Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "Security"

Total Search Results : 325

Voting Machines Should Be As Secure As Slot Machines

November 06, 2012 02:32 PM
Casino gaming machines undergo independent scrutiny to certify their reliability. Shouldn’t voting machines get the same treatment?

AlienVault Unified SIEM Bundles Security Tools For MSPs And Enterprises

February 17, 2011 08:00 AM
AlienVault Unified SIEM 3.0 is an integrated package of tools presented as an attractive way for managed service providers to extend their security capabilities, including a full enterprise security information and event management offering. The latest version of Unified SIEM, announced at the RSA Conference, provides tight integration of the company's Open Source SIEM (OSSIM) with a fistful of security tools available for deployment, making it well-suited for MSPs.

AirMagnet Enterprise 9.0 Takes WLAN Security Up A Notch

January 31, 2011 07:05 PM
The tidal wave of mobile devices washing over the enterprise these days is on everybody's mind. We all have our own frames of reference and reasons to care about the running invasion of portable devices and the insatiable demand for networks in the air, and AirMagnet comes at it from the security angle with its new Enterprise 9.0. Wireless environments are dynamic enough to keep us on our toes when things are healthy and everyone is behaving themselves, but human nature is never far away, and so wireless security has to be kept conversationally front and center. The stakes are high in many market spaces that have wireless networks, and AirMagnet Enterprise 9.0 promises new capabilities and improved responsiveness for wireless customers that simply cannot afford to go unarmed.

Imation Scanner Protects Tapes

August 05, 2009 03:25 PM
Tape vendors have been including a little bit of flash in their tape cartridges -- and over hyping the capabilities of that memory -- since Sony added MIC (Memory in Cassette) to AIT-1 in 1996. Imation's Secure Scan extends the real usefulness of the RF accessible cartridge memory beyond identifying unique tapes and tracking error data to securely locking tapes for transport.

In Packet Inspection Race, Cisco Sees FPM As Key To Network Security

July 30, 2009 06:42 PM
Cisco has an interesting tease for an upcoming Webcast entitled "Defending Your Router in 256 Bytes or Less." The thesis is that "the increase in accuracy and performance of network security products has pushed hackers to create attacks within the first 256 bytes of code that slip into networks under the radar." The upshot is that Cisco is pitching Flexible Packet Management (FPM), a technique it developed as a more effective way to block attacks than the deep packet inspection methods that are widely used.

Network Solutions Data Breach Proves Savvy Aren't Always Secure

July 27, 2009 07:20 PM
The data breach at Network Solutions, where hackers broke into the company's servers and stole info on 573,000 credit cards, shows how vulnerable even the presumably Net savvy can be. Hey, if a domain registrar and Web host can have their systems breached, is anyone safe?

Is It Time To Offload IT Gateway Security To A Cloud?

July 01, 2009 07:22 PM
Managing the security risks that multiply with technologies like Web 2.0 comes at a time when Gartner estimates that less than 30 percent of organizations have devised or implemented effective malware-fighting strategies.

Smartphone Security: How To Manage Rogue Mobile Devices

May 30, 2008 08:00 AM
A single unsecured smartphone can jeopardize the security of your entire organization. Here's how to manage the risk by using firm IT policies and mobile device management software.

Rolling Review: Layer 7 SecureSpan XML Networking Gateway

May 17, 2008 04:00 AM
The first entry in our all-in-one SOA appliance review shows that increased competition means lines between product categories are blurring -- and IT is benefiting.

Virtualization's Promise And Problems

May 16, 2008 08:01 PM
The virtual desktop and data center are here, but for this technology to continue taking over the enterprise, I/O and security issues need to be addressed.

 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013

TechWeb Careers