Monday, August 11, 2014

Riverbed bolsters net management software

Riverbed bolsters net mgmt. software for greater automation | Seven ways DARPA is trying to kill the password

Network World Network/Systems Management

Forward this to a Friend >>>


New security tools from Tenable, HP, Co3 attempt the impossible
Automated incident response is one of the fastest growing fields in computer security. Alternatively called threat monitoring, vulnerability management or threat management, it encompasses the seemingly impossible task of defending a network from active threats as they happen, in addition to detecting every possible vulnerability that could be exploited by an attacker. As such, you don't see tons of companies jumping into this area. But several companies have come out with automated incident response products and three of the leading vendors accepted our invitation for a comparative review -- Tenable Network Security SecurityCenter, Hewlett Packard WebInspect and Co3 Systems Security Module.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Aerohive

The New Mobility: Astonishingly Simple and Powerful
Mobility has not only changed how we live, it is also dramatically changing the network infrastructures that we rely on. For the better. As organizations cope with a tidal wave of mobile users, mobile applications, and demand for pervasive access, it's becoming clearer that prior-generation approaches to providing mobility are breaking. Learn more

WHITE PAPER: McAfee

The Significant Threat of Advanced Evasion Techniques
Advanced hacking methods, like advanced evasion techniques (AETs) have become more prevalent and harder to detect. Yet many network security vendors have downplayed the threat they pose as purely theoretical. Learn the false sense of security many IT professionals are under View Now

Riverbed bolsters net mgmt. software for greater automation
Riverbed tacked three new software modules onto its SteelCentral network management product today, broadening the features already available through that framework.The company's announcement detailed the availability of NetAuditor, NetPlanner and NetCollector modules. The first is designed to improve configuration management, the second to provide robust planning and design capabilities for hybrid networks, and the last to work as an assistant to the other two, by providing real-time data management. Read More


WHITE PAPER: Dell

Achieve Deeper Network Security and Application Control
Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet to safeguard an organization from today's ever-evolving threats, NGFWs must be able to deliver an even deeper level of network security. View Now

Seven ways DARPA is trying to kill the password
A seemingly constant stream of data breaches and this week's news that Russian hackers have amassed a database of 1.2 billion Internet credentials has many people asking: Isn't it time we dumped the user name and password?A lot of the best technology of today exploits biometric factors such as retina patterns, fingerprints and voice analysis, but beyond that a number of researchers are looking to tap into the way we think, walk and breathe to differentiate between us and an intruder.Helping to lead the research is DARPA, the U.S. military's Defense Advanced Research Projects Agency. Its active authentication project is funding research at a number of institutions working on desktop and mobile technologies that work not just for the initial login but continuously while the user is accessing a device. The array of sensors already found in mobile phones makes some of the ideas particularly interesting.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: Citrix Systems

Solving the ADC Market Share Riddle: Winning the Data Center
No other ADC is better equipped to master those transformations than Citrix NetScaler. Gartner Inc.'s market share report confirms that NetScaler alone lives up to the full potential of ADCs for supporting today's IT requirements. Learn why other leading ADCs fall short while Citrix NetScaler gained share consistently for six consecutive quarters. Learn more

Emerging networking technology used by Apple, Cisco will frustrate firewalls
Today's security software is ineffective against an emerging networking technology already in use by Apple for its Siri voice-recognition software, according to research presented at the Black Hat hacking conference this week.The technology, called Multipath TCP (MPTCP), is a souped-up sibling of TCP, a cornerstone Internet protocol for transferring data packets between computers. Cisco and Juniper have also put MPTCP in some of their equipment.But while TCP can only use one connection path to send data, MPTCP can simultaneously use different connection paths, such as Wi-Fi and a mobile phone's data connection, which results in better performance and resiliency.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

Black Hat 2014: How to crack just about everything

From cell phones and cars to IPv6 security researchers have turned their skills against a world of technology.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES of 2014

1. Netscout sues Gartner over Magic Quadrant rating

2. Why TCP/IP is on the way out

3. Amazon Fire Phone: Nice but nothing to get fired up about

4. Rackspace bows out commodity IaaS market in favor of 'managed cloud'

5. Cisco's new UCS fabric interconnect: no ACI?

6. Smartphone kill-switch bill passes California assembly

7. Emerging networking technology used by Apple, Cisco will frustrate firewalls

8. IBM/DARPA turn out brain-like 5-billion transistor superchip

9. 10 ways to get noticed at Black Hat

10. Top 20 colleges for computer science majors, based on earning potential


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment