Friday, May 16, 2014

New products of the week 05.12.14

How to optimize your security budget | Google Apps users getting encrypted messaging that goes beyond Gmail

Network World Compliance

Forward this to a Friend >>>


New products of the week 05.12.14
Our roundup of intriguing new products from companies such as IBM and CA Read More


WHITE PAPER: Tintri Inc.

Simplify VMware Backup & Recovery
Simplify storage for your VMware environment. Read data protection capabilities available for VMware VADP backup and recovery, the advantages and disadvantages of different backup solutions, and how these backup methods impact both the backup and restore workflows. Learn more

WHITE PAPER: Intigua

Systems Management Virtualization
Discover how virtualizing the management layer, by de-coupling agents from the underlying server infrastructure, eliminates the need to install physical agents on servers and makes ongoing management tasks such as provisioning and updating agents as simple as copying a single "virtual agent" file to all required servers. Read more. Learn More

How to optimize your security budget
The good news is that security budgets are rising broadly. The bad news? So are successful attacks. Perhaps that's why security budgets averaging $4.3 million this year represent a gain of 51% over the previous year a and that figure is nearly double the $2.2 million spent in 2010 a all according to our most recent Global Information Security Survey, conducted by PricewaterhouseCoopers. Read More

Google Apps users getting encrypted messaging that goes beyond Gmail
Google is making available a service to allow its enterprise customers to send and receive encrypted e-mail to users of non-Google mail systems, including Yahoo and Microsoft Exchange. Read More

INSIDER
Step-by-step guide to documenting your network
Every network should have a customized manual of sorts with maps showing the network layout and written documentation on all the basic aspects of the network. Read More

Security-vendor snake oil: 7 promises that don't deliver
Beware bold promises from a multibillion-dollar industry that can't prevent your IT systems from being routinely hacked Read More


WEBCAST: Brocade Communications

IT Agility: How Do You Stack Up?
Are you faced with increasing pressure to deploy technology faster? You're not alone. This year, over half of enterprises will be prioritizing building a private cloud, a concept introduced less than five years ago. View Now>>

Brown HIV researchers make Dropbox secure with nCrypted Cloud
While workers have embraced consumer technology in the workplace with enthusiasm, those technologies have posed pesky problemsA for organizations that deal with sensitive personal information, especially universities. Read More

Reining in out-of-control security alerts
Enterprises unable to process the flood of alerts received each day from security systems have several options available to regain control and improve network defenses, experts say. Read More

Facebook experiment helps battle man-in-the-middle attacks
Researchers at Facebook and Carnegie Mellon University have developed a detection tool for man-in-the middle attacks that security pros might find helpful in protecting corporate data. Read More

Research gives reason to double-check Heartbleed fix
System administrators rushing to fix the highly publicized Heartbleed vulnerability may have introduced the flaw into unaffected websites, a security researcher says. Read More


WHITE PAPER: Sophos, Inc.

Advanced Persistent Threats: Detection and Protection
In this paper we'll explain how a multi-faceted approach to protect against APTs including layers of defense can reduce the risk of attacks. Learn More

Glow in the dark -- how CISOs can find their way through the darkness of the web
Even my favorite small sushi shop has a website with an online ordering capability. It also has a blog with news, events, and recipes and an option to subscribe to the newsletter. Read More

License reader lawsuit can be heard, appeals court rules
A federal appeals court this week ruled that a woman's Fourth Amendment rights may have been violated when San Francisco police arrested her after an automated license plate reader mistakenly identified her car as stolen. Read More

Why an NFC iPhone Could be Big for Enterprise Security
Last week, a report from New York-based global investment news site BrightWire.com suggested that Apple's upcoming smartphone, the iPhone 6, will (finally) support near-field communications (NFC) technology. BrightWire.com cited "a source close to the matter." Read More

Avast: Users frequently hitting websites loaded with ransomware
Fresh statistics from the maker of a widely used free security product show the extent to which users are encountering file-encrypting malware known as ransomware. Read More

7 enterprise messaging companies to watch
Just a taste of the growing number of business-centric messaging companies out there. Read More


SLIDESHOWS

10 nerdiest Linux gadgets

Of all the nerdy Linux gadgets out there, these take the cake.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. TechEd: Microsoft reveals new Office features available only in the cloud

2. 8 emerging tech titles -- grab 'em before they're hot

3. Cisco may be bouncing back, but can Chambers hold on?

4. New evidence that Microsoft is preparing a cloud-based Windows OS

5. Step-by-step guide to documenting your network

6. New NSA Chief expects attacks attempting to damage, destroy critical infrastructure

7. Upgrade to Samsung Galaxy S5? No thanks

8. Microsoft sticks to vow, leaves XP exposed to ongoing attacks

9. Juniper Networks goes 'Back to the Future'

10. Real reason behind California's kill-switch bill: Bieber


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: