If you cannot view this email please click here.
Banner
Management Design Infrastructure Traffic Storage Security Helpdesk

Features

A question of authenticity

Are authentication services sowing the seeds of their own security failure? If you’re working remotely then you must ensure that you manage and protect your identity, writes Steve Watts, co-founder of SecurEnvoy

The big data network

Big data is both potentially lucrative and disruptive. Jamal Elmellas, Technical Director at Auriga, looks at the considerations for the network manager

main headline

Unleashing IT Automation

Colin Beasty of Advanced Systems Concepts explains why IT organisations should adopt an architectural approach to IT automation

main headline

Network Computing 2013 Reader Survey

Complete our 2013 Reader Survey for the chance to win iTrinegy’s personal network emulator, INE for Windows. The closing date for entries is 16th December

main headline

News

Dedicated to securing the Cloud

K3 Business Technology Group launches new IT consultancy division to deploy and manage secure cloud services around the world, with access to 300 international datacentres

main headline

BYOD trend could see 1bn mobiles devices heading to work by 2018

New report forecasts that the number of employee owned smartphones and tablets used in the enterprise will exceed 1 billion by 2018

Axios Systems joins G-Cloud 4 programme

Software as a Service solution available on the G-Cloud 4 cloud procurement framework

Brand-Rex Partners with Allied Telesis on EcoSystem

Data network solutions provider Brand-Rex has signed an EcoSystem Partnership with IP networking infrastructure provider Allied Telesis

Case Study

Credit where credit’s due with AppQoS

Resolving application performance issues with AppQoS from iTrinegy alleviated the need for WAN optimisation for International Personal Finance, a leading international home credit business

main headline

Reviews

Privileged Account Security from CyberArk

Many high profile hacking incidents result from the unauthorised use of privileged accounts and passwords. CyberArk is the market leader in privileged account security, its software suite mitigating these threats by managing all areas of access.

main headline

Bandwidth Analyzer Pack from SolarWinds

SolarWinds offers one of the most comprehensive ranges of network monitoring solutions, and its latest Bandwidth Analyzer Pack strives to provide businesses with total network visibility.

main headline

Opinion

Scanning ahead

Arian Evans of WhiteHat Security explains how knowing what the attackers know, combined with continuous application scanning, will make your network a safer place to work

main headline

Security driven profits

Tufin's Chris Hooper explains how Security Policy Orchestration, when implemented correctly, can both save money and help to make it

main headline

Seeing is believing

Trevor Dearing of Gigamon explains why IT managers must increase visibility and create ways to intelligently select, sort and direct traffic flows if they are to ensure that their networks remain operational

main headline

Awards

Network Computing Awards 2013

Held at the Hotel Russell in London earlier this year and voted for by the readers of the magazine, the 2013 Network Computing Awards celebrate the organisations, products, services and individuals that keep our networks running. Here we profile some of this year’s winners. Nominations for the 2014 Network Computing Awards will open soon. www.networkcomputingawards.co.uk

main headline

Network Management Product of the Year

Emulex - OneCommand Vision

main headline

Messaging Product of the Year

GFI MailEssentials

main headline

IT Optimisation Product of the Year

Loadmaster 5300

main headline

Cabling Supplier of the Year

Excel

main headline

Welcome to the November edition of the Network Computing Newsletter. Last month we covered NASA’s struggles with its public cloud strategy and now the International Space station (ISS) has experienced a rather glaring - and unnervingly basic - IT failing of its own. In a scene probably not reminiscent of “Gravity” it was revealed earlier this month that the ISS had been infected by a computer virus via a USB device brought onboard by Russian cosmonauts.

Commenting, Justin Briere of Data Memory Systems said the incident was “Proof that security needs to be taken more seriously across the globe, especially when it comes to USB flash drives …Many of our USB drives come with added software which allow for easy management of the data stored on the devices, and also have the function to password protect the files, so that users have optimum control over what files they are transporting at all times.” It’s something worth bearing in mind whether you’re plugging a USB stick in at your desk or while orbiting the earth at 17,000 mph!

It’s not as if we can relax when it comes to security measures down here on terra firma either, after all. As SecurEnvoy’s Steve Watts explains this month, even security providers themselves can prove fallible when it comes to ensuring the integrity and privacy of our data. Steve examines the potential misuses of authentication services and explains why the secret keys they generate may not be quite so secret after all.

Switching to more seasonal fare, it’s nearly time to start making a list, checking it twice and deciding who’s been particularly nice this past year. Yes, nominations for the Network Computing Awards 2014 are opening soon - we’ll have more details next issue!

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622