You might think your customers would have to be living in a cave these days to avoid news of high-profile data breaches and privacy regulations. But do they understand the need for data security as a business issue that impacts their business? According to SearchSecurity.com contributors Craig Norris and Tom Cadle, data privacy laws are commonly ignored by private companies:
There is a huge misconception among information security professionals today that data privacy laws are not applicable to private companies, but are only designed for publicly traded companies, government organizations or financial institutions. This is not the case. Whether your company is public or private, large or small, today’s information privacy regulations may affect you and your organization on many different levels, not just financially and legally.
The article goes on to illustrate the value of private information and the laws that affect the use of this information — all valuable selling points when presenting a data protection strategy to your customer. You’ll also find a series of questions that you can ask to catalog their data collection practices.
As your customers’ trusted adviser, you play a key role in keeping them informed of security threats and how they apply to their business. It can be easy to tune out issues we like to think don’t apply to us. It’s your job to make your customers listen and understand why they should care.
Two interesting new tools for the enterprise are getting some press today. Big Blue’s OmniFind Yahoo edition enterprise search tool allows companies to search their stored information. From the sound of it, it seems like companies will be able to search their data portfolios to track down stored information. Not a bad idea for storage VARs who specialize in compliance to take a look at this. Instead of having to search file by file for old information that wasn’t properly tagged and archived, the tool allows for customizable searches that will reduce time spent tracking down information and allow VARs to devote more time to meeting regulatory compliance rules.
The other tool that caught my eye is a loss calculator that estimates the cost of lost data in an enterprise. This could be another useful tool for VARs who are trying to a professional service contract locking down data. Imagine the power of being able to put a dollar and cent value to a data breach. Seems like it could be a powerful sales tool.
WiMax — a microwave-based technology defined by the IEEE 802.16e standard for broadband wireless access – has the potential to provide wireless-network access across distances as great as 30 miles. Sprint is working on a WiMax network that will reach two miles, which is still vastly better than the few hundred feet most WLAN methods provide.
Intel to build WiMAX into laptops in 2008 IDF ‘Montevina’ Centrino details revealed. [TheReg]
Ex-Executive Agrees to Pay $800 Million in Restitution The former chief executive of Computer Associates will pay $800 million to investors who lost money because of the company’s accounting fraud. [NYT]
IBM sells energy-efficient Intel and AMD rack and BladeCenter servers IBM is offering more energy-efficient rack and blade servers that use reduced watt processors from AMD and Intel.
Certain politicos may not take Global Warming seriously, but the IT industry certainly does.
Last April, our sister site SearchDataCenter.com reported that IT heavyweights IBM, Hewlitt-Packard and Sun Microsystems sponsored a “new initiative called the Green Grid” who were to focus on data center power management and cooling.
The non-profit environmental consortium was launched early this year. Last week I posted a boiled down version of Green Grid’s energy saving guidelines. On April 10th they announced their inaugural technical summit, to be held April 18-19 in Denver Colo. The release also welcomed Brocade Communications, Cisco and Novell; these industry giants join Hewlett-Packard, IBM, Microsoft, Sun Microsystems, VMware and Dell.
SearchDataCenter.com recently posted Dell pushes green computing initiative; the company is introducing two low power AMD Opteron-based servers, PowerEdge 2970 and PowerEdge Energy Smart 2970D. Dell claims that these servers draw up to 34% less power than a Dell Power Edge and can deliver up to 105% greater performance per watt over the previous generation of Dell servers featuring dual-core processors.
Are we seeing an environmental trend in the IT industry? It looks that way to me, given whose involved. What do you think?
Cyberoam calls the appliance the first identity-based UTM on the market, meaning it controls access based on information in access-control lists about the user — not on the machine being used to connect to the network.
The vendor has enlisted the help of a marketing firm, Marketlink Technologies, and formed a channel partner advisory board to attract more value-added resellers (VARs) to the 100%-channel-driven initiative.
One of the first VARs to sign on was Creative Breakthroughs of Troy, Mich. Steve Barone, the reseller’s president, expects small- to medium-sized businesses (SMBs) and the remote offices of enterprise companies to make up the vast majority of buyers.
Cyberoam has a window of opportunity of about six months to sell the identity-based UTM before market leaders like Fortinet and Juniper Networks come up with similar solutions, Barone said. Cyberoam is targeting the top 4% of VARs for its channel program, said David Glenn, the director of U.S. channel sales.
“We’re really looking for people that either have a hole in their existing product set or are really focused on security,” he said.
Malware outbreak ‘largest in almost a year’ Security firm Postini and the SANS Internet Storm Center said they are tracking a significant malware outbreak. Postini calls it the biggest email attack in almost a year.
Cisco wireless products suffer multiple vulnerabilities Cisco Systems is reporting multiple vulnerabilities in Cisco’s Wireless Control System (WCS), Wireless LAN Controller and Lightweight Access Points. [TheReg]
Microsoft delays betas for virtualization software Beta releases for Microsoft’s Viridian hypervisor and Virtual Server 2005 Service Pack have been pushed back. Analysts say ship dates and third-party vendors could be affected too. [SearchWinIT.com]
Indicative takes on big 4 in IT service management The company challenges much larger rivals like IBM and HP with its Indicative performance monitoring and troubleshooting tool. [eWEEK]
Exchange Server 2007 Service Pack 1 beta ready for download Microsoft has begun rolling out the first beta of Service Pack (SP) 1 for Exchange Server 2007, according to a blog posting on Microsoft’s TechNet site. Exchange Server 2007 shipped just over four months ago, in December 2006. [All About Microsoft]
Dell pushes green computing initiative, offers low power AMD servers Dell is offering two new lower power PowerEdge servers using AMD Opteron processors to address power consumption concerns in the data center.[SearchDataCenter.com]
The incredible shrinking SOA vendors Acquisition mania is likely to continue to shorten the list of SOA software vendors, analysts say, but it may not be bad news even for organizations shopping for platforms and tools.[SearchWebServices.com]
Application maintenance colossal pain point for SMBs Forrester Research found that SMBs tend to apply “Band-Aids” rather than fix problems when their application maintenance groups start to falter.[SearchSMB.com]
IBM connects chips for better bandwidth Intel and others have been showing off “through-silicon vias,” but IBM says it will come out with chips using the new technology next year. [CNET]
20% of mobiles to include Near Field Communications by 2012 By 2012, some 292 million handsets — just over 20% of the global mobile handset market — will ship with built in NFC capabilities, according to ABI Research. The analysts believe this year will be critical for NFC technology as key standards and operator trials complete the foundations for the first real deployments. [Tekrati]
Stanford report: what do users do on the Internet? We asked each of our 4000 respondents to select among a list of 17 common internet activities and tell us which they did or did not do. This is what we found.
LeftHand takes iSCSI to 10Gig Slapping SAN and the LAN together. [TheReg]
Apache reignites Sun open source dispute Opens fire with open letter. [TheReg]
Weak Vista launch continues to take its toll on computer industry The release of Vista was supposed to have been a boon for the computer industry, as many were expecting business and consumers to upgrade their hardware at the same time they upgraded their operating system. But, despite Microsoft’s claims to the contrary, the launch has generally been regarded as weak. The upshot is that makers of computers and parts are now being forced to ratchet down expectations. [Techdirt]
Not a good day for Microsoft Microsoft issued yet another critical security update for Windows Vista its most secure version of Windows ever, as part of the company’s Patch Tuesday set of updates. Meanwhile, Goldman Sachs — the Wall Street firm that helped take Microsoft public — issued a note removing Microsoft from its “super-duper buy list,” claiming Microsoft is at a crossroads. [All About Microsoft]
Oracle to patch 37 flaws Database giant Oracle Corp. offered a preview of its April Critical Patch Update (CPU). Fixes are planned for 37 flaws across its product line.
Symantec patches flaw in Enterprise Security Manager Anti-virus vendor plugs hole that could have been exploited remotely. [eWEEK]
Antivirus, firewall protection and security solution provider GRISOFT announced a new free tool for rootkit removal this morning. As the press release says:
“Rootkits are computer code that attempt to hide their actions and processes, making the job of detecting the code and the harmful processes very difficult,” explains Larry Bridwell, VP of Global Security Strategies of GRISOFT. “AVG Anti-Rootkit is developed to detect and destroy rootkits effectively, without bothering users with false alarms.”
The product’s web page boasts the following highlights:
- Powerful cleaning due to advanced cleaning driver
- Easy to use interface
- Fast and efficient detection (even for NTFS-ADS objects)
- Special interface for visually impaired people
GRISOFT’s solution, available for download on the site, promises to remove stubborn rootkits at a price any CFO will love. Leave Lady Macbeth in the dust. After all, what’s done is not always done. You have the power to rid your customer’s networks of tricky hidden malware without tugging on the purse strings.
Be sure to look at our open source security tools topic center for more no-cost hints and tips. And if you have an issue involving security threats and countermeasures that needs Macduff‘s touch, ask Russell Dean Vines your hardest questions.