Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "data breaches"

Total Search Results : 11

Data Breaches, Attacks Still Have IT Security Worried, Survey Finds

May 21, 2012 09:52 AM
Fifteen percent of respondents to the InformationWeek 2012 Strategic Security Survey say they're more vulnerable to attacks and data breaches than they were. Learn why.

Co3 Tackles One Of Security's Hidden Costs

September 13, 2011 08:00 AM
Billions are being spent annually on protecting information, but Co3 Systems is offering a unique solution for what to do after a data breach occurs. The Cambridge, Mass., software-as-a-service (SaaS) startup is announcing an automated, repeatable way to prepare for data loss events, assess their potential impact, and generate and manage incident response plans more efficiently. Its solution can cut incident response process time by as much as half, and can significantly reduce the risk, expense and resources associated with data loss events, says the company.

GlobalSign Puts Holds On New Certificates Pending Security Investigation

September 07, 2011 10:09 AM
After boasts by the Comodo hacker that he'd compromised GlobalSign, the certificate authority (CA) on Tuesday announced that it would temporarily cease issuing any new certificates.

'Operation Shady Rat' Perpetrated Five Years Of Long-Term Attacks On Government, Enterprises

August 04, 2011 11:00 AM
More than 70 government agencies, large commercial enterprises and other organizations have been victims of a series of long-term targeted attacks resulting in the loss of sensitive information and intellectual property during the last five years, according to an investigation by McAfee. In a probe dubbed Operation Shady RAT, researchers gained access to one of the attack servers and obtained detailed insight into the victims, the information stolen and the methods used.

Black Hat Will Once Again Show Our Security Weaknesses

August 01, 2011 11:15 AM
The most important thing about Black Hat is the reality check it provides on just how insecure everything really is, from computers to networks to mobile devices to industrial and other systems that are now increasingly connected and exposed. And this week’s Black Hat will be no exception, as several scheduled demos will display just how scary some of these security holes can be.

Verizon Launches Service Based On Data Breach Report Methodology

June 22, 2011 08:00 AM
Verizon Business is offering an security incident analysis service based on the Verizon Incident Sharing framework (VerIS), the foundation of its highly regarded annual Data Breach Investigation Report (DBIR). The aim of the service is to generate metrics of an organization’s security incidents over time to discover the root causes of vulnerability and take preventive measures.

Survey Shows 3 of 4 Companies Suffer Data Loss

June 13, 2011 08:00 AM
Research released this week by the Ponemon Institute reveals that more than three out of four organizations surveyed have experienced some kind of data loss within the last year. Some of the data loss occurred because of negligence on the part of an employee or a technical glitch, but an increasing percentage of the data breaches were the result of malicious criminal activity, underscoring the need for increased attention to DLP security.

Enterprises Still Gambling on Mobile Device Security

December 01, 2006 05:00 AM
Given the rash of high-profile data breaches and the ease with which mobile devices can be lost or stolen, what reason could companies offer for failing to implement security policies?

Credant Mobile Guardian 5.1 Enterprise Edition

April 05, 2006 04:00 AM
This mobile security platform takes a different -- and more secure -- tack than full hard-disk encryption products.

Credant Mobile Guardian 5.1 Enterprise Edition

March 24, 2006 09:35 PM
This mobile security platform takes a different--and more secure--tack than full hard disk encryption products.

 1 | 2  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers