Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "encryption"

Total Search Results : 115

Building An Information Security Policy Part 2: Hardware and Software

February 27, 2014 01:20 PM
Here's how to select the right network device hardware and software to support your security policy.

Protecting Yourself From NSA Web Surveillance

September 11, 2013 07:01 PM
After new reports of NSA digital snooping, security expert Bruce Schneier advises Internet users to use public-domain encryption. Meanwhile, Google steps up its encryption efforts.

Top IaaS Security Requirements To Consider

July 22, 2013 03:03 PM
Don't rush into an Infrastructure as a Service contract without evaluating regulatory compliance requirements, data protection controls, and contractual obligations.

Encrypting Backups Requires Key Planning

April 02, 2013 12:29 PM
Some enterprises are adopting an "encrypt everything" policy to address the confidentiality and security of data, including on backups. A new backup product from Sepaton separates encryption from key management.

Storage Head-Scratchers

January 18, 2013 10:43 AM
Not every idea that comes out of the storage industry is a good one. Here are three developments in storage encryption, patents and holographic storage that have got me scratching my head.

Best Use of Encryption You Never Considered

December 04, 2012 03:03 PM
Got e-discovery, data destruction or outdated hardware woes? Digital shredding may be the solution — and it can bolster the business case for encrypting data.

Porticor Beefs Up Cloud Security with Split-Key Encryption

October 31, 2012 02:53 PM
Porticor's Virtual Private Data service encrypts information stored in private and public clouds, and uses homomorphic encryption techniques to protect master keys.

The State of Data Storage Management: 2011 vs. 2012

July 27, 2012 12:13 PM
In 2011, data storage management was all about centralization and consolidation. Now, the tide has turned to data reliability, security and performance. Learn why.

Certes Unveils Cloud Encryption Virtual Appliance

April 24, 2012 09:00 AM
Concern about the security of cloud-based data is a big issue for enterprises. Several technology companies, now joined by Certes, are trying to allay customer concerns about data security by giving them control of the keys that protect their data in the cloud.

PerspecSys: Removing a Key Security Barrier to Public Cloud Adoption

February 23, 2012 01:00 PM
Several months ago, an IT trade publication (which will remain nameless) published an article whose title stated that public cloud security remains "mission impossible." While the article was well-reasoned and backed off from the title's hyperbolic assertion, the damage had already been done. Actually, the title should have been something more like, "Public cloud security is mission possible, but proceed cautiously."

 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers