Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "PII"

Total Search Results : 4

PerspecSys: Removing a Key Security Barrier to Public Cloud Adoption

February 23, 2012 01:00 PM
Several months ago, an IT trade publication (which will remain nameless) published an article whose title stated that public cloud security remains "mission impossible." While the article was well-reasoned and backed off from the title's hyperbolic assertion, the damage had already been done. Actually, the title should have been something more like, "Public cloud security is mission possible, but proceed cautiously."

Encryption Key To Evolving Data-Centric Security Model

February 07, 2012 11:00 AM
With data access no longer restricted to the four walls of the enterprise (or branch) and 9-to-5 business hours, enterprises that have traditionally relied on a perimeter-based approach to security are now seeing the benefits of a data-centric approach. Data encryption is paving the way for the transition to data-centric security methods, according to a survey of 506 IT professionals.

Enterprises Need to Pay More Attention to Data Privacy

February 15, 2010 12:00 PM
Many enterprises are still under the delusion that they can do more or less what they want with individuals' personal information. The European Union, many states (including California with its data breach law), and now Massachusetts are attempting to disabuse them of that notion. But this situation is not only about how to achieve compliance with disparate laws; it should also be a wakeup call informing enterprises that they now have to manage information for more than what they consider to be their primary business processes.

Strategic Security: Privacy Compliance Suites

January 19, 2007 05:00 AM
Inadvertently exposing customers' personally identifiable information is a sure way to land your company in hot water. On tap to help: enterprise-ready privacy compliance systems, or PCSs, the next evolutionary

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers