Networking Decisions Conference 2004: Network security presentations

Networking Decisions 2004 continued to provide a combination of valuable strategic and technical content that our audience took back to their organizations to utilize immediately. We learned from celebrated networking experts, senior executives and industry analysts who revealed the most effective real-world solutions for managing and securing enterprise networks.

Network security presentations

Selling information security to upper management

Convincing upper management of the importance of information security is one of the toughest jobs any IT professional will ever be faced with. However, it must be done in order to ensure information security success within the organization. In this session, Kevin Beaver, Founder and President of Principle Logic, LLC outlined how to take the technical aspects out of information security initiatives and turn them around to show business value to upper managers to get buy-in and ongoing support - all without having to make detailed calculations of risk and ROI.

    Requires Free Membership to View

Click here to download this PowerPoint presentation.

Best practices for securing IP telephony

Security is a prime concern for most organizations that are evaluating or implementing IP telephony. Moving voice onto the data network implies that all the vulnerabilities currently facing data networks will now be a risk for voice networks as well. In this session, Irwin Lazar, Practice Manager, Burton Group, explored the risk factors in IP telephony and provided best practices and strategies for risk mitigation.
Click here to download this PowerPoint presentation.

Encrypt the data, not the network

Enterprises spend billion of dollars creating massive, mission critical, global networking infrastructures and they are spending billions of more dollars securing this network from unauthorized, nefarious users -- many of whom come from within the enterprise, not from outside. In this session, Jon Callas, CTO and CSO of PGP, Inc. showed us an alternative approach to leveraging investments as well as the common communications protocols widely in use today. This approach not only addresses e-mail security, but all forms of data traffic that transmit across the ISO stack at level 4.
Click here to download this PowerPoint presentation.

Research results: Rating networking vendors and overall technology

Based on in-depth interviews with over 150 networking and information security executives, this presentation highlights the 2005-2006 networking technology implementation plans of Fortune 1000 enterprises. Over 30 different emerging technologies and infrastructure technologies will be discussed and the relative demand for each will be presented, based on direct user feedback. In addition, "voice of the customer" ratings and commentary on over 25 different networking technology vendors will be presented. Quotes from customers of these vendors will be used to illustrate the quantitative ratings of these vendors on 12 different corporate and product-specific criteria.
Click here to download this PowerPoint presentation.

Exclusive news from our conference floor:
City's mesh network nets criminals
In New Orleans, a wireless mesh network with surveillance cameras has not only helped cops catch criminals in the act, but also kept Wi-Fi costs down and extended access to the underprivileged.

Networking Decisions 2005 will be held in Chicago, Nov. 8-10, 2005.

This was first published in November 2004

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.