Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "RSA"

Total Search Results : 39

The Real Reason IT Security Fails

December 19, 2013 11:50 AM
Humans are the weak link in security, but blaming them for clicking on links or opening phishing emails overlooks basic human nature.

Email Encryption And The Goldilocks Principle

July 15, 2013 03:32 PM
Trying to find an email encryption system that's just right for both users and security pros? Good luck.

EMC Navigates the IT Transformation Waters

May 21, 2013 04:43 PM
Here's what I took away from this year's EMC World, including thoughts on Pivotal and ViPR.

Encrypting Backups Requires Key Planning

April 02, 2013 12:29 PM
Some enterprises are adopting an "encrypt everything" policy to address the confidentiality and security of data, including on backups. A new backup product from Sepaton separates encryption from key management.

Vendors Roll Out Mobile Security, Vulnerability and Forensics Tools

August 06, 2012 12:37 PM
Mobile device management (MDM) is top of mind for many nowadays, so it's not surprise that mobile security was a focus at Black Hat. Learn more about MDM products announced during the show, as well as new vulnerability management and forensics tools.

HP: When 'Good' Security News Isn't

April 23, 2012 09:00 AM
HP is just the latest in a long list of security vendors touting its comprehensive cyber security report showing what the most recent threats are, how they’ve changed and--sometimes subtly, sometimes not--how their security technology can protect you. But its study is another illustration of how the tech industry is constantly playing catchup with the criminals. HP’s report also illustrates how seemingly good news can turn out to be bad.

EMC Unveils More Flexible IT Bundling

April 12, 2012 09:00 AM
These days, companies basically have two options for bringing new information technology into their data centers. They can acquire all the servers, storage, networking and software from different vendors, try to put it all together and make it work, or they can buy one big appliance that’s simpler to set up but is of a fixed configuration. EMC is offering a third option that combines the best attributes of the previous options, which it calls VSPEX.

Preventing SSL Certificate Authority Breaches

April 09, 2012 09:00 AM
SSL (X.509) certificates have been the backbone of public key infrastructure and privilege management infrastructure since virtually the onset of the Worldwide Web. But in recent years, SSL certificates have been in the headlines for all the wrong reasons, with certificate authorities (CAs) from RSA to Dutch company DigiNotar suffering high-profile breaches.

More Security Breaches: Denial Not An Option!

April 02, 2012 09:00 AM
It has happened again. Another breach. Another report of millions of credit card numbers at risk. Another round of media coverage. Another reminder that despite all the sophisticated technology that enterprises have deployed to protect computer networks, these breaches still happen. But despite the negative publicity that comes from continuing reports of such breaches, the need to be vigilant about thwarting such attacks remains, says Steve Durbin, global vice president of the Information Security Forum (ISF).

HireRight Data Center Refresh Ups Performance 50%, Cuts Power 45%, Footage 60%

March 02, 2012 09:30 AM
HireRight--a provider of cloud-based, on-demand employment screening programs--in collaboration with Cisco and EMC has implemented green technology while launching a refresh to its data center infrastructure. The company says the new deployment increases performance by 50%, decreases power consumption by 45% and reduces data center square footage by 60%.

 1 | 2 | 3 | 4  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013

TechWeb Careers