Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "network security"

Total Search Results : 69

Cloud-Based Security Helps Aspen Fend Off Malware

September 25, 2013 02:40 PM
Cloud security service cuts down on malware infections and provides relief for small network team in Colorado.

Five SDN Benefits Enterprises Should Consider

July 12, 2013 02:12 PM
SDNs promise speedy service provisioning, network flexibility and other advantages, according to a new InformationWeek report.

BYON: New Acronym, Same Problem

October 22, 2012 10:13 AM
Bring Your Own Network is a new name for an old threat, but it emphasizes an important rule: unsecured data is at-risk data.

Network Security a Growing Virtualization Concern, But Also an Opportunity

July 02, 2012 02:40 PM
Almost two-thirds of respondents to a new InformationWeek network security expect to have half or more of their production servers virtualized by year's end. Find out how that could help network security in the long run.

Report: BYOD, Virtualization, Mobile Will Make 45% of Networks Obsolete by 2016

June 29, 2012 02:21 PM
As more technologies devour more enterprise network resources, fewer will be able to keep up with the demands by 2016, according to Dimension Data's Network Barometer 2012 report.

Five Ways to Engineer Better Network Security

June 26, 2012 10:54 AM
BYOD policies, mobile devices, IT compliance, Wi-Fi access and other demands are all affecting network security. Experts offer five network design tips to help increase IT functionality and improve security.

Survey: Gen Y Workers Want Mobile Devices; Prep Your BYOD Policies

June 25, 2012 10:36 AM
A new survey finds that one in three Gen Y workers will work around BYOD policies in order to use mobile devices while on the job. Learn why, and how enterprises should tackle the bring-your-own-device dilemma.

Cisco Visual Networking Index Predicts More Video and Devices

June 15, 2012 09:00 AM
According to the latest Cisco Visual Networking Index, there will be much more video by 2016, which will increase bandwidth and quality-of-service demands. The growth in tablets and smartphones will lead to new management and security challenges.

BGP Origin Authentication and RPKI

June 14, 2012 09:00 AM
The BGP Origin Authentication is a positive step, writes our blogger, but it has a downside. Learn more about IP address theft.

Data Breaches, Attacks Still Have IT Security Worried, Survey Finds

May 21, 2012 09:52 AM
Fifteen percent of respondents to the InformationWeek 2012 Strategic Security Survey say they're more vulnerable to attacks and data breaches than they were. Learn why.

 1 | 2 | 3 | 4 | 5 | 6 | 7  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers