Portal:Information Security

From Wikibon

Revision as of 04:00, 30 September 2009 by Dvellante (Talk | contribs)
Jump to: navigation, search


Welcome to the Wikibon Information Security Portal. The Information Security Portal is a resource for IT professionals interested in learning from peers and sharing knowledge with other practitioners.

Wikitip

Portal:Mobile Enterprise

The Wikibon Mobile Enterprise Technology Portal contains mobile enterprise industry research, articles, expert opinion, case studies, and mobile enterprise related company profiles. Best Investment | Managed Funds | Mutual Funds Australia

>>Join our Group >>Become a Fan >>Follow @Wikibon >>Read the Blog

Wikitip

New multiplatform organizational tool coming

Datebk6 has long been the secret organizational weapon of the Palm PDA cognoscenti. The brainchild of C.E.S. Dewer, it is the ultimate personal information manager (PIM), with sophisticated functionality that other applications, including Microsoft Outlook and Lotus Notes, cannot come close to matching. Recently CESD has announced a new development platform, now in alpha test, to redevelop Datebk on a multiplatform base that will allow him to port it to a list of popular desktop and mobile systems, starting with Microsoft Windows and eventually including Macintosh, iPhone/iPod Touch, and Android. And this new version, named PIMlical adds the one thing the Palm version lacks – the ability to send and receive meeting invitations to lists of meeting participants. Although traditionally marketed mostly to the consumer marketplace on the Palm, PIMlical has obvious applications in business, where personal and small team organization is vital. And it has the added benefit that it will create one virtual mobile PIM platform across several physical platforms. For companies that have users on several mobile platforms, this could help unify support for mobile PIM applications.

View Another Wikitip

Browse all Mobile Enterprise Wikitips

Featured Case Study

Safeguarding Enterprise Voice Communication over WiFi

Enterprises are showing a strong interest on wireless voice technology over the standard WiFi networks for its attractive features such as lower phone bills, centralized management, or fast deployments. However these wireless voice networks are susceptible to usual attacks like viruses, spam, phishing, hacking, stolen data, denial of service (DoS), voice injections, man in the middle attacks, call hijacking, eavesdropping etc. The security of these networks become a major concern for enterprises because IT managers have no or very little knowledge how to protect voice networks.

read more...

Mobile Enterprise Professional Alerts


Featured How-To Note


Architecting Wireless Email

Wireless email is an important business tool for today's enterprises and an entrepreneurial solution to maximize the employees’ business potential and gain a competitive edge. Since businesses now send as much as 60% of their business-critical data via email, accessing emails wirelessly means business success for many organizations by providing rapid customer communication, faster decision-making and collaboration from distant places.

read more...

Action Item: Aksesoris Mobil | Florist Jakarta | Railing Tangga | Rental Forklift

Footnotes:

View Another Wikitip

Browse all Information Security Wikitips

Featured Research

Data Encryption Strategies

As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.

read more...

Information Security Professional Alerts


Browse all Information Security Professional Alerts

Featured How-to Note

Implementing Storage Network Security

In the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems.

read more...

Action Item:

Footnotes:

Personal tools