Tuesday 22 February 2011

How to secure Web applications from insecure mobile devices

CIOs Model Skill Sets to Align with Cloud | Smartphone Security Threats Overdramatized, Experts Say

Network World IT Best Practices

Forward this to a Friend >>>


How to secure Web applications from insecure mobile devices
RSA says 2011 will be the year of mobile device malware and of criminals exploiting these devices to commit fraud and other crimes. With literally billions of devices in use worldwide, it's hard to secure them all. Trusteer takes a different approach: secure the applications people want to access from these mobile devices. The solution involves a secure Web browser on a gateway that the mobile device must use to access the protected application. Read More


RESOURCE COMPLIMENTS OF: Citrix XenServer

Download Free XenServer
XenServer is the only enterprise-ready, cloud-proven virtualization platform you don't have to pay for. With live migration, centralized multi-server management, and shared storage support, you can't afford not to try it! Click to continue

WHITE PAPER: LogMeIn

Install Software on 50 Computers in 5 Minutes
Make routine maintenance truly routine. See how to create, schedule and roll-out repetitive, tedious IT support tasks. From defrag analysis or deploying network drive and printer mapping scripts, to software installations and patch deployments, LogMeIn can improve the way you monitor, access and maintain remote clients. Read now.

CIOs Model Skill Sets to Align with Cloud
Some insights from a recent eventI recently spoke at an IT roadmap event and walked away with some interesting observations: CIOs are building cloud computing into their plans as they model skill sets based on how the current talent will impact new recruitment, training, outsourcing, and retention of staff. Read More


WHITE PAPER: Brocade

6 Questions to Ask about Virtual Data Centers
Organizations can control risk and reduce costs by choosing a cost-effective, phased network architecture upgrade that enables new levels of application flexibility and business agility. Discover how they accomplish this in this informative whitepaper. Read now!

Smartphone Security Threats Overdramatized, Experts Say
I was sitting in the middle of one of the most security conscious crowds you'd ever come across--about 200 computer security professionals listening to a high-powered panel on mobile security threats at the RSA Conference in San Francisco last week. Read More


WEBCAST: IBM

How much network downtime can your business tolerate?
Join this IBM broadcast to learn how to manage and improve network configuration activity to keep your networks running, in compliance and generating revenue. View Now

Avaya extends 'private cloud' capabilities to campus networks
Avaya is taking its data center architecture to the enterprise campus, with the goal of creating "private clouds." Read More

Disk or tape? How about both
Enterprises today have many more backup choices than they used to have, and they're taking advantage by pairing legacy technologies such as tape backups with newer disk-based data protection options. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

When IT professionals cheat
We asked 200 IT professionals to tell us how often IT workers cheat on certification exams, buy fake gear or illegally share software. Here are the results.

Tech 'firsts' that made a President's day
From the first presidential steamboat ride to the introduction of electricity in the White House to Obama's famous BlackBerry, our nation's commanders in chief have always enjoyed the privilege of being exposed to technology's cutting edge -- even if they haven't always embraced the opportunities.

MOST-READ STORIES

  1. Anonymous: It's a trap!
  2. Mobile heavyweights seek to finalize 1Gbps mobile standard
  3. The iPad data dilemma: Where cloud storage can help
  4. iPad could get Intel's superfast Light Peak connector
  5. Disk or tape? How about both
  6. How IT pros cheat on certification exams
  7. Cerf: Future of Internet doesn't include an IPv7
  8. Cisco grapples with transition as routers and switches lag
  9. Cisco's moment of truth
  10. Why you freak out over Facebook

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment