Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Kaspersky And Sophos Top Security Vendor Survey

An annual InformationWeek reader survey measuring the quality of security software vendors has found Kaspersky Lab and Sophos at the top of the class. These two companies topped the list of nine antivirus/anti-malware vendors for overall performance, price, and other product-specific features such as virus and malware detection and removal. But it's worthwhile to note only six percentage points separate the top dogs from this list's last-place finisher, Trend Micro.

The survey also found the endpoint security market is still a viable one as it's "growing at a healthy clip".

"You'd have thought the market had saturated already," remarks Kurt Marko, technology columnist and author of the report. "The endpoint security market is actually growing at a fast rate. That could be because the overall threat environments are getting more sophisticated as are the security products themselves.

"Somehow these companies are generating faster growth than the underlying PC market."

The InformationWeek 2012 Antivirus and Anti-malware Vendor Evaluation Survey sought the insights of 386 IT professionals, asking them to gauge the security vendors they've evaluated in the past 12 months. Though the survey asked respondents to share their thoughts on 20 antivirus vendors, only nine received a sufficient amount of responses to warrant a full evaluation, the report read.

On the subject of mobile malware – an increasingly important threat to network security for CIOs to be aware of – the results frame an alarming portrait. Incredibly, 27 percent of the respondents stated they have no plans for mobile device protection at all and 12 percent said they didn't know if their organization had any plans in place to do so.

Marko agreed these are damning statistics and he added it suggests most IT organizations don't have a mobile strategy. Period.

"They haven't even thought about what they're going to do with respect to mobile devices in general within their organizations," he says. "The end users are way ahead of IT on this technology. The notion of mobile device security is only going to come up once organizations start thinking about that overall strategy."


Page:  1 | 23  | Next Page »


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers