Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "cloud security"

Total Search Results : 8

Top IaaS Security Requirements To Consider

July 22, 2013 03:03 PM
Don't rush into an Infrastructure as a Service contract without evaluating regulatory compliance requirements, data protection controls, and contractual obligations.

The Biggest Cloud Computing Security Risk Is Impossible to Eliminate

August 10, 2012 03:41 PM
A recent "epic hacking" that involved Amazon and Apple accounts just goes to show that the biggest security risk in cloud computing is from humans. Learn how mistakes, negligence and even reasonable use can blow apart a digital life.

Public Cloud Is Neither More Nor Less Secure Than Private Cloud

June 26, 2012 02:57 PM
Claims that public cloud is more secure than private cloud are pure FUD and ignore the responsibilities that each party plays in information security. What matters is how well your applications and VM are protected. Learn why.

Study: Mobile, Cloud Computing Factoring Into Disaster Recovery

May 30, 2012 09:51 AM
This year's disaster recovery study from AT&T finds that 67% of the 504 respondents are including wireless network capabilities in their business continuity plans, while 38% are investing in the cloud.

TrendMicro Adds Enhanced Host Security & New Cloud Encryption

August 31, 2010 11:30 AM
Trend Micro is adding an anti-malware module to its host-based security product, now Deep Security 7.5, the host-based intrusion prevention product from the acquisition of Third Brigade last year. They are also introducing SecureCloud, a hosted encryption service for protecting data in the cloud. The anti-malware capability protects individual virtual machines at the hypervisor level, eliminating the need for managing agents on each client VM. SecureCloud encrypts data to and from Infrastructure as a Service cloud improving security and compliance requirements.

Novell Announces General Availability of Novell Cloud Security Service

August 24, 2010 10:06 AM
Novell today announced the general availability of Novell Cloud Security Service. Part of Novell's WorkloadIQ vision, Novell Cloud Security Service gives cloud providers the ability to deliver secure access and compliance in the cloud for their customers. Novell Cloud Security Service is a critical part of Novell's broader identity and security portfolio, which enables enterprises to have a consistent framework for managing identities across physical, virtual and cloud deployments. Novell is the only vendor to offer this integrated capability, which helps organizations manage complex security and compliance requirements through a cost-effective and easy-to-use suite of products.

The Cloud As An Extension

August 06, 2009 07:16 PM
In my recent series of entries for Byte and Switch, I attempted to categorize cloud storage. Various companies are delivering sub-sections of cloud storage that when stacked together form the solution.

Is It Time To Offload IT Gateway Security To A Cloud?

July 01, 2009 07:22 PM
Managing the security risks that multiply with technologies like Web 2.0 comes at a time when Gartner estimates that less than 30 percent of organizations have devised or implemented effective malware-fighting strategies.

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers