U.S. based enterprises are very concerned about the risks that are posed by the influx of personally owned
mobile devices in the workplace, and are moving swiftly to put policies in place to control their use and protect the corporate data they hold, according to an IT risk survey conducted by ISACA (Information Systems Audit and Control Association). Respondents also indicate that their
companies are making progress integrating IT risk management with their overall approach to risk
management, but still have a lot of work to do. The survey included 712 U.S. ISACA members.
Network Computing
ISACA Survey: Enterprises Are Addressing Mobile Device Risk
Comments Off
Categories: General.
AMD Survey Shows Cloud Computing ‘Maturing Rapidly’
A survey by semiconductor maker AMD shows that the adoption of cloud computing is “maturing rapidly” as businesses and other enterprises are developing more in-house cloud expertise, putting more valuable business data in the cloud and quantifying the value to the business of adopting cloud computing strategies. Also, close to half of survey respondents said that they consider cloud computing to be a strategic shift in IT policy that they are taking within their organization.
Network Computing
Comments Off
Categories: General.
Solarwinds Eases Network Device Tracking
In a move that will help network administrators locate specific user end nodes that might be causing
problems, SolarWinds has announced the SolarWinds User Device Tracker. The software works by taking an IP address, host name or Media Access Control (MAC) address, and then responding with information about the device, such as the switch name, port, port description or and the virtual LAN on which it’s located. In addition, network administrators can set up a notification alert for when a specific device connects to the network, which can be useful in helping protect against security incidents such as network intruders.
Network Computing
Comments Off
Categories: General.
Cloud Security A Moving Target
Cyber-Ark’s fifth annual “Trust, Security and Passwords” report surveyed 1,422 IT staff and C-level professionals across North America and Europe, the Middle East and Africa (EMEA), and found that nearly one in five C-level respondents admit insider sabotage had occurred at their workplace. Another 16% believe that competitors may have received highly sensitive information or intellectual property–including customer lists, product information and marketing plans–from sources within their own organization.
Network Computing
Comments Off
Categories: General.
Ohio Department Of Developmental Disabilities Taking Control Of Virtual Desktops
When it comes to IT, Ohio’s Department of Developmental Disabilities (DoDD) wants innovation. So when the agency’s IT manager went looking for a way to manage the new virtual desktop infrastructure, he looked for innovative solutions. “In our agency, we know we have to innovate. And one of the ways we work is we look for innovators in the industry,” says Kipp Bertke, IT manager for the Ohio DoDD, which oversees a system of support services for 80,000 people with developmental disabilities.
Network Computing
Comments Off
Categories: General.
Brocade Flexes Fabric Muscle At Technology Day Summit
Last June, the industry embraced the introduction of the Brocade One architecture, VCS technology and VDX switches–which for the first time brought to life a new fabric network design for flatter scale-out in virtualized clouds. At its Technology Day Summit in San Jose, Brocade presented its vision for the fabric industry, unveiled its next-generation fabric architecture called CloudPlex and announced the availability of several new products.
Network Computing
Comments Off
Categories: General.
Bringing Customer Experience And Business Channel Development Together With IT
As one of the largest hospitality companies in the world, Marriott has over 3,500 lodging properties in the U.S. and 69 other countries and territories, and a daily workload of over 750,000 new reservations. Transaction throughput must be rapid, unfailing and 24/7. If problems arise, failover must be swift and absolute. Simultaneously, business intelligence systems must be able to “right fit” pricing and accommodations for customers during transactions–and the systems must have the ability to extend the “reach” of Marriott’s reservation community from the company-hosted Website and systems to the Websites and systems of worldwide channel partners that sell Marriott reservations along with other services.
Network Computing
Comments Off
Categories: General.
Citrix CTO On Demanding Clarity From Cloud Vendors
Citrix Systems CTO Simon Crosby sat down with Andrew Conry Murray at Interop 2011 for a candid question-and-answer session on a variety of subjects, including emerging cloud power centers–Citrix is a major player in some. The company is also pushing emerging standards on a variety of fronts, including cloud computing and application performance. Crosby talked about the company’s goals for these efforts. He also advised IT to demand more vendor clarity about the cloud.
Network Computing
Comments Off
Categories: General.
ExaGrid Pushes Backup And Disaster Recovery Appliances To 13 Terabytes
ExaGrid Systems Inc., which makes a disk-based backup and disaster recovery appliance that includes deduplication and replication functionality, has announced a 13-terabyte model, the EX13000E. Because users can use them to build grids of up to 10 devices, the new model means network administrators can now build a grid with a capacity of up to 130 TB, which is a 30 percent improvement over one built with the company’s existing products. The device also has half the power and cooling requirements of previous models, and now offers an encryption option, though the company is not formally announcing it at this time.
Network Computing
Comments Off
Categories: General.
Survey: Half Of Enterprise Software Will Be Open Source Within Five Years
A survey being released today at an open source conference in San Francisco shows that 56 percent of respondents predict that more than half of the software purchases made by businesses and other enterprises over the next five years will be of open source software. The organizers of the Open Source Business Conference 2011 say that this is because customers have overcome their reluctance toward using open source, such as concerns about licenses, and are embracing its virtues, such as flexibility, lower cost and avoiding vendor lock-in. The survey also identifies growth opportunities for open source in the software as a service (SaaS), cloud computing and mobile markets, which are growth areas for IT in general.
Network Computing
Comments Off
Categories: General.
