Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Data Protection Channel

News and Analysis

Apple Fingerprint Hack: A Great Reminder

Apple's hacked fingerprint reader serves as a reminder to enterprise users: Be cautious about which two-factor mechanism you use.

More News and Analysis

More News and Analysis in Data Protection Channel »

Architectures

Cloud-Based Security Helps Aspen Fend Off Malware

Cloud security service cuts down on malware infections and provides relief for small network team in Colorado.

More Architectures

More Architectures in Data Protection Channel »

Reviews & Workshops

Mobile Biometrics: The Next Phase of Enterprise Authentication?

Smartphones and tablets equipped with fingerprint readers or other biometric hardware have the potential to drive greater adoption of biometric authentication in the enterprise—if we can get the hardware, software and business processes right.

More Reviews & Workshops

More Reviews & Workshops in Data Protection Channel »

Blogs

user-pic

Information Security Strategy: Stop Punishing End Users

September 30, 2013 11:19 AM
Posted by Joseph Granneman

Enterprise security programs have longed focused on restricting end-user activity, but this strategy hasn't worked. It's time to change course.

See all blogs by Joseph Granneman

| Full Post

Tags: information security strategy, enterprise security, security programs, Microsoft Active Directory, CSO

Channel: Content Management, Networking & Mgmt, Data Protection, Security

user-pic

Data Protection In The Cloud Era

September 18, 2013 02:06 PM
Posted by Tom Trainer

Organizations need to review security policies and procedures before implementing newer technologies such as cloud computing and virtualization.

See all blogs by Tom Trainer

| Full Post

Tags: data protection, cloud computing, virtualization, security policies, extranets

Channel: Public Cloud, Virtualization, Cloud Storage, Cloud Computing, Data Center, Private Cloud, Security, Data Protection

user-pic

9 Immutable Laws of Network Design

September 17, 2013 06:54 PM
Posted by Jennifer Minella

Follow these simple rules to ensure your network is stable, secure and built to last as you overlay new services and applications.

See all blogs by Jennifer Minella

| Full Post

Tags: network design, network infrastructure, virtualized environments, VLAN, software-defined networking

Channel: Next Gen Network, Data Protection, Virtualization, Security, Networking & Mgmt, Wireless

user-pic

Windows 8 Enterprise Benefits And Challenges

September 03, 2013 11:28 AM
Posted by Joseph Granneman

The much-maligned operating system actually offers several security and manageability improvements for businesses. But it still has its downsides.

See all blogs by Joseph Granneman

| Full Post

Tags: Windows 8 enterprise benefits, open source, Windows 8, BitLocker, Windows 7, Start menu

Channel: Data Protection, Wireless, Networking & Mgmt, Security, Content Management

user-pic

New Technologies Target OpenStack Private Clouds

August 16, 2013 02:05 PM
Posted by Tom Trainer

Companies like Druva aim to address data center and private cloud storage and data management challenges using the OpenStack framework.

See all blogs by Tom Trainer

| Full Post

Tags: OpenStack Private Clouds, Druva, OpenStack framework, scale-out object storage, private clouds

Channel: Backup & Recovery, Cloud Storage, Public Cloud, Data Center, Cloud Computing, Data Protection, Storage & Mgmt

user-pic

Self-Encrypting Drives Aren't Magic Security Dust

August 13, 2013 06:49 PM
Posted by Serdar Yegulalp

SEDs may be attractive in this time of heightened data security awareness but they're not necessarily a better option than software-based encryption for data protection.

See all blogs by Serdar Yegulalp

| Full Post

Tags: self-encrypting drives, SEDs, software-based encryption, WinMagic, Microsoft BitLocker, data protection, data security

Channel: Storage & Mgmt, , Data Protection, Security

Next >>


Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers