News
News Archive
-
April 08, 2007
08
Apr'07
Symantec fixes 'high-risk' flaw in Enterprise Security Manager
Attackers could hijack machines from remote locations by exploiting a flaw in Symantec Enterprise Security Manager (ESM). Kaspersky Lab users also have a flaw to deal with.
-
April 05, 2007
05
Apr'07
Goldman Sachs: Interest in NetApp SAN products wanes
A survey by the investment firm shows enterprise storage buyers had a declining interest in NetApp SAN products over the last year.
-
April 04, 2007
04
Apr'07
Wireless VoIP market to grow rapidly
VoIP and Voice over Wi-Fi markets are expected to be strong in 2007 and remain so through 2012.
-
April 04, 2007
04
Apr'07
Storage vendors propose FC over Ethernet standard
A group of nine storage vendors led by Emulex is proposing a Fibre Channel over Ethernet (FCoE) standard .
-
April 04, 2007
04
Apr'07
Data security breach at UCSF may have exposed thousands
The University of California at San Francisco (UCSF) acknowledged Wednesday that a security hole in a computer server may have exposed 46,000 people to potential identity fraud.
-
April 01, 2007
01
Apr'07
Spam poses as Internet Explorer 7 download
Beware of emails from "[email protected]." It may look like an invitation to download Internet Explorer 7, but it's really a trick to infect machines with malware.
-
April 01, 2007
01
Apr'07
Microsoft releases patch for Windows ANI flaw
Security companies are seeing massive attacks against the Windows ANI zero-day flaw, prompting Microsoft to rush out a fix a week before Patch Tuesday.
-
April 01, 2007
01
Apr'07
News Wrap 2.0
TechTarget ANZ's slightly skewed look at this weeks news.
-
April 01, 2007
01
Apr'07
Network security, content security markets to grow in 2007
The network security appliance and software markets are expected to continue growing steadily in 2007, while content security sales will begin to affect most enterprises' networking budgets.
-
March 29, 2007
29
Mar'07
VoIP network monitoring improves VoIP deployment
VoIP network monitoring and pre-deployment analysis are becoming more important as VoIP application overlay becomes denser
-
March 28, 2007
28
Mar'07
Enterprise switch upgrade specifications
Product snapshots highlighting key specifications for a cross section of popular enterprise-class switch products.
-
March 27, 2007
27
Mar'07
Compellent adds boot from SAN consolidation
Update saves storage space by consolidating boot volumes into a "golden" copy of the OS, but experts are troubled by a lack of partnerships with server and OS vendors.
-
March 27, 2007
27
Mar'07
Storage newcomers fight uphill battle
Gresham is newly marketing its VTL product to mixed U.S. reviews, and Australian file management player Moonwalk is inching its way onto U.S. radar screens.
-
March 27, 2007
27
Mar'07
VoIP's inherited data security problems
VoIP security problems present a challenge for voice and network staff. This article explains how to secure both your call servers and endpoints, and how best to divide this work between voice and data personnel.
-
March 26, 2007
26
Mar'07
What are some of the other options available to help manage unstructured data?
Eliminate unnecessary data from your production storage. This typically involves moving the unnecessary data to a different tier or deleting the data entirely...
-
March 26, 2007
26
Mar'07
What are some of the best practices for managing the growth of unstructured data?
It starts with corporate policies around data management...
-
March 26, 2007
26
Mar'07
What is unstructured data and how is it different from structured data in the enterprise?
What we're really doing is designating our data as structured or unstructured. Let's start with structured data...
-
March 26, 2007
26
Mar'07
Web 2.0: CIOs want it their way
A new study found CIOs want Web 2.0 technology, but they're a little insecure about getting it from emerging specialized vendors.
-
March 26, 2007
26
Mar'07
Metasploit Framework 3.0 released
Brief: Metasploit Framework 3.0 contains 177 exploits, 104 payloads, 17 encoders and 30 auxiliary modules that perform such tasks as host discovery and protocol fuzzing.
-
March 26, 2007
26
Mar'07
How can a company set retention policies with such a glut of unstructured data?
It depends; there are no easy answers to this. There are a number of initiatives that a company should undertake, including disaster recovery, business continuity planning, Sarbanes-Oxley compliance and data security...
-
March 26, 2007
26
Mar'07
How is unstructured data affecting storage administrators and other staff?
There is absolutely an effect. Additional data volume translates into...
-
March 26, 2007
26
Mar'07
Should I use data deduplication to manage unstructured data?
Absolutely; there are two areas where data deduplication, or single-instance storage, can help...
-
March 26, 2007
26
Mar'07
What is the impact of unstructured data on backup and restore and disaster recovery in general?
As data volumes grow, there's a bigger problem meeting recovery time objectives. We depend on our data, and we have set recovery times for our systems that are zero (no downtime) in some cases, though most companies set recovery times from eight to ...
-
March 26, 2007
26
Mar'07
What are some of the biggest challenges with unstructured data?
By far, the volume of data has to be the biggest challenge...
-
March 26, 2007
26
Mar'07
Are there regulatory compliance issues related to unstructured data?
The most important issue is legal discovery. You may not know what you have or how to find it, so it can be very difficult to find the files that may be required by a court of law...
-
March 26, 2007
26
Mar'07
What are some of the hidden costs of managing unstructured data?
-
March 26, 2007
26
Mar'07
IP communications tools boost productivity, sales
IP communications tools have opened up several possibilities for one North American company, giving it presence awareness and unified messaging.
-
March 25, 2007
25
Mar'07
Microsoft investigates Windows Vista Mail flaw
Attackers could exploit a flaw in Windows Vista Mail to compromise PCs by tricking the user into opening a malicious email attachment. Microsoft is investigating.
-
March 25, 2007
25
Mar'07
EMC CEO tips hat on future storage plans
At a media event in Sydney, EMC CEO, Joe Tucci said the company is working on storage tuned to the needs of Web 2.0 apps and also plugged the company's deduplication product.
-
March 25, 2007
25
Mar'07
Basic VoIP network setup
Basic VoIP network setup advice.
-
March 25, 2007
25
Mar'07
Why is VoIP authentication essential?
VoIP authentication advice.
-
March 25, 2007
25
Mar'07
VoIP protocols
VoIP protocols -- the strengths and weaknesses of each.
-
March 22, 2007
22
Mar'07
Midrange storage array purchase considerations
A Buying Guide focusing on specific considerations for midrange disk array systems. Also find a series of specifications to help make on-the-spot product comparisons between v
-
March 22, 2007
22
Mar'07
Flaws haunt protocol tied to national infrastructure
Also: A weakness is found in Windows settings, Microsoft investigates a new Vista flaw, and flaws are addressed in OpenOffice.org and Firefox.
-
March 22, 2007
22
Mar'07
Mozilla releases Firefox fix
One newly-discovered flaw and several glitches introduced in the last update have been fixed with Mozilla's release of Firefox 2.0.0.3 and 1.5.0.11.
-
March 22, 2007
22
Mar'07
Midrange storage array specifications
Product snapshots highlighting key specifications for a cross section of midrange storage array products.
-
March 22, 2007
22
Mar'07
11n will boost speed, prompt upgrades
802.11n's speed will be a welcome boost for end-users, but will create headaches as admins face network upgrades to deal with the demand for bandwidth it unleashes.
-
March 21, 2007
21
Mar'07
Storage Security FAQ audiocast
Don't have time to dig into the FAQ text now? Download the audiocast in MP3 format and listen in the car, at the gym -- wherever you want. You can download the entire presentation or the individual questions that you are most interested in.
-
March 21, 2007
21
Mar'07
Hackers broaden reach of cross-site scripting attacks
An explosion of AJAX-based applications has increased the damage that cross-site scripting (XSS) attacks can inflict on machines. A new tool uses XSS flaws to create a botnet.
-
March 21, 2007
21
Mar'07
VoiceCon Spring: A transition show for the VoIP industry
VoiceCon Spring was all about unified communications. Zeus Kerravala provides highlights of the more interesting points from the show.
-
March 20, 2007
20
Mar'07
NAC panel says technology may not add up
A panel discussing the potential of using network access control (NAC) says the technology may not be worth the price of deploying and maintaining it.
-
March 20, 2007
20
Mar'07
Symantec says fixing licensing portal top priority
Company officials say help is on the way as fallout continues from the merger of Symantec and Veritas ordering systems last November.
-
March 19, 2007
19
Mar'07
Internet complexity, insecurity could stifle innovation, expert says
Security threats are driving vendors to produce software and devices that automatically update and run only proprietary software with no effort from the end user. The result could be less flexibility and innovation, one expert says.
-
March 19, 2007
19
Mar'07
Power over Ethernet power consumption: The hidden costs
Power over Ethernet (PoE) has many advantages in a VoIP migration, but some companies overlook the amount of power needed to run PoE for VoIP and the costs and cooling requirements that come with it.
-
March 18, 2007
18
Mar'07
Symantec: Data thieves thrive on zero-day flaws
According to Symantec's threat report for the second half of 2006, attackers exploited misplaced USB drives and zero-day flaws to steal vast amounts of data. Expect more of the same in 2007.
-
March 18, 2007
18
Mar'07
Hacker techniques use Google to unearth sensitive data
Those who know where to look could use Google to dig up all sorts of sensitive company information, including intellectual property and passwords, one security expert warns.
-
March 18, 2007
18
Mar'07
Cisco stamps on Brocade in Q4, Dell'Oro says
For the second quarter in a row Cisco is gaining SAN switch market share on Brocade, according to the latest report by the Dell'Oro Group. But the numbers are causing a firestorm.
-
March 18, 2007
18
Mar'07
VoIP security worries are plentiful, potent
VoIP creates a new set of security issues for your network, as expert Ed Skoudis explains.
-
March 18, 2007
18
Mar'07
New gigabit standard: How fast is fast enough?
Last June, the 10GBASE-T standard was published promising 10 Gbit operations on copper cabling. This standard was originally targeted toward data centers, but the Ethernet Alliance and IEEE are working on increasing this standard to potentially 40 ...
-
March 15, 2007
15
Mar'07
Cisco buys WebEx for $3.2 billion
Cisco plans to buy WebEx, maker of hosted, on-demand collaboration applications.