Asia's Source for Enterprise Network Knowledge

Monday, May 27th, 2019

Compliance monitoring

How smart companies make mobility productive, simplify compliance

Increasing network infrastructure complexity and mobility of workforce pose a challenge to organizations looking to boost user productivity while simplifying compliance requirements. 

Mobile payments, PCI DSS compliance: Some clarity

Mobile payments technology is a loud sonic boom thundering through the payments industry.

Security pros, meet your new best friend: the CFO

Executives in charge of information security should make friends with the CFO, who can give them a broad overview of corporate priorities and see to funding the most important IT projects that protect corporate data.

Security pros should also look skeptically at industry compliance standards and avoid outsourcing security wholesale, said John Pironti, president of IT Architects, speaking at the Interop conference in Las Vegas.

CFOs have a broad view of the company and can appreciate where info security is key to

Endpoint security gets complicated

Microsoft ships RC1 of new Forefront Identity Manager

Microsoft Thursday shipped the second release candidate of Forefront Identity Manger 2010, which is a major piece of its strategy to integrate its security and identity technology.

Forefront Identity Manager 2010, formerly called Identity Lifecycle Manager 2 (ILM), is Microsoft's platform for identity synchronization, certificate and password management, and user provisioning. It has four areas of focus: policy, credential, user and group management.

The 10 dumbest mistakes network managers make

When you look at the worst corporate security breaches, it's clear that network managers keep making the same mistakes over and over again, and that many of these mistakes are easy to avoid.
In 2008, Verizon Business analyzed 90 security breaches that represented 285 million compromised records.

Trend Micro upgrades data-loss prevention software

Trend Micro today announced an updated version of its Windows desktop-based data-loss prevention software in two editions; one “Standard” for monitoring users and data, the other “Advanced” to add protections for intellectual property and source code.

LeakProof 5.0 is being sold in two editions because two camps of enterprise customers are shaping up that use DLP somewhat differently, says Mark Bloom, global manager at trend Micro for DLP marketing.

Security and regulatory concerns slow some server virtualization efforts

Security and regulatory concerns have some users warily eyeing the move to server virtualization.

For example, during the past year, the Stanford Hospital & Clinics, part of Stanford University in Palo Alto, Calif., has shifted about half of its applications from traditional server platforms to VMware-based virtual machines (VM) -- and found it strongly impacted decision-making on security.