Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "AES"

Total Search Results : 14

Encrypting Backups Requires Key Planning

April 02, 2013 12:29 PM
Some enterprises are adopting an "encrypt everything" policy to address the confidentiality and security of data, including on backups. A new backup product from Sepaton separates encryption from key management.

Porticor Beefs Up Cloud Security with Split-Key Encryption

October 31, 2012 02:53 PM
Porticor's Virtual Private Data service encrypts information stored in private and public clouds, and uses homomorphic encryption techniques to protect master keys.

What Do We Do Now That All Wireless Security Protocols Are Busted?

July 26, 2010 09:30 AM
Just like that, the last bastion of wireless security went in the toilet. By now, anyone in the wireless game has likely heard about the Hole 196 attack that renders WPA2--depending on your tolerance for the parameters of the exploit--useless. Sure, the Advanced Encryption Standard (AES) used in WPA2 is still sound enough to have the confidence of the US government for its beefiest encryption needs, but WPA2 itself now has a black eye. A big one.

Wireless Security: What's Good Enough?

September 26, 2005 12:42 AM
Despite strong advances in WLAN security, a survey found that many organizations don???t take even basic precautions. Here are some wireless security best practices to allay your concerns.

Safe Hotspotting With For-Hire VPNs

April 14, 2005 11:53 AM
These two for-hire virtual private networks help make your hotspot experience safe and secure so you can check your e-mail and enjoy your latte without worry.

Vendors Unveil Smarter Access Points

November 30, 2004 03:49 PM
D-Link claims its new access point simplifies management for small and medium-sized businesses.

Funk Software Releases WiFi Secure Access Client With WPA2 Support

November 01, 2004 05:01 AM
Upgrade to Odyssey Client also adds support for the WLAN protocols EAP-FAST and EAP-SIM, and Microsoft machine credentials.

Space For Rent

October 27, 2004 03:56 PM
Network Computing reviews five online backup services for agent functionality, ease of use, system-management capabilities, cost and retention schemes.

Does 802.11i Solve Your WLAN Security Problems?

July 12, 2004 12:00 PM
The new security standard provides momentum for what could be a major ramp up of WLAN implementation in the enterprise.

802.11i Ratification Expected To Spur WLAN Adoption

June 25, 2004 04:00 PM
Thursday's final ratification of the 802.11i WLAN security standard will boost confidence in WLAN security and encourage enterprise deployment, experts say.

 1 | 2  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers