NetSecure BLOG
PDF Print E-mail
For many IT administrators, the ability to monitor bandwidth, firewall use and VPN sessions has been simplified with the use of a security information and event management (SIEM) platform. The increasing flexibility of SIEM tools is especially important the more hazardous the threat landscape becomes. This latest ebook from SC Magazine examines the benefits and challenges faced by enterprises and the security teams running SIEM implementations.
 
PDF Print E-mail
Network Management
Written by Administrator   
Friday, 12 November 2010 14:18

Missing Hotel Room Key? Try Your Phone

If you are like me, there are times when you will misplace your hotel key. Times when you’re switching a bucket of ice between hands while searching your pockets or bag. Wondering if you’ve left the key in your room or possibly the lobby. Thinking “I’ve always got my phone on me, wouldn’t it be so much easier if I could use it to open the door.” OK, maybe I’ve never thought that last bit, but the folks at high-security lock makers Assa Abloy apparently have. They’re running a four-month trial of their Mobile Key technology at the Clarion Hotel in Stockholm. Essentially a guest checks in with a phone and the room key is sent directly to the device. No more misplaced keys.

argaiv1671

 
PDF Print E-mail

Over the past few years, we have seen a gradual transition from traditional computer centers with dedicated resources to virtual machines and cloud computing. 

During this time, people have realized some of the value of virtualization in terms of savings and resource optimization. Unfortunately there are still a number of warts in virtualization that have followed the migration to the cloud.

Before we discuss those warts, it is important to fully describe the cloud environment about which we are talking.

While most people want to talk about software-as-a-service (SaaS) and platform-as-a-service (PaaS) – and we could include them in our conversation – we really want to talk about clouds that are transparent and migratory. 

These clouds are typically described as public, private or hybrid.

What is a private cloud? 

A private cloud is (typically) a cloud created within a corporation (only using corporate-owned machines) and is entirely at the control of the corporation. The cloud includes numerous computers and can extend among different computer facilities, as well as crossing geographical boundaries. 

What is a public cloud?

A public cloud is controlled by someone other than the corporation and can have multiple entities participating all on the same machine. Each entity can have its own separate virtual machine (VM) and may not readily be able to see other entities. The cloud location and co-residents are unknown.

What is a hybrid cloud?

A hybrid cloud consists of some resources being controlled by the corporation and some by an outside entity. There may or may not be a bleed-over of clouds from the private cloud to the public cloud.

 
PDF Print E-mail

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are relatively new technologies and, like most network-security methods, are constantly evolving to keep up with the ever-changing nature of computer threats.

1. Thwart attacks on your network.

2. Alert a network administrator of possible security events.

3. Meet compliance regulations.

4. Enforce network security policies.

5. Limit nonbusiness IM (instant messaging) and video streaming.

6. Better understand network activity.

7. Save time.

8. Learn what applications users have installed on the network.

9. Build trust with partners.

10. Save money.

http://www.itsecurity.com/whitepaper/idps-10-reasons-service/index.php?cmd=submitForm

 
More Articles...