Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "malware"

Total Search Results : 118

Gigamon Unveils Branch Office Node, FlowVUE App

May 06, 2013 02:29 PM
News roundup: GigaVUE-HB1 leverages GigaSMART; Ixia debuts ControlTower architecture; CipherCloud bolsters compliance policies; ForeScout and FireEye team up to combat malware.

Attackers Hold Upper Hand Despite Increased Security Spending

April 04, 2013 12:23 PM
From advanced malware to spear phishing that spoofs business communication, companies are being pounded by attacks, according to a new report.

Demand for IT Security Experts Outstrips Supply

March 12, 2013 02:15 PM
IT security professionals are in high demand, especially those with certifications, and security salaries are on the rise. But a shortage of talent leaves companies struggling to get their hands around breaches.

The New Olympic Sport: Information Security Attacks

August 01, 2012 12:44 PM
Redouble patching and end-user education to avoid getting burned by information security attacks tied to current events like the Olympics Games.

Cybercriminals Building Intricate, Multiuse Malnets

February 15, 2012 01:00 PM
Cybercriminals have gotten so sophisticated that they can build an intricate network infrastructure and use it repeatedly for the distribution of malware, according to a new study from the network security company Blue Coat Systems. These malware networks, or malnets, lure targets through trusted websites, then route them to malware through relay, exploit and payload servers to deliver the malware payload. While malnets are becoming increasingly sophisticated, Blue Coat says these assets can be identified and the malware attacks blocked.

Sourcefire Uses Big Data Analytics To Stop Malware

January 25, 2012 03:15 PM
Cyber security vendor Sourcefire's latest product uses big data analytics methods to search data to discover patterns in malware attacks and intervene to stop them. The release of FireAMP comes the same week that Cisco Systems released its fourth-quarter 2011 Global Threat Report that details how pervasive the malware threat is to networks. Cisco reports that in the fourth quarter, enterprise users experienced an average of 339 Web malware encounters per month. For all of 2011, the average was 362 per month. Cisco also reports that 20,141 unique Web malware hosts were encountered per month in 2011, up from 14,217 in 2010.

Security 2012 Outlook: Brace For New Types Of Attacks

December 28, 2011 12:00 PM
Each time enterprises manage to thwart one type of cyber attack, the criminals develop a new strategy. A recently released security forecast from Cisco Systems identifies the new threats to watch out for in 2012. Meanwhile, a security industry education group predicts that salaries for security experts will grow by 4.5% next year as demand for their services grows with the threats.

Security 2011: Attack Of The Human Errors

December 22, 2011 01:33 PM
Some household names in enterprise and consumer technology suffered the embarrassment of having been hacked by cybercriminals in 2011. RSA, of all companies -- the IT security division of EMC -- had to admit that its two-factor SecureID protection technology for customers had been compromised. And the most high profile breach affecting consumers made news when the Sony PlayStation Network was hacked, affecting 77 million customers whose private information was stolen.

Palo Alto Networks Introduces Next-Generation Firewalls For Branch Offices, Apple Devices

November 08, 2011 08:11 AM
Palo Alto Networks, which earlier this year launched the PA-5000 series of next-generation firewalls, has introduced the new PA-200, which protects branch offices and home offices as well as the bigger models. It has also upgraded its GlobalProtect technology for secure remote access to specifically protect Apple computers and mobile devices.

Raytheon And SafeNet Team To Deliver Next Generation Malware Detection Technology

July 29, 2011 10:35 AM
Raytheon Company has entered into an exclusive licensing agreement with SafeNet, Inc., a global leader in information security, to market RShield, Raytheon's advanced malware detection product.

 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers