Search This Blog

Monday, October 31, 2011

Cisco rolls out military-strength encryption for ISR router

Cisco, AT&T offer Wi-Fi IPTV | Will the sky fall if you don't deploy IPv6?

Network World Cisco

Forward this to a Friend >>>


Cisco rolls out military-strength encryption for ISR router
Cisco has announced a hardware encryption module for its ISR G2 router that allows point-to-point encryption of IP traffic based on what's called "Suite B," the set of encryption algorithms designated by the National Security Agency for Department of Defense communications. Read More


WHITE PAPER: MegaPath

Today's Network: Make It a Strategic, Future-Proof Asset
Today's small and mid-sized organizations support dozens of applications and hundreds of devices and mobile workers. Network congestion has become a risk, as users change offices, work from home and add devices at will. SMBs need simplification in the form of network convergence. And a managed service provider can help. View Now

WHITE PAPER: Intel

Optimize virtualization with HP & Intel
Virtualization has become a powerful enabler for consolidating servers, running applications in multiple operating system environments, simplifying administration and lowering operating costs. This paper describes how to optimize server virtualization using enterprise-class HP Multi-Port Server Adapters and Intel® Ethernet technology. Click to continue

Cisco, AT&T offer Wi-Fi IPTV
Cisco this week said it launched a wireless IPTV service with AT&T. Cisco says it is the sole provider of the wireless IPTV system, including receivers and access points, for AT&T's U-verse service. The Cisco gear will be deployed across the entire U-verse footprint beginning Monday, October 31. Read More


WHITE PAPER: Quest Software

Create a Solid Backup Strategy
The simpler a backup plan is to plan and execute, the more likely it is to be done. Read Now!

Will the sky fall if you don't deploy IPv6?
Will the world end? Will the Internet grind to a screeching halt? Will your computer systems disintegrate into a pile of bits and bytes? In short, no. At least not yet. But you may want to consider a few things. Read More


WHITE PAPER: ExtraHop

Application Performance Management
In this eGuide, Network World, with sister publication CIO, offer news on the latest trends, best practices, and straightforward advice on these solutions and the challenges of managing application performance. Learn More!

Brocade on the block again?
Brocade is reportedly shopping itself around again, two years after failing to find a buyer the first time. According to The Wall Street Journal, citing "people familiar with the matter," Brocade rehired investment bank Qatalyst Partners to stoke interest in the company again. Read More

68 great ideas for running a security department
Looking for inspiration? Want to learn a few new ways to elevate your security game? Can you spare five minutes to think strategically and long-term instead of just putting out another fire? Read More

Coolest Mac-o-lanterns from around the world
Pumpkin carvers honor Jobs, Woz, iPads, iPhones & Macs Read More



SLIDESHOWS

20 high-tech toilets
Today's techiest toilets incorporate music players, motion-activated lids, heated seats, washing and drying functions, and more. Take a look.

GOODIES FROM MICROSOFT SUBNET
We've got books on System Center and Microsoft training of the winner's choice from Webucator.. Enter here.Also: Please take our survey on certifications and your career

MOST-READ STORIES

  1. Microsoft claims Hyper-V will leapfrog VMware
  2. DARPA offers $50,000 prize if you can figure out these shredded puzzles
  3. New Nokia phone name, Lumia, means 'prostitute' in Spanish
  4. HP to keep PC division, rejects spin-off idea
  5. Cisco rolls out military-strength encryption for ISR router
  6. Researchers find "massive" security flaws in cloud architectures
  7. Paycheck payoff for IT certs still declining
  8. Linux Foundation wades into Windows 8 secure boot controversy
  9. Attackers trick Facebook users into exposing secret security codes
  10. History of malware: from script kiddies to rootkits

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_cisco_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: