Tuesday, March 12, 2013

Wireless LAN Security | Cloud ID Management | Cost of Cyber Crime

If you have trouble viewing this email, read the online version.

masthead
March 12, 2013
Follow us:   
InformationWeek Reports Newsletter
 
Featured Content
>
>
>
>
>
>
>

Editor's Note

Why You Need Two Opposing Styles of Monitoring
By Wendy Nather

When most people think of monitoring, they think of catching the intruder, and a whole industry focuses on deep expertise in this area: attacker methods, indicators of compromise, attribution, and fast response. Take a regular Security Information and Event Management (SIEM) system, layer some catching-the-intruder expertise on top and you have a more specialized monitoring system.
Read More




 
 More Resources
Cost of Cyber Crime Study, United States
Consistent with the previous two US studies, the loss or misuse of information is the most significant consequence of a cyber attack, and it comes at significant financial cost. Organizations need to be more vigilant in protecting their most sensitive and confidential information.

IT Executive Guide to Security Intelligence
Learn how security intelligence addresses shortcomings and empowers organizations-from Fortune Five companies to midsize enterprises to government agencies - to maintain comprehensive and cost-effective information security. Read more.

Energy Efficient Data Center Strategies
You can dramatically reduce the electrical consumption of typical data centers with appropriate design of the physical infrastructure. Learn how to quantify the electricity savings and get examples of methods that can greatly reduce electrical power consumption.



WIRELESS

2013 Wireless LAN Survey: The Need for Security, Reliability
It's a mobile world, and Wi-Fi is displacing wired Ethernet: 89% use 802.11 as a client network access method, up from 76% in 2010. Still, IT must meet high expectations for network speed, security and reliability. Perhaps that's why 45% have plans to deploy 802.11ac gear in production.

CLOUD COMPUTING

Cloud ID Management Approaches Sponsored by HP
Identity management is tricky, especially for cloud and SaaS applications. The four approaches available: full or partial Active Directory synchronization, federation or identity-as-a-service. Gain insight into the upsides and downsides of each option.

Moving Legacy Apps to the Cloud
Can you run that old ERP system on Amazon Web Services or CloudStack? Yes, and it just may save you money. However, CIOs need to ensure that teams set expectations, employ the right tools for the right use case and test before leaping. Oh, and don't get stopped by the application lifecycle police.

SECURITY

Building and Maintaining Database Access Control Provisions Sponsored by IBM
Knotted and complex database access permissions are among the biggest threats to enterprise data security. We examine the problems associated with granting permissions to sensitive data, and recommend solutions that will help organizations effectively grant privilege when and where it is needed.

DATA CENTER

Data Center Debate: Benefits of Standardization vs. Reality of Specialization
Most IT pros like uniformity: 60% have explicit policies to ensure consistency, and 57% of these respondents have enforcement mechanisms. But there's something to be said for systems purpose-built for a specific task, given that 45% err on the side of looser standardization. There's also the hard fact that in the age of BYOD and cloud, you're often fighting a losing battle.

MOBILITY

Mobile Commerce: State of the Market
Every business needs a plan for what's projected to be a $1 trillion market by 2017. Here's how to future-proof mobile commerce investments and strategies, and weigh the pros and cons of various approaches and architectures.

UNIFIED COMMUNICATIONS

The UC Identity Crisis Sponsored by Mitel
Judging by our InformationWeek Unified Communications Survey, vendors looking to sell IT on unified communications systems aren't making as much headway as they'd like. In response, restless marketing executives are tacking on new capabilities and adding modifiers, like "collaboration" and "social business," in an effort to gain traction while abandoning the "UC" terminology. So what does that mean for enterprise IT teams that just want to get everyone talking?

InformationWeek Reports is brought to you by HP, IBM, Mitel, Schneider Electric and UBM TechWeb.


You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter.

If you received this newsletter from a friend and want to join.
Read about and join other InformationWeek Newsletters here.

UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy

 

No comments:

Post a Comment