Search This Blog

Wednesday, May 26, 2010

Novell IM 4 aimed at enterprise data center, cloud security providers

NAC: What went wrong? | Cisco's NAC goes off track, customers taken aback

Network World Security: Identity Management

Forward this to a Friend >>>


Novell IM 4 aimed at enterprise data center, cloud security providers
Last issue I briefly mentioned Novell's release of Identity Manager 4, announced at BrainShare in Amsterdam. While I was there I had the opportunity to sit down with Jim Ebzery (senior vice president and general manager for the Security, Management and Operating Platforms) and Nick Nichols (Identity Manager product manager) to talk about the new release. Ebzery, by the way, was formerly responsible for leading the Identity and Security Management business unit so he does know what he's talking about. Read More


RESOURCE COMPLIMENTS OF: WatchGuard

10 Questions to Ask Before Buying a Spam Firewall
Learn 10 commonly overlooked factors when choosing an anti-spam solution. Arm yourself with the knowledge to get the most value possible out of a spam firewall. All you need to avoid a difficult to manage appliance that is a poor fit for your network is this brief white paper. Download here

WHITE PAPER: Riverbed

Overcome Two Key Challenges with Virtualization
How do you accelerate virtualization for your enterprise - and take IT flexibility and cost savings to the next level? Start by downloading this whitepaper from Riverbed. WAN optimization is a class of technology that has rapidly been adopted across enterprises in order to address the challenges of bandwidth limitations and latency over the WAN. Click here!

NAC: What went wrong?
After spending four months in the lab testing the 12 leading network access control products, we've come to this conclusion: Five years of hype, buzzwords, white papers, product launches, standards battles and vendor shakeouts have resulted in very little in the way of clarity. Agreement on what NAC really means and the right approach to NAC remain as elusive today as in 2005, when the first NAC products burst on the scene. Read More

Cisco's NAC goes off track, customers taken aback
As the most important supplier of network infrastructure to enterprises, Cisco's NAC products are a natural point of curiosity for network managers. Unfortunately, though, Cisco's approach to NAC has been riddled with in-fighting, false starts, delayed product releases, and a good dose of chaos and confusion. Read More

Two years later, Apple still won't fix Safari hole
Two years after fixing a security bug in the Windows version of its Safari browser, Apple apparently has decided that Mac users can go without a fix. Read More

Facebook to Launch Simplified Privacy Controls
Facebook is ready to make up for its latest privacy debacle by introducing new privacy settings as soon as Wednesday. Read More


WHITE PAPER: IBM

IBM Analytics Solutions
Business leaders today are making decisions with major blind spots. But with advanced analytics, you can become a smarter, more fact-based enterprise. Read this white paper to see how IBM Analytics Solutions can help you gain a competitive advantage by enabling real-time or near-real-time decisions. Read More

Ubiquitous broadband poses problem for cyber security
Symmetric, high speed, ubiquitous broadband will lead to a big increase in cyber crime, according to a cyber security expert. Read More

Businesses lag in moving away from IE6 and its vulnerabilities, study says
Microsoft's Internet Explorer continues to dominate corporate browser use more so than it does private use, with its nearest rival, Mozilla's Firefox, lagging far behind with one in seven businesses opting for it, according to data collected by Internet-based security service Zscaler. Read More

The smart paranoid's guide to using Google
Google is nearly everyone's best friend. But have you ever stopped to think about just how much Google knows about you? Read More

The 10 Best Hacks of 2010 (So Far)
In honor of Geek Pride Day, Towel Day, and the Glorious 25th of May, here are ten of our most favorite hacks featured in Geek Tech in the last five months, running the gambit from phone, car, and CPU mods. Read on for some great moments in geek! Read More


WHITE PAPER: Novell

File Management Suite
Better track and understand storage patterns, allocate and manage storage based on its relevance and value to the business, while saving money in the administration and procurement of storage resources. Learn to get a handle on the unchecked proliferation of data. Read Now

Piper Jaffray fined £485k for failure to retain emails
The Financial Industry Regulatory Authority has fined Piper Jaffray nearly half a million pounds ($700,000) for failing to retain 4.3 million emails between November 2002 and December 2008. Read More

NAC standards wars end in truce
The Trusted Computing Group's Trusted Network Connect (TNC) is an industry-supported working group developing NAC architecture documents and standards. The first public documents came out of TCG's TNC in 2005 after a year of work, and the group has continued to publish NAC standards and fill out their NAC architecture every year. Read More

Self-replicating nanobots
One of the scariest issues I can think of with respect to nanotechnology is self-replicating nanobots. Read More

Sneaky browser 'tabnapping' phishing tactic surfaces
All of the major browsers on Windows and Mac OS X are vulnerable to a sly new attack tactic dubbed "tabnapping" that can dupe users into giving up passwords by secretly changing already-open browser tabs. Read More

Bank, customer settle suit over $800,000 cybertheft
An unusual lawsuit between a bank and a customer victimized by cyberthieves was quietly settled last week. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Today from the Subnet communities

15 copies of CCNP ROUTE study kits available and 15 copies of Unix and Linux System Administration Handbook up for grabs, too.Deadline May 31.

SLIDESHOWS

40 days of summer (gadgets)
Summer's here and the time is right for looking at gadgets to make the summer days and nights go by easier or more fun at least. If you're going outside to enjoy the sun, hitting the road for a long road trip to a vacation destination, or just staying at home for the perfect "staycation", here are 40 devices or apps we think you'll like.

What if tech companies owned the Wonders of the World?
In this slideshow, we'll take a look into a future where broke governments are forced to sell their most treasured landmarks to the world's richest nerds.

MOST-READ STORIES

  1. Chinese Web site leaks photo of white iPhone 4G
  2. 40 days of summer (gadgets)
  3. Cisco's NAC goes off track, customers taken aback
  4. NAC: What went wrong?
  5. Is Facebook truly sorry for its privacy sins?
  6. The iPad strikes out at Yankee Stadium
  7. Red Hat exec: Oracle's not an open source company
  8. What if tech companies owned the Wonders of the World?
  9. Swap sites gaining popularity
  10. Deeper Windows Phone 7 details continue to surface

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: