Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "risk management"

Total Search Results : 13

Security Snake Oil for Sale

September 11, 2013 04:45 PM
Traditional security systems aren't doing much to help us manage risk, but we keep buying them. Is it the vendors' fault or ours? And are there better ideas we should explore?

The Critical Need For Data Disposal

June 03, 2013 12:23 PM
With so much stored data having no business value, enterprises need to tackle the challenge of reducing the data mountain.

HP Strengthens Security Portfolio With IPS, Data Center Services

September 11, 2012 04:54 PM
The HP TippingPoint NX Platform Next Generation Intrusion Prevention System and HP Data Center Protection Services are among a host of new offerings that are part of the company's Enterprise Security and Risk Management Strike 2012.

Data Classification Tips And Technologies

March 29, 2012 09:00 AM
As data continues to grow in terabytes in the enterprise, classifying it based on its sensitivity has never been more important. According to a just-released InformationWeek report, 10 Steps to Effective Data Classification, an organizational classification program defines policy requirements; specific classifications, generally as “secret,” “private,” “confidential” and “public,” and their associated data types; processes and procedures; accountability metrics; and repercussions from not following the rules, according to author Erik Bataller, a senior consultant with information security consultancy Neohapsis.

The Limits Of Intuition

August 05, 2010 05:01 PM
We in IT often rely on gut instinct to make decisions. We pride ourselves on the ability to look at a problem and quickly find a solution. We see a vulnerability, know a nasty exploit exists, and react by telling everyone the vulnerability must be patched. Instict and intuition play a useful role in decision-making, but it's a lot more limited than many people would like to admit, particularly in the realm of security and risk management. It's foolish to think that the complex risks that a corporation faces can be met on intuition alone.

CA Technologies And SAP Reduce The Risk In Risk Management

July 27, 2010 10:00 AM
CA Technologies and SAP recently announced a collaborative partnership to help their customers better manage risk and compliance initiatives across both business and IT infrastructure processes. That has the potential of both reducing the risk in risk management, as well as the risk in not being compliant. Before we examine the CA Technologies and SAP partnership specifically, let's consider its broader context. Beyond the "real" physical world our five senses were designed to perceive lies the non-physical world of information and its related processes. Despite being intangible, information is one of the foundations of our society for individuals and organizations. Consider the consequences if your bank account information electronically disappeared.

McAfee Unveils Unparalleled Risk Management Solution

July 19, 2010 09:31 AM
McAfee, Inc. today unveiled the world's most comprehensive Risk Management solution for IT Security. An industry first, the solution combines real-time threat intelligence with global vulnerability scanning across applications, databases and networks, and correlates that with security countermeasures already in place, to help organizations assess their highest priority risks. The solution empowers organizations to focus their limited resources on best protecting company information and taking a more proactive approach to enterprise security.

Jericho Forum's 11 Commandments Of Cloud Security Design

March 15, 2010 11:00 AM
Enterprises are trying to figure out how to adapt their architectures to secure cloud computing as their vanishing perimeters trail off into wisps. The Jericho Forum's new Self-Assessment Scheme offers new guidance for both organizations and vendors, with a framework that fleshes out the Forum's 11 "commandments." These principles of sound security design are crafted with emphasis on de-perimeterization and externalization, that is, the move towards cloud-based IT.

Netwitness(R) And Mnemonic Partner To Offer Next Generation Network Security Monitoring In Nordic Region

July 21, 2009 05:30 PM
Leading it security provider will resell Netwitness' comprehensive network visibility solutions to address advanced persistent threats

IBM Acquires Security Vendor Watchfire

June 07, 2007 08:49 PM
Deal shows the importance of Web application security for enterprises.

 1 | 2  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers