Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "data security"

Total Search Results : 46

Self-Encrypting Drives Aren't Magic Security Dust

August 13, 2013 06:49 PM
SEDs may be attractive in this time of heightened data security awareness but they're not necessarily a better option than software-based encryption for data protection.

Survey: Gen Y Workers Want Mobile Devices; Prep Your BYOD Policies

June 25, 2012 10:36 AM
A new survey finds that one in three Gen Y workers will work around BYOD policies in order to use mobile devices while on the job. Learn why, and how enterprises should tackle the bring-your-own-device dilemma.

Big Data Security: The Balance Is Shifting in Favor of IT

June 18, 2012 11:35 AM
There's a perception in the marketplace that encrypting data equals a big performance hit. That's not necessarily the case anymore.

Minnesota DoJ Uses Biometrics Streamlining Security, Paperwork

June 02, 2010 08:00 AM
When the Minnesota Department of Justice began its eCharging program, the goals were to streamline workflows and to reduce the amount of paperwork between law enforcement agents in the field and the court system. Paperwork backlogs adversely affected productivity, and law enforcement officers in the field received the added benefit of not having to key in unique user ID and password combination for 10-12 different law enforcement databases that they regularly accessed from laptops in squad cars.

Data Security Is A Federal Issue Now

January 27, 2010 09:00 AM
Just when you think you have dodged the data security bullet, here come the Feds. My view on data security of late has been that those who thought they needed to secure information have done it, and those who didn't were not in a big hurry to do it. Times are changing. The Federal Data Breach Notification Law that recently passed through the house is now on its way to the Senate and then on its way to you.

How To Assess Offshore Data Security

May 31, 2008 04:00 AM
Secure offshore outsourcing takes similar strategic thinking as in-house work.

Your Data And The P2P Peril

March 15, 2008 04:02 AM
Usher, 10,000 BC, and your company's confidential spreadsheets could all be out there for the world to grab. Here's how these data leaks happen and what you can do to

PCI And The Circle Of Blame

February 23, 2008 05:00 AM
Who's responsible for the security of credit card data? From retailers to auditors to card brands, the first order of business is self preservation--and that costs all of us.

Review: Automated Code Scanners

April 13, 2007 04:00 AM
With our developer hats on, we tested three source-code analyzers, evaluating language and platform support, usability and customization. Find out which one stood out from the others -- thanks

Analysis: Automated Code Scanners

April 13, 2007 04:00 AM
Vendors claim that adopting source-code security analyzers will fortify your business and protect your precious data. But should they be your only line of defense, or will they simply lull

 1 | 2 | 3 | 4 | 5  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers