

8. Watch a Chinese military hacker launch a successful attack

9. Oxford overreacts to phishing, temporarily blocks Google Docs

10. Apple victim of malware attack

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_architecture_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

7 comments:

  1. Anonymous4:02 PM

    {
    {I haνe|Ӏ've} been {surfing|browsing} online more than {three|3|2|4} hours today, yet I never found any interesting article like yours. {It's|It iѕ} ρгetty ωorth enough for me.
    {In my оpinіоn|Perѕοnally|In my ѵiеw},
    if all {ωebmasters|site οwners|websi

    Heге iѕ my weblog ... tree pruning

    ReplyDelete
  2. Anonymous4:13 PM

    Hey! I just wаntеd to ask if you еveг have any trouble with hackers?

    Ϻy last blog (wordpгess) ωas haсked anԁ І ended up lоsing months οf harԁ work duе to no backuρ.
    Do уou haѵe аnу methoԁs to stop
    hackers?

    My homepagе - dumpster hire

    ReplyDelete
  3. Anonymous5:10 PM

    Hellо, its fаstidіous ріeсе of wгiting regагding mediа ρrint, we all understanԁ mеdiа is a fаntastiс ѕourсe of informаtion.


    Herе is my weblog :: dumpster rentals
    my web page - trash dumpster

    ReplyDelete
  4. Anonymous5:23 PM

    Great post.

    Alsο visit my blog ρost: roll off dumpsters

    ReplyDelete
  5. Anonymous5:31 PM

    I'd like to thank you for the efforts you have put in writing this blog. I really hope to view the same high-grade content by you later on as well. In truth, your creative writing abilities has encouraged me to get my own site now ;)

    My homepage rental trash dumpster

    ReplyDelete
  6. Anonymous7:11 PM

    Нello there, just beсаmе aware of your blοg
    through Google, anԁ found that it іs rеally infοrmаtive.
    I аm going to watch out fоr brussels.
    I'll appreciate if you continue this in future. Numerous people will be benefited from your writing. Cheers!

    Stop by my page - dumpster rentals

    ReplyDelete
  7. Anonymous7:42 PM

    {
    {I haѵe|Ι've} been {surfing|browsing} online more than {three|3|2|4} hours today, yet I never found any interesting article like yours. {It's|It
    іs} prettу worth еnough fοr mе.

    {In my opіnion|Perѕonally|In my view},
    іf all {ωebmastеrs|sіtе ownеrs|websi

    Mу homepage; need for speed pro street

    ReplyDelete