News
Enterprise software
-
February 08, 2007
08
Feb'07
New storage IPOs report losses
Of the 2006 "graduating class" of storage IPOs, two reported losses this week in their first quarter as public companies.
-
February 07, 2007
07
Feb'07
VoIP capabilities save hotel money, keep guests connected
"Rip and replace" were three words the Seaport Hotel in Boston didn't want to hear when considering VoIP capabilities.
-
February 07, 2007
07
Feb'07
Briefs: Vulnerabilities found in Trend Micro, Firefox browser
This week, Trend Micro released a fix for a flaw in its antivirus engine, while no fixes are available for two newly discovered Mozilla Firefox browser flaws.
-
February 07, 2007
07
Feb'07
EMC plans array-based encryption via PowerPath
EMC's next security move will be array-based encryption through PowerPath by 2008, according to internal documents obtained by SearchStorage.
-
February 06, 2007
06
Feb'07
VoIP predictions for 2007: Best bets from VoIP experts
How will the VoIP and networking markets evolve over 2007? SearchVoIP experts, Carrie Higbie and Juan Pablo Pazos, and our valued site members, put their cards on the table about the 2007 VoIP market and other important networking trends.
-
February 05, 2007
05
Feb'07
What are the disadvantages of unified storage over independent block and file systems?
There are some compromises that you'll need to make; there are certainly some control granularity issues. The pattern of access for file-based data and block-based data is significantly different...
-
February 05, 2007
05
Feb'07
Is there any reliability difference with unified storage?
There are a few minor differences, but usually not a significant difference...
-
February 05, 2007
05
Feb'07
CA backup bug exploitable on Vista
In what appears to be the first exploit for a third-party app running on Vista, a previously patched buffer overflow vulnerability in CA BrightStor ARCserve Backup has been exploited. One security firm says ISVs aren't taking advantage of Vista's ...
-
February 05, 2007
05
Feb'07
What does unified storage really mean?
This can often be confusing once you read vendors' marketing materials. Simply stated, unified storage [or multiprotocol storage] refers to a single storage system that can support both file and block access...
-
February 05, 2007
05
Feb'07
What is the advantage of having unified storage?
There is debate about that. Many customers may prefer to have just one storage system, avoiding specialized storage systems, like NAS for file-based access or a complicated block-based storage system...
-
February 05, 2007
05
Feb'07
What about the system features, like snapshot and remote replication?
At this point in time, most customers expect to have these features in both block- and file-based storage products...
-
February 05, 2007
05
Feb'07
What will be the impact on performance when mixing block and file in the same system?
Caching difficulties are one concern since caching patterns may not be optimized for block-based storage...
-
February 05, 2007
05
Feb'07
Do all the vendors offer unified storage?
No. Some vendors are moving in that direction and others have a limited number of OEM product offerings now. However, several vendors currently offer established products...
-
February 05, 2007
05
Feb'07
Acopia hypes heterogeneous snapshot
The file virtualisation startup is blustering about a demonstration of heterogeneous snapshot technology, but is being coy about releasing a product.
-
February 05, 2007
05
Feb'07
Symantec chief: Consumer confidence in data protection is key to online growth
In his keynote at RSA Conference 2007, Symantec CEO John W. Thompson said Big Yellow is ready for the shifting dynamics in the information security market, and implied that Microsoft's growing presence in security is a conflict of interest for its ...
-
February 05, 2007
05
Feb'07
Rootkit dangers at an 'all-time high'
Industry experts at RSA Conference 2007 say not only have rootkits become the weapon of choice for malicious hackers, but they've also emerged as useful tools for legitimate businesses trying to exert control over users.
-
February 05, 2007
05
Feb'07
Coviello: In 3 years, no more stand-alone security
RSA President Art Coviello says today's patchwork of monolithic security devices will disappear in the next three years as security is integrated into the larger IT infrastructure.
-
February 05, 2007
05
Feb'07
Gates touts secure access anywhere
Microsoft's chairman tells RSA Conference 2007 attendees that a combination of authentication and access management strategies is what it takes to protect corporate data, but information security pros are willing to wait for the proof.
-
February 05, 2007
05
Feb'07
Does it cost extra for unified storage?
For a lot of NAS-based systems -- even Windows Storage Server (WSS) with an iSCSI target unified storage capability is probably...
-
February 04, 2007
04
Feb'07
Vista exploitable, researcher says
Marc Maiffret, CTO and chief hacking officer of eEye Digital Security, said he has found a way to elevate system privileges by exploiting a flaw in Windows Vista.
-
February 04, 2007
04
Feb'07
CISOs mastering 'softer' skills
Why CISOs can no longer rely on technology skills alone and what businesses are looking for when recruiting their next information security leader.
-
February 04, 2007
04
Feb'07
Email security buying decisions
Email security can be a daunting task for SMBs -- how do you go about finding the right product? This tip delves into three approaches to email security and the products available.
-
February 04, 2007
04
Feb'07
Dozens of Web sites spread malicious Trojan
Update: The same malicious JavaScript keylogger that compromised the Dolphin Stadium Web site last week was found over the weekend on dozens of other high-profile Web sites.
-
February 04, 2007
04
Feb'07
New zero-day attack targets Microsoft Excel
Microsoft says maliciously crafted Excel files may permit the execution of arbitrary code. Other Microsoft Office applications may be at risk.
-
February 04, 2007
04
Feb'07
HDS to acquire Archivas for up to $120M
HDS will acquire archiving software partner, Archivas for close to $120 million stepping up its effort to compete with EMC in this market.
-
February 04, 2007
04
Feb'07
HP fills in gaps with product updates
HP announced updates to several of its products, but analysts are wondering what its ultimate strategy will be for storage virtualisation.
-
February 04, 2007
04
Feb'07
Intrusion detection systems are alive and kicking
IPS hasn't overtaken intrusion detection systems just yet. Senior News Writer Bill Brenner reveals what customers want when they're shopping for IDS products.
-
January 31, 2007
31
Jan'07
Open source ID projects link up with Microsoft
Higgins-Bandit groups develop a new open source tool that could make independent ID systems compatible with Microsoft Windows CardSpace program.
-
January 31, 2007
31
Jan'07
Unified communications to fuel PBX growth
Unified communications will help push the PBX market to $7.5 billion over the next four years, according to recent research by the Dell'Oro Group.
-
January 30, 2007
30
Jan'07
Symantec exploitation video hits YouTube
Symantec posted a clip on the popular video-sharing site showing researchers using a newly discovered flaw in Microsoft Word to drop an executable on a vulnerable machine.
-
January 30, 2007
30
Jan'07
Windows Vista voice command tricked
An attacker found a way to play audio commands at a user's machine tricking the voice command capability in Vista into running arbitrary code.
-
January 30, 2007
30
Jan'07
Microsoft disputes Word zero-day report
Symantec is warning of a new zero-day vulnerability in Microsoft Word. But Microsoft doesn't believe the flaw is new.
-
January 30, 2007
30
Jan'07
Lawyers discuss e-discovery gotchas
During panel sessions at Legal Tech, lawyers provided their insights into the e-discovery process, retention policies and helping judges get up to speed.
-
January 30, 2007
30
Jan'07
Symantec unveils 'universal ID system'
Symantec said the goal is to create a universally accepted identity system across all Web sites -- from online financial institutions to retailers -- for millions of consumers.
-
January 30, 2007
30
Jan'07
Using IAM tools to improve compliance
Provisioning and password management tools can ease complexity, reduce help desk calls and save money. But they also have an added benefit: they can help with your compliance woes.
-
January 29, 2007
29
Jan'07
Hybrid drives hit NAS boxes
DNF will be making hybrid drives available in all of its storage products, but it doesn't recommend them for IP SANs.
-
January 29, 2007
29
Jan'07
Managed VoIP -- 10 tips for a smooth migration
Migrating to managed VoIP doesn't have to be a headache. Here, Verizon Business offers 10 top tips to ensure you get what you need.
-
January 29, 2007
29
Jan'07
TJX faces lawsuit over data breach
A class action lawsuit against TJX accuses the retailer of negligence for not doing enough to secure customer data and for keeping quiet about the breach for a month.
-
January 28, 2007
28
Jan'07
IBM improves data recovery process for TSM users
Tivoli Storage Manager 5.4, released this week, establishes a disk cache for most recently backed-up files, improving the slow restore times associated with the product.
-
January 28, 2007
28
Jan'07
IBM to acquire Softek, looks to pump up services biz
IBM says it intends to use Softek's Transparent Data Migration Facility within its Global Services business.
-
January 28, 2007
28
Jan'07
Brocade unveils McData integration roadmap
McData's directors and FICON routers will remain separate product lines for now; McData's SAN management software will replace Brocade's Fabric Manager.
-
January 25, 2007
25
Jan'07
Balancing the cost and benefits of countermeasures
The final tip in our series, "How to assess and mitigate information security threats."
-
January 25, 2007
25
Jan'07
Malware: The ever-evolving threat
The first tip in our series, "How to assess and mitigate information security threats"
-
January 25, 2007
25
Jan'07
Network-based attacks
The second tip in our series, "How to assess and mitigate information security threats."
-
January 25, 2007
25
Jan'07
Information theft and cryptographic attacks
The third tip in our series, "How to assess and mitigate information security threats."
-
January 25, 2007
25
Jan'07
IBM tool makes online purchases anonymous
A new tool makes online purchases anonymous by using artificial identity information. Experts say enterprises need to adopt the technology before it can become a viable option.
-
January 25, 2007
25
Jan'07
Symantec makes major update to Enterprise Vault
Symantec adds automated data classification and integration with security products in Version 7.0 of its Enterprise Vault archiving tool; EMC reports record earnings for the fourth quarter.
-
January 25, 2007
25
Jan'07
Apple fixes Mac Wi-Fi flaw
The Mac OS X Wi-Fi flaw Apple fixed on 24 Jan was first disclosed as part of the Month of Kernel Bugs in November. Attackers could exploit it to crash the targeted system.
-
January 24, 2007
24
Jan'07
iSCSI SANs grow in midmarket, enterprise
Because transporting "SCSI over IP" leverages ubiquitous Ethernet networks, that translates to lower cost, easier maintenance and simpler management, which makes SAN deployment more attractive for SMEs.
-
January 24, 2007
24
Jan'07
Microsoft investigates new Word zero-day
An unpatched memory-corruption flaw in Microsoft Word is the target of "limited" attacks in the wild, Microsoft confirmed Thursday.