Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Unlocking WAN Optimization Security

As networks expand beyond the corporate firewall to mobile devices, companies need to protect sensitive corporate data when it’s viewed and/or stored on smartphones, laptops and tablet computers. Unlike in the wired network world, where you either get the speed that you're supposed to, or some counter or log somewhere points you to what's wrong, in the wireless realm, the variables are almost infinite. It's much more complicated and getting a lot worse.

There is reason to be concerned. A report from antivirus security vendor McAfee from 2011 cited a 76% growth in the amount of malware targeting mobile devices using the Google Android operating system. Google also recently had to acknowledge that a number of the applications available on its Android Market site turned out to be instruments for delivering malware. And one of those malevolent apps could be on an Android phone that an employee uses to access the corporate network.

More Insights


More >>

White Papers

More >>


More >>

Device makers and carriers are also called upon to do their part to secure mobile networks. Last year Sprint became the first carrier to join the Mobile Security Council, which seeks to collaborate to protect against mobile network threats and respond to attacks when they occur. Sprint supports many of the functions of Microsoft Active Sync, which is how many mobile devices connect to a WAN.

If companies are going to let mobile devices connect to their WAN or LAN, they need to make sure the devices can be remotely locked and wiped. This feature secures a smartphone so that if it’s lost or stolen and the phone falls into the wrong hands, data on it can be erased and can’t be accessed.

AT&T, Verizon and T-Mobile offer remote wipe services to subscribers, as do OS vendors such as Apple, Android, RIM and Microsoft.

Learn more about Strategy: Monitoring and Measuring Cloud Provider Performance by subscribing to Network Computing Pro Reports (free, registration required).

Page: « Previous Page | 1 2  

Related Reading

Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Next Gen Network Reports

Research and Reports

Network Computing: April 2013

TechWeb Careers