News
Enterprise software
-
October 14, 2007
14
Oct'07
VMware takes on data migration
VMware supports migrating data between disc arrays with Storage VMotion, changing the equation between server and storage virtualisation devices.
-
October 10, 2007
10
Oct'07
Unified communications new priority for HP
Unified communications is a confusing area with a number of vendors in the mix. HP has launched new services to help ease companies into unified communications and help them determine which integrated tools will best fit their business goals.
-
October 08, 2007
08
Oct'07
Happy Birthday to TechTarget ANZ
It's our birthday! Join us in wild celebration by remembering our most-read articles of times past.
-
October 07, 2007
07
Oct'07
IP telephony adoption rising, quality sagging
IP telephony adoption continues to grow, but service quality is lagging behind, according to a user survey from Psytechnics.
-
October 05, 2007
05
Oct'07
Podcast: the true cost of IT security
In this interview, Cliff Saran speaks to Martin Sadler, director of HP's Trusted Systems Lab, about how much should we be expected to spend and how much security is enough. Hackers are getting smarter and Martin believes newly trained IT ...
-
October 04, 2007
04
Oct'07
Pillar announces support for 1 TB SATA drives
Pillar is one of the earliest to announce 1 TB SATA drives in an enterprise array. IBM's SVC becomes the first storage virtualization product certified with VMware.
-
October 02, 2007
02
Oct'07
Web 2.0 strategies for SMBs
Web 2.0 technologies are catching on at companies of all sizes. Find out how to make them work for your SMB with SearchSMB.com's top five Web 2.0 tips.
-
September 26, 2007
26
Sep'07
Presence capabilities open university help desk
Presence capabilities have helped one university ensure that calls into its help desk reach the person with the right set of skills.
-
September 26, 2007
26
Sep'07
Microsoft releases Windows Server 2008 RC0
Windows Server 2008 Release Candidate 0 (RC0) is now available for customer review.
-
September 25, 2007
25
Sep'07
How to purchase a data encryption product
Data security is now a critical problem for every company, regardless of size. This buying guide explores the factors involved in purchasing data encryption hardware and software products.
-
September 24, 2007
24
Sep'07
Microsoft's OCS changing the face of VoIP?
Microsoft's OCS platform debuts soon, but will it bring about an industry shift to embedded communication applications as promised?
-
September 24, 2007
24
Sep'07
PCI council adds Pin security to remit
The PCI Security Standards Council has added Pin Entry Device (PED) security technology to its payments industry testing portfolio to streamline standardisation.
-
September 16, 2007
16
Sep'07
3PAR adds tiered storage management tool
The new version of the System Reporter management tool for 3PAR's high-end arrays now includes monitoring for tiered storage environments.
-
September 16, 2007
16
Sep'07
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Creating an intercom network between IP phones that support speakerphone capabilities is a relatively painless process when using Cisco CallManager Express.
-
September 09, 2007
09
Sep'07
Virtual appliance lets users convert DAS to iSCSI San
LeftHand Networks has released an edition of its SaniQ iSCSI San software that will convert locally attached disc to networked storage.
-
September 07, 2007
07
Sep'07
Microsoft update to patch critical Windows flaw
Microsoft plans to patch a critical flaw in Windows and plug holes in MSN Messenger, Visual Studio, and Windows services for Unix.
-
September 07, 2007
07
Sep'07
Government warns of dangerous QuickBooks Online flaw
Attackers could exploit two flaws in the popular Intuit QuickBooks Online Edition to cause buffer overflows and download or upload files in arbitrary locations, US-CERT warned.
-
September 07, 2007
07
Sep'07
Cybercriminals employ toolkits in rising numbers to steal data
The market is increasing for crimeware toolkits that help cybercriminals avoid detection and exploit flaws, according to new research from security vendor, Finjan.
-
September 06, 2007
06
Sep'07
Citrix adds Web security with acquisition
Citrix Systems Inc. said it acquired XML security vendor QuickTree for its compiler technology and Java API for XML processing.
-
September 05, 2007
05
Sep'07
NAC switches, appliances help track users, malware
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market including Cisco NAC and Microsoft NAP sorts itself out.
-
September 05, 2007
05
Sep'07
Firefox security issues persist despite update
Despite Mozilla's recent Firefox security update, researchers say there's another way attackers could exploit the browser for malicious purposes.
-
September 05, 2007
05
Sep'07
Critical flaw discovered in IBM DB2
IBM's DB2 database management system contains a flaw that could be exploited remotely by an attacker to take control of a system.
-
September 04, 2007
04
Sep'07
IT cheat sheets for all
They may seem like no-brainers to you, but some of your IT tricks and workarounds look magical to your peers. We've collected our favorite IT cheat sheets on topics ranging from AS/400 to HTML and Outlook so everyone can look like a whiz.
-
August 30, 2007
30
Aug'07
Flaw found in MSN Messenger
Attackers could exploit a flaw in MSN Messenger to run malicious code on targeted machines, according to Danish vulnerability clearinghouse Secunia.
-
August 30, 2007
30
Aug'07
Critical flaw found in Oracle developer tool
A popular tool used by Oracle developers contains a critical flaw that could be used by an attacker to compromise a system.
-
August 29, 2007
29
Aug'07
Rootkit found in older Sony USB device
F-Secure says it discovered rootkit technology in Sony's Micro Vault USM-F fingerprint reader software. The find comes two years after controversy over Sony's DRM technology.
-
August 28, 2007
28
Aug'07
Data archives overview
When a file is lost due to user error, or data is corrupted because of system problems, the affected data can be restored from a backup. An archive is different from a backup because the data may not be used for months, even years, but must be ...
-
August 28, 2007
28
Aug'07
SANS: Attackers may be attempting Trend Micro exploits
The SANS Internet Storm Center (ISC) warns that attackers may be attempting to exploit flaws in Trend Micro products to hijack computer systems.
-
August 27, 2007
27
Aug'07
VoiceCon Fall 2007: Unified communications still has barriers
Unified communications (UC) offers streamlined communication, but significant challenges still need to be addressed.
-
August 26, 2007
26
Aug'07
IBM back in iSCSI SAN fray
IBM is looking to take on HP's MSA and EMC's AX150, as well as EqualLogic and LeftHand, with a new iSCSI SAN product OEMed from LSI.
-
August 22, 2007
22
Aug'07
Trend Micro fixes flaws in ServerProtect, PC-cillin
Attackers could tamper with servers and run malicious code by exploiting flaws in Trend Micro's ServerProtect, Anti-Spyware and PC-cillin products. But fixes are available.
-
August 22, 2007
22
Aug'07
Microsoft adds CA vets to anti-malware team
Microsoft has hired Jakub Kaminski, one of CA's more talented and well-regarded antivirus researchers, and three of his colleagues from CA's Australian lab.
-
August 22, 2007
22
Aug'07
Attackers target two Microsoft security flaws
Symantec warned customers about attacks targeting two Microsoft security flaws -- an unpatched DirectX Media vulnerability and the XML Core Services flaw patched in MS07-042.
-
August 20, 2007
20
Aug'07
Sourcefire acquires open source ClamAV
Sourcefire, maker of the popular Snort open source IDS tool, has acquired ClamAV, an open source email gateway scanning tool.
-
August 20, 2007
20
Aug'07
VMware acquires HIPS provider Determina
VMware, the leader in virtualization software, has acquired Determina, a provider of host IPS technology.
-
August 19, 2007
19
Aug'07
College campuses prepare for Microsoft Vista challenges
With new Vista machines coming to campus, the IT shops of academia have no choice but to embrace the latest Windows OS and its security implications.
-
August 19, 2007
19
Aug'07
Push voice is the next mobility must-have
Push voice, coupled with mobile email, has the potential to make the smartphone a true mobile office.
-
August 17, 2007
17
Aug'07
Wal-Mart deploys new data security system
Wal-Mart Stores has deployed a data security and encryption system to secure data going over its global network.
-
August 17, 2007
17
Aug'07
HDS, HP simplify high-end disk array pricing
Users of the new USP-V disk array from HDS and the XP24000 disk array from HP will now pay less for attaching external storage, as well as capacity.
-
August 16, 2007
16
Aug'07
TJX profit takes hit over data breach
TJX says it has spent $256 million responding to the massive data breach that exposed 45 million customers to identity fraud, and the bottom line has suffered as a result.
-
August 15, 2007
15
Aug'07
Latest Microsoft flaws affect Windows, IE, Excel
Microsoft released nine security updates Tuesday -- six of them critical -- for flaws in Internet Explorer, Excel and other programs within the Windows OS.
-
August 14, 2007
14
Aug'07
Novell to acquire Senforce for endpoint security
Novell is acquiring Senforce, an early network access control supplier, to integrate its endpoint security features and develop an endpoint management suite.
-
August 14, 2007
14
Aug'07
Apple iPhone to provoke complex mobile attacks, expert warns
Mikko Hypponen, director of antivirus research at F-Secure, said he expects mobile malware attacks to escalate thanks to interest in Apple's iPhone.
-
August 13, 2007
13
Aug'07
Data backup copies overview
How do you choose a storage copy technology? The best choices usually involve need and cost, vendor support, and technological compatibility/longevity.
-
August 10, 2007
10
Aug'07
SMEs’ CRM needs catered for in Sage 200
Accounting software specialist Sage has expanded its business automation software portfolio with the launch of a customer relationship management system, Sage 200.
-
August 09, 2007
09
Aug'07
Buying Guide for NAS management software
Learn the key evaluation factors for purchasing NAS management software in this Buying Guide.
-
August 09, 2007
09
Aug'07
NAS appliance purchase considerations
NAS appliances are frequently touted for bringing convenience and simplicity to network storage. Appliances include their own dedicated disks for storage and RAID, and most NAS appliances can be upgraded with more or larger disks for additional ...
-
August 09, 2007
09
Aug'07
Sun adds virtual tape library to Thumper
Analysts say the combo of FalconStor's software, Solaris and Thumper is a good sign of integration from Sun after a disorganised year, but it's unclear if users will be convinced.
-
August 09, 2007
09
Aug'07
VoIP vulnerability threatens data
VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data.
-
August 09, 2007
09
Aug'07
Immunity releases new exploit-writing tool
Pen testing company says its Debugger tool offers researchers a new way to write exploits, analyse malware and reverse engineer binary files.