SECURITY Insecurity with Java - Sponsored by Imperva In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea? Strategy: Securing The Mobile User - Sponsored by Verdasys Despite the growing acceptance of the bring-your-own-device — or BYOD — movement, there are a number of things working against IT. Fortunately, there are also a number of tools, some of them free, that security professionals can use along with strong policy and best practices to close the enterprise mobile security gap. 5 Keys to Painless Encryption - Sponsored by HP Our 2012 State of Encryption Survey profiles the struggles most IT groups have when trying to manage encryption products. Simply put, the adage "encryption is easy, key management is hard" still holds. But the game is changing. Eight Steps to Securing Small Databases - Sponsored by IBM In this report, we recommend database security strategies and tools for smaller enterprises and workgroups--as well as for smaller databases--that have a big stake in protecting their data but don't have big budgets or dedicated security staff. Achieving Compliance In The Smart Grid - Sponsored by TraceSecurity In the energy business, strict compliance mandates could be all that stands between business as usual and a catastrophic, long-term power outage. Standards regulating the smart grid are often difficult to meet, but they can be leveraged by organizations in all industries to lock down corporate and customer assets. STORAGE AND SERVERS 2013 State of Storage - Sponsored by Schneider Electric A burst of innovation in storage hardware and software means better performance and integration. Some highlights: Ethernet is taking off, with a combined year-over-year boost of 20 points in iSCSI and FCoE; 60% now encrypt at least some stored data; 26% cite insufficient staffing as a top concern, up from 19% in 2012.
VIRTUALIZATION Informed CIO: SDN and Server Virtualization On A Collision Course First came VMMs and cloud software stacks for servers and storage, then SDN for networks; soon, the two will link to form what VMware calls "software-defined data centers." It's a nexus that's disrupting strategies at major IT vendors and, ultimately if not imminently, every enterprise data center.
UNIFIED COMMUNICATIONS Strategy: The UC Identity Crisis - Sponsored by Mitel Judging by our InformationWeek 2012 Unified Communications Survey, vendors looking to sell IT on unified communications systems aren't making as much headway as they'd like. In response, restless marketing executives are tacking on new capabilities and adding modifiers, like "collaboration" and "social business," in an effort to gain traction while simultaneously abandoning the "UC" terminology. So what does that mean for enterprise IT teams that just want to get everyone talking?
InformationWeek Reports is brought to you by HP, IBM, Imperva, Mitel, Schneider Electric, TraceSecurity, Tripwire, Verdasys and UBM TechWeb. You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter. If you received this newsletter from a friend and want to join. Read about and join other InformationWeek Newsletters here. UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy
| |
No comments:
Post a Comment