Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Interop Track Helps Attendees Improve Security And Risk Management

While exposition halls and vendor product announcements tend to get the most attention at conferences such as this week's Interop in Las Vegas, the greatest value for many attendees is in education, in the form of the many workshops and technology tracks at the conference. One area of particular concern is that of security and risk management, and the Information Security and Risk Management Track at Interop provides many sessions that look at the trends in security and how IT can better protect sensitive data.

According to track chair John Pironti, president of IP Architects, one of the key focuses of this track is based on getting attendees to rethink how they approach security and risk management. "The track is more about studying the tone of how to look at different ways of examining the problem and getting ahead of the problem versus just looking at pure technology," he says.

Pironti adds that current methods of security and risk management, which focus mainly on technology solutions rather than dealing with levels of risk, aren't working. He points to increasingly sophisticated attacks, such as advanced persistent threats, which have led to many of the high-profile breaches in recent months. "We need to think about going beyond compliance and beyond traditional, commoditized technology concepts that aren't working for us anymore. How do we start getting ahead instead of being behind all of the time?" he says.

Among some of the issues addressed in this track are how to turn employees into security assets rather than potential points of data leakage, as well as defining the problem based on risk to data rather than securing technology assets. The track will also focus a fair bit on technology tools, but will help attendees focus on what they need to know to be more protected versus what vendors tell them they need to do, according to Pironti. A full schedule of the Information Security and Risk Management Track at Interop can be found here http://www.interop.com/lasvegas/conference/information-security-and-risk-management.php.

See more on this topic by subscribing to Network Computing Pro Reports Strategy: Database Breaches (subscription required).


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers