Posts

Showing posts from March 23, 2014

Proteksi data Anda di Cloud

Image
Data Protection In The Cloud: The BasicsPosted by David Hill
February 24, 2014 What is data protection in the cloud? This isn't an easy question to answer, since it comes in various forms and the tools and technologies for data protection are extremely numerous and can be used in different combinations. From IT’s perspective, a large number of choices can make cloud more difficult than traditional schemas. Still, we can cut the Gordian knot of cloud complexity with three steps that will help guide further exploration of data protection. First, we need to understand in general what data protection models the cloud might solve. Second, we need to understand that big decisions related to the cloud and data protection include what is managed internally and what is managed by a third party. Third, we need a rough basis for putting together an inventory that an organization can consider when moving to the cloud. We can then use this foundation as a basis for future discussion of data pr…

SNMP sebagai standard Network Management

SNMP officially stands for is Simple Network Management Protocol — you may have seen it on a configuration screen for an IP camera or other security device and wondered what it was used for. It really is a pretty useful protocol, and security professionals like Ray Coulombe and Sal D’Agostino think it is time the industry did something with it. Coulombe, founder and managing director of SecuritySpecifiers.com, explains that SNMP is not new. In fact, it has been around for 25 years. It was originally intended to be replaced by other architectures, but, instead, has evolved in its own right and achieved broad acceptance. Working in conjunction with a range of network monitoring packages, such as HP’s Open View, WhatsUpGold by Ipswitch, and Network Vision’s IntraVue, SNMP can provide a command center or a technician important system information, out of limit or alarm conditions, or the ability to update device parameters. Many security devices support SNMP, but it is rarely used, and wh…

Sollarwinds sebagai Product of the Year

Image
SolarWinds Products Garner Global Recognition From IT Pro Community and Industry Experts SolarWinds Named "Software Product of the Year," "Best Risk/Policy Management Solution," "Virtualization Management and Optimization Editor's Choice," and More AUSTIN, TX, Mar 27, 2014 (Marketwired via COMTEX) -- SolarWinds SWI-2.59% , a leading provider of powerful and affordable IT management software, today announced its IT management products across network, security, virtualization, remote IT administration and help desk services have received accolades from leading IT publications, organizations and their associated communities. Among those honoring SolarWinds are Network Computing Magazine, SC Magazine, Virtualization Review, Windows Networking, Virtualization Admin, IT Europa and Ed Tech Digest. "For more than 15 years, SolarWinds' mission has been to deliver purpose-built products that help simplify the complexity of monitoring, analyzing and re…

Gunakan ISO 17799 utk amankan akses partner / service provider Anda

Image
ISO 17799: A methodical approach to partner and service provider security management Richard E. Mackey, Jr., Contributor This tip is part ofEnsuring compliance across the extended enterprise, a lesson in SearchSecurity.com'sCompliance School. Visit theEnsuring compliance across the extended enterpriselesson page for additional learning resources. These days, it is fairly common for a company to outsource customer-facing services or allow another organization to handle data processing and even security monitoring and management. Outsourcing allows companies to provide a wider range of services, reduce cost and focus on other tasks that will strengthen the business.