News

Enterprise software

  • February 21, 2007 21 Feb'07

    Cisco warns of IP phone flaws

    Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday.

  • February 20, 2007 20 Feb'07

    Cisco to acquire Reactivity for $135 million

    One analyst says Cisco will benefit from Reactivity's policy and threat management capabilities.

  • February 20, 2007 20 Feb'07

    Microsoft confirms new IE flaw

    Attackers could exploit a new flaw in Internet Explorer (IE) to access local files on targeted systems, Microsoft confirmed Tuesday.

  • February 20, 2007 20 Feb'07

    Google plugs dangerous flaw

    An attacker could exploit a hole in Google Desktop to gain access to users' personal files. Google has released a patch, but experts say not all users are receiving it.

  • February 12, 2007 12 Feb'07

    Microsoft fixes zero-day flaws in Word, Office

    Twelve security updates from Microsoft fix a range of problems, including a flaw in the Malware Protection Engine and previously-exploited zero-days glitches in Word and Office.

  • February 12, 2007 12 Feb'07

    Skype makes more enterprise inroads

    Skype has teamed with FaceTime Communications to give companies more control over Skype use within the enterprise.

  • February 11, 2007 11 Feb'07

    Cybersecurity czar signals government cooperation at RSA Conference

    Cybersecurity chief, Greg Garcia told RSA Conference attendees that government, enterprises and academia need to work together to fight growing Internet threats.

  • February 11, 2007 11 Feb'07

    Solaris 10 has zero-day Telnet flaw

    Attackers could exploit a zero-day flaw in Solaris 10's Telnet daemon to bypass authentication and gain unauthorized system access, security experts warn.

  • February 10, 2007 10 Feb'07

    Cisco VoIP management guide: VoIP management lifecycle

    VoIP lifecycle management enables enterprises to safely pursue large production deployments. The management lifecycle includes the following four elements.

  • February 10, 2007 10 Feb'07

    Cisco VoIP managment guide: Required management tasks

    Comprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call success rates, telephony delays and impairments, as well as call quality. VoIP telephony management is ...

  • February 08, 2007 08 Feb'07

    Roundup: Vista security, breakability touted at RSA Conference

    At RSA Conference 2007, Microsoft extolled the security virtues of its new operating system, but others weren't afraid to demonstrate how Vista security is lacking.

  • February 08, 2007 08 Feb'07

    New storage IPOs report losses

    Of the 2006 "graduating class" of storage IPOs, two reported losses this week in their first quarter as public companies.

  • February 07, 2007 07 Feb'07

    VoIP capabilities save hotel money, keep guests connected

    "Rip and replace" were three words the Seaport Hotel in Boston didn't want to hear when considering VoIP capabilities.

  • February 07, 2007 07 Feb'07

    Briefs: Vulnerabilities found in Trend Micro, Firefox browser

    This week, Trend Micro released a fix for a flaw in its antivirus engine, while no fixes are available for two newly discovered Mozilla Firefox browser flaws.

  • February 07, 2007 07 Feb'07

    EMC plans array-based encryption via PowerPath

    EMC's next security move will be array-based encryption through PowerPath by 2008, according to internal documents obtained by SearchStorage.

  • February 06, 2007 06 Feb'07

    VoIP predictions for 2007: Best bets from VoIP experts

    How will the VoIP and networking markets evolve over 2007? SearchVoIP experts, Carrie Higbie and Juan Pablo Pazos, and our valued site members, put their cards on the table about the 2007 VoIP market and other important networking trends.

  • February 05, 2007 05 Feb'07

    What are the disadvantages of unified storage over independent block and file systems?

    There are some compromises that you'll need to make; there are certainly some control granularity issues. The pattern of access for file-based data and block-based data is significantly different...

  • February 05, 2007 05 Feb'07

    Is there any reliability difference with unified storage?

    There are a few minor differences, but usually not a significant difference...

  • February 05, 2007 05 Feb'07

    CA backup bug exploitable on Vista

    In what appears to be the first exploit for a third-party app running on Vista, a previously patched buffer overflow vulnerability in CA BrightStor ARCserve Backup has been exploited. One security firm says ISVs aren't taking advantage of Vista's ...

  • February 05, 2007 05 Feb'07

    What does unified storage really mean?

    This can often be confusing once you read vendors' marketing materials. Simply stated, unified storage [or multiprotocol storage] refers to a single storage system that can support both file and block access...

  • February 05, 2007 05 Feb'07

    What is the advantage of having unified storage?

    There is debate about that. Many customers may prefer to have just one storage system, avoiding specialized storage systems, like NAS for file-based access or a complicated block-based storage system...

  • February 05, 2007 05 Feb'07

    What about the system features, like snapshot and remote replication?

    At this point in time, most customers expect to have these features in both block- and file-based storage products...

  • February 05, 2007 05 Feb'07

    What will be the impact on performance when mixing block and file in the same system?

    Caching difficulties are one concern since caching patterns may not be optimized for block-based storage...

  • February 05, 2007 05 Feb'07

    Do all the vendors offer unified storage?

    No. Some vendors are moving in that direction and others have a limited number of OEM product offerings now. However, several vendors currently offer established products...

  • February 05, 2007 05 Feb'07

    Acopia hypes heterogeneous snapshot

    The file virtualisation startup is blustering about a demonstration of heterogeneous snapshot technology, but is being coy about releasing a product.

  • February 05, 2007 05 Feb'07

    Symantec chief: Consumer confidence in data protection is key to online growth

    In his keynote at RSA Conference 2007, Symantec CEO John W. Thompson said Big Yellow is ready for the shifting dynamics in the information security market, and implied that Microsoft's growing presence in security is a conflict of interest for its ...

  • February 05, 2007 05 Feb'07

    Rootkit dangers at an 'all-time high'

    Industry experts at RSA Conference 2007 say not only have rootkits become the weapon of choice for malicious hackers, but they've also emerged as useful tools for legitimate businesses trying to exert control over users.

  • February 05, 2007 05 Feb'07

    Coviello: In 3 years, no more stand-alone security

    RSA President Art Coviello says today's patchwork of monolithic security devices will disappear in the next three years as security is integrated into the larger IT infrastructure.

  • February 05, 2007 05 Feb'07

    Gates touts secure access anywhere

    Microsoft's chairman tells RSA Conference 2007 attendees that a combination of authentication and access management strategies is what it takes to protect corporate data, but information security pros are willing to wait for the proof.

  • February 05, 2007 05 Feb'07

    Does it cost extra for unified storage?

    For a lot of NAS-based systems -- even Windows Storage Server (WSS) with an iSCSI target unified storage capability is probably...

  • February 04, 2007 04 Feb'07

    Vista exploitable, researcher says

    Marc Maiffret, CTO and chief hacking officer of eEye Digital Security, said he has found a way to elevate system privileges by exploiting a flaw in Windows Vista.

  • February 04, 2007 04 Feb'07

    CISOs mastering 'softer' skills

    Why CISOs can no longer rely on technology skills alone and what businesses are looking for when recruiting their next information security leader.

  • February 04, 2007 04 Feb'07

    Email security buying decisions

    Email security can be a daunting task for SMBs -- how do you go about finding the right product? This tip delves into three approaches to email security and the products available.

  • February 04, 2007 04 Feb'07

    Dozens of Web sites spread malicious Trojan

    Update: The same malicious JavaScript keylogger that compromised the Dolphin Stadium Web site last week was found over the weekend on dozens of other high-profile Web sites.

  • February 04, 2007 04 Feb'07

    New zero-day attack targets Microsoft Excel

    Microsoft says maliciously crafted Excel files may permit the execution of arbitrary code. Other Microsoft Office applications may be at risk.

  • February 04, 2007 04 Feb'07

    HDS to acquire Archivas for up to $120M

    HDS will acquire archiving software partner, Archivas for close to $120 million stepping up its effort to compete with EMC in this market.

  • February 04, 2007 04 Feb'07

    HP fills in gaps with product updates

    HP announced updates to several of its products, but analysts are wondering what its ultimate strategy will be for storage virtualisation.

  • February 04, 2007 04 Feb'07

    Intrusion detection systems are alive and kicking

    IPS hasn't overtaken intrusion detection systems just yet. Senior News Writer Bill Brenner reveals what customers want when they're shopping for IDS products.

  • January 31, 2007 31 Jan'07

    Open source ID projects link up with Microsoft

    Higgins-Bandit groups develop a new open source tool that could make independent ID systems compatible with Microsoft Windows CardSpace program.

  • January 31, 2007 31 Jan'07

    Unified communications to fuel PBX growth

    Unified communications will help push the PBX market to $7.5 billion over the next four years, according to recent research by the Dell'Oro Group.

  • January 30, 2007 30 Jan'07

    Symantec exploitation video hits YouTube

    Symantec posted a clip on the popular video-sharing site showing researchers using a newly discovered flaw in Microsoft Word to drop an executable on a vulnerable machine.

  • January 30, 2007 30 Jan'07

    Windows Vista voice command tricked

    An attacker found a way to play audio commands at a user's machine tricking the voice command capability in Vista into running arbitrary code.

  • January 30, 2007 30 Jan'07

    Microsoft disputes Word zero-day report

    Symantec is warning of a new zero-day vulnerability in Microsoft Word. But Microsoft doesn't believe the flaw is new.

  • January 30, 2007 30 Jan'07

    Lawyers discuss e-discovery gotchas

    During panel sessions at Legal Tech, lawyers provided their insights into the e-discovery process, retention policies and helping judges get up to speed.