Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Security Channel

News and Analysis

Government Shutdown: What Are IT Systems Risks?

If the looming government shutdown comes to pass, Federal IT faces security, budget, and workflow risks.

More News and Analysis

More News and Analysis in Security Channel »

Architectures

Cloud-Based Security Helps Aspen Fend Off Malware

Cloud security service cuts down on malware infections and provides relief for small network team in Colorado.

More Architectures

More Architectures in Security Channel »

Reviews & Workshops

Digital Hoarding: Do We Have a Problem?

Approximately 2.8 zettabytes of data were created and stored in 2012, and that number is expected to increase 50-fold by the end of the decade. When does data storage turn into data hoarding, and what are the consequences?

More Reviews & Workshops

More Reviews & Workshops in Security Channel »

Blogs

user-pic

Information Security Strategy: Stop Punishing End Users

September 30, 2013 11:19 AM
Posted by Joseph Granneman

Enterprise security programs have longed focused on restricting end-user activity, but this strategy hasn't worked. It's time to change course.

See all blogs by Joseph Granneman

| Full Post

Tags: information security strategy, enterprise security, security programs, Microsoft Active Directory, CSO

Channel: Content Management, Networking & Mgmt, Data Protection, Security

user-pic

InteropNet: Insights from a 19-Year Vet

September 24, 2013 04:39 PM
Posted by

A nineteen-year volunteer of InteropNet says it's the people as much as the technology that keep him coming back.

See all blogs by

| Full Post

Tags: Interop, interoperability, Javits Center, New York, Las Vegas, community

Channel: Wireless, Networking & Mgmt, , Interop, Security

user-pic

WAN Encryption Tops the Agenda After NSA Revelations

September 24, 2013 11:00 AM
Posted by Greg Ferro

Whatever trust customers had in the security of WAN connections from service providers is gone. Encrypt now, and consider less-expensive Internet connections instead.

See all blogs by Greg Ferro

| Full Post

Tags: service provider, NSA, Edward Snowden, IPSec, VPN, MPLS, Frame Relay

Channel: Security, WAN Security, Interop, Networking & Mgmt, , Data Center

user-pic

Data Protection In The Cloud Era

September 18, 2013 02:06 PM
Posted by Tom Trainer

Organizations need to review security policies and procedures before implementing newer technologies such as cloud computing and virtualization.

See all blogs by Tom Trainer

| Full Post

Tags: data protection, cloud computing, virtualization, security policies, extranets

Channel: Public Cloud, Virtualization, Cloud Storage, Cloud Computing, Data Center, Private Cloud, Security, Data Protection

user-pic

9 Immutable Laws of Network Design

September 17, 2013 06:54 PM
Posted by Jennifer Minella

Follow these simple rules to ensure your network is stable, secure and built to last as you overlay new services and applications.

See all blogs by Jennifer Minella

| Full Post

Tags: network design, network infrastructure, virtualized environments, VLAN, software-defined networking

Channel: Next Gen Network, Data Protection, Virtualization, Security, Networking & Mgmt, Wireless

user-pic

12 Must-Attend Interop Events

September 13, 2013 03:41 PM
Posted by Andrew Conry Murray

Interop New York is just around the corner. The show is packed with informative sessions and workshops. Here are a dozen to put on your schedule.

See all blogs by Andrew Conry Murray

| Full Post

Tags: SDN, data center, OpenDaylight, 802.11ac, e-discovery, security, New York

Channel: Networking & Mgmt, , Data Center, Wireless, Security, Virtualization, Interop, E-discovery

Next >>


Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers