Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "authentication"

Total Search Results : 67

Mobile Biometrics: The Next Phase of Enterprise Authentication?

December 11, 2012 09:33 AM
Smartphones and tablets equipped with fingerprint readers or other biometric hardware have the potential to drive greater adoption of biometric authentication in the enterprise—if we can get the hardware, software and business processes right.

WWPass: Only The Just May Pass the Authentication Test

March 22, 2012 09:00 AM
Security has many facets, but the one that is most familiar is the username/password authentication process that allows users to login to a protected application or Website. For some, that may simply seem to be an inconvenience, but the authentication process helps reduce possible security exposures.

Toward More Reliable Wireless With AirMagnet Enterprise 10

February 27, 2012 04:40 PM
If the phone isn't ringing, then your wireless users must not be feeling any pain, right? That can be a dangerous assumption in large, complicated wireless networks. Some issues may not be crystallized enough to raise your clients' ire, but the fact remains that performance is degraded. AirMagnet's latest Enterprise version wants to make hard-to-find problems more obvious even as the WLAN gets ever more complex.

Aruba Networks Swings Big At BYOD And More With ClearPass

February 21, 2012 09:00 AM
Gone are the days of simply providing good signal in the WLAN environment. Guest requirements, the new reality of the BYOD--or bring your own device--model and increasing reliance on the wireless network as a critical resource combine to make life complicated for us in the business of enterprise wireless networking. Aruba Networks is ready to answer the back-end challenges of contemporary wireless with its new ClearPass framework, and the impressive array of features is not limited to use by Aruba customers.

RADIUS Is The Secure WLAN’s Best Friend

June 16, 2011 11:47 AM
When the topic of high-quality wireless networking comes up, its trendy to bandy about notions of blazing throughput and Star Trek-sounding features like "beam forming" and "band steering." But before a client gets to benefit from the growing magic built into the contemporary wireless network, it probably needs to be scrutinized under the lens of “triple A”: authentication, authorization and accounting. This is where the often unsung hero called RADIUS comes in.

EAPeak Tests Wireless Networks For Authentication Weaknesses

June 09, 2011 01:30 PM
A free new tool from security vendor SecureState may make it possible for wireless network administrators and security consultants to verify how strong their wireless authentication is and whether it is possible for attackers to easily penetrate their networks. EAPeak is a simple Python toolkit that will monitor access attempts to a wireless network and track how clients are attempting to authenticate.

Ponemon Auditors' Survey Reveals Poor Opinion Of Security Programs

March 15, 2011 10:30 AM
Auditors generally take a dim view of the data security programs at organizations that they audit, according to a Ponemon Institute survey sponsored by Thales eSecurity. Only about one-third of the respondents said that the organizations are proactive in managing privacy and data protection risks. Further, three of five say they don't feel data security is a strategic priority. Fewer than half believe these organizations have sufficient resources to meet their data compliance requirements. The net outcome is that half the audits they conduct reveal serious deficiencies or compliance failures.

Tufin Firewall Management Suite Supports Palo Alto Networks' Application-Identity Capabilities

February 11, 2011 10:15 AM
Tufin Technologies has extended its firewall audit and change management capabilities to "next generation" firewalls with support for Palo Alto Networks products. In addition to standard network-based firewall capabilities, Palo Alto enables organizations to create fine-grained policies and rules based on application and user identity using deep packet inspection (DPI) technology.

RSA Offers SMBs Strong Authentication Appliance For Remote Web Access

January 27, 2011 10:30 AM
RSA has announced Authentication Manager Express (AMX), a strong remote access authentication appliance for small and midsize businesses. AMX is designed as a simplified SMB alternative to RSA Authentication Manager, the enterprise-class software behind SecurID.

Symantec Adds VeriSign Services To Protection Center Management Platform

January 20, 2011 04:29 PM
Symantec has announced the integration of VeriSign authentication products into Protection Center, its platform for unified management, intelligence and automation of Symantec and third-party partner security tools. The announcement means that users will be able to manage VeriSign Managed PKI, VeriSign Managed PKI for SSL and VeriSign Identity Protection (VIP) Authentication Service from a single console.

 1 | 2 | 3 | 4 | 5 | 6 | 7  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers