Search This Blog

Friday, May 29, 2009

Security and regulatory concerns slow some server virtualization efforts

Network World logo

Security Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Avaya
rule

Unified Communications: An SMB Example
In this live event on June 11 2009 1 PM ET / 10 AM PT, Jason Snook, IT director for Mindwave Research, will describe why his small-to-medium size business took the leap into unified communications. He'll talk about how UC has measurably improved Mindwave's bottom line, while providing superior business communications for both the company's customers and home-based workers.Join Us.

rule

Spotlight Story
Security and regulatory concerns slow some server virtualization efforts

Ellen Messmer By Ellen Messmer and Jon Brodkin
Some organizations, including Stanford Hospital and Clinics, have prescribed a cautious approach to virtualization, mindful that "there's uncertainty" about what's still seen as a new technology. Read full story

Related News:

Security metrics research
One of the most difficult aspects of managing risk in information assurance (IA) is that our statistical information is so poor. We don't know about security breaches that we have not noticed; we don't report all the breaches that we do notice to any central collection point; and we use dreadful methodology for collecting information using poorly constructed surveys that have tiny percentages of respondents, no internal validation and no follow-up verification.

Virtualization security: So far nothing
In April 2004 I wrote my first article on the topic of virtualization security. I was trying to bring attention to the security aspects of this "new" technology that was getting quite a bit of hype at the time. The hope was that this time security would not be an afterthought, that we would reverse the equine-escape/egress-closure sequence.

Six high-tech "less-lethal" weapons that could ruin your day
It is amazing that over time humans in general have never been at a loss to develop new and unique ways to inflict pain and damage to other humans. With millions of development dollars flowing into the research of these systems, it is at least encouraging to see the government recognize that the emergence of new, high-tech, less-lethal weapons poses a number of possible issues: death, significant injuries and civil rights problems among them.

Configuring an Authoritative Time Server (the cool way)
CloseThe other day, I saw this really cool blog posting by the Directory Servers team titled: Configuring an Authoritative Time Server with Group Policy Using WMI Filtering. Basically, in our every ending quest to ensure time is sync'ed the posting show how to use WMI Filtering to force certain GPO settings upon the PDC emulator.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by Avaya
rule

Unified Communications: An SMB Example
In this live event on June 11 2009 1 PM ET / 10 AM PT, Jason Snook, IT director for Mindwave Research, will describe why his small-to-medium size business took the leap into unified communications. He'll talk about how UC has measurably improved Mindwave's bottom line, while providing superior business communications for both the company's customers and home-based workers.Join Us.

rule

EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.


Create Your Own Agenda at IT Roadmap
Customize a day of learning just for yourself! Attend IT Roadmap Conference & Expo and explore new solutions and examine new technology across 10 relevant areas of IT. Security, Virtualization, SaaS, VoIP, Green IT and more. 10 U.S. cities in '09.
Select your city, register and attend free!

 

05/29/09

Today's most-read stories:

  1. Cisco's huge router reaches five-year milestone
  2. Cisco enhances routers, switches for collaboration
  3. VMware hypervisor still king for enterprise-class workloads
  4. EMC inks deal to acquire Configuresoft
  5. YouTube hit by porn storm
  6. Catalyst 6500 has another decade or more left, Cisco hints
  7. Latest Kaspersky mobile software wipes data via SMS
  8. Nortel looking to sell stake in joint venture
  9. Are you ready for Mi-Fi?
  10. Bluetooth headset Battle Royale


Network World on Twitter: Get our tweets and stay plugged in to networking news


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: