News

Enterprise software

  • November 08, 2006 08 Nov'06

    Storage virtualization acquisitions need careful consideration

    Storage virtualization alleviates traditional storage growth problems by implementing a layer of abstraction between applications and physical storage, allowing storage to be combined and treated as a ubiquitous resource, regardless of location. ...

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 8

    Big pay for storage jobs, page 8

  • November 07, 2006 07 Nov'06

    Mozilla fixes Firefox flaws

    Attackers could exploit multiple flaws in Firefox, SeaMonkey and Thunderbird to crash machines, bypass security restrictions and launch malicious code.

  • November 07, 2006 07 Nov'06

    NetApp to acquire Topio

    Six months after EMC acquired heterogeneous replication provider Kashya, NetApp jumps on the bandwagon by announcing plans to acquire Topio for $160M.

  • November 06, 2006 06 Nov'06

    How to manage encryption keys

    Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed.

  • November 06, 2006 06 Nov'06

    Softek rides IBM mainframe wave, plans acquisition

    Data migration software provider Softek is planning to acquire Enigma to boost its mainframe storage software business.

  • November 05, 2006 05 Nov'06

    Microsoft eyes second zero-day threat in a week

    This time, attackers are going after a zero-day flaw in Windows, and Microsoft has released some workarounds until a patch is available.

  • November 01, 2006 01 Nov'06

    Tor network privacy could be cracked

    The Tor network is used by those who want to keep their IP addresses private. But new research shows that it's possible to compromise the system and unmask the user.

  • October 31, 2006 31 Oct'06

    Flaw found in Firefox 2.0

    Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.

  • October 31, 2006 31 Oct'06

    Zero-day attacks target Microsoft Visual Studio

    Microsoft has outlined a series of steps users should take to protect their machines from attacks that exploit a new zero-day flaw in Visual Studio 2005.

  • October 30, 2006 30 Oct'06

    Instant messaging attacks rise in October

    In October alone, security firm Akonix Systems tracked 88 attacks that used instant messaging programs to spread. Attackers are also exploiting P2P programs.

  • October 30, 2006 30 Oct'06

    Firefox fans unfazed by IE 7

    IT administrators like the security improvements in IE 7. But for those who use Firefox, Microsoft's browser upgrade isn't enough to make them switch.

  • October 26, 2006 26 Oct'06

    Achieving compliance: a real-world roadmap

    A security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as essential.

  • October 26, 2006 26 Oct'06

    Security Blog Log: The never-ending PatchGuard debate

    This week, security vendor fright over the Windows Vista PatchGuard feature permeates the blogosphere. Is Microsoft the boogeyman, or just misunderstood?

  • October 26, 2006 26 Oct'06

    What storage managers are buying and why

    The second installment of the 2006 edition of Storage magazine's exclusive Purchasing Intentions Survey reveals key storage technology purchasing decisions by storage managers across all industries.

  • October 26, 2006 26 Oct'06

    IT greats: Top 10 greatest IT people

    For every world-famous name with a world famous fortune – think Bill Gates, Steve Jobs and Michael Dell – there are hundreds of other individuals who have moved the IT industry and its technology inexorably forward

  • October 25, 2006 25 Oct'06

    Sourcefire looking to go public

    The company behind the popular Snort open source IDS tool is making a bid to go public, months after its deal to be acquired by Check Point collapsed.

  • October 23, 2006 23 Oct'06

    Symantec patches AntiVirus Corporate Edition flaw

    Attackers could exploit a flaw in Symantec AntiVirus Corporate Edition and Client Security to overwrite kernel addresses, crash machines and run malicious code.

  • October 23, 2006 23 Oct'06

    Comparing VoIP vendors

    For many companies, the tough decision isn't whether to use IP telephony or not -- it's which vendor to choose. We've collected some of Carrie Higbie's tips and tricks for vendor selection, garnered from her "Ask-the-Expert" section. Carrie ...

  • October 23, 2006 23 Oct'06

    SATA boosts RAID 6 use

    High-capacity SATA disks are driving up the use of RAID 6, which has prompted vendors to create new ways of overcoming the performance hit incurred with dual-parity protection.

  • October 22, 2006 22 Oct'06

    Enhanced Identity and Access Management

    From consolidating directories to automating provisioning and rolling out single sign-on, these sessions identify how leading organizations are strengthening authorization and enforcing access controls.

  • October 22, 2006 22 Oct'06

    Snyder On Security: An insider's guide to the essentials

    Joel Snyder, senior partner with consultancy Opus One, provides an in-depth look at information security trends and technologies.

  • October 18, 2006 18 Oct'06

    Rural Payments Agency project failed after IT system costs spiralled

    Delays in implementing a bespoke IT system led to the Rural Payments Agency (RPA) failing to pay subsidies to farmers on time, according to a National Audit Office report.

  • October 17, 2006 17 Oct'06

    Am I out of luck if I have a "mixed" email system (e.g., Exchange and Notes)?

    That's a "real-life" situation that we run into many times when we've gone out and worked with companies. We might be called in by a company that has both a Microsoft Exchange and a Notes/Domino email system and they want to tie an archive together,...

  • October 16, 2006 16 Oct'06

    Oracle fixes 101 flaws

    Attackers could exploit 45 of the 101 flaws remotely without a username or password. Meanwhile, the new CPU offers more detail on the number of flaws patched and their severity.

  • October 15, 2006 15 Oct'06

    Sun goes back to its roots with Honeycomb user

    Stanford University is the first official Honeycomb customer; it will be using the programmable storage archive for its massive Google library project.

  • October 12, 2006 12 Oct'06

    Microsoft to fold security into Windows division

    The software giant said the move would make future Windows development efforts more efficient. The changes take effect after Microsoft releases Vista.

  • October 11, 2006 11 Oct'06

    Brief: Malicious Web site poses as Google

    A malicious Web site poses as Google's Italian site, but attempts to install malicious ActiveX controls on victim's machines and ultimately redirect them to adult content.

  • October 11, 2006 11 Oct'06

    Sun clarifies disk storage strategy

    Sun execs at StorageTek Forum say they plan to keep (but streamline) most of the disk storage portfolio -- but did not deny rumors about plans to sell off the 6920 array.

  • October 09, 2006 09 Oct'06

    Banking on the future

    As the banking landscape changes and global competition takes hold, IT offers banks a way of differentiating themselves from the competition, so how do they balance innovation and imitation in this tough market sector?

  • October 04, 2006 04 Oct'06

    Tiered storage becoming tried and true

    Tiered storage matches the value of data with the performance (and expense) of storage. Ideally, tiered storage can save money, while easing the access demands to any single storage tier. While tiered storage has clearly brought storage costs and ...

  • October 02, 2006 02 Oct'06

    Cisco brings video to the enterprise

    With the success of YouTube and other consumer on-demand video offerings, Cisco plans to bring on-demand video to the enterprise.

  • October 02, 2006 02 Oct'06

    Cisco brings video to the enterprise

    With the success of YouTube and other consumer on-demand video offerings, Cisco plans to bring on-demand video to the enterprise.

  • October 01, 2006 01 Oct'06

    New exploits target Microsoft's PowerPoint, IE

    Microsoft may have patched the VML flaw in Internet Explorer, but now it faces new threats against the Web browser and PowerPoint.

  • September 26, 2006 26 Sep'06

    Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services'

    Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services'

  • September 26, 2006 26 Sep'06

    Stration worm targets Windows machines

    The worm uses several fake email messages, including one claiming to be a security update. Users are advised to avoid unsolicited email attachments.

  • September 26, 2006 26 Sep'06

    Burton Group: Web application firewall market maturing

    Web application firewalls have improved performance and functionality, but it still takes time, knowledge and skills to implement them, according to a recent Burton Group report.

  • September 24, 2006 24 Sep'06

    Hijacked consumer machines target the enterprise

    Attackers continue to strike gold by targeting consumers who lack the security savvy to address desktop application flaws, according to Symantec Corp. Enterprises ultimately pay the price.

  • September 14, 2006 14 Sep'06

    Secure network perimeter to result from Symantec-Juniper deal

    Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter.

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage, page 3

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 14, 2006 14 Sep'06

    Mozilla fixes several Firefox flaws

    Several flaws could be used for man-in-the-middle, spoofing and cross-site scripting attacks. Mozilla has released Firefox 1.5.0.7 to address the problems.

  • September 12, 2006 12 Sep'06

    Dell and EMC: Five more years

    Dell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ.

  • September 12, 2006 12 Sep'06

    Big security fixes for QuickTime, Flash Player

    Apple and Adobe warned that attackers could exploit multiple flaws in QuickTime and Flash Player to run malicious code on targeted machines.

  • September 11, 2006 11 Sep'06

    Data storage compliance's impact on storage product choices

    Data storage compliance is having a tremendous impact on the storage organization, as well as the management practices employed to retain, search, certify and destroy data. It's not just regulations like SOX or HIPAA that influence storage -- there ...

  • September 11, 2006 11 Sep'06

    Security Bytes: Hackers target the Terminator

    In other news, Symantec upgrades its Norton product line and the Anti-Phishing Working Group says phishing activity soared this summer.