Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

WAN Security Channel

Blogs

user-pic

Certificate Authority Hack Points To Bigger Problems

September 07, 2011 07:00 AM
Posted by Jim Rapoza

What with hurricanes, earthquakes and Kardashian weddings dominating recent media coverage, you may have missed the news about a recent security breach that clearly displayed a serious weakness in one of the core security mechanisms of the Internet.

See all blogs by Jim Rapoza

| Full Post

Tags: SSL, data breach, certificate authorities

Channel: Security, WAN Security, Data Protection

user-pic

Hacking Everything

September 01, 2011 08:58 AM
Posted by Lee H. Badman

Here’s a puzzle for you: What do a new Dodge Ram pickup truck, a digital road sign, a young English lady’s cell phone and a modern lighting control system have in common? They’re not all necessarily made in the same Third World country, if that’s what you’re thinking. But they are all exploitable by virtue of their network connectivity, and the implications can be quite worrisome.

See all blogs by Lee H. Badman

| Full Post

Tags: security, hacking, intrusion prevention

Channel: Security, WAN Security, Wireless

user-pic

Black Hat Will Once Again Show Our Security Weaknesses

August 01, 2011 11:15 AM
Posted by Jim Rapoza

The most important thing about Black Hat is the reality check it provides on just how insecure everything really is, from computers to networks to mobile devices to industrial and other systems that are now increasingly connected and exposed. And this week’s Black Hat will be no exception, as several scheduled demos will display just how scary some of these security holes can be.

See all blogs by Jim Rapoza

| Full Post

Tags: Black Hat, security, data breaches

Channel: Security, WAN Security, Data Protection

user-pic

Don't Get Snagged By Spear Phishers

July 12, 2011 07:00 AM
Posted by Jim Rapoza

For one growing security concern, basic security systems and good user awareness may not be enough to keep users and businesses protected. In some of the recent cases of spear phishing, even trained security personnel were tricked into surrendering personal data or infecting systems with malware.

See all blogs by Jim Rapoza

| Full Post

Tags: security, spear phishing, malware

Channel: Security, WAN Security, Data Protection

user-pic

No Data Privacy In The Cloud

July 01, 2011 11:08 AM
Posted by Jim Rapoza

Most people understand that data in the cloud won’t have the same level of security and privacy that data inside your corporate firewall has. But some recent news has shown just how insecure your cloud-based data really is.

See all blogs by Jim Rapoza

| Full Post

Tags: privacy, cloud computing, security

Channel: WAN Security, Security, Data Protection, Cloud Computing

user-pic

Enterprise Social Networks And Security Risks

June 28, 2011 07:00 AM
Posted by Jim Rapoza

While attending UBM TechWeb's Enterprise 2.0 Conference in Boston last week, I heard lots of conversations about the benefits and potential pitfalls of enterprise social networking. One theme that I heard repeated more than a few times was that enterprise social networks can create a greater security risk.

See all blogs by Jim Rapoza

| Full Post

Tags: security, enterprise social networking, enterprise 2.0

Channel: Security, WAN Security, UC & VoIP

<< Previous

Next >>


Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

WAN Security Reports

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers