Tuesday, October 23, 2012

40 BYOD Vendors, 1 Confusing Market | Cisco Outlook Survey | Network Vulnerability Guide

If you have trouble viewing this email, read the online version.

masthead

InformationWeek Reports Newsletter

October 23, 2012
Featured Content
>
>
>
>
>


Gartner: Supply Chain To Become A Top-Three Security Concern
By Tim Wilson

Integrity of data passed between hardware, software, and information suppliers will be a key security issue by 2017, research firm says

Get More Information



 
Follow us:   
 More Resources
5 Mistakes to Avoid in Risk Management & Security
Benefit from your peers - read this whitepaper and discover the five most common mistakes that you should avoid.

Less Secure Than You Think
Advanced targeted attacks are growing in intensity and sophistication. Despite this reality, many organizations are far from adequately protected.

11 Tips - Protect Your Data When you Travel
The FBI/IC3 have warned travellers about insecure hotel ISPs. Get all the details on how to stay safe.

Network Infrastructure

Cisco Outlook Survey
Nearly 600 business technology pros took time to share their perceptions. Some highlights: 85% like the company's security stance, and 61% see Cisco as a leader in data center switches. Yet just 25% will increase use of the company's gear vs. 27% open to or actively replacing. Here's why.

Security

A Guide to Network Vulnerability - Sponsored by Lumension
Building a more robust network vulnerability management program can help you identify security holes before an attacker does, as well as develop more secure systems and applications in the future. In this Dark Reading report, we examine the products and practices that will get you there.

Avoid Risky Business By Analyzing Threats - Sponsored by Tripwire
Risk management is all the rage for handling security today, but it's a practice fraught with misconceptions and challenges. In this special retrospective of recent news coverage, Dark Reading takes a look at best practices, new technologies such as whitelisting, common missteps--and the added risks associated with the cloud and mobile devices coming in and out of the enterprise.

Strategy: Security at Today's Network Speeds
With 10 Gbps Ethernet standard and 40 and 100 Gbps on the way, one big question is whether firewalls, intrusion-detection systems, packet analyzers and other monitoring systems can keep up. If not, your need for speed might prove deadly.

Mobility & Wireless

IT Pro Impact: 40 BYOD Vendors, One Confusing Market
As enterprise IT gears up to battle mobility run amok, vendors are employing some sleight of hand, using a mix of acronyms to disguise few comprehensive offerings. We took the pulse of this hot area, asking 40 providers tough questions about cost, ­capabilities, deployment options and more. Our research shows little distinction between products that are designated as BYOD and those that are MDM, MAM or something else altogether. So now what?

PLUS: Full Response


InformationWeek Reports is brought to you by ESET, FireEye, Lumension, NEC, Q1 Labs, Tripwire, Verdasys and UBM TechWeb.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM TechWeb | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy

 

No comments:

Post a Comment