Extreme grabs Avaya’s networking business for $100M

Email not displaying correctly? View it in your browser.

NETWORKWORLD

Network World Security Alert

Mar 08, 2017
Featured Image

Cisco reinforces HyperFlex hyperconvergence system with power, management features

It has been almost a year since Cisco jumped into the hyperconverged arena and while the HyperFlex business has done well – landing 1,100 customers -- the company is expecting a burst of upgrades to significantly speed and simplify management of its HyperFlex systems. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Extreme grabs Avaya’s networking business for $100M
Ransomware picks off broader targets with greater severity
Cybersecurity skills shortage holding steady
Why email is safer in Office 365 than on your Exchange server
Honeypot catches social engineering scams on social media
Wikileaks’ dump of CIA exploits exposes enterprises to new risks
U.S. Marshals warn against dual phone scams
(2013) Will entering your ATM PIN in reverse summon the police?
(2016) Cisco Founders Forum: One creative way to keep & energize talent

Solution Center: Rapid7

Do You Have the Power to Make Nothing Happen?

When it comes to security, the ability to "Make Nothing Happen" is really quite exciting. Check out these resources to learn how Rapid7's threat exposure management, incident detection and security advisory services enable organizations to see network risks and spot attacks before they damage your network. When you can make nothing happen, your enterprise can make growth happen. Read More

Thumbnail Image

Extreme grabs Avaya’s networking business for $100M

Extreme’s Ed Meyercord, President and CEO said he expects the deal will broaden the company’s software and strengthen its presence in vertical markets such as healthcare and manufacturing. Norman Rice, an executive vice president with Extreme added that some of Avaya’s strengths included its networking fabric and Network Micro-Segmentation technology that helps customers secure enterprise components. Read More

Thumbnail Image

Ransomware picks off broader targets with greater severity

How to protect more critical organizations from evolving ransomware. Read More

Cybersecurity skills shortage holding steady

Nearly half of all organizations report a “problematic shortage” of cybersecurity skills in 2017. Read More

Thumbnail Image
INSIDER

Why email is safer in Office 365 than on your Exchange server

Beyond blocking spam and virus-laden messages, cloud services can determine whether links are safe to visit and whether you’re protecting the right information. Read More

Thumbnail Image

Honeypot catches social engineering scams on social media

Research company investigates 40,000 fake accounts to find impersonator tactics.  Read More

Thumbnail Image

Wikileaks’ dump of CIA exploits exposes enterprises to new risks

Corporations concerned about the release of thousands of CIA documents detailing hacks against Apple iOS and Mac OSX, Google’s Android, Microsoft’s Windows, Linux and Solaris need to conduct a fresh round of risk assessment that takes the new revelations into account. Read More

Thumbnail Image

U.S. Marshals warn against dual phone scams

The U.S Marshals are warning the public not to respond to two recent scams involving people fraudulently posing as Marshals making calls across the country. The first is a warning about a scam where the fraudster calls members of the public and alleging they, or their family members, have an active federal arrest warrant and demanding payment of fines. Read More

(2013) Will entering your ATM PIN in reverse summon the police?

Read More

Thumbnail Image

(2016) Cisco Founders Forum: One creative way to keep & energize talent

A look at Cisco's little-known Founders Forum, an internal group of brainy entrepreneurs whose companies Cisco has acquired -- and who Cisco wants to keep within its ranks. Read More

Video/Webcast: HP Inc.

6 of 10 Companies Have Unsecured Printers. How About Yours?

Security threats are evolving every day. Even one security breach has the potential to be costly. If private information is jeopardized due to unsecured printing, the ramifications can be numerous. Join this webinar, brought to you by HP Inc., to learn how to protect your print environment from security breaches. Get your questions answered in the live Q&A session at the end of the webinar. Read More

Join The Network World Communities

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World’s LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).
Network World on Facebook
Network World on LinkedIn

SLIDESHOWS

10 killer Raspberry Pi projects (Collection 1)

Coolest new Android phones at Mobile World Congress 2017 Read More

Most-Read Stories

1. How to remotely control your Windows 10 computer via Google Chrome
2. U.S. Marshals warn against dual phone scams
3. Why BPM is now taking a central role in digital transformation
4. What the top 5 metro areas pay for hot IT jobs
5. Trump broke his H-1B promise. Now what?
6. GE favors SaaS for non-differentiated apps, moves away from MPLS, has big plans for IoT
7. Which Linux distros should newbies use?
8. Aruba’s top execs talk new tech, IoT and the competition
9. 7 free tools every network needs
10. Review: vArmour flips security on its head
Twitter Facebook LinkedIn Google+

You are currently subscribed to Network World Security Alert as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 Network World, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to customer_service@nww.com.