Review: Single sign-on tools offer impressive new capabilities | Privacy groups to quit US talks on facial recognition standards
Network World Compliance
Google-infused storage startup Cohesity reveals itself
Mohit Aron has a tough act to follow: His previous startup, Nutanix, may be on the cusp of filing for an IPO that values the hyperconverged infrastructure company at $2.5 billion. But Aron is off to a good start with his new venture, Cohesity, which this week emerges from stealth mode with $70 million in venture funding, reference-able customers such as Tribune Media, and a focus on a potentially big market in converging the secondary storage that houses so much DevOps, data protection, analytics and other unstructured data. Read More
: Open Text
How Businesses Connect, Communicate, and Collaborate
Whether you're new to EDI, need to get EDI-compliant or simply want to educate your business colleagues, EDI Basics provides an easy-to-understand explanation of the fundamental concepts. View Now.
In this Issue
INSIDER Review: Single sign-on tools offer impressive new capabilities
Privacy groups to quit US talks on facial recognition standards
INSIDER A guide to working with non-geeks
iPhone 7 rumor rollup: Apple gets funny, iOS 9 drops hints
9 hot enterprise storage companies to watch
INSIDER Threat intel sharing: Security breakthrough or flavor of the month?
Amazon now an open book on search warrants and subpoenas
INSIDER Cloud fears fizzle, mission-critical deployments sizzle
WHITE PAPER: LogMeIn
Collaboration 2.0 Death of the Web Conference
This new study from Ovum and join.me by LogMeIn is based on a survey of over 3,900 full time professionals worldwide regarding their collaboration and meeting-related behaviors and activities. Learn More
INSIDER
Review: Single sign-on tools offer impressive new capabilities
Since we last looked at single sign-on products in 2012, the field has gotten more crowded and more capable. A number of new vendors have come to ply their wares, and a number of old vendors have been acquired or altered their products.To read this article in full or to leave a comment, please click here(Insider Story) Read More
Privacy groups to quit US talks on facial recognition standards
The groups believe that the talks aren't likely to lead to adequate protections for consumers Read More
WHITE PAPER: NopSec, Inc.
Market Overview: Vulnerability Management
This new analyst report explores the key challenges to effective vulnerability risk management, how technology integration is improving the vulnerability management process, and the emerging solutions available to help organizations move beyond scanning. Learn More.
INSIDER
A guide to working with non-geeks
Are you a geek? If you are, this won't come as a news flash for you: You and the users you work with on the business side are pretty much nothing alike -- not in the way you communicate, not in the way you value various traits and not in the way you relate to work.To read this article in full or to leave a comment, please click here(Insider Story) Read More
iPhone 7 rumor rollup: Apple gets funny, iOS 9 drops hints
Humor alert! Humor alert! Yes, as it relates to Apple.And I’m not talking about the standard eye-rolling stuff of corporate dog-and-pony shows such as last week’s Apple Worldwide Developers’ Conference (WWDC) in San Francisco. Nope, here we have Apple enlisting the aid of former SNL comic Bill Hader, who shares a humorous behind-the-scenes peek at what could have been at WWDC… Alas, there were no iPhone 6S or iPhone 7 rumors in there, just a goat and some larger-than-life fingers. But the actual WWDC’s introduction of iOS 9 did spark speculation about the next flagship iPhones.To read this article in full or to leave a comment, please click here Read More
WHITE PAPER: Kaspersky Lab, Inc.
Top 10 Tips for Educating Employees about Cybersecurity
Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab's Top 10 Tips for Educating Employees about Cybersecurity to learn: Why and how to develop an effective security policy Examples of common threats to employees and your business Tools to reduce risk and cybercrime Learn More
9 hot enterprise storage companies to watch
Amidst all the venture investments this year in startups that generate gobs of data -- from those focused on everything from apps to drones to the Internet of Things to Big Data -- are a batch of newcomers aiming to help organizations store and access all that information. Yes, storage companies are pulling in big bucks in 2015, as they did in 2014, and a couple have even double-dipped this year and announced two rounds of funding.To read this article in full or to leave a comment, please click here Read More
INSIDER
Threat intel sharing: Security breakthrough or flavor of the month?
Threat intelligence sharing has become the "new black" in the world of enterprise security, a trendy buzzword that has become ubiquitous at industry conferences and in vendor marketing pitches. But what exactly is threat intelligence sharing and are we using it effectively to defend against cyberattacks?To read this article in full or to leave a comment, please click here(Insider Story) Read More
Amazon now an open book on search warrants and subpoenas
Amazon has published its first transparency report, years after some of its rivals Read More
INSIDER
Cloud fears fizzle, mission-critical deployments sizzle
As concerns fade, the need for agility drives IT to move mission-critical apps to the cloud. Read More
SLIDESHOWS
5 low-cost Wi-Fi stumblers and analyzers
Wi-Fi stumblers and analyzers are a must-have when troubleshooting Wi-Fi interference and performance issues, or when checking channel usage.
JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn
MOST-READ STORIES
1. Google-infused storage startup Cohesity reveals itself
2. Day One with Windows 10: Things get ugly
3. Tired of sitting all day? Tech pros take a stand
4. AT&T looking at white boxes as CPE
5. 19 free cloud storage options
6. iPhone 7 rumor rollup: Apple gets funny, iOS 9 drops hints
7. First Look: How will Windows 10 play on tablets
8. Why you should read What is Code?
9. Rackspace creates career path for tech execs who don't want to manage people
10. Vote for the Xbox 360 games you want to play on your Xbox One
Join the IDG Contributor Network
The IDG Contributor Network is a collection of blogs written by leading IT practitioners about the technology, business opportunities and challenges you face everyday. We invite you to participate by applying to be a contributor today.
Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.
You are currently subscribed to networkworld_compliance_alert as security.world@gmail.com.
Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy
When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.
If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com
To contact Network World, please send an e-mail to customer_service@nww.com.
Copyright (C) 2015 Network World, 492 Old Connecticut Path, Framingham MA 01701
** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **