Date: Mon, 23 Jun 2003 12:05:08 -0400 (EDT)
From:"Network Computing Newsletter" <Network_Computing_Newsletter@update.networkcomputing.com> 
Subject: Network Computing Report #305
Network Computing Report #305
http://www.networkcomputing.com/
Monday, June 23, 2003

-----------------------------------------------------------
This issue sponsored by Shunra. How will your application perform
over the WAN? Usually you don't know until you deploy it. Learn 
how to test your networked application performance in the lab 
before deployment. Get on-time, on-budget delivery. Read: 
Eyes Wide Open-How to deploy networked applications successfully.
http://www.nwc.com/shunra 
-----------------------------------------------------------

This week, we examine the importance of implementing a corporate
vulnerability-management strategy. Our featured review lays out both
tactical and strategic lines of attack and will help you identify and
exterminate the bugs in your machines.

Plus, try your hand out our identity management IT exam. And, see if
you can outsmart our editors with our latest TechQuiz on vulnerability
management.

Be sure to bookmark our Weblog, the Network Computing Daily Blog,
and check back often for IT news and views.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BkzI0A4

As always, please feel free to message us directly if you have any
comments or questions (mailto:newsletter@nwc.com).

Best regards,
--The Network Computing Report Team

-----------------------------------------------------------
In This Issue:
-----------------------------------------------------------
1)  Newsletter Specials
2)  Feature: Vulnerability Management
3)  Review: Vulnerability-Assessment Tools
4)  Sneak Preview: Fluke's OptiView WAN Analyzer
5)  Sneak Preview: Redline Networks' T|X 2650 Web Acceleration
     Device
6)  Interactive Buyer's Guide: Tape Autoloaders
7)  BuzzCut
8)  Legal Eagle: Patent Impending
9)  NWC Weblogs
10) Editor's Bookshelf and Network Security White Paper Pick
11) Network Computing's Storage Pipeline
12) Last Mile
13) CMP Marketplace
14) Latest IT Professional Downloads
15) Subscription Information

------------------------------------------------------------
1) Newsletter Specials
------------------------------------------------------------
a) 5 Minute Workout: Protecting the Enterprise End-Point
Concerned about how you can both protect and manage your disparate
clients and roving workers? Put your fears to rest with Mike DeMaria's
streaming audio workout. You'll find out how to win compliance as well
as enforcement without alienating users or jeopardizing your network.
Sponsored by Sygate Technologies.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fT0Ax

b) IT Exam: Identity Management
How ready is your company to consolidate the many stovepipes of user
credentials stored in various repositories? Take our interactive exam,
and we'll tell you whether you're ready to tackle identity management
in earnest. You may also win a very cool Palm-powered Wrist-PDA from
Fossil or a copy of "Firewalls: The Complete Reference," both
compliments of our friends at Greenwich Technology Partners.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BfMH0AE

c) TechQuiz: Vulnerability Management
Show off your vulnerability management savvy with our latest TechQuiz.
If you can outsmart our editors, you'll be entered into a drawing for
a fabulous NWC collectible.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40TNs0AY

d) Compare IT: Internet Service
Get high-speed access to the Internet without breaking your company's
budget. Compare and get quotes on solutions from Netifice, NewEdge,
Sprint and XO Communications.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fU0Ay

e) NWC Project: EAI Solutions
Join Contributing Editor Don MacVittie as he puts enterprise
application integration solutions to the test in his Wisconsin Lab.
Check out Don's product criteria and test plan. Plus, you can tune in
to hear him discuss his preliminary findings.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fV0Az

f) NWC Inc.: Building Accounts Payable and Financials Apps
Technology Editor Lori MacVittie has been quite busy in the NWC Inc.
lab, building out a complete set of accounts payable and financials
applications. Stop by Lori's application interface to see first hand
how SOAP queries function across a PHP-, WebSphere- and DB2-based
environment.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fW0A1

g) Top 11 List: Real Reasons Larry Ellison Wants PeopleSoft
Send us your best submissions, and we'll publish them in print and
online. Here are a couple of ideas we gathered last week from your
fellow readers:
--Misunderstood advice to "Gain people skills." --David Salamack
--Enron was no longer available. --Steve Harvey
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BjCi0Af

h) InformationWeek Research Report: Enterprise Storage 2003
How will your organization handle its increasing storage needs? Is
networked storage the best route? Is a SAN the right answer? What
impact will interoperability standards like CIM and Bluefin have on
your organization? Purchase this exclusive InformationWeek research
report to understand current trends in the enterprise storage market.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B12e0AN

------------------------------------------------------------
2) Feature: Vulnerability Management
------------------------------------------------------------
By Greg Shipley
The heart of any security effort is to become less vulnerable.
As with many information-security challenges, the solution lies
partly with technology, partly with tactics and partly with strategy.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fX0A2

Read books on this topic.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BjYs0AD

Read more articles on this subject.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40CN80AI

Read vulnerability management white papers.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fY0A3

Market research and analyst reports.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BsdA0Ah

------------------------------------------------------------
3) Review: Vulnerability-Assessment Tools
------------------------------------------------------------
By Kevin Novak
Network-based vulnerability-assessment scanners play a critical role
in the risk identification process by enabling their operators to spot
security deficiencies before the bad guys do.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fZ0A4

Read books on this topic.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BjYs0AD

Read more articles on this subject.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40CN80AI

Read scanner white papers.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fa0AC

Market research and analyst reports.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BsdA0Ah

------------------------------------------------------------
4) Sneak Preview: Fluke's OptiView WAN Analyzer
------------------------------------------------------------
By Lee Badman
To round out the picture of real-time network diagnostics, Fluke
Networks is offering customer-friendly WAN analysis in the form
of its new OptiView WAN Analyzer product line.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fb0AD

Read books on this topic.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BjYs0AD

Read more articles on this subject.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40CTL0Ai

Read WAN analyzer white papers.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fc0AE

Market research and analyst reports.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BsdA0Ah

------------------------------------------------------------
5) Sneak Preview: Redline Networks' T|X 2650 Web Acceleration
    Device
------------------------------------------------------------
By Lori MacVittie
The T|X 2650 Web I/O Accelerator provides compression, load-balancing
and reverse-proxy functionality to breathe new life into legacy
hardware, saving you the cost of purchasing newer, expensive machines.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fd0AF

Read books on this topic.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BjYs0AD

Read more articles on this subject.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40COC0AU

Read Web acceleration device white papers.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fe0AG

Market research and analyst reports.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BsdA0Ah

------------------------------------------------------------
6) Interactive Buyer's Guide: Tape Autoloaders
------------------------------------------------------------
As enterprise data increases, storage requirements increase.
Fortunately, tape autoloaders are available to meet virtually
any demand. We'll help you select the best solution with our
cross-feature comparative database.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2ff0AH

Read books on this topic.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BjYs0AD

Read more articles on this subject.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40CTJ0Ag

Read tape autoloader white papers.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fg0AI

Market research and analyst reports.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BsdA0Ah

------------------------------------------------------------
7) BuzzCut
------------------------------------------------------------
a) Microsoft Sweetens Sour Licensing Scheme
By Sean Doherty
Engineers may still believe that technology sells products, but
businessmen and lawyers will tell you otherwise. You need to put
the technology in a product, license it and couple it with a service.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fh0AJ

b) Desktop Images Gain Stability
By Bruce Boardman
Intel is making it easier to maintain and deploy desktop images.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fi0AK

c) Warning: Linux Desktops Ahead
By Don MacVittie
With Ximian's introduction of Ximian Desktop 2 (XD2), get ready for
the heterogeneous network--again.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fj0AL

------------------------------------------------------------
8) Legal Eagle: Patent Impending
------------------------------------------------------------
By Sean Doherty
How do the standards bodies get rid of the thorn known as hiding
relevant patent information during the standardization process?
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fk0AM

------------------------------------------------------------
9) NWC Weblogs
------------------------------------------------------------
Daily Blog: Brother Can You Spare a Dimensional Warp Generator?
Right from my spam filter to your news feed, I'm pleased to bring
you the return of the dimensional warp generator spam in its entirety.
I know I'm only encouraging the author, but this is just too good to
trash.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fl0AN

Be sure to check out our other blogs:

Site Content
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40Bz2D0A2

NWC Inc.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BiG60Ar

NWC Goes to School
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BkTj0Ay

------------------------------------------------------------
10) Editor's Bookshelf and Network Security White Paper Pick
------------------------------------------------------------
Our editors have chosen "Network Intrusion Detection: An Analyst's
Handbook" as this week's featured companion book.

Written to be both a training aid and a technical reference for
intrusion detection analysts, Stephen Northcutt's book contains
unparalleled, practical experience that can't be found anywhere else.
With detailed explanations and illustrative examples from his own
career, Northcutt covers the topic completely, from detect evaluation,
analysis and situation handling through the theories involved in
understanding hackers, intelligence gathering and coordinated attacks
to an arsenal of preventive and aggressive security measures. Ideal
for the serious security analyst, "Network Intrusion Detection: An
Analyst's Handbook" is the tool that puts you in full control of your
network's security.

For more information.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fm0AO

Find other books.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BjYs0AD

-------------------------------------------------------------
Network Security White Paper Pick
-------------------------------------------------------------
This week's hottest network security white paper is "Enterprise
Vulnerability Assessment Selection Criteria," published by eEye
Digital Security.

Based on best-of-breed technology and specifically designed to meet
the diverse needs of enterprise network security initiatives, eEye's
solution is proven, accurate and effective. The power of eEye's
Enterprise Vulnerability Assessment solution is a result of its
vulnerability assessment scanning expertise, enterprise management
capabilities, and renowned vulnerability research team.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fn0AP

Access more network security white papers, case studies and product
information in the Network Computing Tech Library.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fo0AQ

For the latest technical information on today's key IT issues, visit
Network Computing's Tech Library.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BsdA0Ah

Get the latest IT white papers via our RSS feed.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40Bu2H0A1

------------------------------------------------------------
11) Network Computing's Storage Pipeline
------------------------------------------------------------
Check out our new storage pipeline for the latest market trends,
updates and news.

a) How To Get Creative When Buying Big-Ticket Infrastructure
(June 17, 2003)
By Eric Chabrow, InformationWeek
IT buyers are asking for--and getting--the technology they need from
vendors at little, or even no, up-front cost. Here's a look at some
best practices, including in the storage management realm.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fp0AR

b) Vendors Begin To Deliver On Convergence Promises
(June 17, 2003)
By Jerry Lazar
For some time, vendors have been talking up the convergence of SANs
and NASes into flexible, robust storage systems. Companies including
Storage Computer, Pirus Networks, EMC and TrueSAN are beginning to
make progress. Here's what it means for you.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fq0AS

If you need to make a critical storage product decision, we've got the
tool to help. Check out our new -- and expanding -- Product Finder.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fr0AT

Check out our Storage News Archives.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fs0AU

Visit -- and bookmark -- our category pages for content organized by
storage technology category.

Storage Software
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2ft0AV

Storage Hardware
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fu0AW

SAN/NAS
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fv0AX

Storage Services
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fw0AY

------------------------------------------------------------
12) Last Mile
------------------------------------------------------------
Edited by Bradley F. Shimmin and David Joachim
This edition: Top 11 signs your summer intern is insane;
the BOFH; Our favorite 404 Page.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2fx0AZ

------------------------------------------------------------
13) CMP Marketplace
------------------------------------------------------------
---------------------------------------------------------------
WE BUY & SELL USED CISCO - SINCE 1985
Network Hardware Resale provides fully guaranteed Cisco, 
Juniper, Extreme, and Redback equipment at affordable prices.
Learn how you can stretch your networking budget with fully 
tested and guaranteed pre-owned products. 
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BqJZ0Ae
--------------------------------------------------------------- 
Known for "industrial-strength text searching" (PC Magazine),
dtSearch(R) products instantly search gigabytes of text across a
desktop, network or Internet/Intranet; or publish big document
sets to the Web or CD/DVD.  See hundreds of reviews & developer case
studies, & download fully-functional evaluations, at:
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BvJw0AE

Kaveman, from Digital V6 is proud to sponsor the Network 
Computing Report. Kaveman provides secure remote (Keyboard/Video/Mouse)  
control to servers, down to the BIOS-level via TCP/IP. With no               
software to install, no license to purchase, Kaveman is cost   
effective and easy to deploy. Available in 1, 8 and 16 ports.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B1bq0AN

This issue sponsored by eEye Digital Security
Introducing Retina, the Industry's #1 rated vulnerability assessment
solution from eEye Digital Security. Retina uses non-intrusive tests
to assess your network, accurately identify weakness and provide 
comprehensive detail to enable complete remediation. Take control of 
your network and let Retina simplify your risk-reduction process. 
Click for a free 15-day trial of Retina and download a 
complimentary vulnerability assessment whitepaper:
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40Bzb30AY


------------------------------------------------------------
14) Latest IT Professional Downloads
------------------------------------------------------------
Find some of the newest files in IT Pro's collection of shareware,
utility and demo downloads for network and IT professionals below. If
you would like to see more downloads and begin receiving the latest
info on hot new utilities, packs and jewels, sign up for our free,
weekly IT Pro Downloads newsletter.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40Bdzn0AZ

a) Alchemy Network Monitor 5.0.13
This advanced and feature-rich network server monitor monitors your
servers and notifies you when a problem occurs.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40BanG0Af
Size: 1554k
Platform: Windows 95, 98 or NT
Licensing: Shareware; $199

b) Cache Speed Adware 3.0
Cache Speed changes some basic settings in your system.ini file. It
also optimizes your current physical RAM, giving your computer the
fresh feel that it has when you reboot it.

Download at:
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40B2TQ0Ac
Size: 1380k
Platform: Windows 95, 98 or NT
Licensing: Shareware; $9.99

By using IT Pro Downloads you agree to these terms of use.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40COR0Aj

-----------------------------------------------------------
This issue sponsored by Shunra. How will your application perform
over the WAN? Usually you don't know until you deploy it. Learn 
how to test your networked application performance in the lab 
before deployment. Get on-time, on-budget delivery. Read: 
Eyes Wide Open-How to deploy networked applications successfully.
http://www.nwc.com/shunra 
-----------------------------------------------------------

15) Subscription Information
------------------------------------------------------------
Did someone forward this newsletter to you? Get your own issue.
http://www.submag.com/cgi-bin/subscribe/nc?tc=1&wp=wpdly&pk=WMNDLY

Subscribe to Network Computing newsletters.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40Bdzn0AZ

Still not receiving your own FREE subscription to Network Computing
Magazine?
http://www.submag.com/cgi-bin/subscribe/nc?tc=1&wp=wpmag3&pk=WMDALY

Note: To better serve you we use dynamic URLs, which allow us to see
how many readers view each story. We do not share this information, or
your personal information, with any outside party. Concerned about the
privacy of your information relative to these tracking URLs? Please
refer to our privacy policy.
http://www.doubleclick.net/us/corporate/privacy

We'd like to know what you think about the newsletter and what
information you'd like to see in future editions. E-mail your comments
to (mailto:newsletter@nwc.com).

Subscribe Today! Network Computing's Security Alert Consensus, created
in conjunction with The SANS Institute, is a free, customizable
newsletter that gives you concise, timely, accurate and authoritative
data on security holes, exploits, patches and workarounds -- all
delivered directly to you from the industry's brightest and best
security experts. What's more, you can customize your content,
selecting from various areas of interest. For more information and to
subscribe to this free newsletter.
http://update.networkcomputing.com/cgi-bin4/DM/y/eMZA0E43wY0V40COV0An

Look for the next Network Computing newsletter on Monday, June 30,
2003.

Copyright (c) 2003 Network Computing, a CMP Media LLC publication.

This message powered by DARTmail
http://www.doubleclick.net/us/corporate/privacy