An effective security policy requires careful planning to ensure the roles and capabilities of routers, switches and firewalls are properly configured.
Network Computing
Permanent link to this post (24 words, estimated 6 secs reading time)
Categories: General.
Tags: Building, Devices, Information, Network, Part, Policy, Security
By IPHere —
February 19, 2014 at 12:13 pm How many apps do you have on your smartphone or tablet right now? Well, take that number, and multiply it by 0.9. That’s about how many of your apps are a potential security concern according to a new study from Appthority.
The Appthority Reputation Report for Winter 2014 was compiled using data from the cloud-based Appthority App Risk Management Service. Appthority performed static, dynamic, and behavioral app analysis of 400 paid and free apps spanning iOS and Android to assess the relative security and risky behavior of the most popular apps.
This is a preview of
Report finds iOS apps riskier than Android apps
.
Read the full post (108 words, estimated 26 secs reading time) Categories: General.
Tags: Android, Apps, Finds, Report, riskier, Than
By IPHere —
February 19, 2014 at 12:15 am If things go as planned for disk drive manufacturers, Heat Assisted Magnetic Recording could produce a 25TB disk drive. Here’s how HAMR works.
Network Computing
Permanent link to this post (26 words, estimated 6 secs reading time)
Categories: General.
Tags: Boost, Capacity, HAMR, Promises, Storage
By IPHere —
February 18, 2014 at 6:15 pm Interested in making the switch to software-defined networking? Don’t feel like you need to do it in one leap, advises Eric Hanselman, 451 Research analyst and Interop Las Vegas SDN track chair.
Network Computing
Permanent link to this post (35 words, estimated 8 secs reading time)
Categories: General.
Tags: first, Making, Steps, Transition
By IPHere —
February 18, 2014 at 12:18 pm An Enterprise Strategy Group poll of IT networking pros indicates that many are eying a shift to software-defined networking.
Network Computing
Permanent link to this post (22 words, estimated 5 secs reading time)
Categories: General.
Tags: 'Under, Finds, Planning, Survey
By IPHere —
February 17, 2014 at 6:13 am We’ve selected seven Interop presenters that will make it worth a trip to Vegas. You’ll be so absorbed in tech, you won’t even notice the glitter (unless it’s of the unicorn variety).
Network Computing
Permanent link to this post (35 words, estimated 8 secs reading time)
Categories: General.
Tags: Head, It's, Reasons, Secret, Vegas, Weapons
By IPHere —
February 16, 2014 at 6:21 pm The newest version of the payment card security standard doesn’t do much to clarify its complex requirements.
Network Computing
Permanent link to this post (20 words, estimated 5 secs reading time)
Categories: General.
Tags: Pros, Relief, Security, Version
By IPHere —
February 14, 2014 at 12:14 pm With the price of SSDs rapidly declining, it’s tempting to put them in every new server or storage system. Not so fast.
Network Computing
Permanent link to this post (25 words, estimated 6 secs reading time)
Categories: General.
Tags: DataCenter, Flash, Guide, SSDs, Using
By IPHere —
February 13, 2014 at 12:13 pm Network engineers are busy preparing the network infrastructure for the multi-vendor InteropNet that will support the upcoming Interop conference. Preview the action in our video.
Network Computing
Permanent link to this post (28 words, estimated 7 secs reading time)
Categories: General.
Tags: Behind, Building, Interopnet, Scenes
By IPHere —
February 13, 2014 at 12:13 am Software-defined networking is taking the industry by storm, but presents new security challenges, according to security specialists.
Network Computing
Permanent link to this post (20 words, estimated 5 secs reading time)
Categories: General.
Tags: Beware, Experts, Risks, Security, Warn
By IPHere —
February 12, 2014 at 12:13 pm