Friday, September 03, 2010

Organizing sensitive data in the cloud

RSA Security Extends Compliance to Virtualization | InfoWorld review: Meeting the network security and compliance challenge

Network World Compliance

Forward this to a Friend >>>


Organizing sensitive data in the cloud
What does a cloud vendor do to properly segment various types of sensitive data within its cloud? Gregory Machler discusses how to capture the metadata you'll need. Read More


WHITE PAPER: Tripwire

Taking the Time Crunch Out of IT Compliance with Automation
Read this exclusive white paper from compliance leader Tripwire to learn how a Protect, Detect, and Correct compliance strategy can give you back your most precious resource: time. Read More!

WHITE PAPER: Symantec

Backup and Disaster Recovery eGuide
In these articles, Network World and its sister publications CIO, Computerworld, CSO and InfoWorld lay down the groundwork and explore the latest tips and technologies for no-fail corporate data backup and disaster recovery. Get your copy now!

RSA Security Extends Compliance to Virtualization
In between the cloud rhetoric and virtualization hyperbole at this year's VMworld, I'm starting to see a few significant announcements. RSA Security made one of these by introducing virtualization intelligence in its Archer compliance suite. Read More

InfoWorld review: Meeting the network security and compliance challenge
ArcSight, LogRhythm, and NitroSecurity lead a strong field in mining event log data for security alerting, compliance auditing, and countless other uses Read More


WHITE PAPER: HP

HP EVA Cluster: Unleash the power of your physical storage
Infrastructure Convergence is the key to successful IT transformation. One key element to achieve total convergence is to pool your compute and storage resources via virtualization technologies. Learn how the EVA Cluster can be used to unleash the power of your physical storage. Read Now

DARPA takes aim at insider threats
Looking to protect its massive networks from myriad insider security threats, the Defense Advanced Research Projects Agency rolled out a project that would let security personnel quickly detect and stop network insiders stealing or distributing military or government information. Read More

What to Consider After Passing CCNA
If you want to work with Cisco, and you want certs, your opening moves are obvious. Although Cisco positions CCENT as its entry-level certification - the "E" even stands for Entry - the prerequisite cert for all the rest of the Cisco cert world is CCNA. However, once you get that CCNA, the choices are wide and varied. Today we'll take a look at some of the things to consider when reaching this point,... Read More


WHITE PAPER: Tripwire

Taking the Time Crunch Out of IT Compliance with Automation
Read this exclusive white paper from compliance leader Tripwire to learn how a Protect, Detect, and Correct compliance strategy can give you back your most precious resource: time. Read More!

Why automation and virtualization must go hand in hand
With VMworld 2010 this week, and in particular VMware's own strategic cloud infrastructure announcements, start-ups and longtime IT fixtures alike are clamoring to get the word out that they've got what it takes to help enterprises coordinate between virtualized premises-based infrastructure and the public cloud. Read More

Leadership Development on a Shoestring
Even with limited resources, you can provide effective leadership training for your team by following these three suggestions. Read More

Join Network World's group on LinkedIn
Why join Network World's LinkedIn group? You can have interesting discussions with your peers, managed by Network World editors. You can make new contacts in your industry. It looks good on your profile. And of course, it's free. Join today. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Are you the corporate geezer?
Our first Geezer Quiz in 2009 has been so popular that we've created this new set of questions that will test your memory and perhaps also bring on a wave of nostalgia for the days of minicomputers, X.25 and token ring. Keep score and see how well you do at the end. Enjoy!

The hottest virtualization products at VMworld
With VMworld kicking off in San Francisco, this is one of the biggest weeks of the year in the virtualization industry. VMware, Citrix, EMC and many other companies are releasing new virtualization technologies or adding virtualization capabilities to existing products. Here's a roundup of what's being announced this week.

MOST-READ STORIES

  1. Burning Man's open source cell phone system could save the world
  2. U.S. spends $11M to kick-start video search technology
  3. Microsoft to VMware: Windows is still relevant in the virtualization era
  4. VMworld 2010: Virtualization, The Matrix, VMware/Microsoft rivalry
  5. Eight great virtual appliances for VMware, free for the downloading
  6. The new iPhone that's not a phone: the latest Wi-Fi only iPod touch
  7. Botnet takedown may yield valuable data
  8. Brocade set to take Cisco, Juniper on in 100G
  9. Brocade set to unveil 100G Ethernet
  10. 6 useful Wi-Fi tools for Windows

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: