Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "information security"

Total Search Results : 10

Public Cloud Is Neither More Nor Less Secure Than Private Cloud

June 26, 2012 02:57 PM
Claims that public cloud is more secure than private cloud are pure FUD and ignore the responsibilities that each party plays in information security. What matters is how well your applications and VM are protected. Learn why.

Security Professionals Get The Best Toys

March 23, 2012 10:00 AM
Do you think penetration testers--the people that companies hire to break into organizations and test their defenses--remain immersed in the pale glow of a stack of monitors listening to techno and mainlining over-caffeinated fruit drinks? I was visiting Steve Stasikounis, CEO of Secure Network Technologies and Dark Reading contributor, last week in his offices, and he couldn't help showing off his latest penetration testing and forensic investigation tools.

Verizon Acquires Security Vendor Cybertrust

May 14, 2007 07:36 PM
Deal will help Verizon Business deliver managed security services.

Architecting for Data Security

December 01, 2006 05:00 AM
IT pros must understand and address the liability associated with granting unfettered access to sensitive data. We explore methods for safeguarding private information while keeping it usable for applications.

EMC and RSA: A New Day for Data Security

July 13, 2006 04:00 AM
EMC's acquisition of RSA gives the company a competitive advantage in the information security space and a golden opportunity to lead the market in a new direction.

The Politics of Infosec

July 15, 2005 04:00 AM
Faced with the public embarrassment of data security breaches, companies must get their infosec acts together. Immediate notifications will let those affected head off fraud.

Network Forensics

December 03, 2004 06:00 AM
Agent Gil Grissom isn't standing by to investigate your info-security incidents. Having an incident-response policy and designated team in place before a security breach occurs will protect your company's assets

Network Forensic Tools

December 03, 2004 06:00 AM
We tested a range of investigative tools, from full-featured remote image acquisition products to specialized apps that can dig deep into text or mail stores. Find out which ones will

Enterprises Fail on Internal Security

November 05, 2004 06:00 AM
A new study indicates that although companies are more aware of security risks, they are failing to do what they should do to prevent them.

Under Attack

July 05, 2004 04:02 AM
Businesses are suffering more downtime as the threat from viruses and worms continues to grow (Originally published in Information Week)

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers