News
Enterprise software
-
March 15, 2007
15
Mar'07
Cisco buys WebEx for $3.2 billion
Cisco plans to buy WebEx, maker of hosted, on-demand collaboration applications.
-
March 14, 2007
14
Mar'07
Podcast: Security360 - SOA, Web Services Security
ZapThink analyst Jason Bloomberg offers an overview of the security issues unique to SOA environments, while executives from SAP and Oracle discuss how they address SOA security in their software.
-
March 14, 2007
14
Mar'07
Emulex launches storage virtualization appliance
Emulex has packaged a chip from its Aarohi acquisition into an appliance that could be a lower cost hardware platform for storage virtualization software products.
-
March 13, 2007
13
Mar'07
NEC reveals HydraStor grid storage
NEC announces its HydraStor array for secondary storage, touting its grid storage architecture, automated policies for data management and scalable deduplication.
-
March 08, 2007
08
Mar'07
Review: eGuardPost a B+ overall
eGuardPost is a well-designed and highly capable product that meets an important need. It has strong security and great forensics capabilities.
-
March 08, 2007
08
Mar'07
Review: Sun Java System Identity Manager 7.0 'impressive'
Hot Pick: Sun Java System Identity Manager 7.0 excels with agentless connectors, scalability and amazing auditing.
-
March 07, 2007
07
Mar'07
Microsoft cancels Patch Tuesday as DST looms
IT administrators who are struggling to apply all their daylight-saving time (DST) patches will get a break from Microsoft next week, as no new security fixes will be released.
-
March 07, 2007
07
Mar'07
Microsoft outlines software-centric VoIP, UC
Microsoft unveils its vision of a software-based VoIP system to enable unified communications.
-
March 05, 2007
05
Mar'07
Nortel switch release focuses on unified communications
Nortel today released two new switch series aimed at unified communications deployments.
-
March 05, 2007
05
Mar'07
Nortel switch release focuses on unified communications
Nortel today released two new switch series aimed at unified communications deployments.
-
March 04, 2007
04
Mar'07
NetApp stokes midrange fires with new array
The FAS 3040 is a scaled down version of the 64-bit 3070 architecture; NetApp officials say more moves downmarket will follow.
-
March 04, 2007
04
Mar'07
Buzz builds around data reduction for primary storage
Analysts predict that in-band compression offerings from StoreWiz, newly updated this week, are the first step toward a new wave of primary storage deduplication products.
-
March 04, 2007
04
Mar'07
Expert: NAC not a network security cure-all
According to an expert at Black Hat DC, NAC success demands careful planning and a good understanding of the company network; otherwise, implementations can quickly go awry.
-
March 02, 2007
02
Mar'07
Police force secures data with biometrics
Humberside Police has issued biometric USB drives among staff to maintain data security.
-
March 01, 2007
01
Mar'07
Linksys, Gateway launch low-end NAS
Cisco subsidiary Linksys and PC maker Gateway launch new NAS products for small businesses and consumers.
-
February 28, 2007
28
Feb'07
RFID cloning presentation moves forward despite legal threats
Chris Paget, director of research and development at IOActive spoke mainly about the science behind RFID tags and readers and the inherent security issues of the technology.
-
February 27, 2007
27
Feb'07
McAfee fixes flaw in Mac antivirus software
Attackers could exploit the hole in McAfee's Virex 7.7 antivirus program for Mac OS X to bypass the malware scanner, but a fix is available.
-
February 27, 2007
27
Feb'07
'Worm' targets Sun Solaris Telnet flaw
Security researchers have found evidence that a worm is trying to exploit the recently patched Telnet flaw in Sun Solaris. Experts say it's another reason to stay away from Telnet.
-
February 27, 2007
27
Feb'07
Wireless security: IT pros warily watching mobile phone threats
Security experts have warned repeatedly that mobile phone attacks will grow as the devices become more sophisticated. IT administrators are starting to believe them.
-
February 26, 2007
26
Feb'07
HP acquires clustered file system software maker PolyServe
HP announced its intent to acquire clustered file system maker PolyServe.
-
February 26, 2007
26
Feb'07
Storm rages again: Self-morphing Trojan uses blogs to spread rootkits
A new variant of the Storm Trojan that changes with each download is infecting blog sites with malicious URLs, intercepting traffic when visitors try to post comments.
-
February 25, 2007
25
Feb'07
HP announces iSCSI VTL for SMBs
HP's new iSCSI VTL devices include automated backup capabilities for users with fewer than four servers.
-
February 25, 2007
25
Feb'07
PatchLink acquires STAT Guardian tool
PatchLink says it will add more muscle to its vulnerability management portfolio by acquiring the STAT Guardian tool from IT vendor Harris Corp.
-
February 25, 2007
25
Feb'07
Does an organization have to have an IP PBX in order to have a unified communications system?
Does an organization have to have an IP PBX in order to have a unified communications system?
-
February 22, 2007
22
Feb'07
Google offers 10 GB inbox
The search engine giant is offering an email application on a subscription basis with five times the storage capacity of the free version.
-
February 21, 2007
21
Feb'07
Cisco warns of IP phone flaws
Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday.
-
February 20, 2007
20
Feb'07
Cisco to acquire Reactivity for $135 million
One analyst says Cisco will benefit from Reactivity's policy and threat management capabilities.
-
February 20, 2007
20
Feb'07
Microsoft confirms new IE flaw
Attackers could exploit a new flaw in Internet Explorer (IE) to access local files on targeted systems, Microsoft confirmed Tuesday.
-
February 20, 2007
20
Feb'07
Google plugs dangerous flaw
An attacker could exploit a hole in Google Desktop to gain access to users' personal files. Google has released a patch, but experts say not all users are receiving it.
-
February 19, 2007
19
Feb'07
Sourcefire fixes Snort flaw
Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code.
-
February 19, 2007
19
Feb'07
When security firms merge, some users are losers
Some users see their services improve when IT security vendors merge with other companies or get acquired. Others say they've been left out in the cold.
-
February 19, 2007
19
Feb'07
What is unified communications?
Defining unified communications.
-
February 19, 2007
19
Feb'07
What is communication-enabled-business processes (CEBP)?
Defining communication-enabled business processes.
-
February 12, 2007
12
Feb'07
Siemens' acquisition of UGS 'will benefit users'
-
February 12, 2007
12
Feb'07
Mobile carriers admit to malware attacks
Eighty-three percent of mobile operators surveyed by McAfee Inc. say they've suffered malware infections, but two competing security vendors say the overall threat is still small.
-
February 12, 2007
12
Feb'07
Microsoft fixes zero-day flaws in Word, Office
Twelve security updates from Microsoft fix a range of problems, including a flaw in the Malware Protection Engine and previously-exploited zero-days glitches in Word and Office.
-
February 12, 2007
12
Feb'07
Skype makes more enterprise inroads
Skype has teamed with FaceTime Communications to give companies more control over Skype use within the enterprise.
-
February 11, 2007
11
Feb'07
Cybersecurity czar signals government cooperation at RSA Conference
Cybersecurity chief, Greg Garcia told RSA Conference attendees that government, enterprises and academia need to work together to fight growing Internet threats.
-
February 11, 2007
11
Feb'07
Solaris 10 has zero-day Telnet flaw
Attackers could exploit a zero-day flaw in Solaris 10's Telnet daemon to bypass authentication and gain unauthorized system access, security experts warn.
-
February 10, 2007
10
Feb'07
Cisco VoIP management guide: VoIP management lifecycle
VoIP lifecycle management enables enterprises to safely pursue large production deployments. The management lifecycle includes the following four elements.
-
February 10, 2007
10
Feb'07
Cisco VoIP managment guide: Required management tasks
Comprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call success rates, telephony delays and impairments, as well as call quality. VoIP telephony management is ...
-
February 08, 2007
08
Feb'07
Roundup: Vista security, breakability touted at RSA Conference
At RSA Conference 2007, Microsoft extolled the security virtues of its new operating system, but others weren't afraid to demonstrate how Vista security is lacking.
-
February 08, 2007
08
Feb'07
New storage IPOs report losses
Of the 2006 "graduating class" of storage IPOs, two reported losses this week in their first quarter as public companies.
-
February 07, 2007
07
Feb'07
VoIP capabilities save hotel money, keep guests connected
"Rip and replace" were three words the Seaport Hotel in Boston didn't want to hear when considering VoIP capabilities.
-
February 07, 2007
07
Feb'07
Briefs: Vulnerabilities found in Trend Micro, Firefox browser
This week, Trend Micro released a fix for a flaw in its antivirus engine, while no fixes are available for two newly discovered Mozilla Firefox browser flaws.
-
February 07, 2007
07
Feb'07
EMC plans array-based encryption via PowerPath
EMC's next security move will be array-based encryption through PowerPath by 2008, according to internal documents obtained by SearchStorage.
-
February 06, 2007
06
Feb'07
VoIP predictions for 2007: Best bets from VoIP experts
How will the VoIP and networking markets evolve over 2007? SearchVoIP experts, Carrie Higbie and Juan Pablo Pazos, and our valued site members, put their cards on the table about the 2007 VoIP market and other important networking trends.
-
February 05, 2007
05
Feb'07
What are the disadvantages of unified storage over independent block and file systems?
There are some compromises that you'll need to make; there are certainly some control granularity issues. The pattern of access for file-based data and block-based data is significantly different...
-
February 05, 2007
05
Feb'07
Is there any reliability difference with unified storage?
There are a few minor differences, but usually not a significant difference...
-
February 05, 2007
05
Feb'07
CA backup bug exploitable on Vista
In what appears to be the first exploit for a third-party app running on Vista, a previously patched buffer overflow vulnerability in CA BrightStor ARCserve Backup has been exploited. One security firm says ISVs aren't taking advantage of Vista's ...