Search This Blog

Monday, June 21, 2010

Provisioning and the cloud

  Network access control vendors pass endpoint security testing | Network access control management: Pick your poison
 
  Network World Security: Identity Management

Forward this to a Friend >>>


Provisioning and the cloud
At last month's GlueCon conference my buddy Nishant Kaushik (he's lead strategist for identity management at Oracle) delivered a very well-received presentation entitled "Federated Provisioning and the Cloud." He's posted the slides online, but -- more importantly -- he's written a series of blog posts explaining the session and going into much more detail. Read More


RESOURCE COMPLIMENTS OF: AT&T

AT&T
Designing Tomorrow's Ethernet-Based Metropolitan Area Networks Click to continue

In this Issue


WHITE PAPER: ArcSight

Building a Successful Security Operations Center
This paper outlines industry best practices for building and maturing a security operations center (SOC). For those organizations planning to build a SOC or those organizations hoping to improve their existing SOC this paper will outline the typical mission parameters, the business case, people considerations, processes and procedures, as well as, the technology involved. Building a Successful Security Operations Center

Network access control vendors pass endpoint security testing
One of the main promises of NAC is that you can ensure that endpoint security tools are up to date and that non-compliant machines can be identified or blocked. As regulatory compliance has grown in importance, NAC vendors have reacted by building strong feature sets aimed at endpoint security and compliance. In our NAC testing, we had good, and sometimes great, results across the board when it came to endpoint security. Read More

Network access control management: Pick your poison
In testing 12 NAC products, we discovered an incredible variety of management styles. To organize our results, we broke things up into three main categories: overall management, separation of control, and high availability. Read More

Police seize a million child porn pictures from one man
"Someone must have stashed those pictures on my computer; I have no idea how they got there." The lament has become a favorite excuse of child pornography perverts and a nightmare for those legitimately victimized ... but it's obviously not available to this recently arrested Austrian. From an Associated Press story: Austrian authorities say they have arrested a man who hoarded more than a million... Read More

Dell backtracks slightly on Ubuntu safety
In a move that probably shocks no one, Dell has removed a statement that Ubuntu is more secure than Microsoft Windows from its website.Given that Dell sells computers pre-loaded with Windows, one might imagine the company came under a wee bit of pressure from the software maker. As I reported yesterday, in Dell's Top Ten things you should know about Ubuntu, No. 6 wasUbuntu is safer than Microsoft® ... Read More

Can X Prize help deliver Gulf region from BP oil disaster?
The X Prize Foundation, known for offering millions of dollars in prize money to drive innovations in aerospace, life science and energy will soon offer its potentially extensive help to the White House in an effort to tackle challenges of the devastating BP Oil spill in the Gulf of Mexico. Read More


E-GUIDE: Compuware

Perfecting Application Performance
The enterprise application scene has become increasingly complicated over the years. Things have changed with the rise of Web services, SOA, Virtualization and cloud computing. In this Executive Guide explore how to get the best performance out of today's application environments. Read Now.

Google Street View Wi-Fi data included passwords and e-mail
Wi-Fi traffic intercepted by Google's Street View cars included passwords and e-mail, according to the French National Commission on Computing and Liberty (CNIL). Read More

Apple OS X gets IPsec VPN client
Mac users are being offered a new and feature-rich alternative to Apple's in-house OS X VPN client, free of charge to individual users. Read More

Banking's big dilemma: How to stop cyberheists via customer PCs
In online banking and payments, customers' PCs have become the Achilles' heel of the financial industry as cyber-crooks remotely take control of the computers to make unauthorized funds transfers, often to faraway places. Read More

Security Careers: The Mic is Always On. Always.
"This is a big BLEEPING deal," remarked Vice President Joe Biden. Apparently he forgot the microphones were on and sensitive enough to capture his remark, intended to be private. Read More

Advocacy Groups Ask Facebook for More Privacy Changes
Facebook recently made some significant changes to its privacy settings, but ten advocacy groups are want the social network to do more. The groups are asking for six additional privacy changes, ranging from providing a more secure user connection to the Facebook site, to giving you more control over how third-party apps access your data. Read More


WHITE PAPER: Novell

Intelligent Storage Management at the File Level
Many storage management tools for file storage are "dumb." They treat all files the same regardless of business relevance and they lack the ability to automate user-storage management tasks or set policies based on business requirements. Learn how to augment your existing storage management system with intelligence at the file level. Read Now

iPad hacker arrested on multiple drug charges after FBI search
One of the hackers in the group that snatched more than 100,000 iPad owner e-mail addresses from AT&T's servers was arrested Tuesday on felony drug charges after the FBI searched his Arkansas home Read More

Supreme Court ruling lets employers view worker text messages with reason
The U.S. Supreme Court has ruled that the Ontario, Calif., police department has the right to search through personal text messages sent by employees on city-issued devices. Read More

Cisco NAC: Strong in-line enforcement
While Cisco's overall NAC strategy is in flux, a NAC Appliance investment is likely to come with substantial purchase protection — just be sure to keep your SMARTnet contract up to date. Read More

Enterasys NAC: Put it on your short list
Enterasys has done a good job making sure that its NAC product works very well in non-Enterasys networks. Because Enterasys NAC has both in-line and edge-enforcement technologies in a single product line, we think that this is a definite short-list for any 802.1X-based NAC deployment. Read More

Juniper NAC: Powerful, complex
Trying to describe Juniper's UAC is difficult, because Juniper's NAC strategy has its tendrils in virtually every security product the company makes, from firewalls to switches to SSL VPNs. Read More

McAfee NAC focuses on endpoint protection
McAfee NAC is clearly slanted towards endpoint security and compliance requirements more than fine-grained network access controls. Because McAfee NAC depends heavily on ePolicy Orchestrator, existing McAfee end-point security customers will find that adding McAfee's NAC to their networks is a very natural and easy extension. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Books for you from Microsoft Subnet and Cisco Subnet

Throw your name in the hat for a complete CompTIA Security+ study guide and the SharePoint bible, Essential SharePoint 2010. Deadline July 31. Enter today!

Computerworld and Network World: Best of Green IT

Computerworld and Network World: Best of Green IT Computerworld and Network World are teaming up to identify the top organizations leading the way with green-IT efforts and the coolest green-IT products. Computerworld will feature two ranked lists in its Oct. 25 issue: Top green-IT end-user organizations and a Top green-IT data center suppliers/vendors. Network World will feature the most effective green-IT products, as cited by survey respondents, in its Oct. 25 issue and online. Please fill out our short survey or forward this link to the person in your company best able to answer questions about IT energy issues. Surveys should be submitted by Thursday, July 1 at 12 noon EST.

SLIDESHOWS

A brief history of smartphones
How the smartphone went from a high-end enterprise device to an everyday consumer staple.

Summer gadget guide 2010
From a solar-powered watch to a speaker for your bike helmet and a nifty geocache finder, these 10 high-tech toys are perfect for summer.

MOST-READ STORIES

  1. Ruling lets employers view worker text messages with reason
  2. Run on IPv4 addresses could exhaust supply by December
  3. Facebook, stop what you're doing: Amazon has patent for 'social network'
  4. 10 great illustrations of Linux humor
  5. Microsoft gives look at internal "YouTube" network
  6. Dell says Ubuntu is safer than Windows
  7. Banking's big dilemma: How to stop cyberheists via customer PCs
  8. End of life for CSA? That's okay
  9. DNS security reaches 'key' milestone
  10. Tech argument: LTE vs. WiMAX

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_identity_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: