Monday, 14 March 2011

This SIEM is a good fit for small and mid-sized companies

SAP sees BI on tablets gaining ground with mobile workers | How to Prepare Your Enterprise for iPad 2: Expert Tips

Network World IT Best Practices

Forward this to a Friend >>>


This SIEM is a good fit for small and mid-sized companies
When you think of security information and event management (SIEM) tools, you typically think of vast enterprises that have thousands of devices logging millions of events every day. In such cases, a SIEM might be the only way to truly gain visibility into such a large network. But smaller companies can benefit from a SIEM tool, too—especially if the IT department is small and overworked. TriGeo Network Security offers a tool for the SMB market that's like having a security expert on staff. Read More


RESOURCE COMPLIMENTS OF: IT Roadmap Denver

IT Roadmap Denver - April 28, 2011
IT Roadmap Denver returns April 28 to the Colorado Convention Center! Through executive keynotes, ROI workshops, technical tutorials, strategy sessions, networking opportunities and a private IT expo, attendees will gain insights into the latest IT issues, trends, challenges and solutions from top IT analysts and practitioners. Register now to attend!

WHITE PAPER: Compellent VMware

Seven storage features every VM needs
The key to maximizing your VMware environment is to create a storage environment as flexible as your virtual server environment. Learn how Fluid Data storage from Compellent maximizes VM Storage performance and efficiency, while being a cost-effective solution. Learn more.

SAP sees BI on tablets gaining ground with mobile workers
SAP AG has deployed 3,500 Apple iPads globally, mainly for software developers and sales execs who use them for real-time access to vital BI data, SAP CIO Oliver Bussmann said in an interview Wednesday. Read More

How to Prepare Your Enterprise for iPad 2: Expert Tips
Many CIOs were hoping the iPad would fade into the shadows of the next new thing, as so many other tech gadgets have. But the iPad is proving to have a lot more staying power than many predicted--and the consumer-driven iPad is on a crash course with enterprise IT. CIOs will need to handle anything and everything the iPad, Apple and iOS app developers throw at them. Read More


WHITE PAPER: Polycom

Microsoft and Polycom Strategic Alliance
Learn how Microsoft and Polycom deliver a complete and interoperable end-to-end UC solution that addresses key business challenges like total cost of ownership (TCO), productivity, efficiency, and team collaboration. Read now.

Cross-Ocean Clouds Are Gaining IT Favor
Concerns about latency and questions about legal and regulatory issues aren't stopping CIOs from moving key systems to the cloud, even if it means using applications that are hosted in data centers located overseas. Read More

CIOs plot their response to tech's unstoppable forces
CIOs at Computerworld's Premier 100 conference share their responses to the IT trends, including mobile devices, ubiquity and cloud computing. Read More


WHITE PAPER: F5 Networks

The Antidote to DNS Cache Poisoning and Other DNS Attacks
Domain Name System (DNS) provides one of the most basic but critical functions on the Internet. If DNS isn't working, then your business likely isn't either. Secure your business and web presence with Domain Name System Security Extensions (DNSSEC). Learn more!

How CIOs Can Devise a Social Business Strategy
Untapped data. Inability to scale. Dismal adoption. Overspending. Gaping security holes. These are some of the most common challenges—and often sources of failure—that enterprises encounter following a social solution deployment, according to a new report by Forrester Research. Read More

8 must-have Android security apps
While Android is a terrific operating system in many ways, it does pose some real risks for IT departments. Last week's revelation that Google had to remove around 50 malware-infected applications from its Android Market highlighted the downside of the company's "free love" approach to publishing applications where it will let anyone put their app on the market and will only take it down if alerted by a third-party user. The upside of this, of course, is that the market also offers a wide variety of quality security applications that can protect you from malicious apps. Here are eight Android applications that can help IT departments keep a better hold on employees' Android-based devices. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of VMware ESXi books. Enter here.

SLIDESHOWS

Perks drive up pay for tech CEOs
Many tech vendors have shied away from extravagant perks, but there are still plenty worth highlighting. Like a $1.5 million tab for home security. Or how about the $36,619 one company paid to reimburse its CEO for the taxes he had to pay on the $106,589 he gained by using company aircraft for personal flights? Read on to find out which tech CEOs enjoyed the priciest perks in 2010 and which ones went to work perk-free.

First look at Google Chrome 10
Google has released the stable version of Chrome 10 and users are now being automatically updated. As always, Chrome's new features focus on security, speed and simplicity, with greater JavaScript performance, sandboxing technology for Adobe Flash, password encryption and an easier-to-use settings interface. Here's a look at the new features.

MOST-READ STORIES

  1. Researchers develop more powerful biofuel alternative
  2. Google still scrambling to recover from DroidDream Android attack
  3. Ex-Microsoft CTO publishes groundbreaking cookbook
  4. If you had bought 100 shares of Microsoft 25 years ago ...
  5. Harvard computer scientist Leslie Valiant wins Turing Award
  6. The eight most important commands on Cisco ASA security appliance
  7. VMware unleashes virtual desktops for Apple iPad
  8. Microsoft pushes more Kinect-like user interfaces
  9. Botnets, cloud computing power may be fueling attacks against VoIP
  10. Most Android, iPhone apps violate open source rules

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment