Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "compliance"

Total Search Results : 120

Security Snake Oil for Sale

September 11, 2013 04:45 PM
Traditional security systems aren't doing much to help us manage risk, but we keep buying them. Is it the vendors' fault or ours? And are there better ideas we should explore?

The Ugly Break Up: Time for Your Apps to Part

April 09, 2012 09:00 AM
The marketing is there, and has been for some time. Buzzwords have been coined and your interest is piqued. You sat back long enough to see if this was just vaporware or real, while gaseous. Cloud turns out to be more solid than its nomenclature. You’re ready, in fact you’re all in. Now the bad news: If you want to succeed in the cloud, the long-term relationship you've had with your apps must be broken up.

Data Classification Tips And Technologies

March 29, 2012 09:00 AM
As data continues to grow in terabytes in the enterprise, classifying it based on its sensitivity has never been more important. According to a just-released InformationWeek report, 10 Steps to Effective Data Classification, an organizational classification program defines policy requirements; specific classifications, generally as “secret,” “private,” “confidential” and “public,” and their associated data types; processes and procedures; accountability metrics; and repercussions from not following the rules, according to author Erik Bataller, a senior consultant with information security consultancy Neohapsis.

Cloud Enthusiasts Worry About Data Security

March 15, 2012 11:00 AM
IT professionals at companies around the world are all in for cloud computing, but they still worry about the risks the technology may present to their organizations, according to a new survey. The study shows that top challenges to adoption of cloud computing include security, compliance issues, bandwidth capacity and a lack of interoperability with existing applications.

EMC Rolls Out 5 GRC-Centered Security Services

February 29, 2012 01:00 PM
EMC's consulting arm is introducing five security and risk management advisory services. "When you look at the services and the way we set this up, it's very much a reflection of our need to provide our customers with end-to-end solutions... framed under the broader umbrella of GRC--governance, risk and compliance," says Mat Allen, senior director, security and risk management global practice, EMC Consulting. "GRC acts as the center point."

Toward More Reliable Wireless With AirMagnet Enterprise 10

February 27, 2012 04:40 PM
If the phone isn't ringing, then your wireless users must not be feeling any pain, right? That can be a dangerous assumption in large, complicated wireless networks. Some issues may not be crystallized enough to raise your clients' ire, but the fact remains that performance is degraded. AirMagnet's latest Enterprise version wants to make hard-to-find problems more obvious even as the WLAN gets ever more complex.

IPv6: Proper Planning Prevents Poor Performance

February 14, 2012 01:00 PM
IPv6 is coming, and we've reported in this series some of the issues network operators have to deal with in the near future. Two issues that require more than just checking boxes on a to-do list concern compliance and security. However, making sure the IPv6 network is as compliant and secure as the existing IPv4 network can be accomplished with the proper planning.

Time To Buckle Down And Start An IPv6 Project

February 08, 2012 11:00 AM
While the Internet Society (ISOC), a global Internet standards-setting group, has seen a pickup in adoption of IPv6 by some measures, conversion from the IPv4 standard is still relatively slow. The ISOC has scheduled another IPv6 Day for June 6, hoping to build on the momentum for adoption of the new Internet Protocol from IPv6 Day on June 8, 2011. In a three-part series, Network Computing will look at how companies can develop a road map for IPv6 conversion, the technical implications of running IPv6 on an existing IPv4 network, and what compliance and security issues have to be addressed in a transition.

Easing Some Of Virtual Security's Complexities

February 06, 2012 01:00 PM
Virtualization and cloud computing pretty much dominate the IT world, but security and compliance with IT standards are neither trivial concerns nor going away any time soon. But in some ways, security is easier to accomplish in virtual systems than in physical ones.

OASIS Targets Cloud Portability

February 02, 2012 01:00 PM
The Topology and Orchestration Specification for Cloud Applications (TOSCA) Technical Committee recently formed by OASIS (Organization for the Advancement of Structured Information Standards), the not-for-profit open standards consortium, along with several IT vendors and consumer groups, will be good for facilitating cloud portability, industry observers say. The goal of TOSCA is to enable deploying cloud applications without vendor lock-in, while maintaining application requirements for security, governance and compliance.

 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers